Abstract
In ethical hacking, the reconnaissance phase is followed by the scanning and enumeration phase where the information collected from reconnaissance phase is used to examine the target or target network further for getting specific details such as computer names, IP addresses, open ports, user accounts, running services, OS details, system architecture, vulnerabilities, etc. This chapter introduces different scanning and enumeration tools used in the scanning phase of the ethical hacking process in detail. One may use scanning and enumeration tools and techniques involving packet crafting tools, packet analyzers, port scanners, network mappers, sweepers, and vulnerability scanners during this phase. The chapter introduces tools like Hping3, NMAP security scanner, Colasoft packet builder to create custom packets, vulnerability scanners such as Nessus, Netbios enumeration technique, Hyena, remote administration of network devices using advanced IP scanner, global network inventory, network mapping using the dude network monitor, banner grabbing using ID serve, SNMP enumeration technique, creating NetBIOS null session to enumerate, etc. The chapter also provides the details of maintaining privacy and anonymity while carrying out such scanning and enumeration attacks.
Reference22 articles.
1. ADVANCEDIPSCANNER. (2018). Advanced IP Scanner. Available from: http://www.advanced-ip-scanner.com
2. COLASOFT. (2018). Colasoft Packet Builder. Available from: http://www.colasoft.com/packet_builder/
3. Experimental analysis of DDoS attack and it's detection in Eucalyptus private cloud platform
4. A case study on web application vulnerability scanning tools
5. GZAPPER. (2018). KSoft: G-Zapper. Available from: http://www.dummysoftware.com/gzapper.html