No announcement yet.

Hacking Methodology Phase 2: Scanning

  • Filter
  • Time
  • Show
Clear All
new posts

  • Hacking Methodology Phase 2: Scanning

    Phase 2 of the hacking methodology is scanning, which focuses on an active engagement of the target with the intention of obtaining more information. Scanning the target network will ultimately locate active hosts that can then be targeted in a later phase. Footprinting helps identify potential targets, but not all may be viable or active hosts. Once scanning determines which hosts are active and what the network looks like, a more refined process can take place.

    During this phase tools that provide functionality such as these are used
    • Pings
    • Ping sweeps
    • Port scans
    • traceroute

    This was written from CEHv8 material but the process applies to the process and concepts for most any CEH version.
    Certified Security Geek