From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Scanning the LAN
From the course: Ethical Hacking: Vulnerability Analysis
Scanning the LAN
- [Narrator] Scanning the network for vulnerabilities involves identifying hosts and listening services and creating a network map. In this segment, we'll review what you might do when scanning the network along with some of the key characteristics found in most scanners. First, let's talk about what happens when scanning the network. Typically, network scanning begins with host discovery, which identifies active devices on a network. Now, this is done by sending probes to a range of IP addresses to see which hosts respond. Some common methods for host discovery includes ICMP echo requests, or ping scans, TCP ACK or SYN packets, and ARP requests. After the team identifies the listening host, the next step is to run a port scan. Now, this determines which ports on a device are open, closed, or filtered. Methods include the SYN scan, full connect scan, and the ACK scan. Now, beyond identifying active services on a host, the team often conducts scans to determine the operating system of…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.