3.1 Scanning and Enumeration Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

19 hours 55 minutes
Video Transcription
I welcome back to the course. So in the last module, we wrapped up our discussion of footprint in with some labs
in this module running over skinning an enumeration. What's gonna talk a little bit about vulnerabilities?
So our scanning methodology. So we want to check for different live systems and also hope imports.
We also want to try toe be able too scared beyond the intrusion detection system and also perform things like banner grabbing. That way we can see potentially what kind of operating system is in use.
We want to scan for vulnerabilities, draw out or map out the network and then also prepare proxies. We want to say someone anonymous.
So are three way handshake. In the next video, we're gonna go over this more in depth, but basically, we I send you a sin packet of saying, Hey, I want to talk to you. You send me back a sin slash acknowledgement packets to basically say Okay, you know, I kind of want to talk to you. Do you want to talk to me? And then I send you $1 went back saying, Of course I want to talk to you
and then we established connection.
So again we're gonna hit that more in depth in the next video. I just want to kind of touch on it in this one
TCP header flags. So we're gonna see this more when we actually do our hands on labs. So we're gonna be doing several different sends of different packets. So by the TCP header flags, you've got to synchronize with the sin, which we've just seen in the previous slide there. So that's me sending that packet. You saying Hey, I want to, you know, talk to you.
We've got our announcement packet that basically sets the acknowledgement of the sin flags and yeah, I got your message, and then a reset our RST flag, basically, what that's gonna do that's gonna force the termination of communications in both directions. So let's pretend like we're boyfriend girlfriend, and we decided we didn't like each other, So we do the RST the reset flag and it terminates the phone call.
We've got the Finnish flag. So this one signifies an order close to remember that for your exam that this one is the order close to communications with us about the push flag or PS H that forces the delivery of day without any concern for buffering. So basically just sends it away, It doesn't care.
And then the urgent flag that'll send data out of the band.
So just one quick post assessment question again, What does the fin flags signify?
All right, so I mentioned you really want to know this for your exam The fin signifies in order to close to the communication.
So this video, we just touched a little bit on TCP three way handshake. And then the next video, we're gonna go over it a little more death. I've got a little drawing that I do for you that hopefully breaks down the concept a little better.
Up Next
Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By