Legal Disclaimer
Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking
Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Hacking For Beginners – Manthan Desai 2010<br />
Hacking tool Nmap<br />
http://www.insecure.org/nmap<br />
Stealth Scan, TCP SYN<br />
nmap -v -sS 192.168.0.0/24<br />
UDP Scan<br />
nmap -v -sU 192.168.0.0/24<br />
Stealth Scan, No Ping<br />
nmap -v -sS -P0 192.168.0.0/24<br />
Fingerprint<br />
nmap -v -0 192.168.0.0/24 #TCP<br />
Nmap is covered under the GNU General Public License (GPL) and can be downloaded free of charge from<br />
http://www.insecure.org/nmap. It comes as tarred source as well as RPM format. The usage syntax of Nmap is fairly<br />
simple. Options to nmap on the command-line are different types of scans that are specified with the -s flag. A ping scan,<br />
for example, is "-sP". Options are then specified, followed by the hosts or networks to be targeted. Nmap's functionality is<br />
greatly increased when run as root.<br />
Nmap is flexible in specifying targets. The user can scan one host or scan entire networks by pointing Nmap to the<br />
network address with a "/mask" appended to it. Targeting "victim/24" will target the Class C network, whereas<br />
"victim/16" will target the Class B. Nmap also allows the user to specify networks with wild cards, as in 192.168.7.*, which<br />
is the same as 192.168.7.0/24, or 192.168.7.1,4,5-16 to scan the selected hosts on that subnet.<br />
Users are able to sweep entire networks looking for targets with Nmap. This is usually done with a ping scan by using the<br />
"-sP" flag. A TCP "ping" will send an ACK to each machine on a target network. Machines that are alive on the network will<br />
respond with a TCP RST. To use the TCP "ping" option with a ping scan, the "-PT" flag is included to specific port on the<br />
target network.<br />
Nmap has been covered in detail in module three and readers are advised to refer to that to learn more about the OS<br />
fingerprinting and other scan options.<br />
Password cracking in Linux<br />
<br />
Xcrack<br />
(http://packetstorm.linuxsecurity.com/Crackers/)<br />
<br />
<br />
<br />
Xcrack doesn't do much with rules.<br />
It will find any passwords that match words in the dictionary file the user provides, but it won't apply any<br />
combinations or modifications of those words.<br />
It is a comparatively fast tool.<br />
Xcrack (http://packetstorm.linuxsecurity.com/Crackers/)<br />
Xcrack is a simple dictionary based password cracking tool. It will find any passwords that match words in the dictionary<br />
file the user provide. It does not generate permutation combination of the words provided in the dictionary to arrive at<br />
the right password. For this reason, it is a comparatively faster tool, though efficacy might be less.<br />
w w w . h a c k i n g t e c h . c o . t v Page 87