Learn Hacking


Hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners .

Three types of scanning are involved:

  • Port scanning: This phase involves scanning the target for the information like open ports, Live systems, various services running on the host.

  • Vulnerability Scanning: > Checking the target for weaknesses or vulnerabilities which can be exploited. Usually done with help of automated tools

  • Network Mapping: Finding the topology of network, routers, firewalls servers if any, and host information and drawing a network diagram with the available information. This map may serve as a valuable piece of information throughout the haking process.