Ethical Hacking (part 2.0/20): Network scanning in depth with examples and tools

Zalwert
10 min readJun 1, 2021

Note: This article is being updated regularly. The latest update is as of 01/06/2021

Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you prevent cyber attacks on your personal or business resources.

At the end of this article, you will be able to conduct an advanced network analysis using one of the most common scanning tools.

This article will cover:

  1. Introduction to network scanning
  2. Network scanning tools
  3. Host and OS discovery + ports/services scanning
  4. Other scanning techniques
  5. Drawing network structure

Introduction to network scanning

Network scanning is the second step in preparation for cyberattack. The first step is a footprinting and reconnaissance that we’ve covered in the separate article. The goal of the network scanning is to discover exploitable communications channels of a victim’s device.

Scanning network is a fairly large subject — there are so many methods that can confuse anyone at the first…

--

--

Zalwert

Experienced in building data-intensive solutions for diverse industries