Tuesday, January 23, 2024

CEH: Gathering Host And Network Information | Scanning

Scanning

It is important that the information-gathering stage be as complete as possible to identify the best location and targets to scan. After the completion of  footprinting and information gathering methodologies, scanning is performed.
During scanning, the hacker has vision to get information about network an hosts which are connected to that network that can help hackers to determine which type of exploit to use in hacking a system precisely. Information such as an IP addresses, operating system, services, and installed applications.

Scanning is the methodology used to detect the system that are alive and respond on the network or not. Ethical hackers use these type of scanning to identify the IP address of target system. Scanning is also used to determine the availability of the system whether it is connected to the network or not.

Types Of Scanning 

Network Scanning Identifies IP addresses on a given network or subnet
Port Scanning Determines open, close, filtered and unfiltered ports and services
Vulnerability Scanner Detect the vulnerability on the target system

Port Scanning ​

Port scanning is the process of identifying open and available TCP/IP ports on a system. Port-scanning tools enable a hacker to learn about the services available on a given system. Each service or application on a machine is associated with a well-known port number. Port Numbers are divided into three ranges:
  • Well-Known Ports: 0-1023
  • Registered Ports: 1024-49151
  • Dynamic Ports: 49152-6553

Network Scanning

Network scanning is performed for the detection of active hosts on a network either you wanna attack them or as a network administrator. Network-scanning tools attempt to identify all the live or responding hosts on the network and their corresponding IP addresses. Hosts are identified by their individual IP addresses.

Vulnerability Scanning

This methodology is used to detect vulnerabilities of computer systems on a network. A vulnerability scanner typically identifies the operating system and version number, including applications that are installed. After that the scanner will try to detect vulnerabilities and weakness in the operating system. During the later attack phase, a hacker can exploit those weaknesses in order to gain access to the system. Moreover, the vulnerability scanner can be detected as well, because the scanner must interact over the network with target machine.

The CEH Scanning Methodology

As a CEH, you should understand the methodology about scanning presented in the figure below. Because this is the actual need of hackers to perform further attacks after the information about network and hosts which are connected to the network. It detects the vulnerabilities in the system bu which hackers can be accessible to that system by exploitation of that vulnerabilities.



Continue reading


  1. Beginner Hacker Tools
  2. Hacker Tools List
  3. Hacking Tools Github
  4. Usb Pentest Tools
  5. Hack Website Online Tool
  6. Pentest Tools
  7. Pentest Tools For Ubuntu
  8. Usb Pentest Tools
  9. Hackers Toolbox
  10. Bluetooth Hacking Tools Kali
  11. Hacking Tools Github
  12. Pentest Tools Framework
  13. Hack Website Online Tool
  14. Hacking App
  15. Pentest Automation Tools
  16. Pentest Tools Github
  17. Hacking Apps
  18. Hacking Tools Online
  19. Ethical Hacker Tools
  20. Pentest Recon Tools
  21. Pentest Tools Website
  22. Hacker Tools Github
  23. Hacker Tools Hardware
  24. Termux Hacking Tools 2019
  25. Hacking Tools Name
  26. Hacking Tools For Windows Free Download
  27. Hacker Tools For Pc
  28. Pentest Tools Nmap
  29. Hacking Tools Kit
  30. Best Hacking Tools 2020
  31. New Hacker Tools
  32. World No 1 Hacker Software
  33. Hacks And Tools
  34. Hack Tools For Mac
  35. Hacking Tools For Windows 7
  36. Hack Tools For Mac
  37. Hack Tool Apk No Root
  38. Hacking Tools Pc
  39. New Hacker Tools
  40. Pentest Tools Find Subdomains
  41. Termux Hacking Tools 2019
  42. Pentest Box Tools Download
  43. Pentest Tools Github
  44. Hacker Tools Mac
  45. Hacker Tools Apk Download
  46. Pentest Tools For Ubuntu
  47. Hacker Security Tools
  48. Hack Tools 2019
  49. Hacking Tools For Games
  50. Hack Tools
  51. Hacks And Tools
  52. Hacker Tools For Ios
  53. Pentest Tools Nmap
  54. Beginner Hacker Tools
  55. Hacking Tools For Pc
  56. Pentest Recon Tools
  57. Hacking Tools For Games
  58. Hak5 Tools
  59. Pentest Reporting Tools
  60. Hacking Tools Usb
  61. Hacking Tools Free Download
  62. Pentest Tools Kali Linux
  63. Hack Tools
  64. Hack Tools
  65. Hacker Tools For Ios
  66. New Hack Tools
  67. Hacker Tools Github
  68. Hacking App
  69. Hacking Tools Name
  70. Pentest Tools Find Subdomains
  71. Pentest Reporting Tools
  72. Tools 4 Hack
  73. Android Hack Tools Github
  74. Pentest Tools Review
  75. Pentest Tools For Android
  76. Hacking Tools Pc
  77. Nsa Hack Tools
  78. Pentest Tools Website
  79. Hack Tools For Ubuntu
  80. Hack Tools
  81. Hacking Tools For Kali Linux
  82. Hacking Tools Kit
  83. Pentest Tools Github
  84. Hacking Tools Kit
  85. Hacker Tools Windows
  86. Hacker Tools Free
  87. Termux Hacking Tools 2019
  88. Hacker Tools Github
  89. Hacker Search Tools
  90. Top Pentest Tools
  91. Hack Tools For Ubuntu
  92. Pentest Tools Review
  93. Hack Tools For Mac
  94. Top Pentest Tools
  95. Pentest Tools For Mac
  96. Hacking Tools For Games
  97. Pentest Recon Tools
  98. Hack App
  99. Hacker Security Tools
  100. Hak5 Tools
  101. Pentest Tools Port Scanner
  102. Hacking Tools Mac
  103. Hack Tools Pc
  104. Beginner Hacker Tools
  105. Hacker Security Tools
  106. Hacking Tools Github
  107. Hack Tool Apk
  108. Pentest Tools Alternative
  109. Hack Tools Mac
  110. Hacking Tools Windows
  111. Pentest Tools Kali Linux
  112. Hack Tools Mac
  113. Hacking Tools Windows
  114. Hacking Tools Usb
  115. Best Hacking Tools 2020
  116. Hack Tools Mac
  117. Hacking Tools 2020
  118. Pentest Tools For Android
  119. Pentest Tools Free
  120. Underground Hacker Sites
  121. Hacker Tool Kit
  122. Hacker Tools For Ios
  123. Hacking Tools 2020
  124. Underground Hacker Sites
  125. How To Install Pentest Tools In Ubuntu
  126. Hacker Tools Free
  127. Install Pentest Tools Ubuntu
  128. Best Pentesting Tools 2018
  129. What Are Hacking Tools
  130. Hackrf Tools
  131. Pentest Automation Tools
  132. Pentest Automation Tools

No comments:

Post a Comment