Securing Network Infrastructure
上QQ阅读APP看书,第一时间看更新

Port Scanning

In this chapter, we will cover the following recipes:

  • How to specify a target
  • How to perform host discovery
  • How to identify open ports
  • How to manage specification and scan order
  • How to perform script and version scan
  • How to detect operating system
  • How to detect and bypass network protection systems
  • How to use Zenmap