Hello all , hope you all doing good and safe . So , as i said earlier in my pervious blog “ ethical hacking ” , i will be continuing that in this blog . This blog will about the topic “ Networking ” which is the base of Ethical Hacking . Let's get into it .
Every business or a communication has a network . Networking is used to find active hosts , ports and services the target application . Computer network is a group of devices connected physically or logically for communication . Each device in the network is known as host / node . An ethical hacker who looks for a weakness point in the system to attack , that is the network . Ethical hackers uses networks to discover these weak areas in the system but a black hat may exploit it to attack the network . This network can be of two ways ,
But it both the cases , hackers have to identify the weak spot in the web that can be corrupted to hack it . Network scanning is a technique for locating such nodes in a network .
What is Scanning Techniques ?
There are 3 types of scanning :
Network Scanning :
It is the one of the major part of the intelligence gathering and information retrieving mechanism that an attacker uses to create an overview of the target organization .
Objectives of network scanning :
Port Scanning :
It is a conventional technique used by hackers to access the target's organization by finding any open doors . This process involves that the hackers must find out the live hosts , firewalls , operating systems used , or any other device that has connection with the target . Once this process is over , the hacker will have the opposite parties network under control . “ Amap” is the tool to port scanning .
Vulnerability Assessment :
This type of scanning is done to identify the network flaws. It results whether the network can be exploited or not , while the system is connected to internet .
Network Topologies :
Topology means the way how a network communicates with devices . There are two types of topologies .
I will explain the details of topologies in my next "ethical hacking" series. Thanks for reading ! 💙