Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks by Dr. Hidaia Mahmood Alassouli

Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks by Dr. Hidaia Mahmood Alassouli

Author:Dr. Hidaia Mahmood Alassouli [Alassouli, Hidaia Mahmood]
Language: eng
Format: epub
Tags: Foot printing, Reconnaissance, Scanning Methodology, Enumeration, Hacking, Computer Networking
Publisher: Dr. Hidaia Mahmood Alassouli
Published: 0101-01-01T00:00:00+00:00


Using scapy tool to send a packet

c) Understanding the ping sweep technique.

It will find which devices are actives in the network. There are many tools to make ping sweep: angry and hping and nmap.

Use nmap

#nmap –sn 192.168.28.0 /24

Use hping

Use in windows angry tools

Use the nmap to know the open ports in a host

#nmap –sT 192.168.152.130 -p 80

Use the nmap to make scan on all ports

#nmap 192.168.152.130

Use the metasploit for same purpose



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.