1 00:00:15,980 --> 00:00:23,180 Let us start with the news section scanning and enumeration in this lecture, we are going to learn 2 00:00:23,270 --> 00:00:25,200 an overview of network scanning. 3 00:00:25,910 --> 00:00:27,080 So what is scanning? 4 00:00:27,740 --> 00:00:34,880 Scanning is a set of procedures for identifying a Laveaux port services, discussing operating systems, 5 00:00:35,030 --> 00:00:40,090 architecture of target system, identifying vulnerabilities and threats in the given network. 6 00:00:40,700 --> 00:00:44,450 Network scanning is used to create a profile of the target organization. 7 00:00:45,170 --> 00:00:51,070 Scanning refers to collecting more information using complex and aggressive reconnaissance techniques. 8 00:00:51,860 --> 00:00:58,370 So water object use of network scanning to discover lifeforce and Computer's IP address. 9 00:00:58,520 --> 00:01:05,090 Open borders of the target victim to discover services that are running on the host computer, to discover 10 00:01:05,090 --> 00:01:08,000 the operating system and system architecture of the target. 11 00:01:08,480 --> 00:01:14,920 To discover and deal with the vulnerabilities in life of every organization has a network. 12 00:01:15,530 --> 00:01:20,690 This network could be an internal network which consists of all the systems connected to each other. 13 00:01:20,960 --> 00:01:24,310 Or it can be a network that is connected to the Internet. 14 00:01:24,740 --> 00:01:29,960 In either case, to hack the network, you will have to find a vulnerable point in the network that 15 00:01:29,960 --> 00:01:30,920 can be exploited. 16 00:01:31,580 --> 00:01:35,050 Network scanning is used to find such vulnerable points. 17 00:01:35,690 --> 00:01:39,260 So how networks can be different from information gathering? 18 00:01:40,100 --> 00:01:42,470 Well, think of it as like this. 19 00:01:43,160 --> 00:01:48,080 You are an Army officer and you and your team are planning to attack a terrorist lair. 20 00:01:48,890 --> 00:01:54,320 You fond of the location of the lair and details about the surroundings and also the ways to send them 21 00:01:54,320 --> 00:01:54,890 to the letter. 22 00:01:55,550 --> 00:02:00,410 You can consider all the information you have gathered using the information gathering phase. 23 00:02:00,950 --> 00:02:06,950 Now you have to find a point through which you can enter the terrorist organization and attack the enemy. 24 00:02:07,280 --> 00:02:10,520 This is network scanning in simple terms. 25 00:02:10,820 --> 00:02:15,140 Information gathering is used to gather information and understand your target. 26 00:02:15,410 --> 00:02:20,570 And network scanning is a method used to find possible vulnerable points in the network through which 27 00:02:20,570 --> 00:02:21,770 you can hack the network. 28 00:02:22,610 --> 00:02:29,080 Depending on what kind of information the scan identifies, it was scanning can be classified reports 29 00:02:29,510 --> 00:02:35,180 or scanning and vulnerability scanning for learning the network scanning files you need to learn. 30 00:02:35,480 --> 00:02:39,650 DCB Connection establishment also called as three way handshake. 31 00:02:40,660 --> 00:02:46,450 BCB three way handshake is a process which is used in a discipline at work to make a connection between 32 00:02:46,450 --> 00:02:47,870 the server and the client. 33 00:02:48,470 --> 00:02:54,130 It is a three step process that requires both the client answerable to exchange synchronization and 34 00:02:54,130 --> 00:02:57,880 acknowledgement package before the real data communication process starts. 35 00:02:58,620 --> 00:03:04,390 A three way handshake process is designed in such a way that both and help you to initiate, negotiate 36 00:03:04,390 --> 00:03:07,120 and separate TCP socket connections the same time. 37 00:03:07,630 --> 00:03:13,270 It allows you to transfer multiple DCB socket connections in both directions at the same time. 38 00:03:13,810 --> 00:03:16,690 But DCB traffic begins in a three way handshake. 39 00:03:17,480 --> 00:03:23,870 In this distribution process, a client needs to initiate the conversation by requesting a communication 40 00:03:23,870 --> 00:03:25,250 session with the server. 