Premium Essay

Nt1310 Unit 3 Application Of Port Scanning

Submitted By
Words 407
Pages 2
Enumeration in information security is the process of extracting user names, machine names, network resources, and other services from a system. The information is collected and used to identify the vulnerabilities or weaknesses in a networks security posture and tries to take advantage of them.
Enumeration is considered the first actual attack on target networks or machines because it is actively connecting to the network or machine to gather information.
Port Scanning is one of the most popular techniques that an attacker uses to discover services running on that system. All the systems connected to the LAN or accessing network via a modem which runs services that listen to well-known ports. It is a common technique used by a penetration tester to find open ports and the services running on those ports. Port scanning provides the pentester with some insight to which OS is running, whether a firewall is involved, routing and general network topology and types of other hardware involved being used on the target network. …show more content…
Nmap is a great tool for digging deeper into automated scanning tool results or verifying them. Developed for the UNIX environment, Nmap is an open source tool available free from a variety of sites, the primary one being http://www.insecure.org/nmap.
Angry IP Scanner is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses and ports as well as has many other

Similar Documents