Book Image

Practical Network Scanning

By : Ajay Singh Chauhan
Book Image

Practical Network Scanning

By: Ajay Singh Chauhan

Overview of this book

Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system.
Table of Contents (19 chapters)
Title Page
Packt Upsell
Contributors
Preface
Index

Exploited system vulnerabilities


When moving to cloud computing, you have to consider the following security issues in order to enhance your data safety.

Session riding attack works based on session cookies and takes advantage of the user's previously authenticated session. Account hijacking or session riding is not new to cloud service providers and users. Hackers manage to gain access to login credentials and can easily track user activities. A similar attack occurs when attackers access cloud drive files without user credentials. This type of attack works by stealing the password token via a phishing attack or drive-by-exploit, a small file that sits on a user's device for convenience (saving the user from entering their password each time). Once attackers gain access, they can access and steal files, and even add malware or ransomware to the victim's cloud folder, which can be used for further attacks.

Note

Https:// does not protect from session riding attacks.

Cloud-based DDoS attacks are...