1 / 22

Chapter 2 IP Address Trace

Chapter 2 IP Address Trace. Hoon Ko hoon.ko@ujep.cz Office# 460, Department of Informatics, J . E. Purkinje University. IP Address Goals. Understand a IP address trace All IP have their source and destination address To catch their destination address

wyanet
Download Presentation

Chapter 2 IP Address Trace

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 2IP Address Trace Hoon Ko hoon.ko@ujep.cz Office# 460, Department of Informatics, J. E. Purkinje University

  2. IP Address Goals • Understand a IP address trace • All IP have their source and destination address • To catch their destination address • Understand a Traceroute (Tracert)

  3. To check login / establishment

  4. IP address between users in messengers

  5. IP trace with a tracert command

  6. Spade: to trace

  7. Chapter 2Footprinting and Scanning Hoon Ko hoon.ko@ujep.cz Office# 460, Department of Informatics, J. E. Purkinje University

  8. Goals • Understand a Footprinting • Understand a Scan • ping, ICMP • Detect OS • nmap

  9. Understand Footprinting • Take a look all footprintings to have the target’s information

  10. SCAN • To catch two services between service providers and service receivers • What services they use

  11. ping / ICMP • to see their availability to all network services • ICMP using in TCP/IP • to see if my targets are in activation • Echo Request / Echo Reply • Timestamp Request / Time Reply • Information Request / Information Reply • ICMP address mask request / ICMP address mask reply

  12. OS detect • Netcraft using: www.netcraft.com

  13. nmap scan • download: http://nmap.org or command using

  14. nmap open scan: nmap –sTwww.ujep.cz • open can using connect() function.

  15. nmap TCP SYN scan: nmap –sSwww.ujep.cz • SYN scan which is not established

  16. nmap FIN scan: nmap –sF –p 21,23 www.ujep.cz • FIN packet using

  17. nmap fragmentation scan: nmap –f –sS www.ujep.cz

More Related