0xdf
The video provides guidance on how to scan UDP ports with nmap, an essential skill for hacking. Although UDP scans can be slow and unreliable, they can be useful and necessary. The video recommends starting with basic scans of the top 10 ports with the S capital u command, with the most common ports being SNMP and DNS. The speaker provides tips for scanning larger port ranges, including hitting the top thousand ports quickly and identifying any potential issues. The video also explains the differences between "filtered" and "closed" results in nmap, which indicate either administratively closed ports or OS port-not-open responses.
In this section, a hacker presents a guide to scanning UDP with nmap, an essential skill when it comes to hacking. While TCP scans are commonly used, UDP scans can be useful and sometimes necessary. However, UDP scanning can be unreliable, slow, and flaky, so there are some tips to make the process fast and catch the information needed. For example, starting with something simple like the top 10 ports of a box with S capital u command, where the most common and widely-used are SNMP and DNS. The hacker also suggests commands and tips for scanning more extensive port ranges quickly. There may be some random closed or filtered ports, but for the hacker's needs, these results are useful for catching open ports while avoiding spending many hours sifting through potentially irrelevant data.
In this section, the speaker uses nmap to scan UDP ports with a source Port of 40202. Since it does not receive any response, nmap marks the ports as "closed." Running the scan more slowly reveals that all of the ports send back an ICMP packet for almost every port. The speaker theorizes that these destination unreachable messages are caused when the box is overwhelmed with packets and drops some of them. The speaker recommends hitting the top thousand ports quickly, and all background ports if necessary, to identify any potential issues. Finally, the speaker shows that the "filtered" and "closed" result differences in nmap are due to either administratively closed ports or OS port-not-open responses.
No videos found.
No related videos found.
No music found.