Let's take our information gathering phase a bit further than we have done before. In this section, we are going to perform various scan types on a target. These will include the following:
- Ping sweep
- Operating system and service version detection
- Scanning for host devices that have ICMP disabled
- Performing stealth scanning
- Scanning UDP ports using Nmap
- Performing evasion scanning techniques using Nmap
The objective of scanning is to identify live hosts on a network, determine open and closed ports on a system, identify running services on a target, and create a network diagram of the target's network infrastructure. The information obtained during the network-scanning phase is key in creating a profile of a target organization.
Scanning a target without permission is illegal in many countries. For this reason, we will be scanning devices within our lab.
Within...