Port Scan : 1st Stage for Vulnerability Assessment

February 28, 2018 | Views: 2913

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Port Scan is the 1st Stage of any vulnerability assessment done on the orgaization. It can be of two types: Internal & External.

Internal Scan: Inside scan of IPs that are private ip & not being natted. External IPs can also be scanned.

External Scan: IPs which are being natted to communicate with outside world. Generally, performed from outside the organizaton’s network.

Pros:

1: Finding Threats & Vulnerabilities through IP.

2:  Services running on those ports & their versions.

Cons:

1: Firewall will keep logs of the Source_IP from where the scan was initiated.

Command : “sudo”(to run as root) nmap -sV -O <target-ip>

nmap: Network Mapper is free network scanning tool.

-sV: detects target system’s service & version

-O: detects OS of the target system.

N.B: There are many commands even –scripts are there to run along nmap. This is just the basic & most efficient command to remember & does the job.

 

 

Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterGoogle+LinkedInEmail
Ready to share your knowledge and expertise?
18 Comments
  1. lolz This paragraph is missing all the words that would make it an artice. 🙂

  2. can you list the stages and tools you would use?

    1) nmap scan find the ports that are open
    2) use another tool to find a way exploit that port
    3) another tool to drop the payload to the port and gain entry

    • Tools : for Scanning
      1:Nmap
      2: Golismero
      3:Sparta

      2 & 3 are best for port scan as well as do exploit !!!!!!
      deaful
      N.B: they run NMAP by default with evry nmap scripts !!!!!

      will give you more btter results.!!!!

  3. Excellent article. However, I want to suggest other useful argument for the nmap command, is using IP spoofing of course you need to know first which ports are open from the bridging device to spoof its IP.

    nmap -sI [IP_intermediate_Device]:[Open_Port] -Pn [IP_Target]

Page 2 of 2«12
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel