This is our Third Module of Online Ethical Hacking Tutorial. So In this Module we understand the Scanning, it’s types and how scanning performs.
Scanning as its name implies it is technique which is used to gather information for our targeted network and it’s host systems.
Scanning is the first phase of ethical hacking where actual hacking will be start.
Scanning is the process of locating targeted systems that are alive or responding on the network. For this hackers used the IP addresses, operating systems, services and installed applications to find the type of exploit which he later used in the hacking process.
Ethical Hacker used the Scanning to find the target system’s IP addresses.
Why Scanning Performs:-
1. To determine the perimeter of the target network/system.
2. To facilitate network mapping.
3. To Build and Inventory of accessible systems on target network.
In our next article we discus on the types of Scanning?