top of page

What Is Scanning? - A Guide to Network Monitoring

Updated: Aug 22, 2022

What is Scanning?

Filtering is a bunch of techniques for recognizing live has, ports, and administrations, finding Operating framework and design of target framework, Identifying weaknesses and dangers in the organization. Network checking is utilized to make a profile of the objective association.

Checking alludes to gathering more data utilizing intricate and forceful surveillance procedures.

Network Scanning

Network Scanning:

The motivation behind each filtering interaction is given underneath:

  • Port Scanning – distinguishing open ports and administrations running on the objective.

  • Network Scanning – IP addresses, Operating framework subtleties, Topology subtleties, confided in switches data, and so on

  • Weakness filtering – examining for known weaknesses or shortcomings in a framework

Filtering Methodology

  • Check for Live Systems: Ping filter checks for the live framework by sending ICMP reverberation demand parcels. If a framework is alive, the framework reacts with ICMP reverberation answer parcel containing subtleties of TTL, bundle size, and so on

  • Check for Open Ports: Port filtering assists us with discovering open ports, administrations running on them, their forms and so forth Nmap is an amazing asset utilized basically for this reason.

We have different kinds of sweep:

Associate sweep: Identifies open ports by building up a TCP handshake with the objective.

What Is Scanning?

Nmap order: nmap - sT - v - p-<TargetIP>

The half-open sweep also called Stealth check used to filter the objective covertly by not finishing the TCP handshake by suddenly resetting the correspondence.

The half-open sweep

Nmap order: nmap - sS - v <TargetIp>

XMAS filter: This is likewise called opposite TCP examining. This works by sending bundles set with PSH, URG, FIN banners. The objectives don't react assuming the ports are open and send a reset reaction if ports are shut.

XMAS Filter
Information Security

Balance check: Fin banner is set in the TCP bundles shipped off the objective. open ports doe don't react while shut ports send a reset reaction.


Nmap order: nmap - SF <targetIp>

ACK check: Here the aggressor sets the ACK banner in the TCP header and the objective's port status is accumulated dependent on window size and TTL worth of RESET parcels got from the objective.

ACK Check


Nmap order: nmap - SA - v <targetip>

Invalid Scan: Works by sending TCP parcels without any banners set to the objective. Open ports don't react while shut ports react with a RESET bundle.

What Is Scanning?

Nmap Command: nmap - sN - p-<targetIP>

Inactive Scan: Here the assailant attempts to veil his character utilizes an inactive machine on the organization to test the status subtleties of target ports.

Inactive Scan_kodexhub


Nmap order: nmap - Pn - sI ZombieIp TargetIp

Pennant Grabbing

Pennant getting is a course of gathering data like working framework subtleties, the name of the assistance running with its rendition number, and so on

Weakness filtering:

Principally mechanized devices are utilized for this reason. These mechanized scanners filter the objective to discover weaknesses or shortcomings in the objective association which can be taken advantage of by the assailants. Weaknesses incorporate application weaknesses, design weaknesses, network weaknesses, working framework weaknesses, and so forth.

A few models incorporate working framework isn't refreshed, default passwords utilized, plain text conventions utilized, weak conventions running, and so forth

Instruments: Nessus, Acunetix

Draw Network Diagrams

With the data accumulated, the aggressor can think of an organization chart that may give him data about the organization and design of the objective association assisting him with distinguishing the objective without any problem

Instruments: Network View, Opmanager, and so forth

Get ready Proxies

Intermediaries can use to keep up with the secrecy of the assailant by covering the IP address. It can catch data going through it since it goes about as a delegate among customer and server and the assailant can get to the assets remotely utilizing the intermediaries.

Eg: TOR programs, Onion destinations and so forth, Proxify, Psiphon, and so on


  • Arrange IDS and firewall to impede tests.

  • Keep firewall, switches, IDS firmware update

  • Run port scanners to confirm the security of the objective.

  • Add rules in the firewall limiting admittance to ports.

  • Cripple ICMP-based checking at the firewall.

95 views0 comments

Recent Posts

See All


bottom of page