System & Network
Network Scanning and Enumeration involve actively probing a network or system to identify active hosts, open ports, services, and vulnerabilities. This type of reconnaissance is essential in the initial phase of penetration testing and cybersecurity assessments.
Explanation and Methodologies
Host Discovery: Identifying live hosts in the network. Techniques include ping sweeps and ARP scanning.
Port Scanning: Determining open ports on discovered hosts. Techniques vary from a simple TCP connect scan to more sophisticated SYN stealth scans.
Service Enumeration: Identifying services running on open ports and gathering information like service type, version, etc.
OS Fingerprinting: Determining the operating systems of the hosts.
Vulnerability Scanning: Identifying potential vulnerabilities in the hosts, services, or applications.
Network Mapping: Visualizing the network layout, understanding the topology and interconnections between hosts.
Network Scanning and Enumeration
Nmap (CLI-based): Scans for open ports, identifies services and operating systems.
Wireshark: Network protocol analyzer for network troubleshooting and analysis.
Netcat (CLI-based): Networking utility for reading/writing network connections.
Masscan (CLI-based): Ultra-fast port scanner, scanning large networks.
Angry IP Scanner: Fast IP and port scanner with a GUI.
Last updated