Network Scanning

Network scanning is a key process in cybersecurity and penetration testing used to identify active devices, open ports, services, and potential vulnerabilities on a network.

It helps security professionals map the network structure and detect unauthorized or risky devices.

What is Network Scanning | Network Scanning Method and Types of Network Scanning

What is Network Scanning?

1: Process of Scanning.

2: Active Devices.

3: Open Ports.

4: Checking Misconfigurations.

Network Scanning Methodology

1: Selecting Target.

2: Scan for IP range.

3: Scan for Open Ports.

4: Checking Services.

5: Grabbing Versions.

6: Grabbing OS.

7: Bypassing IDS.

8: Selecting Correct Scan.

Types of Network Scans

1: -sT          Nmap -sT 192.168.34.228 (TCP)

2: -sU         Nmap -sU 192.168.34.228 (UDP)

3: -sS          Nmap -sS 192.168.34.228 (SYN)

4: -sA          Nmap -sA 192.168.34.228 (ACK)

5: -sF           Nmap -sF 192.168.34.228 (FIN)

6: -sN          Nmap -sN 192.168.34.228 (NULL)

7: -sX           Nmap -sX 192.168.34.228 (XMAS)

8: -sI             Nmap -sI 192.168.34.228 (IDLE)

Computer networking

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top