Posts

Showing posts from September 24, 2023

Nmap: SYN Scans, UDP Scans.

Nmap SYN Scans A SYN scan, also known as a half-open scan, is a popular network scanning technique. SYN scans are designed to determine which ports on a target system are open, closed, or filtered without completing a full TCP connection. Here's how a SYN scan works in Nmap: 1. TCP Three-Way Handshake: In a normal TCP connection, a three-way handshake occurs. The client sends a SYN (synchronize) packet to the server, the server responds with a SYN-ACK (synchronize-acknowledgment) packet, and the client completes the handshake with an ACK (acknowledgment) packet. 2. SYN Packet: In a SYN scan, Nmap sends a TCP SYN packet to the target system for each port it wants to scan. This is just the first step of the three-way handshake. If the port is open, the target system should respond with a SYN-ACK packet.  3. Nmap analyzes the responses it receives: If the target system responds with a SYN-ACK, Nmap considers the port open. If the target system responds with a RST (reset) packet, Nmap

Nmap: Introduction, Nmap switches and TCP Connect Scans.

Introduction Don't forget to read everything there, and if you have any questions around nmap, please drop them in the comments below, as well as to any other posts i make. Thank you.  Question 1: What networking constructs are used to direct traffic to the right application on a server? Answer: Ports Question 2: How many of these are available on any network-enabled computer? Answer: 65535  Question 3: How many of these are considered "well-known"? Answer: 1024 -------------------------------------------------------------------------------------------------------- Nmap Switches - Nmap can be accessed by typing nmap into the terminal command line. * To check the help section      1. nmap -h      2. man nmap  Question: What is the first switch listed in the help menu for a 'Syn Scan'? Answer: -sS Question:  Which switch would you use for a "UDP scan"? Answer: -sU Question If you wanted to detect which operating system the target is running on, which switc

Network Exploitation Basics: Introductory Networking

 The OSI Model: An Overview.  tryhackme room: introtonetworking -------------------------------------------------------- Please, read everything there, even if it seemed like a revision.  Q: Which layer would choose to send data over TCP or UDP? A: 4 Q: Which layer checks received information to make sure that it hasn't been corrupted? A: 2 Q: In which layer would data be formatted in preparation for transmission? A: 2 Q: Which layer transmits and receives data? A: 1 Q: Which layer encrypts, compresses, or otherwise transforms the initial data to give it a standardised format? A: 6 Q: Which layer tracks communications between the host and receiving computers? A: 5 Q: Which layer accepts communication requests from applications? A: 7 Q: Which layer handles logical addressing? A: 3 Q: When sending data over TCP, what would you call the "bite-sized" pieces of data? A: Segments (Which is the work of the TCP Protocol) Q: Which layer would the FTP protocol communicate with? [Re

Introductory Researching

Image
This room is part of "Complete Beginner " Pathway. It is simply how to research stuff in cyber using google and the such.  Task 2) Example Research Question: First Question: In the Burp Suite Program that ships with Kali Linux, what mode would you use to manually send a request (often repeating a captured request numerous times)? How it'll go: step 1: Go to Google.com  step 2: search "What is the model used in burp suite to send a request?" Answer: Repeater Second Question: What hash format are modern Windows login passwords stored in? my search: "what hash does the windows operating system for its stored passwords?" Answer: NTLM Third question:  What are automated tasks called in Linux? Search: what do we use to automate tasks in linux os?? And the answer is Cron Jobs.  You Got the idea. Question 4: What number based could you use as a shorthand for base 2 (binary)? Answer: Base 16 Question 5: If a password hash starts with $6$, what format is it (Uni