Port Scanning | JamiiForums | The Home of Great Thinkers

Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

Port Scanning

Discussion in 'Tech, Gadgets & Science Forum' started by MziziMkavu, Oct 16, 2011.

  1. MziziMkavu

    MziziMkavu JF-Expert Member

    Oct 16, 2011
    Joined: Feb 3, 2009
    Messages: 39,620
    Likes Received: 4,615
    Trophy Points: 280
    Port Scanning

    Port Scanning is one of the most popular techniques used by hackers to discover services that can be compromised.
    • A potential target computer runs many ‘services’ that listen at ‘well-known’ ‘ports’.
    • By scanning which ports are available on the victim, the hacker finds potential vulnerabilities that can be exploited.
    • Scan techniques can be differentiated broadly into Vanilla, Strobe, Stealth, FTP Bounce, Fragmented Packets, Sweep and UDP Scans.
    Port Scanning Techniques
    Port Scanning Techniques can be broadly classified into:
    • Open scan
    • Half- open scan
    • Stealth scan
    • Sweeps
    • Misc
    Commonly used tools for port scanning1. Tool: SuperScan 3.0[​IMG] 2. Tool: NMap (Network Mapper)[​IMG]3. Tool: NetScan Tools Pro 2003[​IMG]4. Tool: ipEye, IPSecScan[​IMG]