Port scanning is a technique used to determine which port in a network is open and can
send and receive data and can be used by attackers to break into the system. Port scanning is also
a process for dispatching packets to a particular port on analyzing feedbacks to point out
vulnerabilities. First, scanning must identify a list of operating hosts and match the hosts to their
right IP addresses so that scanning can occur.
Network scanning and port aim to identify the arrangement of IP addresses and ports to
see if they are open to risk and diagnose the collective security measure. Port scanning and
network can show the presence of security standards in place, for example, firewalls betwixt the
user's device and the server. It is vital to understand that information technology administrators
and criminals can use port scanning and network both to check the security status of a network
and identify risks. The first step utilized by attackers is the host discovery element in network
scanning.
I have learned that the ports are used for programming and consistency. IP address and
port form crucial information stored by internet service providers to fulfill the requests from
clients. They are many different port scanning techniques depending on your set objectives, for
example, ping scans, half-open or SYN scans, and XMAS scans.
In conclusion, the port scanner is a program that helps in checking network ports. It helps
in diagnosing connectivity issues and networks. The Port scanner sends a packet of network
information to view the current status. I would highly recommend this video to my colleague as
it helps one have a clear picture of port scanning.
3
PORT SCANNING
Reference
https:www.youtube.com/watch?v=5sKVaQLYJY