29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Hacking For Beginners – Manthan Desai 2010<br />

Hacking tool Nmap<br />

http://www.insecure.org/nmap<br />

Stealth Scan, TCP SYN<br />

nmap -v -sS 192.168.0.0/24<br />

UDP Scan<br />

nmap -v -sU 192.168.0.0/24<br />

Stealth Scan, No Ping<br />

nmap -v -sS -P0 192.168.0.0/24<br />

Fingerprint<br />

nmap -v -0 192.168.0.0/24 #TCP<br />

Nmap is covered under the GNU General Public License (GPL) and can be downloaded free of charge from<br />

http://www.insecure.org/nmap. It comes as tarred source as well as RPM format. The usage syntax of Nmap is fairly<br />

simple. Options to nmap on the command-line are different types of scans that are specified with the -s flag. A ping scan,<br />

for example, is "-sP". Options are then specified, followed by the hosts or networks to be targeted. Nmap's functionality is<br />

greatly increased when run as root.<br />

Nmap is flexible in specifying targets. The user can scan one host or scan entire networks by pointing Nmap to the<br />

network address with a "/mask" appended to it. Targeting "victim/24" will target the Class C network, whereas<br />

"victim/16" will target the Class B. Nmap also allows the user to specify networks with wild cards, as in 192.168.7.*, which<br />

is the same as 192.168.7.0/24, or 192.168.7.1,4,5-16 to scan the selected hosts on that subnet.<br />

Users are able to sweep entire networks looking for targets with Nmap. This is usually done with a ping scan by using the<br />

"-sP" flag. A TCP "ping" will send an ACK to each machine on a target network. Machines that are alive on the network will<br />

respond with a TCP RST. To use the TCP "ping" option with a ping scan, the "-PT" flag is included to specific port on the<br />

target network.<br />

Nmap has been covered in detail in module three and readers are advised to refer to that to learn more about the OS<br />

fingerprinting and other scan options.<br />

Password cracking in Linux<br />

<br />

Xcrack<br />

(http://packetstorm.linuxsecurity.com/Crackers/)<br />

<br />

<br />

<br />

Xcrack doesn't do much with rules.<br />

It will find any passwords that match words in the dictionary file the user provides, but it won't apply any<br />

combinations or modifications of those words.<br />

It is a comparatively fast tool.<br />

Xcrack (http://packetstorm.linuxsecurity.com/Crackers/)<br />

Xcrack is a simple dictionary based password cracking tool. It will find any passwords that match words in the dictionary<br />

file the user provide. It does not generate permutation combination of the words provided in the dictionary to arrive at<br />

the right password. For this reason, it is a comparatively faster tool, though efficacy might be less.<br />

w w w . h a c k i n g t e c h . c o . t v Page 87

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!