In our last article we discussed on What is Scanning, and today going to forward we discuss on types of Scanning which is used in the ethical hacking.
Scanning are three types:-
1. Port Scanning
2. Network Scanning
3. Vulnerability Scanning
So Today we only discussed on the Port Scanning.
Port Scanning is one of the most popular reconnaissance techniques used by hackers to discover services that can be compromised. So in this we identify the open and available TCP/IP Ports on a system. In Port Scanning we identify the open and available TCP/IP Ports on a system. So in simple we can say that in port scanning we discover or find the secuirty holes that we can use against the system or our target.
Port-scanning tools enable a hacker to learn about the services available on a given system. Each service or application on a machine is associated with a well-known port number.
A port scan helps the attacker find which ports are available (i.e., what service might be listing to a port). Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness.
Port numbers are 16-bit unsigned numbers.The port numbers are divided into three ranges:
- Well Known Ports (0 – 1023)
- Registered Ports (1024 – 49151)
- Dynamic and/or Private Ports (49152 – 65535)
Ports numbered 0 to 1023 are considered well known (also called standard ports) and are assigned to services by the IANA (Internet Assigned Numbers Authority).
By a non-standard port, we simply mean a port whose number is higher than 1023. In this range also, several services are “standard.”
Wait for our next articles on Further Types of Scanning.