Network scanning

The following is a list of guidelines for performing network scanning:

  1. Perform host discovery on the network.
  2. Perform port scanning to determine services.
  3. Perform banner grabbing of target operating systems and ports.
  4. Perform vulnerability scanning.
  5. Create a network topology of the target network.

Next, we will learn about the fundamental requirements for an enumeration checklist.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.137.178.133