1 00:00:01,130 --> 00:00:02,000 Since Ganny. 2 00:00:03,710 --> 00:00:06,860 And map as as target IP command. 3 00:00:08,330 --> 00:00:11,990 Is the most commonly used form of scanning and unmap. 4 00:00:13,370 --> 00:00:19,490 Of course, if we do not give a parameter while scanning and will always scan Tsipi. 5 00:00:21,640 --> 00:00:25,150 So this can uses the aforementioned three way handshake system. 6 00:00:26,080 --> 00:00:32,290 A second scan is faster and less detectable than a TCP scan because in this scan, the connection is 7 00:00:32,290 --> 00:00:35,230 terminated before it's fully established. 8 00:00:36,610 --> 00:00:42,670 However, you should also remember that they may be detected by next generation firewalls and security 9 00:00:42,670 --> 00:00:43,270 software. 10 00:00:45,440 --> 00:00:46,940 I'll show you how the scan works. 11 00:00:48,220 --> 00:00:55,900 So step one and map will send a send packet to the scanned port of the target computer step to the computer, 12 00:00:55,900 --> 00:00:59,680 receiving this response will send a sin act. 13 00:01:01,270 --> 00:01:07,150 Step three, after receiving this answer and map does not send the packet from the computer that we're 14 00:01:07,150 --> 00:01:09,020 scanning to complete the connection. 15 00:01:09,460 --> 00:01:12,700 Instead, it sends a reset packet. 16 00:01:15,510 --> 00:01:21,770 So that way, the possibility of logging is reduced and our speed increases as there is not a full connection. 17 00:01:23,450 --> 00:01:29,480 Now, this type of scan is especially useful for systems that use firewalls, that way the status of 18 00:01:29,510 --> 00:01:31,970 the corresponding port of the target is determined. 19 00:01:34,530 --> 00:01:41,640 Ensign scanning comments are made according to the answers received, so when a scan is performed, 20 00:01:42,120 --> 00:01:44,790 the following answers can be received from the target system. 21 00:01:45,630 --> 00:01:47,010 The port open status. 22 00:01:47,950 --> 00:01:54,220 So Unmap sends us in packet to the destination and the destination system sends this and packet. 23 00:01:55,790 --> 00:02:01,250 And Map terminates the connection by sending a reset packet instead of sending an act back packet. 24 00:02:03,240 --> 00:02:11,170 That indicates that the port is open and accessible and that the port accepts DCPI or UDP connection. 25 00:02:13,440 --> 00:02:15,510 Port closed status. 26 00:02:16,810 --> 00:02:23,710 And Map sends the send packet to the destination and the destination system sends a reset message instead 27 00:02:23,710 --> 00:02:25,840 of the Sinak back at. 28 00:02:26,900 --> 00:02:28,580 And then terminates the connection. 29 00:02:29,610 --> 00:02:34,380 And in this case, the board is accessible but cannot be processed. 30 00:02:37,010 --> 00:02:39,080 Now, how about the port filtered stats? 31 00:02:40,560 --> 00:02:44,560 So two kinds of answers can be received here on the unmap side. 32 00:02:45,450 --> 00:02:49,410 First, the unmap sends a send packet to the target system. 33 00:02:50,290 --> 00:02:53,220 And no response is received from the target system. 34 00:02:54,040 --> 00:03:00,880 When that happens, it is not commented whether the port on the target system is open or closed. 35 00:03:01,940 --> 00:03:09,320 Then secondly, and maps tend to send packet to the target system and the destination system sends the 36 00:03:09,320 --> 00:03:12,530 ICMP unreachable error packet. 37 00:03:13,960 --> 00:03:20,440 So then in this case, the port is accessible, but it's not known whether it's open or closed.