Professional Documents
Culture Documents
Security & Ethical Hacking p2
Security & Ethical Hacking p2
Hacking
Luke Arntson
Central Washington University
Winter 2007
Presentation #2 – Advanced Scanning & Exploitation
Introduction
Again “Ethical” hacking
SCAN TECHNIQUES:
-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
-sU: UDP Scan
-sN/sF/sX: TCP Null, FIN, and Xmas scans
--scanflags <flags>: Customize TCP scan flags
-sI <zombie host[:probeport]>: Idlescan
-sO: IP protocol scan
-b <ftp relay host>: FTP bounce scan
arntsonl@cwu.edu