A Quick Guide To Network Scanning for Ethical Hacking

A Quick Guide To Network Scanning for Ethical Hacking

A Quick Guide To Network Scanning for Ethical Hacking - This article will give you a brief introduction to Network Scanning for Ethical Hacking and how to use Network Scanning Tools like Nmap, ..πŸ”₯πŸ”₯πŸ”₯

A Quick Guide To Network Scanning for Ethical Hacking - This article will give you a brief introduction to Network Scanning for Ethical Hacking and how to use Network Scanning Tools like Nmap, ..πŸ”₯πŸ”₯πŸ”₯

Similarly, when you know about your target, half the task of Hacking is done. There are different ways to gather information about your target. In the previous blog, I have explained how to gather information using Footprinting. But knowing basic information is not enough. So in this blog, I will tell you how to gather specific details of your target using Network Scanning for Ethical Hacking. If you are interested in Ethical Hacking or Cybersecurity, check out this live training by Edureka.

The topics covered in this blog are: What is Network Scanning?How is Network Scanning different from Reconnaissance?Types of Network Scanning for Ethical HackingHow to use Network Scanning Tools?## What is Network Scanning?

Network Scanning is the procedure of identifying active hosts, ports and the services used by the target application. Suppose you are an Ethical Hacker and want to find vulnerabilities in the System, you need a point in the System that you can try to attack. Network Scanning for Ethical Hacking is used to find out these points in the system that a Black Hat Hacker can use to hack the network. And then the respective teams work on improving the security of the network.

Every Organization has a Network. This network could be an internal network which consists of all the systems connected with each other, or it can be a network that’s connected to the internet. In either case, to hack the network, you will have to find a vulnerable point in the network that can be exploited. Network Scanning is used to find out such points in the network.

How is Network Scanning different from Reconnaissance?

Think of it like this: You are an army officer and you and your team are planning to attack a terrorist lair. You have found out the location of the lair and details about the surroundings and also found ways to send the team to the lair. You can consider all this as the information you’ve gathered using Reconnaissance. Now you have to find a point through which you can enter the lair and attack the enemy. This is Network Scanning.

In simple terms, Reconnaissance is used to gather information and understand your target, and Network Scanning is a method used to find possible vulnerable points in the network through which you can hack the network.

Depending on what kind of information the Scan identifies, Network Scanning can be classified into different types.

Types of Network Scanning for Ethical Hacking

Network Scanning can be classified into two main categories: Port Scanning**Vulnerability Scanning### **Port Scanning

As the name suggests, Port Scanning is a process used to find out active ports on the network. A Port Scanner sends client requests to the range of ports on the target network and then saves the details about the ports that send a response back. This is how active ports are found.

There are different types of Port Scanning. Below is a list of some of the most used ones: TCP scanningSYN scanningUDP scanningACK scanningWindow scanningFIN scanning### Vulnerability Scanning

Vulnerability Scanning is a type of Network Scanning for Ethical Hacking used to find out weaknesses in the network. This type of scanning identifies vulnerabilities that occur due to poor programming or misconfiguration of the network.

Now that you know what Network Scanning is, I will introduce you to some tools and tell you how to use them for Network Scanning.

How to use Network Scanning tools?

In this section of Network Scanning for Ethical Hacking blog, I will show you how to use some Network Scanning tools. The Operating System I am using for this is Kali Linux because it comes with many in-built tools for Hacking. If you want to learn how to install Kali Linux, refer to this link. And if you face any problems with this, you can ask for help on Edureka Community.

The first tool I am going to talk about is Nmap.

1. Nmap for Network Scanning

Nmap is a free and open source network scanner. You can scan a network with Nmap either by using the IP address of the target:

$ nmap 1.2.3.4

Or using the hostname

$ nmap example.com

Note that it is illegal to scan the network of any organization without prior authorization by the organization. So don’t try to scan just any random network. But if we can’t scan any network without permission, then how will we learn about Nmap? Don’t worry, the Nmap Organization has provided a website for us to practice scanning using Nmap: scanme.nmap.org

Let’s try scanning this. Open a terminal in your system and run the below command:

$ nmap -v -A scanme.nmap.org

You can see how Nmap displays the open ports on the network in the result. In the above command, option β€˜vβ€˜ is for verbose output and option β€˜Aβ€˜ is to detect the Operating System.

There are a lot of options that can be used with the Nmap tool to obtain different kinds of results. To understand more about using the Nmap tool, check out this Nmap tutorial.

