{"id":35252,"date":"2021-06-01T09:34:44","date_gmt":"2021-06-01T07:34:44","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=35252"},"modified":"2021-06-01T10:08:30","modified_gmt":"2021-06-01T08:08:30","slug":"second-phase-of-hacking","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/second-phase-of-hacking\/","title":{"rendered":"Scanning and enumeration"},"content":{"rendered":"<p>Last week we talked to you about the<strong> first phase of Hacking<\/strong>, <a href=\"https:\/\/eiposgrados.edu.es\/blog-ciberseguridad\/que-es-footprinting\/\" target=\"_blank\" rel=\"noopener\">Footprinting<\/a>, where the \u201chacker\u201d collected all possible information about the target to find a way to access the system or decide which cyberattacks are most appropriate to be successful.<\/p>\n\n\n\n<p>If you want to learn more about ethical hacking, we invite you to visit our school <a href=\"https:\/\/eiposgrados.edu.es\/\" target=\"_blank\" rel=\"noopener\">EIP<\/a> and train with our <a href=\"https:\/\/eiposgrados.edu.es\/master-en-ciberseguridad\/\" target=\"_blank\" rel=\"noopener\">Master in Cybersecurity Management, Ethical Hacking and Offensive Security.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Second phase of hacking<\/h2>\n\n\n\n<p>Well, today we are going to talk about the <strong>second stage<\/strong> of hacking, <strong>Scanning and Enumeration<\/strong>, in this phase we will take all the information discovered during Footprinting or recognition and we will use it to explore the network.&nbsp;<\/p>\n\n\n\n<p>During the scan, the<strong> \u201chacker\u201d<\/strong> use tools such as<strong> dialers<\/strong> (markers), <strong>port scanning<\/strong>, <strong>network mappers<\/strong>, <strong>ping sweepers<\/strong> and of<strong> network protocols and vulnerability scanners<\/strong>, with the idea of finding the necessary information to decide which exploit will attack the target. <\/p>\n\n\n\n<p>The <strong>data<\/strong> that can help the most to this end are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>IP addresses<\/strong>.<\/li><li><strong>Operating systems<\/strong> installed.<\/li><li><strong>Available services<\/strong>.<\/li><li><strong>Installed applications<\/strong>.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Scan Types<\/h2>\n\n\n\n<p>A <strong>\u201chacker\u201d<\/strong> Follow a sequence of steps to scan a network. The <strong>analysis methods<\/strong> They can vary depending on the objective of the cyberattack, which are configured before the hackers begin the process. There is <strong>three types<\/strong> scanning:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>He <strong>port scanning<\/strong>, where the open and available TCP\/IP ports are determined<\/li><li>He <strong>network scan<\/strong>, where the hosts that are active are determined.<\/li><li>He <strong>vulnerability scanning<\/strong>, where the existence of known vulnerabilities in the hosts is determined.<\/li><\/ul>\n\n\n\n<p>The enumeration starts when the scan has finished and as the name suggests, <strong>enumerate and identify<\/strong> scanned information such as computer names, operating systems, users, shared resources, etc.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/06\/segunda-fase-del-hacking-1024x683.jpg\" alt=\"Second phase of hacking, scanning and enumeration\" class=\"wp-image-35262\" width=\"588\" height=\"392\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/06\/segunda-fase-del-hacking-1024x683.jpg 1024w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/06\/segunda-fase-del-hacking-300x200.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/06\/segunda-fase-del-hacking-768x512.jpg 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/06\/segunda-fase-del-hacking-1536x1024.jpg 1536w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/06\/segunda-fase-del-hacking-2048x1365.jpg 2048w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/06\/segunda-fase-del-hacking-248x165.jpg 248w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/06\/segunda-fase-del-hacking-190x126.jpg 190w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2021\/06\/segunda-fase-del-hacking-scaled.jpg 1920w\" sizes=\"(max-width: 588px) 100vw, 588px\" \/><\/figure><\/div>\n\n\n\n<p>Along with footprinting, scanning and enumeration are the phases of obtaining information <strong>previous<\/strong> to a cyber attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Next phases of hacking<\/h2>\n\n\n\n<p>Scanning and Enumeration is the <strong>second phase of hacking<\/strong>, during the next few weeks we will see the remaining phases, which would be:<\/p>\n\n\n\n<ul class=\"wp-block-list\" start=\"3\"><li>Get Access.<\/li><li>Maintain Access.<\/li><li>Erasing traces.<\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>At EIP we have already talked in other posts about the first phase of hacking, now we explain what the second phase of hacking is about. Forward!<\/p>","protected":false},"author":51,"featured_media":35264,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-35252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/35252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=35252"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/35252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/35264"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=35252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=35252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=35252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}