for checking ip address which you are connect(sudo ifconfig)
for going on root account(sudo su)
for coming out from root we use(exit)
for making file unwritable we use root(sudo touch file1)or(sudo nano file1)
if we want to write in it we use(sudo nano filename)
for making complete detail of site(whatweb(in random),whatweb-v(in proper manner))
pot 80 =http port for website
for checking ip address range we use(whatweb (ip address range) --aggression 3 -v)
for making same but no error output(whatweb(ip adrress range) --aggression 3 -v --
no-errors)
for saving results in file we use(whatweb(ip adrress range) --aggression 3 -v --
no-errors --log-verbose=filename)
TCP full foam Transmission control protocol
UDP full foam User Datagram Protocol
There is three ways in TCP
1 Syn(synchronized sequence number):it check server is online or not
2 SYN/ACK(synchronized sequence number/Acknowledge):this stepcheck target machine
send feedback or not)
3 ACK it startdata transfer to the target machine
UDP it is faster than TCP but it not known where the data has been go it only send
packets
->arp -a it is used to check the networks that can be connect to the router(ip
address) it is a root function so we used sudo for it and it can only discovered
routers address.
->netdiscover it is used to find other connected devices to the router ip address
-> for finding only router address we use (netstat -nr)
->nmap(network mapper)=>it shows how many ports are open and closed and filtered
but it cannot scan 65000 ports.it can be used (nmap ipaddressor ipaddress range)
->syn scan(sS):it is used to scan 1000 of portsin few seconds and it is more
secure it can work on root priveleges(sudo nmap -sS targetaddress)and it does not
leave more trace.
->full tcp scan=>it is used to scan 1000 of port in few second and it is more
faster than the syn scan but it is leave more trace that why syn scan is more
use.symbolof using is (sudo nmap -sT target address)
->UDP scan=> it isame as 1 scan but it is very slow its symbol is (sudo nmap -sU
target ipaddress)
->Important Note => the target machine should have one port is open and one is
closed for operating system scan.
->OS=>(sudo nmap -o target ip address)for finding what operating systrem is running
-> for finding version (sudo nmap -sV target ip address)
->for aggresively finding operating system we used(sudo nmap -A target ipaddress)
it can find nmap scrips and vession and operating system is running it cannot used
because it left some information.
->sn =>For checking the host is up we used it(nmap -sn target ip address)
-> for checking single port is open we used(nmap -p target ip address)
-> for checking range of ports up we used (nmap -p 1-100 target ipadress)
-> for checking first 1000 ports up very fastly we used(nmap -F target address
-> for saving in a file we used (sudo nmap -sS trarget address >>filename)int his
file is save but do not show on terminal on that time.
-> for saving file and seeing on terminal we use (namp -oN filename -sS target
ipadress)
->