What Is Port Scanning? Port Scanning Works

Drag to rearrange sections
Rich Text Content


Network administrators employ port scanning to map and secure their networks. Port scanning can also be used by hackers to discover weak or unprotected ports within a network so they can take advantage of port weaknesses. Port scanners can be used for connecting to multiple IP addresses or ports in the network.

How Port Scanning Works
Port scanning works the same regardless of whether it's being done by administrators for security reasons or hackers. Before using a port scanner it is necessary to establish the scope of the network to be examined. This could range from one IP address up to several IP addresses.

After you have decided on the appropriate range, it's important to set the port scanner for the amount you need to scan the ports as well as IP addresses in the network. There are various levels of port scanning, from light port scanning to more intense port scanning.

Basic Port Scan: This the easiest kind of port scan that involves scanning a specified port by sending a configured packet that contains the port number of the port to be being scanned. This method is employed to determine which port is available on the machine.

TCP Connect TCP Connect: TCP Connect: TCP connect is used to scan a series of ports on an equipment to check port availability. If a port that is connected to the machine is open then the TCP connect is successful in connecting to the port.

dns checker : This kind of scan is typically used by hackers to discover the ports the hacker already knows how to exploit. Strobe scans are more limited and allow for disclosure of usernames of TCP connections.

Stealth Scan The Stealth Scan scan is designed specifically for hacking because it is designed to be undetected by auditing tools that monitor networks. If a open port checker, is utilized, the ports listening to the scan will report an error message when there's an inbound connection found. However, no information is attached to that connection. Audits are evaded using stealth scans that are able to bypass this process.

There are many different types of scans that can be carried out using the help of a port check tool different than those mentioned in this article. Port scanners are used by administrators of networks to detect vulnerabilities. However hackers who employ port scanners with malicious intent cannot label port scanners as illegal until they have actually committed an illegal crime.
rich_text    
Drag to rearrange sections
Rich Text Content
rich_text    

Page Comments

No Comments

Add a New Comment:

You must be logged in to make comments on this page.