25 de jan. de 2024

CEH: Gathering Host And Network Information | Scanning

Scanning

It is important that the information-gathering stage be as complete as possible to identify the best location and targets to scan. After the completion of  footprinting and information gathering methodologies, scanning is performed.
During scanning, the hacker has vision to get information about network an hosts which are connected to that network that can help hackers to determine which type of exploit to use in hacking a system precisely. Information such as an IP addresses, operating system, services, and installed applications.

Scanning is the methodology used to detect the system that are alive and respond on the network or not. Ethical hackers use these type of scanning to identify the IP address of target system. Scanning is also used to determine the availability of the system whether it is connected to the network or not.

Types Of Scanning 

Network Scanning Identifies IP addresses on a given network or subnet
Port Scanning Determines open, close, filtered and unfiltered ports and services
Vulnerability Scanner Detect the vulnerability on the target system

Port Scanning ​

Port scanning is the process of identifying open and available TCP/IP ports on a system. Port-scanning tools enable a hacker to learn about the services available on a given system. Each service or application on a machine is associated with a well-known port number. Port Numbers are divided into three ranges:
  • Well-Known Ports: 0-1023
  • Registered Ports: 1024-49151
  • Dynamic Ports: 49152-6553

Network Scanning

Network scanning is performed for the detection of active hosts on a network either you wanna attack them or as a network administrator. Network-scanning tools attempt to identify all the live or responding hosts on the network and their corresponding IP addresses. Hosts are identified by their individual IP addresses.

Vulnerability Scanning

This methodology is used to detect vulnerabilities of computer systems on a network. A vulnerability scanner typically identifies the operating system and version number, including applications that are installed. After that the scanner will try to detect vulnerabilities and weakness in the operating system. During the later attack phase, a hacker can exploit those weaknesses in order to gain access to the system. Moreover, the vulnerability scanner can be detected as well, because the scanner must interact over the network with target machine.

The CEH Scanning Methodology

As a CEH, you should understand the methodology about scanning presented in the figure below. Because this is the actual need of hackers to perform further attacks after the information about network and hosts which are connected to the network. It detects the vulnerabilities in the system bu which hackers can be accessible to that system by exploitation of that vulnerabilities.



More information


  1. Hackers Toolbox
  2. Pentest Tools Website
  3. Hacking Tools Hardware
  4. Hacking Tools Usb
  5. Best Hacking Tools 2020
  6. Hacker Tools Windows
  7. World No 1 Hacker Software
  8. Pentest Tools Download
  9. Hack Tools Mac
  10. Hacking Tools For Kali Linux
  11. Hacking Tools Software
  12. How To Hack
  13. Hacker Tools For Pc
  14. Hacker Tools 2019
  15. Wifi Hacker Tools For Windows
  16. Best Hacking Tools 2019
  17. Pentest Tools For Ubuntu
  18. Hack Tools Mac
  19. Hacking Tools For Kali Linux
  20. Hackrf Tools
  21. Wifi Hacker Tools For Windows
  22. Termux Hacking Tools 2019
  23. Hack Tools Github
  24. Pentest Tools Android
  25. Hacking Tools Usb
  26. Best Hacking Tools 2019
  27. Hack Tools For Games
  28. Best Pentesting Tools 2018
  29. Pentest Tools Bluekeep
  30. Hack App
  31. Hack Tools 2019
  32. Pentest Tools Bluekeep
  33. Pentest Reporting Tools
  34. World No 1 Hacker Software
  35. Pentest Tools Kali Linux
  36. Nsa Hacker Tools
  37. Pentest Tools Url Fuzzer
  38. Hacking Apps
  39. How To Install Pentest Tools In Ubuntu
  40. Pentest Reporting Tools
  41. Hacking Tools 2019
  42. Bluetooth Hacking Tools Kali
  43. Pentest Tools For Android
  44. Hack Tools For Windows
  45. Usb Pentest Tools
  46. Hack Tool Apk No Root
  47. Pentest Automation Tools
  48. Pentest Tools Url Fuzzer
  49. Hack Tools For Pc
  50. Hacker Security Tools
  51. Termux Hacking Tools 2019
  52. Hack Tools Online
  53. Hack Tools Pc
  54. Hacker Security Tools
  55. Pentest Tools Website Vulnerability
  56. Hack Tools Mac
  57. Nsa Hack Tools
  58. Pentest Tools Open Source
  59. Blackhat Hacker Tools
  60. Hacking App
  61. Hacking Tools Usb
  62. Hacking Tools Hardware
  63. Hacker Tools Online
  64. Hacking Tools Pc
  65. Pentest Tools Subdomain
  66. Hacking Tools For Windows Free Download
  67. Hacking Tools For Beginners
  68. Hack Tools
  69. Physical Pentest Tools
  70. Hack Tools Github
  71. Best Pentesting Tools 2018
  72. Physical Pentest Tools
  73. Hacker Tools Mac
  74. Pentest Tools Bluekeep
  75. Growth Hacker Tools
  76. What Is Hacking Tools
  77. Hacking Tools Free Download
  78. Beginner Hacker Tools
  79. Hacking Tools For Pc
  80. Hackrf Tools
  81. Pentest Tools Find Subdomains
  82. How To Hack
  83. Pentest Tools Website
  84. Pentest Tools Nmap
  85. Hacker Tools For Ios
  86. Pentest Tools Apk
  87. Hack Website Online Tool
  88. Pentest Tools Review
  89. Hacker Tools Apk
  90. Physical Pentest Tools
  91. Hack Apps
  92. Hacking App
  93. Hacker Tools Free Download
  94. Hackers Toolbox
  95. Pentest Tools Find Subdomains
  96. Pentest Tools List
  97. Best Hacking Tools 2020
  98. Pentest Tools For Mac
  99. Hack Apps
  100. Hacking Tools Online
  101. Hacking Tools For Windows 7
  102. Hacker Techniques Tools And Incident Handling
  103. Pentest Tools Subdomain
  104. Hacker Tools
  105. Hacker Tools 2019
  106. Pentest Tools Subdomain
  107. Install Pentest Tools Ubuntu
  108. New Hack Tools
  109. Pentest Tools For Mac
  110. Usb Pentest Tools
  111. Hacking Tools For Mac
  112. Pentest Tools Github
  113. Hack Tools
  114. Underground Hacker Sites
  115. Hacking Tools Name
  116. Hacker Tools 2020
  117. Nsa Hack Tools Download
  118. Pentest Tools Download
  119. Pentest Tools Review
  120. Pentest Tools For Android
  121. Beginner Hacker Tools
  122. Wifi Hacker Tools For Windows
  123. Hacking Tools For Beginners
  124. Hacking Tools 2019
  125. Hacker Tools Apk Download
  126. Hacking Tools
  127. Hacking Tools For Games
  128. Hacker Tools Free Download
  129. Pentest Tools List
  130. Pentest Tools Android
  131. Hacking Tools Windows 10
  132. Hack Tools For Mac
  133. Hacker Tools For Ios
  134. New Hack Tools
  135. Hack And Tools
  136. Hacker
  137. Top Pentest Tools
  138. Hacker Tools For Pc
  139. Growth Hacker Tools
  140. Hacking Tools Windows
  141. Hack Tools Download
  142. Hack Tools Github
  143. Easy Hack Tools
  144. Usb Pentest Tools
  145. Ethical Hacker Tools
  146. Tools Used For Hacking
  147. Hacking Tools Pc
  148. Best Pentesting Tools 2018
  149. Pentest Reporting Tools
  150. Nsa Hacker Tools
  151. Nsa Hacker Tools

Nenhum comentário: