Tuesday, February 26, 2013

Assessment of Ping and Port Scanning

Assessment of Ping and Port Scanning
Author
Course Name
T separatelyers Name
Attacks on figurer networks can have devastating effects on companies, their employees, and their clients. In fact it has become so bad that even the close basic of administrative duties can appear to be person probing a network for vulnerabilities. Network reconnaissance is utilise for both legitimate administrative duties as well as by hackers.
One of the first tools used by an executive director is to ping, a tool used to send out an ring request to an IP address or a score of IP addresses such as 192.168.0.1 to 192.168.0.255 to see if there is a system attached to that IP and it is awake. R atomic number 18ly argon the IPs that an executive pings outside of the administrators local anesthetic network unless there is a problem with connecting to a website or other resource outside of their local LAN. According to Boyd (2000)one of the most basic steps in mapping out a network is performing an automatize ping sweep on a range of IP addresses and network blocks to determine if individual systems are alive (pp. 2-3). It is palmy to see why people with less than honorable jailed would do the same thing.

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.


After mapping out what machines are awake and configured to respond to an ECHO (ping) request (which meaning they are publicly accessible), the next step is to investigate each of the active IP addresses to see what ports are open. This is done by dint of port scanning, which Andrew Whitaker and Daniel Newman (2006) describe as the process of scanning a host to determine which TCP and UDP ports are accessible (p. 3). formerly again this is another tool also used by administrators to determine what programs are currently running on a machine. The reasons hackers use it, is the fact that if they know what programs are running on a system they can then use currently known security issues to gain access to the machine itself.
These techniques are known as active scanning, they are more direct, endure better results, but are...If you want to get a affluent essay, order it on our website: Orderessay



If you want to get a full essay, wisit our page: write my essay .

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.