Book Image

Practical Network Scanning

By : Ajay Singh Chauhan
Book Image

Practical Network Scanning

By: Ajay Singh Chauhan

Overview of this book

Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system.
Table of Contents (19 chapters)
Title Page
Packt Upsell
Contributors
Preface
Index

Public Key Infrastructure


PKI refers to processes and technologies which provide a secure data exchange between two nodes over unsecured infrastructure. It uses private and public key pairs to achieve the underlying security service.

There are three types of cryptography algorithms:

  • Symmetric
  • Asymmetric
  • Hash function.

Symmetric encryption

In symmetric encryption, a single key is used both to encrypt and decrypt traffic. Symmetric encryptions are fast, simple and easy to implement. However, some easy ciphers are vulnerable to brute-force attacks, making management a complex job. If the key is compromised, then the whole system becomes vulnerable. Data encryption standard (DES) and Advance encryption standard (AES) are symmetric systems, but AES is much more reliable than DES.

The symmetric encryption scheme has five elements:

  • Plain-text: Refers to the original data that needs to be encrypted
  • Encryption Algorithm: Refers to a combination of ciphers used to encrypt data
  • Secure Key: Refers to input in...