Aditya Share
v.01
today : | at : | safemode : ON
> / home / facebook / twitter / exit /
name author perms com modified label

Port Scanning Aditya Illusion rwxr-xr-x 0 00.31

Filename Port Scanning
Permission rw-r--r--
Author Aditya Illusion
Date and Time 00.31
Label
Action
Port Scanning is one of the most popular techniques used by hackers to discover services that can be compromised.
  • A potential target computer runs many ‘services’ that listen at ‘well-known’ ‘ports’.
  • By scanning which ports are available on the victim, the hacker finds potential vulnerabilities that can be exploited.
  • Scan techniques can be differentiated broadly into Vanilla, Strobe, Stealth, FTP Bounce, Fragmented Packets, Sweep and UDP Scans.
Port Scanning Techniques
 
Port Scanning Techniques can be broadly classified into:
  • Open scan
  • Half- open scan
  • Stealth scan
  • Sweeps
  • Misc
Commonly used tools for port scanning

1. Tool: SuperScan 3.0

  
  
  
  
  
  


2. Tool: NMap (Network Mapper)


3. Tool: NetScan Tools Pro 2003 


4. Tool: ipEye, IPSecScan

0 komentar:

Posting Komentar

 

Indonesia Is The Best © 2012 Aditya Share
VB (Yudi Aditya) Template design by Aditya Share