02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

122 Chapter 5 ■ Scanning Networks<br />

So how does it work? Again, let’s let the developer describe the process (from the same<br />

website):<br />

To create a private network pathway with Tor, the user’s software or<br />

client incrementally builds a circuit of encrypted connections through<br />

relays on the network. The circuit is extended one hop at a time, and<br />

each relay along the way knows only which relay gave it data and which<br />

relay it is giving data to. No individual relay ever knows the complete<br />

path that a data packet has taken. The client negotiates a separate set of<br />

encryption keys for each hop along the circuit to ensure that each hop<br />

can’t trace these connections as they pass through.<br />

So you see that TOR provides you with a good amount of protection as well as the<br />

ability to obscure or encrypt traffic, making it much more difficult to detect.<br />

Summary<br />

Acting on the information gathered from the footprinting phase, you can perform network<br />

scanning with a much more targeted and purposeful strategy. Scanning represents an<br />

aggressive approach to gaining information about a system, because you are interacting<br />

directly with a target. You are probing the network and systems looking to see what you<br />

can find. Vulnerability scans, network mapping, port scans, and OS fingerprinting give you<br />

insight into the system and tell you the potential paths you can take with your testing.<br />

Exam Essentials<br />

Remember the basic concept of scanning. Scanning is designed to reveal the nature of<br />

system networks as well as the vulnerabilities that are present in the environment.<br />

Understand the targets. Know what resources can be targeted. Know what is present and<br />

start making plans on how to attack.<br />

Know the vulnerabilities. Understand that vulnerabilities change based on the operating<br />

system, network design, and other factors present in an environment.<br />

Know when to use each scan. Each scan has its own benefits and drawbacks that make it<br />

a good or bad choice for a given situation. Know when to use each.<br />

Know the preventive measures. Know the preventive measures available and the actions<br />

each one takes to prevent the attack.<br />

Know your tools and terms. The <strong>CEH</strong> exam is drenched with terms and tool names in<br />

the case of scanners there are quite a few available. However, the one you should be most<br />

familiar with and have experience using is Nmap. Familiarize yourself with the switches<br />

and techniques used to operate this scanner prior to taking the exam.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!