The scanning phase is a crucial step in the ethical hacking process, which involves identifying potential vulnerabilities in a target system or network.
The goal of the scanning phase is to gather information about the target system or network, which can then be used to identify potential vulnerabilities and plan the next steps in the ethical hacking process.
📌Threat Model: Where is the attacker
📌Threat Surface: What can the attacker reach
Nmap
Wireshark
Angry IP scanner
Aircrack-ng
$nmap -sV 192.168.100.70
TCP connect scan(-sT)
SYN scans(-sS) - stealthier
UDP Scans(-sU) - fire & forget
p => port
sV => service versions
A => OS type, version, script scan
O => remote OS detection
Vulnerability scanning.
Acunetix
dnscan
Knockpy
massdns
OpenVAS
Nikto
Netcat
NeXpose
Nessus
$nc 192.168.1.203 80
Port scanning Tools
Angry IP scanner
Nmap
Masscan
Wireshark
$nmap -sT -p 1-1024 <target_ip>
📌 If the target has no vulnerabilities, create the vulnerability.
Is the process of capturing and analyzing network traffic.