Scanning
It is important that the information-gathering stage be as complete as possible to identify the best location and targets to scan. After the completion of footprinting and information gathering methodologies, scanning is performed.During scanning, the hacker has vision to get information about network an hosts which are connected to that network that can help hackers to determine which type of exploit to use in hacking a system precisely. Information such as an IP addresses, operating system, services, and installed applications.
Scanning is the methodology used to detect the system that are alive and respond on the network or not. Ethical hackers use these type of scanning to identify the IP address of target system. Scanning is also used to determine the availability of the system whether it is connected to the network or not.
Types Of Scanning
Network Scanning | Identifies IP addresses on a given network or subnet |
Port Scanning | Determines open, close, filtered and unfiltered ports and services |
Vulnerability Scanner | Detect the vulnerability on the target system |
Port Scanning
Port scanning is the process of identifying open and available TCP/IP ports on a system. Port-scanning tools enable a hacker to learn about the services available on a given system. Each service or application on a machine is associated with a well-known port number. Port Numbers are divided into three ranges:- Well-Known Ports: 0-1023
- Registered Ports: 1024-49151
- Dynamic Ports: 49152-6553
Network Scanning
Network scanning is performed for the detection of active hosts on a network either you wanna attack them or as a network administrator. Network-scanning tools attempt to identify all the live or responding hosts on the network and their corresponding IP addresses. Hosts are identified by their individual IP addresses.Vulnerability Scanning
This methodology is used to detect vulnerabilities of computer systems on a network. A vulnerability scanner typically identifies the operating system and version number, including applications that are installed. After that the scanner will try to detect vulnerabilities and weakness in the operating system. During the later attack phase, a hacker can exploit those weaknesses in order to gain access to the system. Moreover, the vulnerability scanner can be detected as well, because the scanner must interact over the network with target machine.The CEH Scanning Methodology
As a CEH, you should understand the methodology about scanning presented in the figure below. Because this is the actual need of hackers to perform further attacks after the information about network and hosts which are connected to the network. It detects the vulnerabilities in the system bu which hackers can be accessible to that system by exploitation of that vulnerabilities.More articles
- Hacking Tools Kit
- Hacker Tools Windows
- Hacking Tools And Software
- Easy Hack Tools
- Pentest Tools Online
- Hacker Tools Github
- Computer Hacker
- Pentest Tools Review
- Pentest Tools Windows
- Physical Pentest Tools
- Hacking App
- Hacks And Tools
- Hack Website Online Tool
- Hack Tools For Games
- Hack Tools For Mac
- Hacker Tools For Mac
- Hack Tools For Pc
- Hack And Tools
- Hacking Tools Name
- Hackers Toolbox
- Android Hack Tools Github
- Termux Hacking Tools 2019
- Hacking Tools Download
- Hacker Tools Github
- Physical Pentest Tools
- Hacking App
- Physical Pentest Tools
- Hack Tools Mac
- Pentest Tools Kali Linux
- Pentest Tools Review
- Hacking Tools Name
- Pentest Tools Apk
- Pentest Tools Windows
- Underground Hacker Sites
- Hacking Tools 2020
- Github Hacking Tools
- Pentest Tools For Mac
- Pentest Tools Website Vulnerability
- Hacking Tools Mac
- Easy Hack Tools
- Hacking Apps
- Black Hat Hacker Tools
- Hack Apps
- Pentest Tools For Android
- Hack Tools Pc
- Hack Tool Apk
- Pentest Tools For Ubuntu
- Best Pentesting Tools 2018
- Hack Tools Github
- New Hacker Tools
- Black Hat Hacker Tools
- Hacking Tools
- Best Hacking Tools 2019
- Pentest Tools Open Source
- Pentest Tools Subdomain
- Hack Tool Apk No Root
- Hacker Techniques Tools And Incident Handling
- Usb Pentest Tools
- Hacker Tools Github
- Best Hacking Tools 2020
- Pentest Box Tools Download
- Pentest Tools Linux
- Nsa Hacker Tools
- What Is Hacking Tools
- Hacker Tools Hardware
- Hacking Tools Windows 10
- Hacker Tools For Pc
- Best Pentesting Tools 2018
- Black Hat Hacker Tools
- Hacker Search Tools
- Hacking Tools Download
- Hacker Tools Mac
- Hack Tools
- Tools For Hacker
- Android Hack Tools Github
- Black Hat Hacker Tools
- Pentest Tools Windows
- Hack Tools For Games
- Hacker Tools Free Download
- Pentest Tools Website Vulnerability
- Hacking Tools For Pc
- Hacker Tools 2020
- Hacker Search Tools
- Hacker Tools For Mac
- Bluetooth Hacking Tools Kali
- Pentest Tools Review
- Pentest Tools Framework
- Hacker Tools For Ios
- Pentest Tools Nmap
- Hack Tools
- Hacker Security Tools
- Hack Tools 2019
- Hacker Tools Free
- Install Pentest Tools Ubuntu
- Wifi Hacker Tools For Windows
- How To Hack
- Hacking Tools Windows
- Termux Hacking Tools 2019
- Hacking Tools For Windows 7
- Pentest Tools Linux
- Hacking Tools Hardware
- Hackrf Tools
- Hack Tools For Ubuntu
- Hacker Tools Hardware
- Pentest Tools Linux
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Bluekeep
- Hack Tools 2019
- Pentest Tools Website Vulnerability
- How To Make Hacking Tools
- Hacking Tools For Windows
- Pentest Tools Kali Linux
- Hacker Hardware Tools
- Pentest Recon Tools
- Hacking Tools Windows
- Hacking App
- Free Pentest Tools For Windows
- Hacker
- Hack Tools Download
- Hack Tools
- Install Pentest Tools Ubuntu
- Pentest Tools Online
- Nsa Hacker Tools
- Pentest Tools List
- Tools Used For Hacking
- Bluetooth Hacking Tools Kali
- Hacker
- Hacking Tools Windows
- Pentest Tools Online
- Hacker Tools Mac
- Hacker Tools Online
- Hacker Tools Apk
- Hacker Tools Online
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Name
- Pentest Tools Port Scanner
- Nsa Hack Tools Download
- Hacker Tools Github
- Pentest Tools Alternative
- Pentest Tools Github
- Hacking Apps
- Hacker Tools For Mac
- Hacker Tools For Windows
- Bluetooth Hacking Tools Kali
No comments:
Post a Comment