Basic techniques of scanning.

During this phase, you use techniques such as these: Pings Ping sweeps Port scans Tracert Some of the processes you use unmask or uncover varying levels of detail about services. You can also use inverse-scanning techniques that allow you to determine which IP addresses from the ranges you uncovered during footprinting do not have a
corresponding live host behind them.

Please follow and like us:

Leave a Reply

Your email address will not be published. Required fields are marked *