Network Scans May Reveal Vulnerabilities
- Log in to post comments
Network scanning is a critical step in ascertaining the security of a network. Some types of scans include the following:
Network Sweeping – This type of scan sends a series of probe packets to identify live hosts at the IP addresses in the target network.
Network Tracing – This type of scam is closely related to network sweeping. During this scan, we attempt to determine the network topology so that we can draw a network map.
Port Scanning – This type of scanning is used to determine the TCP and UDP ports that are listening on the target system.
OS Fingerprinting – This type of scanning is used to determine the operating system of the target based on the behavior of the network.
Version Scanning – Version scanning allows the tester to determine the version of the services and protocols used by open TCP and UDP ports.
Vulnerability Scanning – This type of scanning is used to determine potential vulnerabilities in a target machine. Some of these vulnerabilities such as misconfigurations and unpatched services.