41 00:03:25,670 --> 00:03:30,170 So how is the process of prevention in the first step? 42 00:03:30,410 --> 00:03:33,150 The client establishes a connection with the server. 43 00:03:33,620 --> 00:03:35,480 It sends a signal to the scene. 44 00:03:35,760 --> 00:03:41,180 There is the Synchronization Baggot and informs the server about the client that through the communication. 45 00:03:41,210 --> 00:03:42,710 We start with that. 46 00:03:42,980 --> 00:03:50,780 The client also sends the sequence number in the second step server response to the client with Senex 47 00:03:50,780 --> 00:03:56,840 in that synchronization and acknowledgement, acknowledgement helps you to signify the response of the 48 00:03:56,840 --> 00:03:59,660 segment that is received in the final step. 49 00:03:59,870 --> 00:04:05,420 The client acknowledges the response of the server and they both create a stable connection will begin 50 00:04:05,420 --> 00:04:07,180 the actual data transfer process. 51 00:04:07,550 --> 00:04:11,330 So let us have a summary of a DCP handshake and the first step. 52 00:04:11,570 --> 00:04:14,090 The client establishes a connection with the server. 53 00:04:14,510 --> 00:04:18,920 In the second step, the server responds to the client with Senex, Signal said set. 54 00:04:19,130 --> 00:04:22,910 And in the final step, the client acknowledges the response of the server. 55 00:04:23,980 --> 00:04:28,870 In the last lady, we saw the cockpit prevention process initiation. 56 00:04:29,970 --> 00:04:37,260 In this light, we will see DCB condition termination for terminating the condition Galion sense of 57 00:04:37,260 --> 00:04:38,010 Fynn segment. 58 00:04:38,340 --> 00:04:45,630 Finn stands for Finish the Server with it said to one gland enters the Fininvest state. 59 00:04:45,630 --> 00:04:53,640 One gland waits for an acknowledgement from the server after receiving the segment, server frees up 60 00:04:53,640 --> 00:05:00,240 its buffer's server since an acknowledgement to the client server enters the Clausewitz's state. 61 00:05:01,650 --> 00:05:08,880 After receiving the acknowledgement, client enters the freeway to state now the connection from client 62 00:05:08,880 --> 00:05:12,720 to server is terminated, that is when the connection is closed. 63 00:05:13,260 --> 00:05:20,790 Glan cannot send any data to the server since the server has released its buffer's, pure acknowledgments 64 00:05:20,790 --> 00:05:22,760 can be sent from the client server. 65 00:05:23,220 --> 00:05:26,220 The connection from the server to client is still open. 66 00:05:26,460 --> 00:05:27,690 There's one connection. 67 00:05:27,690 --> 00:05:28,620 It's still open. 68 00:05:29,160 --> 00:05:33,370 Server now can send both data and acknowledgments to the client. 69 00:05:34,330 --> 00:05:40,470 Now suppose server wants to close the connection with the client for terminating the connection between 70 00:05:40,470 --> 00:05:41,580 server and client. 71 00:05:41,850 --> 00:05:48,990 Server sends a phone signal to the client within a certain server waits for acknowledgement from the 72 00:05:48,990 --> 00:05:51,660 client, not a server wanted. 73 00:05:51,960 --> 00:05:57,540 It could have sent the Fehn segment along with the previous acknowledgement that it sent to the client. 74 00:05:57,870 --> 00:06:03,660 After receiving the final segment, client frees up its Bofors client sends the acknowledgement to the 75 00:06:03,660 --> 00:06:08,510 server, which is not mandatory, and then client and does the time red state. 76 00:06:08,820 --> 00:06:11,430 So all this time would state the time. 77 00:06:11,430 --> 00:06:15,780 Red state allows the client to present the final acknowledgement if it gets lost. 78 00:06:16,260 --> 00:06:22,740 The time spent by the client in time with state depends on the implementation, the typical values that 79 00:06:22,740 --> 00:06:29,130 thirty seconds, one minute and two minutes after the word, the connection gets formally closed. 80 00:06:29,610 --> 00:06:33,480 In the next lecture, we will see different scanning techniques.