Thursday, January 25, 2024

CEH: Gathering Host And Network Information | Scanning

Scanning

It is important that the information-gathering stage be as complete as possible to identify the best location and targets to scan. After the completion of  footprinting and information gathering methodologies, scanning is performed.
During scanning, the hacker has vision to get information about network an hosts which are connected to that network that can help hackers to determine which type of exploit to use in hacking a system precisely. Information such as an IP addresses, operating system, services, and installed applications.

Scanning is the methodology used to detect the system that are alive and respond on the network or not. Ethical hackers use these type of scanning to identify the IP address of target system. Scanning is also used to determine the availability of the system whether it is connected to the network or not.

Types Of Scanning 

Network Scanning Identifies IP addresses on a given network or subnet
Port Scanning Determines open, close, filtered and unfiltered ports and services
Vulnerability Scanner Detect the vulnerability on the target system

Port Scanning ​

Port scanning is the process of identifying open and available TCP/IP ports on a system. Port-scanning tools enable a hacker to learn about the services available on a given system. Each service or application on a machine is associated with a well-known port number. Port Numbers are divided into three ranges:
  • Well-Known Ports: 0-1023
  • Registered Ports: 1024-49151
  • Dynamic Ports: 49152-6553

Network Scanning

Network scanning is performed for the detection of active hosts on a network either you wanna attack them or as a network administrator. Network-scanning tools attempt to identify all the live or responding hosts on the network and their corresponding IP addresses. Hosts are identified by their individual IP addresses.

Vulnerability Scanning

This methodology is used to detect vulnerabilities of computer systems on a network. A vulnerability scanner typically identifies the operating system and version number, including applications that are installed. After that the scanner will try to detect vulnerabilities and weakness in the operating system. During the later attack phase, a hacker can exploit those weaknesses in order to gain access to the system. Moreover, the vulnerability scanner can be detected as well, because the scanner must interact over the network with target machine.

The CEH Scanning Methodology

As a CEH, you should understand the methodology about scanning presented in the figure below. Because this is the actual need of hackers to perform further attacks after the information about network and hosts which are connected to the network. It detects the vulnerabilities in the system bu which hackers can be accessible to that system by exploitation of that vulnerabilities.



Related links


  1. Hacking Tools Download
  2. Hacker Tools Hardware
  3. Hacking Tools Windows 10
  4. Best Hacking Tools 2019
  5. Hackrf Tools
  6. New Hacker Tools
  7. Hacking Tools For Windows 7
  8. Hacking Tools Windows
  9. Pentest Tools Free
  10. Usb Pentest Tools
  11. Wifi Hacker Tools For Windows
  12. Hacker Tools Linux
  13. Hacking Tools Windows 10
  14. Hack Tool Apk
  15. Hacking Tools 2020
  16. Hacker Tools Mac
  17. Pentest Tools Free
  18. Hack Tools For Pc
  19. Pentest Tools Download
  20. Hacking Tools Windows
  21. Hack Tools For Windows
  22. Pentest Tools Website
  23. Underground Hacker Sites
  24. Pentest Tools Port Scanner
  25. World No 1 Hacker Software
  26. Hacker Techniques Tools And Incident Handling
  27. Pentest Tools List
  28. Pentest Tools Find Subdomains
  29. Kik Hack Tools
  30. Hacker Tools 2020
  31. World No 1 Hacker Software
  32. Hacker Tools For Mac
  33. Hacker Tools Software
  34. Pentest Tools Linux
  35. Pentest Automation Tools
  36. Pentest Tools Website
  37. Hak5 Tools
  38. Hacking Tools Github
  39. New Hacker Tools
  40. Pentest Tools Linux
  41. Pentest Tools
  42. Pentest Tools Open Source
  43. Termux Hacking Tools 2019
  44. Hacker Tools Linux
  45. Hacking Tools Usb
  46. Physical Pentest Tools
  47. Hacking Tools 2019
  48. Pentest Tools Android
  49. How To Make Hacking Tools
  50. Hack Tools For Games
  51. Nsa Hack Tools
  52. Hacker Tools Software
  53. Best Hacking Tools 2020
  54. Growth Hacker Tools
  55. Pentest Tools Apk
  56. Hacker Tools 2019
  57. Pentest Tools Bluekeep
  58. Growth Hacker Tools
  59. Pentest Automation Tools
  60. How To Make Hacking Tools
  61. Hacking App
  62. Hacker Tools Hardware
  63. Hacker
  64. Hack Tools For Ubuntu
  65. Hacking Tools Github
  66. Hacking Tools For Beginners
  67. Pentest Tools List
  68. Kik Hack Tools
  69. Pentest Tools Online
  70. Hacker Tools For Pc
  71. Hacker Tools For Pc
  72. Pentest Tools Url Fuzzer
  73. What Is Hacking Tools
  74. Free Pentest Tools For Windows
  75. Hacker Tools Free Download
  76. New Hack Tools
  77. Hacker Tools For Ios
  78. Pentest Tools Linux
  79. Hacking Tools Mac
  80. Hacking Tools Mac
  81. Nsa Hacker Tools
  82. Hacking Tools Pc
  83. Hacker
  84. Hacker Tools List
  85. Hack Tool Apk No Root
  86. Hack Rom Tools
  87. Pentest Tools Open Source
  88. Hacker Search Tools
  89. Kik Hack Tools
  90. Best Pentesting Tools 2018
  91. How To Make Hacking Tools
  92. Pentest Tools List
  93. Pentest Automation Tools
  94. Hacks And Tools
  95. Pentest Tools For Windows
  96. Pentest Tools Alternative
  97. Best Pentesting Tools 2018
  98. Hacker Tools 2019
  99. Pentest Tools For Ubuntu
  100. Hacking Tools 2020
  101. Pentest Tools Kali Linux
  102. Pentest Tools Nmap
  103. Hacker Hardware Tools
  104. Install Pentest Tools Ubuntu
  105. Hack Website Online Tool
  106. Hacking Tools Github
  107. Pentest Tools For Windows
  108. Install Pentest Tools Ubuntu
  109. What Are Hacking Tools
  110. Beginner Hacker Tools
  111. Hacker Search Tools
  112. Pentest Tools
  113. Termux Hacking Tools 2019
  114. Hacking Tools For Beginners
  115. Hacker Tools Software
  116. Hacking Tools For Kali Linux
  117. Hacking Tools Pc
  118. Pentest Tools Android
  119. Hack Tools Download
  120. Hacker Tool Kit
  121. Pentest Tools Android
  122. Github Hacking Tools
  123. Hacking Tools 2020
  124. Pentest Tools Nmap
  125. Hacker Tools For Ios
  126. Hak5 Tools
  127. Hacking Tools For Windows Free Download
  128. Hacker Tools Apk Download
  129. Hacking Tools Free Download
  130. Hack Tools

0 comments:

Post a Comment