Scanning Networks
Involves collecting additional information about the victim’s host, port, and network services. It aims to identify vulnerabilities and then plan attacks.
Scanning Types:
Name of Term | Description of term |
---|---|
Port scanning | The process of Checking open ports and services. |
Network scanning | The process of checking lists of IP Addresses |
Vulnerability scanning | This is also called penetration testing |
Common Ports to Scan:
Port Number |
Protocol Type |
Network Type |
---|---|---|
22 |
TCP |
|
23 |
TCP |
|
25 |
TCP |
|
53 |
TCP/UDP |
|
80 |
TCP |
|
123 |
TCP |
|
443 |
TCP/UDP |
|
500 |
TCP/UDP |
|
631 |
TCP/UDP |
|
3389 |
TCP/UDP |
|
9100 |
TCP/UDP |
Scanning Tools:
Name of Tool | Description of Tool |
---|---|
Nmap | Nmap (“Network Mapper”) is a free and open-source utility for network exploration and security testing. |
Hping | Hping is a command line-oriented TCP/IP packet compiler/parser. |
Arping | Arping is a tool for polling hosts on a network. Unlike the ping command, which operates at the network layer. |
Ethical Hacking Cheatsheet
Ethical hacking includes authorized attempts to gain unauthorized access to computer systems, applications, or data. Ethical hacking requires replicating the strategies and behaviors of malicious attackers. This practice helps identify security vulnerabilities, So they can be fixed before malicious attackers can exploit them.