Published Sep 8, 2021
2 mins read
406 words
This blog has been marked as read.
Read more
Technology
Science
Knowledge Sharing

Ethical Hacking - Networking Part 2 !

Published Sep 8, 2021
2 mins read
406 words

Hello all , hope you all doing good and safe . So , as i said earlier in my pervious blog “ ethical hacking ” , i will be continuing that in this blog . This blog will about the topic “ Networking ” which is the base of Ethical Hacking . Let's get into it .

Every business or a communication has a network . Networking is used to find active hosts , ports and services the target application . Computer network is a group of devices connected physically or logically for communication . Each device in the network is known as host / node . An ethical hacker who looks for a weakness point in the system to attack , that is the network . Ethical hackers uses networks to discover these weak areas in the system but a black hat may exploit it to attack the network .  This network can be of two ways , 

  • An Internal network with all the systems connected
  • An Internet connected network 

But it both the cases , hackers have to identify the weak spot in the web that can be corrupted to hack it . Network scanning is a technique for locating such nodes in a network . 

What is Scanning Techniques ?

There are 3 types of scanning :

  1. Network Scanning
  2. Port Scanning
  3. Vulnerability Scanning

Network Scanning :

It is the one of the major part of the intelligence gathering and information retrieving mechanism that an attacker uses to create an overview of the target organization . 

Objectives of network scanning :

  1.  To discover whether the computer/hosts , Ip address and open ports of the victim .
  2. Find the operating system and system architecture of the target
  3. To identify the services that runs on a host computer 

Port Scanning :

It is a conventional technique used by hackers to access the target's organization by finding any open doors . This process involves that the hackers must find out the live hosts , firewalls , operating systems used , or any other device that has connection with the target . Once this process is over , the hacker will have the opposite parties network under control . “ Amap”  is the tool to port scanning .

Vulnerability Assessment :

This type of scanning is done to identify the network flaws. It results whether the network can be exploited or not , while the system is connected to internet .

Network Topologies :

Topology means the way how a network communicates with devices . There are two types of topologies .

  • Wired topology
  • Wireless topology

I will explain the details of topologies in my next "ethical hacking" series. Thanks for reading ! 💙

#Ethical Hacking
#ethical
#basics
41
12
suresh4037 9/8/21, 4:09 PM
2
Good Support me
2
mreeduban.goswami 9/8/21, 6:15 PM
1
Interesting blog keep going ✌🏻✌🏻
1
arpit.kour 9/8/21, 6:55 PM
1
Good job. Keep it up.
1
arpita.nandi7777 9/8/21, 8:10 PM
1
Very nice.Read mine
1
ashika.singh 9/9/21, 2:59 AM
1
hey thanks for such a wonderful information. I have read your blog please do read mine too. I have also followed you hope you will do the same lets grow together and support each other ^_^ ;-)
1
jack_of_all 9/9/21, 4:06 AM
1
Keep writing. Do read and like mine blogs.
1
richa.vedpathak 9/9/21, 10:19 AM
1
Nice one. Do read my blogs as well.
1
padfoot 9/9/21, 2:37 PM
1
good job! :) do read and support my blogs
1
2k_queen 9/10/21, 1:28 PM
Good one #monkhood
asadmirza1997 9/11/21, 6:12 AM
👍👍👍👍👍👍👍
senthil_kumar 9/16/21, 6:42 AM
nice
akanksha02 9/23/21, 3:21 AM
informative..please like my blogs too

Candlemonk | Earn By Blogging | The Bloggers Social Network | Gamified Blogging Platform

Candlemonk is a reward-driven, gamified writing and blogging platform. Blog your ideas, thoughts, knowledge and stories. Candlemonk takes your words to a bigger audience around the globe, builds a follower base for you and aids in getting the recognition and appreciation you deserve. Monetize your words and earn from your passion to write.