Podcast
Questions and Answers
What is the primary function of Network Tools Pro?
What is the primary function of Network Tools Pro?
What type of information does Network Tools Pro list automatically?
What type of information does Network Tools Pro list automatically?
What is the purpose of scanning beyond IDS?
What is the purpose of scanning beyond IDS?
What is banner grabbing?
What is banner grabbing?
Signup and view all the answers
What is the purpose of preparing proxies?
What is the purpose of preparing proxies?
Signup and view all the answers
What is the purpose of scanning for vulnerabilities?
What is the purpose of scanning for vulnerabilities?
Signup and view all the answers
What is the purpose of drawing network diagrams?
What is the purpose of drawing network diagrams?
Signup and view all the answers
What is the purpose of checking for live systems?
What is the purpose of checking for live systems?
Signup and view all the answers
What is the purpose of checking for open ports?
What is the purpose of checking for open ports?
Signup and view all the answers
What is penetration testing?
What is penetration testing?
Signup and view all the answers
What is the primary purpose of network scanning?
What is the primary purpose of network scanning?
Signup and view all the answers
What technique is used to remain anonymous while scanning a network?
What technique is used to remain anonymous while scanning a network?
Signup and view all the answers
What is the goal of banner grabbing?
What is the goal of banner grabbing?
Signup and view all the answers
What is IP spoofing used for in network scanning?
What is IP spoofing used for in network scanning?
Signup and view all the answers
What is the purpose of drawing network diagrams?
What is the purpose of drawing network diagrams?
Signup and view all the answers
What is the term for testing a network's defenses?
What is the term for testing a network's defenses?
Signup and view all the answers
What is the source IP address of the ICMP Echo Reply?
What is the source IP address of the ICMP Echo Reply?
Signup and view all the answers
What command is used to perform the ping scan using Nmap?
What command is used to perform the ping scan using Nmap?
Signup and view all the answers
What is the destination IP address of the ICMP Echo Reply?
What is the destination IP address of the ICMP Echo Reply?
Signup and view all the answers
Which of the following is NOT a valid IP address in the output?
Which of the following is NOT a valid IP address in the output?
Signup and view all the answers
What is the purpose of the nmap
command?
What is the purpose of the nmap
command?
Signup and view all the answers
What protocol is used for the ping scan?
What protocol is used for the ping scan?
Signup and view all the answers
What is the IP address of the host that is being scanned?
What is the IP address of the host that is being scanned?
Signup and view all the answers
What is the purpose of the ICMP Echo Reply?
What is the purpose of the ICMP Echo Reply?
Signup and view all the answers
What is the primary purpose of network scanning in the context of intelligence gathering?
What is the primary purpose of network scanning in the context of intelligence gathering?
Signup and view all the answers
What does a ping scan involve?
What does a ping scan involve?
Signup and view all the answers
What is one of the objectives of network scanning?
What is one of the objectives of network scanning?
Signup and view all the answers
What is the outcome if a host is live when sent an ICMP ECHO request?
What is the outcome if a host is live when sent an ICMP ECHO request?
Signup and view all the answers
What is the primary goal of scanning beyond IDS?
What is the primary goal of scanning beyond IDS?
Signup and view all the answers
What is one of the uses of a ping scan?
What is one of the uses of a ping scan?
Signup and view all the answers
What is the purpose of banner grabbing?
What is the purpose of banner grabbing?
Signup and view all the answers
What is one of the objectives of network scanning in the context of penetration testing?
What is one of the objectives of network scanning in the context of penetration testing?
Signup and view all the answers
Which tool is available at http://www.colasoft.com?
Which tool is available at http://www.colasoft.com?
Signup and view all the answers
What is the name of the tool available at http://www.pingtester.net?
What is the name of the tool available at http://www.pingtester.net?
Signup and view all the answers
Which tool is available at http://www.nirsoft.net?
Which tool is available at http://www.nirsoft.net?
Signup and view all the answers
What is the name of the tool available at http://www.greenline-soft.com?
What is the name of the tool available at http://www.greenline-soft.com?
Signup and view all the answers
Which tool is available at http://w1v111.digilextechnologies.com?
Which tool is available at http://w1v111.digilextechnologies.com?
Signup and view all the answers
What is the name of the tool available at http://www.ipuptime.net?
What is the name of the tool available at http://www.ipuptime.net?
Signup and view all the answers
Which tool is available at http://www.niliand.com?
Which tool is available at http://www.niliand.com?
Signup and view all the answers
Study Notes
Network Scanning
- Network scanning involves identifying hosts, ports, and services in a network to gather information about the target organization.
- Objectives of network scanning include:
- Identifying live hosts, IP addresses, and open ports of live hosts.
- Discovering services running on hosts.
- Discovering vulnerabilities in live hosts.
Scanning Techniques
- Ping scan: involves sending ICMP ECHO requests to a host to determine if it is live and if ICMP is passing through a firewall.
- Ping scan output can be obtained using tools like Nmap.
Tools for Ping Scanning
- Colasoft Ping Tool: a network scanning tool for Windows.
- Advanced IP Scanner: a free tool for scanning IP addresses and ports.
- Visual Ping Tester - Standard: a tool for testing ping responses.
- Ping Sweep: a tool for pinging a range of IP addresses.
- Ping Scanner Pro: a tool for scanning IP addresses and ports.
- OpUtils: a network management tool with ping scanning capabilities.
- Ping Monitor: a tool for monitoring ping responses.
- Ping Info View: a tool for viewing ping responses.
- Pinkie: a tool for pinging IP addresses.
Overview of Network Scanning Process
- Sends packets to the network to gather information.
- Gets network information about hosts, ports, and services.
Check for Live Systems and Open Ports
- Checking for live systems involves scanning for hosts that respond to ICMP ECHO requests.
- Checking for open ports involves scanning for ports that respond to connection attempts.
Scanning Beyond IDS and Banner Grabbing
- Scanning beyond IDS (Intrusion Detection Systems) involves evading detection by IDS.
- Banner grabbing involves collecting information about services running on hosts.
Scan for Vulnerability and Draw Network Diagrams
- Scanning for vulnerabilities involves identifying weaknesses in hosts and services.
- Drawing network diagrams involves creating visual representations of the network infrastructure.
Prepare Proxies and Scanning Pen Testing
- Preparing proxies involves setting up anonymizers for attack.
- Scanning pen testing involves simulating attacks on the network to test defenses.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers network security scanning techniques, including scanning for open ports, vulnerability scanning, and network diagramming. It also touches on the use of proxies and network troubleshooting tools.