.

Saturday, May 18, 2019

Port scans and ping sweeps Essay

Regarding your recent request about more study on ping chimneysweeps and look scans, I am going to provide you with some information to help you with any confusing that you may have. larboard scans and ping sweeps are networking tools that admins use to perform normal and common functions such as, checking server to see if it is political campaign correct or to determine with services are open so they can receive definitive updates. Hackers use the same function which can provide a hacker with information.Port scans, like I stated earlier, are used to discover what services are running on a sealed machine. Each service offered by our servers makes user of ports by which TCP/IP requests are sent. Hackers use this information to determine what types of vulnerabilities they can use this is why the only ports that are open are the ones that we are using. By keeping all former(a) ports closed this keeps hackers from opening other unnecessary openings.Ping sweeps are often used in combination with Port scans, similar process. Ping sweeps are used to see what targets are available on the network. For instance, we may be on a 192.168.1.0 vlan with only a few computers. The router or DHCP server will assign each machine with its own IP address in swan by request, by doing this the IP address can get out of order. A Ping sweep of the IP range 192.168.1.1 192.168.1.99 would show the computers are currently on the network. Hackers do this to gain as practically access as possible.Port scans and Ping sweeps are something that every(prenominal)one should know about and know what they do. These are something that every company should worry about. These are the most common ways that hackers will get information from other computers. One of the first things you can do in order to occlusive unauthorized access to it, is to block unneeded ports on your computer, and disable applications that are not really needed and that can be barbarian for your computer. It is h ighly recommended to install a software firewall on your computer, or at least a port blocking utility.

No comments:

Post a Comment