Module 3. Scanning Networks
Scanning itself is not the actual intrusion, but an extended form of reconnaissance in which the ethical hacker and pen tester learns more about the target, including information about open ports and services, OSes, and any configuration lapses. The information gleaned from this reconnaissance helps you to select strategies for the attack on the target system or network.
This is one of the most important phases of intelligence gathering, which enables you to create a profile of the target organization. In the process of scanning, you attempt to gather information, including the specific IP addresses of the target system that can be accessed over the network (live hosts), open ports, and respective services running on the open ports and vulnerabilities in the live hosts.
Port scanning will help you identify open ports and services running on specific ports, which involves connecting to Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) system ports. Port scanning is also used to discover the vulnerabilities in the services running on a port.
The labs in this module will give you real-time experience in gathering information about the target organization using various network scanning and port scanning techniques.
Objective
The objective of this lab is to conduct network scanning, port scanning, analyzing the network vulnerabilities, etc.
Network scans are needed to:
Check live systems and open ports
Identify services running in live systems
Perform banner grabbing/OS fingerprinting
Identify network vulnerabilities
Last updated