Phase 2 of the hacking methodology is scanning, which focuses on an active engagement of the target with the intention of obtaining more information. Scanning the target network will ultimately locate active hosts that can then be targeted in a later phase. Footprinting helps identify potential targets, but not all may be viable or active hosts. Once scanning determines which hosts are active and what the network looks like, a more refined process can take place.
During this phase tools that provide functionality such as these are used
This was written from CEHv8 material but the process applies to the process and concepts for most any CEH version.
During this phase tools that provide functionality such as these are used
- Pings
- Ping sweeps
- Port scans
- traceroute
This was written from CEHv8 material but the process applies to the process and concepts for most any CEH version.