InfosecTrain

Exploring CEH Module 3: Scanning Networks


Listen Later

After selecting a target and initial reconnaissance, as described in the Footprinting and Reconnaissance module, attackers search for access points into the target system, determining the system’s activity status to streamline scanning efforts. Scanning, a deeper reconnaissance form, reveals information about the target’s operating systems. This module provides an overview of network scanning techniques, including live system checks, port and service discovery, and strategies to circumvent IDS and firewalls.

What is Network Scanning?

Network scanning is a critical process in cybersecurity for acquiring in-depth information about a target by employing advanced reconnaissance tactics. Network scanning encompasses procedures for detecting hosts, ports, and services within a network and is also instrumental in discovering the Operating Systems (OS) on the active machines. This is a crucial step for information collection for an attacker, facilitating the construction of a comprehensive profile of the target organization. During the scanning process, an attacker collects specific IP addresses that are reachable across the network, the system architecture of the target’s OS, and the services active on each system.

First, we will explore a selection of network scanning tools featured in this module. Then, leveraging these tools, we will guide you through the process of conducting a comprehensive network scan. The following list highlights the top network scanning tools used for scanning.

View More: Exploring CEH Module 3: Scanning Networks

...more
View all episodesView all episodes
Download on the App Store

InfosecTrainBy InfosecTrain

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings


More shows like InfosecTrain

View all
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

371 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,023 Listeners

Smashing Security by Graham Cluley

Smashing Security

322 Listeners

Professor Messer's Security+ Study Group by Professor Messer

Professor Messer's Security+ Study Group

138 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,013 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

174 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

AWS Podcast by Amazon Web Services

AWS Podcast

202 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

73 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

137 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

170 Listeners

CISSP Cyber Training Podcast - CISSP Training Program by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

CISSP Cyber Training Podcast - CISSP Training Program

32 Listeners

Tech Career Blueprint Podcast | Presented By Master I.T. Zero To I.T. Hero by MASTER I.T.

Tech Career Blueprint Podcast | Presented By Master I.T. Zero To I.T. Hero

19 Listeners

CISM Central by Krishnakumar Mahadevan

CISM Central

0 Listeners

Decoded: The Cybersecurity Podcast by Edward Henriquez

Decoded: The Cybersecurity Podcast

4 Listeners