One of the three components of intelligence gathering for an attacker
The attacker finds information about the
• specific IP addresses
• Operating Systems
• system architecture
• services running on each computer
The various types of scanning are as follows:
Port Scanning
• A series of messages sent by someone attempting to break into a computer to learn about the computer’s network services
• Each associated with a "well-known" port number
Network Scanning
•A procedure for identifying active hosts on a network
•Either for the purpose of attacking them or for network security assessment
Vulnerability Scanning
•The automated process of proactively identifying vulnerabilities of computing systems present in a network
•The automated process of proactively identifying vulnerabilities of computing systems present in a network
Most wanted software for this part :
Advance Administrative Tools.zip
AntiFirewall
backstealth
firewalk
firewalk.pdf
firewar
Friendly Pinger.exe
genius
hping2 Tutorial.htm
httport3snf.exe
httrack Website Copier.exe
icmpquery.c
ipeye.exe
ipsecscan.exe
KingPing-1.0
Linux Tools
Lite-SOCKS
modem
ModemScan.msi
NeoWatchTrial24.exe
NetScanToolssetup.exe
Network Utilities
nmapwin.exe
PhoneSweep War Dialer
pinger
portscan.pdf
ProxyCap.msi
scanlogd
SNMPscanner
snort.exe
sockschain_setup.exe
SolarWinds Network Tools.exe
stealther_setup.exe
SuperScan
TeleSweep
thc-ts20
Tiny TCP Firewall
tunneld2
War Dialer Hacking techniques.mht
yaph
Zone Alarm Pro.exe
AntiFirewall
backstealth
firewalk
firewalk.pdf
firewar
Friendly Pinger.exe
genius
hping2 Tutorial.htm
httport3snf.exe
httrack Website Copier.exe
icmpquery.c
ipeye.exe
ipsecscan.exe
KingPing-1.0
Linux Tools
Lite-SOCKS
modem
ModemScan.msi
NeoWatchTrial24.exe
NetScanToolssetup.exe
Network Utilities
nmapwin.exe
PhoneSweep War Dialer
pinger
portscan.pdf
ProxyCap.msi
scanlogd
SNMPscanner
snort.exe
sockschain_setup.exe
SolarWinds Network Tools.exe
stealther_setup.exe
SuperScan
TeleSweep
thc-ts20
Tiny TCP Firewall
tunneld2
War Dialer Hacking techniques.mht
yaph
Zone Alarm Pro.exe
No comments:
Post a Comment