Ethical Hacking - Scanning

Scanning is a set of procedures for identifying live hosts, ports, and services that are running on a host computer, discovering Operating system and architecture of target system, Identifying vulnerabilities and threats in the network.

Network scanning is used to create a profile of the target system.

The purpose of each scanning process is given below :

  • Port Scanning – detecting open ports and services running on the target.

  • Network Scanning – IP addresses, Operating system details, Topology details, trusted routers information etc.

  • Vulnerability scanning – scanning for known vulnerabilities or weakness in a target system.

Tools that can are used to scan ports, networks and vulnerabilities are :

Nmap : To extract information such as live hosts on the network, services, type of packet filters/firewalls, operating systems and OS versions. It is also used to scan vulnerabilities on the target system.

Angry IP Scanner : Scans for systems available in a given input range.

Superscan : It is a powerful tool developed by Mcafee, which is a TCP port scanner, also used for pinging.

ZenMap : It is another very powerful Graphical user interface (GUI) tool to detect the type of OS, OS version, ping sweep, port scanning, etc.

There are various other scanners available free and inbuilt in Kali Linux OS.