Objective: To establish the ing between IP addresses and open ports and services
The scanning process is divided into three different stages:
1. Verify that the system is running
2. Scan the system Port
3. Scan System Vulnerabilities
Vulnerability scanning is a process of locating and identifying known vulnerabilities in services and software running on the target computer.
Whether you want to control some confidential internal machines or simply try to enter a target network, you generally need to start scanning external devices. Cause:
1. Most of the information obtained by the Investigation belongs to external devices.
2. It is difficult to directly access the target network, so the Skip Control
Not every host will respond to the ping request. Some firewall or other facilities on the host will suppress the ping packet.
Penetration Testing Practice Guide: Tools and methods required