From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Learning objectives

Learning objectives

- Welcome to our lesson on Scanning Networks. With the information covered regarding footprinting and reconnaissance, we can move on to finding hosts that we should focus our attacks on. The common path to discover these hosts is to scan those networks using easily accessible tools to find hosts with services that are exposed. These services provide a potential path for exploitation. In addition to general TCP and UDP scanning, we will be discussing diagramming, tunneling as well as grabbing banners.

Contents