Ethical Hacking: Scanning Networks

Ethical Hacking: Scanning Networks

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 54m | 292 MB

After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the system to look for valuable data and services in a specific IP address range. Network scans are also a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization’s infrastructure and data.

This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security.

Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50). This course maps to the 03 Scanning Networks domain.

Topics include:

  • Scanning overview
  • Port scanning countermeasures
  • Scanning and querying DNS
  • Scanning with ICMP
  • Mapping (or blueprinting) a network
  • Scanning for vulnerabilities
  • Using tools such as hping and NetScan
  • Evading detection
  • Concealing your network traffic
  • Preventing tunneling
Table of Contents

1 Welcome
2 Scan the LAN
3 What you should know
4 Hacking ethically
5 Virtual network setup
6 Roadmapping a scan
7 Scan techniques
8 Scanning vs. penetration testing
9 Scanning IPv6 networks
10 Port scanning countermeasures
11 The three-way handshake
12 TCP flags
13 Idle scans
14 Scan and query DNS
15 Scan using ICMP
16 Banner grabbing
17 Map a network with Nmap
18 Passive operating system discovery
19 SSDP for discovery
20 Other network mapping tools
21 Vulnerability scanning overview
22 Vulnerability discovery with Acunetix
23 Commercial and free scanners
24 Use hping
25 Scan with Nikto
26 NetScan tools
27 Intrusion detection systems
28 Use IP fragmentation scan
29 Staying anonymous
30 Hiding with onion routing
31 Proxifier and SocksChain
32 IP addresses spoofing countermeasures
33 IP spoofing detection techniques
34 HTTP
35 SSH
36 Defend against tunneling
37 Next steps