How does network scanning work?
In a general sense, network administrators use network scanning to identify active hosts on a network by evaluating IP addresses and more. The same types of principles can also be used in cyberattacks to find weaknesses in a system.
In a practical sense, there are different tools and techniques for network scanning. Administrators may conduct ping sweeps, where they find a range of IP addresses that map to live hosts in the network. This may require using tools like nmap to look at how these IP addresses are mapped.
Administrators can also use port scans, which send messages to each port in a network, to look at where that network is strong or weak. Different types of port scans include a regular or "vanilla" port scan where the scanner sends out communications to all of the ports in a system. Where this is not practical, administrators can use more specific types of scans like a strobe scan, stealth scan or other technique.
More From Our Experts
Free Whitepaper: The Path to Hybrid Cloud:
Free E-Book: Public Cloud Guide:
Free Tool: Virtual Health Monitor:
Free 30 Day Trial – Turbonomic:
- Oct25 A Bigger Magnifying Glass: Analyzing the Internet of Things
- Oct26 The Central Hub: Defining the Data Lake
- Oct27 The New Normal: Dealing with the Reality of an Unsecure World
- Nov01 Time's Up! Getting Value from Big Data Now
- Nov16 Data Modeling in an Agile Environment
Being digital should be of more interest than being electronic.- Alan Turing, 1947