Ethical Hacking : Port Scanning

Port Scanning is a way to find out which service are offered by a host. Port scanning is able to identifies vulnerabilities. Port scanning can be really useful, because port scanning are able to find any open services available and found any vulnerable port, which we could launch our exploit from.

There are 7 known types of port scanning

  1. SYN Scan -> Stealthy scan
  2. Connect Scan -> completes the 3-way handshake
  3. NULL Scan -> packet flags are turned off
  4. XMAS Scan -> FIN, PSH, URG flags are set on (Feels like Christmas Presents!!!!)
  5. ACK Scan -> Sending ACK Flag, Used to past a firewall
  6. FIN Scan -> Send FIN Flag, Closed port will respond with RST flag
  7. UDP Scan -> Closed port will respond with ICMP “Port Unreachable” message

One of the most famous tool to do port scanning is called nmap. Nmap (Network Mapper) is a security scanner used to discover hosts and services on a computer network.

The most simplest command that usually used on nmap is

nmap *IP Address/Domain name* -> used to scan a single website / IP Address

nmap *IP-Add IP-Add* -> used to scan more than 1 IP Address

Those 2 scanning type is by default a SYN Scan. We can specify the type of scan that we would like to use.

We also could check for the website version and to give all data about the website

This entry was posted in Uncategorized. Bookmark the permalink.