Vulnerability scanning

There are many methods that can be used to scan your network for existing vulnerabilities. Some of these mechanisms include:

  • Port scanning: A type of scan that determines whether a computer has open TCP or UDP ports. If a port is open on a computer, it means that a network service is running and is listening on that port.
  • Network tracing: A scan that attempts to build a network map based on the results returned by the scan.
  • Version scanning: The version scan adds to the port scan by attempting to determine which service and what version of that service is running on a given port.
  • Network sweeping: This type of scan is used to determine what IP addresses are in use by network connected devices.
  • OS fingerprinting: Like version scanning in that the scanner attempts to guess the version of the operating system based on data returned by the scan.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.216.163