11.9.08

part 2 : Scanning



One of the three components of intelligence gathering for an attacker
􀁾 The attacker finds information about the
• specific IP addresses
• Operating Systems
• system architecture
• services running on each computer


The various types of scanning are as follows:


􀁾Port Scanning
• A series of messages sent by someone attempting to break into a computer to learn about the computer’s network services
• Each associated with a "well-known" port number


􀁾Network Scanning
•A procedure for identifying active hosts on a network
•Either for the purpose of attacking them or for network security assessment

􀁾Vulnerability Scanning
•The automated process of proactively identifying vulnerabilities of computing systems present in a network


Most wanted software for this part :

Advance Administrative Tools.zip
AntiFirewall
backstealth
firewalk
firewalk.pdf
firewar
Friendly Pinger.exe
genius
hping2 Tutorial.htm
httport3snf.exe
httrack Website Copier.exe
icmpquery.c
ipeye.exe
ipsecscan.exe
KingPing-1.0
Linux Tools
Lite-SOCKS
modem
ModemScan.msi
NeoWatchTrial24.exe
NetScanToolssetup.exe
Network Utilities
nmapwin.exe
PhoneSweep War Dialer
pinger
portscan.pdf
ProxyCap.msi
scanlogd
SNMPscanner
snort.exe
sockschain_setup.exe
SolarWinds Network Tools.exe
stealther_setup.exe
SuperScan
TeleSweep
thc-ts20
Tiny TCP Firewall
tunneld2
War Dialer Hacking techniques.mht
yaph
Zone Alarm Pro.exe

No comments: