From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Scanning the LAN

Scanning the LAN

- [Narrator] Scanning the network for vulnerabilities involves identifying hosts and listening services and creating a network map. In this segment, we'll review what you might do when scanning the network along with some of the key characteristics found in most scanners. First, let's talk about what happens when scanning the network. Typically, network scanning begins with host discovery, which identifies active devices on a network. Now, this is done by sending probes to a range of IP addresses to see which hosts respond. Some common methods for host discovery includes ICMP echo requests, or ping scans, TCP ACK or SYN packets, and ARP requests. After the team identifies the listening host, the next step is to run a port scan. Now, this determines which ports on a device are open, closed, or filtered. Methods include the SYN scan, full connect scan, and the ACK scan. Now, beyond identifying active services on a host, the team often conducts scans to determine the operating system of…

Contents