Scanning
During scanning, the hacker continues to gather information regarding the network and its
individual host systems. Data such as IP addresses, operating system, services, and installed
applications can help the hacker decide which type of exploit to use in hacking a system. Scanning is the process of locating systems that are alive and responding on the network. Ethical
hackers use it to identify target systems’ IP addresses.
Saturday, 12 January 2019
What is Scanning?
Subscribe to:
Post Comments (Atom)
Best Ethical Hacking Institute In India
Cyber Yodha is a Best Ethical hacking institute in india was founded with a vision to make learning easier and accessible. From over 30 cour...
-
Sql injection SQL injection and buffer overflows area unit similar exploits therein they’re each typically delivered via a user-input fiel...
-
Information Gathering with Whois As I have mentioned earlier, our goal in the information gathering and enumeration phase is to ...
-
Sniffers concept A sniffer can be a packet-capturing or frame-capturing tool. It intercepts traffic on the network and displays it in ei...
No comments:
Post a Comment