27.06.2013 Views

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3 rd packet :<br />

Machine A sends back TCP packet on port 0 with all flags at 0.<br />

Please note that the IP identification number has been incremented <strong>of</strong> several bits, from 0x848 to<br />

0x1923.<br />

4 th packet :<br />

The machine answers with a TCP packet identical to the 2 nd packet. Now look at the IP identification<br />

number: it has been incremented <strong>of</strong> +256!<br />

The identification number <strong>of</strong> machine A is always incremented <strong>of</strong> +256. But remember that it is not the<br />

value <strong>of</strong> the increment that is <strong>of</strong> interest to us here but rather the fact that it remains constant. Thanks<br />

to this identification number, we will be able to determine if a port is open on server S.<br />

Now, machine A must send a spo<strong>of</strong>ed packet to server S, to make it believe that machine C wishes to<br />

connect. To establish the scan, the first window is left open and another one is opened in which we will<br />

type:<br />

hping -a -S -p <br />

Example: hping -a 192.168.231.81 -S -p 21 192.168.231.1 where 22 is a port and we are going to try<br />

to determine if it is open or not.<br />

The <strong>Hack</strong>ademy DMP -86/209- SYSDREAM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!