Scanning
During scanning, the hacker continues to gather information regarding the network and its
individual host systems. Data such as IP addresses, operating system, services, and installed
applications can help the hacker decide which type of exploit to use in hacking a system. Scanning is the process of locating systems that are alive and responding on the network. Ethical
hackers use it to identify target systems’ IP addresses.
Saturday, 12 January 2019
What is Scanning?
Subscribe to:
Post Comments (Atom)
Best Ethical Hacking Institute In India
Cyber Yodha is a Best Ethical hacking institute in india was founded with a vision to make learning easier and accessible. From over 30 cour...
-
What Is a Penetration Test? A penetration test is a subclass of ethical hacking; it comprises a set of methods and procedures that aim a...
-
Sql injection SQL injection and buffer overflows area unit similar exploits therein they’re each typically delivered via a user-input fiel...
-
Information Gathering with Whois As I have mentioned earlier, our goal in the information gathering and enumeration phase is to ...
No comments:
Post a Comment