DEF CON Forum Site Header Art

Basic ethical hacking techniques

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • Cross_Reaper
    Member
    • Oct 2023
    • 1

    #1

    Basic ethical hacking techniques

    Hi, I am getting into to ethical hacking what something I should look for when I use something such as Nmap to scan a system?
  • ghostunder
    Member
    • Nov 2023
    • 16

    #2
    You can get information like header, IP software mapping, etc. To network mapping i use one of my tools (Print the port 80 on ipv4 IP range).

    Comment

    • Ryskill
      Hacker
      • May 2023
      • 3

      #3
      Running nmap with default scripts and versions (-sC and -sV flags) does a decent job at giving you more information on what is running on each scanned port and would be a good place to start.

      Comment


      • Aslwma
        Aslwma commented
        Editing a comment
        Hello brother, how are you? I hope you can message me on Telegram, this is my username (aslwma0), or on Instagram, this is my username (lwnyslwmh).
    • alanom299
      Member
      • Aug 2024
      • 2

      #4
      How i can make money using darknet

      Comment


      • BlazeBlade
        BlazeBlade commented
        Editing a comment
        I think if you're asking questions like this, you should start with building basic skills first, and then think about making money later.

      • befu
        befu commented
        Editing a comment
        sybau bummmm
    • Pass
      Member
      • Aug 2024
      • 4

      #5
      nmap is the best tool. go YouTube and you will get your answer..port scanning are hard. depends on system.. if have low firewall than ok. but if have more firewalls than ports seen like filtres ....

      Comment

      • CASTA
        Member
        • Apr 2025
        • 3

        #6
        When scanning a target with **Nmap**, you should focus on gathering as much useful information as possible :

        ### **1. Open Ports & Services**
        - Identify which **ports** are open (e.g., `22/TCP` for SSH, `80/TCP` for HTTP).
        - Determine what **services** are running (e.g., Apache, Nginx, MySQL, RDP).
        - Command:
        ```bash
        nmap -sV -p- <target_IP>
        ```
        - `-sV`: Service detection
        - `-p-`: Scan all ports (1-65535)

        ### **2. Operating System Detection**
        - Helps in fingerprinting the target’s OS for further exploitation.
        - Command:
        ```bash
        nmap -O <target_IP>
        ```

        ### **3. Vulnerability Scanning (Scripts)**
        - Use Nmap’s **NSE (Nmap Scripting Engine)** to detect vulnerabilities.
        - Common scripts:
        ```bash
        nmap --script vuln <target_IP> # Checks for known vulnerabilities
        nmap --script http-enum <target_IP> # Enumerates web directories
        nmap --script ssl-enum-ciphers <target_IP> # Checks weak SSL/TLS ciphers
        ```

        ### **4. Firewall & IDS Evasion**
        - If the target has a firewall/IDS, use stealth techniques:
        ```bash
        nmap -sS -T2 -Pn <target_IP> # Stealth SYN scan, slow timing, no ping
        nmap -f --mtu 24 <target_IP> # Fragmented packets to evade detection
        ```

        ### **5. UDP Port Scanning**
        - Many services run over UDP (e.g., DNS, SNMP, DHCP).
        - Command:
        ```bash
        nmap -sU <target_IP> # UDP scan (can be slow)
        ```

        ### **6. Output Results for Analysis**
        - Save results in different formats for later review:
        ```bash
        nmap -oN normal_output.txt <target_IP> # Normal text
        nmap -oX xml_output.xml <target_IP> # XML format (for tools like Metasploit)
        nmap -oG grepable_output.txt <target_IP> # Grep-friendly format
        ```

        ### **7. Follow-Up Actions**
        - **Web Ports (80, 443, 8080)**: Check for web apps, run `nikto`, `dirb`, or `gobuster`.
        - **SMB (445)**: Check for EternalBlue or anonymous shares with `smbclient`.
        - **SSH (22)**: Check for weak credentials or outdated versions.
        - **Database Ports (3306, 5432)**: Test for default credentials or SQL injection.

        ### **Example Full Scan Command**
        ```bash
        nmap -sS -sV -sC -O -p- -T4 -Pn -oN full_scan.txt <target_IP>
        ```
        - `-sS`: SYN Stealth Scan
        - `-sC`: Default NSE scripts
        - `-T4`: Aggressive timing
        - `-Pn`: Treat host as online (skip ping)

        Comment

      • Jack T. Ripper
        Member
        • Apr 2025
        • 2

        #7
        First: look for documentation.
        Hint: https://nmap.org/
        Second: read the documentation. (available in multiple languages)
        Third: practice on your network. Be prepared to break your network. Don't break other people's network.

        Comment

        • Tactical Bacon
          Member
          • May 2025
          • 3

          #8
          Hey, Jack! I'm brand new to this. Just signed up. I'm keen to learn some basic skills. Is there a forum, blog or directory anywhere that might be beneficial for a complete novice? I'm talking in terms of step-by-step guides to ethical hacking techniques via Kali Linux... Any help would be greatly appreciated. Many thanks!

          Comment

          • Tactical Bacon
            Member
            • May 2025
            • 3

            #9
            Originally posted by Jack T. Ripper
            First: look for documentation.
            Hint: https://nmap.org/
            Second: read the documentation. (available in multiple languages)
            Third: practice on your network. Be prepared to break your network. Don't break other people's network.
            As per my last comment/question... apologies, forgot to tag/quote you! Still learning lol.

            Comment

            • wh@t
              Member
              • Nov 2025
              • 1

              #10
              I already have some foundational skills in ethical hacking, and now I want to learn blockchain security techniques — do you have any good suggestions?

              Comment

              • h0p3l3ss
                Member
                • Feb 2026
                • 1

                #11
                im getting here finding answers i need some hacking lessons im in urge to get money from anywhere just asking im too young to die alone at least with money or friends here

                Comment

                Working...