Table of Contents
Network scanning is a key process in cybersecurity and penetration testing used to identify active devices, open ports, services, and potential vulnerabilities on a network.
It helps security professionals map the network structure and detect unauthorized or risky devices.
What is Network Scanning | Network Scanning Method and Types of Network Scanning
What is Network Scanning?
1: Process of Scanning.
2: Active Devices.
3: Open Ports.
4: Checking Misconfigurations.
Network Scanning Methodology
1: Selecting Target.
2: Scan for IP range.
3: Scan for Open Ports.
4: Checking Services.
5: Grabbing Versions.
6: Grabbing OS.
7: Bypassing IDS.
8: Selecting Correct Scan.
Types of Network Scans
1: -sT Nmap -sT 192.168.34.228 (TCP)
2: -sU Nmap -sU 192.168.34.228 (UDP)
3: -sS Nmap -sS 192.168.34.228 (SYN)
4: -sA Nmap -sA 192.168.34.228 (ACK)
5: -sF Nmap -sF 192.168.34.228 (FIN)
6: -sN Nmap -sN 192.168.34.228 (NULL)
7: -sX Nmap -sX 192.168.34.228 (XMAS)
8: -sI Nmap -sI 192.168.34.228 (IDLE)

