Book Image

Practical Network Scanning

By : Ajay Singh Chauhan
Book Image

Practical Network Scanning

By: Ajay Singh Chauhan

Overview of this book

Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system.
Table of Contents (19 chapters)
Title Page
Packt Upsell
Contributors
Preface
Index

IKE V1 versus IKE V2


In this section, we will go over what IKE is and what the differences are between IKEv1 and IKEv2. IKE  is a protocol that belongs to the IPsec protocols suite and is responsible for setting up a security association (an agreement between both parties) that enables two end IPsec enabled devices to send data securely:

  • IKEv2 is faster and light on bandwidth, as a smaller number of messages are needed to establish a tunnel. With IKEv1, we had main mode (nine messages), and aggressive mode (six messages). In contrast, IKEv2 only has one mode that has only four messages.
  • IKEv2 provides inbuilt NAT Traversal and, by default, IKEv1 does not provide this facility. It is a well-known fact that the IPSec protocol was not designed with Network Address and Port Translation (NAPT) in mind. The initial payload and, in particular, the headers are encrypted when using IPSec ESP mode. An intermediate NAT device cannot change these encrypted headers to its own address. During phase one...