Network Scans May Reveal Vulnerabilities

Network scanning is a critical step in ascertaining the security of a network. Some types of scans include the following:

Network Sweeping – This type of scan sends a series of probe packets to identify live hosts at the IP addresses in the target network.

Network Tracing – This type of scam is closely related to network sweeping. During this scan, we attempt to determine the network topology so that we can draw a network map.

Port Scanning – This type of scanning is used to determine the TCP and UDP ports that are listening on the target system.

OS Fingerprinting – This type of scanning is used to determine the operating system of the target based on the behavior of the network.

Version Scanning – Version scanning allows the tester to determine the version of the services and protocols used by open TCP and UDP ports.

Vulnerability Scanning – This type of scanning is used to determine potential vulnerabilities in a target machine. Some of these vulnerabilities such as misconfigurations and unpatched services.