-:Network Hacking (Port Scanning):-
Port Scanning :- Port scanning is carried out to determine a list of open ports on the
remote host that have certain services or daemons running. In port scanning, the attacker
connects to various TCP and UDP ports and tries to determine which ports are in listening mode.
1) TCP Ports Scanning :- Almost all port scans are based on the client sending a packet
containing a particular flag to the target port of the remote system to determine whether
the port is open. Following table lists the type of flags a TCP packet header can contain.
A typical TCP/IP three way handshake can be described as follows :
1) The client sends a SYN packet to the server.
2) The server replies with a SYN packet and acknowledges the
1) The client sends a SYN packet to the server.
2) The server replies with a SYN packet and acknowledges the
client's SYN packet by sending an ACK packet.
3) The client acknowledges the SYN sent by the server.
Different techniques of TCP port scanning are :-
1) TCP connect port scanning
2) TCP SYN scanning (half open scanning)
3) SYN/ACK scanning
4) TCP FIN scanning
5) TCP NULL scanning
6) TCP Xmas tree scanning
3) The client acknowledges the SYN sent by the server.
Different techniques of TCP port scanning are :-
1) TCP connect port scanning
2) TCP SYN scanning (half open scanning)
3) SYN/ACK scanning
4) TCP FIN scanning
5) TCP NULL scanning
6) TCP Xmas tree scanning
2) UDP Ports Scanning :- In UDP port scanning, aUDP packet is sent to each
port on the target host one by one.
If the remote port is closed, then the server replies with a Port Unreachable
If the remote port is closed, then the server replies with a Port Unreachable
ICMP error message. If the port is open then no such error message is generated.
3) FTP Bounce Port Scanning :- The FTP bounce port scanning technique was
3) FTP Bounce Port Scanning :- The FTP bounce port scanning technique was
discovered by Hobbit. He revealed a very interesting loophole in the FTP protocol
that allowed users connected to the FTP service of a particular system to connect
to any port of another system. This loophole allows anonymous port scanning.
how i scan port of eg DOCOMO , IDEA and other?? give me full info on love.like.as.u.want@gmail.com
ReplyDeletefirst you should have an ip/domain to scan the port then use this software which is know as ipscan.. this tool is one of the best tool http://www.crocko.com/D1B2863C90874C96A5F5455897356B08/ipscan.exe
ReplyDelete