Next tool we are going to use is Nikto.

Nikto for Network Scanning

Nikto is a Web Server Scanner that tests for dangerous files and outdated service software. And these details can be exploited and used to hack the network. Nikto is designed to scan the web server in the quickest possible time.

To use Nikto, open the terminal and run the following command:

$ nikto -host scanme.nmap.org

You should see a similar output

The highlighted part in the above screenshot shows the results that Nikto has found. These results are helpful to understand the weaknesses of the network or application being scanned. Once you find the weakness of the network, you can choose relevant attacks to hack the network.

The next tool I am going to talk about is Nessus.

Nessus for Network Scanning

Nessus is one of the most powerful vulnerability scanners available. This scanner does not come pre-installed with Kali Linux. So, before telling how to use it, I will show you how to install it.

Open a browser and go to www.tenable.com/downloads/nessus and click on β€œGet Activation Codeβ€œ.

You will see two versions of Nessus: A free version(Nessus Home) and a paid version. We shall use the free version, so click on the β€œRegister Now” button under β€œNessus Homeβ€œ.

In the next page, enter your first name, last name, and Email Id. A link will be sent to your Email Id and you will be redirected to the download page.

Download a suitable file. I am downloading the .deb file for AMD64 architecture because that’s compatible for the Kali Linux I am using.

After the download is complete, open the terminal and run the following command to install Nessus:

1

2

$ cd Downloads

$ dpkg -i Nessus-8.3.0-ubuntu910_amd64.deb

Nessus will be installed and now you will have to start the Nessus service to use it. Refer to the below command:

$ /etc/init.d/nessusd start

Once the service starts, open a web browser and go to //kali:8834/

Enter a Username and a Password and in the next page, enter the Activation Code that was sent to your Email Id.

After successful activation, wait for Nessus to download necessary Plugins. Once Nessus completes the setup, you will see something like this:

To scan a network, click on β€œNew Scan” on the top right corner.

In the next page, you will see different types of scans that Nessus provides. I will choose β€œBasic Network Scanβ€œ.

Enter the name for your scan, description, folder, and the target and click on β€œSaveβ€œ. For this Network Scanning for Ethical Hacking tutorial, I will scan my local network.

Next, select the scan and click on the start icon.

Cybersecurity Certification Course

Weekday / Weekend Batches

See Batch Details

After the scan is complete, you can see the vulnerability report under the β€œVulnerabilities” tab.

The scan results show the information and vulnerabilities found. This is how Nessus can be used for Network Scanning for Ethical Hacking.

The more details you find out about the target, the easier it will be to test for vulnerabilities. Try using more Network Scanning tools such as OpenVAS, Core Impact, Retina, etc. If you have any question, ask it on Edureka Community and we will get back to you.

If you wish to learn Cybersecurity and build a colorful career in Cybersecurity, then check out our Cybersecurity Certification Training which comes with instructor-led live training and real-life project experience. This training will help you understand Cybersecurity in depth and help you achieve mastery over the subject.

security

What's new in Bootstrap 5 and when Bootstrap 5 release date?

How to Build Progressive Web Apps (PWA) using Angular 9

What is new features in Javascript ES2020 ECMAScript 2020

Deno Crash Course: Explore Deno and Create a full REST API with Deno

How to Build a Real-time Chat App with Deno and WebSockets

Convert HTML to Markdown Online

HTML entity encoder decoder Online

Random Password Generator Online

HTML Color Picker online | HEX Color Picker | RGB Color Picker

What are the top Cyber Security Threats in 2020?

Learn Cyber Defense programming by Cyber Security Training. Know how to stop tactics of ransomware, malware, social engineering, phishing by hacking course.

Android Security - Best Ways to Secure your Android Devices

Android security - Learn what is security in Android, how to make your Android devices secure, what are security patches and how are they important.

Arduino Security Primer

At Arduino, we are hard at work to keep improving the security of our hardware and software products, and we would like to run you through how our IoT Cloud service works. The Arduino IoT Cloud's security is based on three key elements: The open-source library ArduinoBearSSL for implementing T

NSO Group Impersonates Facebook Security Team to Spread Spywareβ€” Report

An investigation traces an NSO Group-controlled IP address to a fake Facebook security portal. NSO Group Impersonates Facebook Security Team to Spread Spyware.

How To Set Up Two-Factor Authentication in cPanel

What is 2FA Two-Factor Authentication (or 2FA as it often referred to) is an extra layer of security that is used to provide users an additional level of protection when securing access to an account.