Ethical Hacking : Scanning FAQs


Q.1 Why Scanning is performed?

To determine the perimeter of the target, facilitating network mapping and to build an inventory of accessible systems on target network.

Q.2 What are the popular tools for scanning a network?

  • War Dialers
  • Ping Utilities

Q.3 What are War Dialers?


A war driver is a tool used to scan a large pool of telephone numbers to detect vulnerable modems to provide access to the system.Some of the war dialers are THC-Scan, ToneLoc, TBA etc.

Q.4 What is ping?


Ping send out an ICMP Echo Request packet and awaits an ICMP Echo Reply Message fom an active machine.Ping Helps in assessing network traffic by time stamping each packet. Ping can also be used to resolve the host names.Some of the well known tools are WS_Ping ProPack, NetScan tools and HPing.

Q.5 What is Port Scanning?


Port Scanning is one of the most popular reconnaissance techniques used by the hackers to discover the services that can be compromised. By scanning which ports are available on the victim, the hacker finds the potential vulnerabilities that can be exploited.

1 comment:

  1. Thanks for sharing this useful and wonderful information here. This will be useful for my ethical hacking course in chennai

    ReplyDelete