Preview

Ping Sweep and Port Scan Essay Example

Good Essays
Open Document
Open Document
602 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ping Sweep and Port Scan Essay Example
Ping Sweeps and Port Scans

The use of computers in this generation has been a necessity. A lot of companies depend on computers to operate their business which is why it is essential to learn the different threats that other people could use to attack their business. New technologies are on the rise these days and the knowledge that people have about computers can be accessed easily on the internet. Different kind of hackers can get access to people’s computers easily with the necessary knowledge and devices. People need to be aware of these kinds of threat and help them by preventing their computers or networks of being hacked. Hackers today uses ping sweeps and port scans to gain access to networks. Learning how ping sweep and port scans are utilized can help us protect ourselves from these hackers. Ping sweep is a type of network probe or network attack. People uses ping sweep to know if a computer or network exist. Basically, the user ping the computer or network by their IP Address. Once the ping request has been sent, the user should get a reply back from the computer, notifying the user that it is online. If the user did not receive any reply then more likely the computer is down. The ping sweep method can also be used by hackers to know which computers or networks are available, so they can plan their attack. According to Lawrence Theo, (Networks Probes Explained: Understanding Port Scans and Ping Sweeps), “fping is a tool that can be used for conducting ping sweeps”. “Unlike normal ping, fping sends one ping packet to one IP address, and then proceeds immediately to the next IP address.” Learning ping sweep and how it can be used is essential to protect our information. Port scan is another type of network probe. It is considered the most common method of network probing which is used by intruders to gain access to computers and discover what kind of services are running in the computer. There are different types of scans that an intruder can use

You May Also Find These Documents Helpful

  • Powerful Essays

    When your computer connects to the Internet, it is assigned an Internet Protocol address (IP address), usually a different address each time you connect. If you're experiencing slow or no signal, the…

    • 856 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    To be able to see all the packets that come in and out on the Network…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    It’s used for port scanning. It can be used to see what hosts are on the network and to see what services they are running.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Port scanning is the act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Perform Reconnaissance

    • 299 Words
    • 2 Pages

    1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Paper

    • 292 Words
    • 2 Pages

    What was the DHCP allocated source IP host address for the student VM, DHCP Server, and IP default gateway router?…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork.…

    • 1091 Words
    • 5 Pages
    Good Essays