GATHERING NETWORK AND HOST INFORMATION

Get Started. It's Free
or sign up with your email address
Rocket clouds
GATHERING NETWORK AND HOST INFORMATION by Mind Map: GATHERING NETWORK AND HOST INFORMATION

1. Null sessions

1.1. an anonymous connection to an inter-process communication network service

1.2. an anonymous connection to an inter-process communication network service

2. Types of scanning

2.1. a. Port scanning

2.1.1. act of systematically scanning a computer's ports.

2.1.2. refers to the surveillance of computer ports, most often by hackers for malicious purposes.

2.1.3. also considered an open-door hacking technique.

2.1.4. Nmap Online Port Scanner

2.2. b. Network scanning

2.2.1. the use of a computer network to gather information regarding computing systems.

2.2.2. mainly used for security assessment, system maintenance, and also for performing attacks by hackers.

2.2.3. is designed to locate all the live hosts on a network

2.3. c. Vulnerability scanning

2.3.1. is designed to locate all the live hosts on a network

2.3.2. quite commonly done as a proactive measure with the goal of catching problems internally before an attacker is able to locate those same vulnerabilities and act on them