Port Scan in Ethical Hacking Last Updated : 31 May, 2022 Comments Improve Suggest changes Like Article Like Report Port Scanning is the name of the technique used to identify available ports and services on hosts on a network. Security engineers sometimes use it to scan computers for vulnerabilities, and hackers also use it to target victims. It can be used to send connection requests to target computers and then track ports. Network scanners do not actually harm computers; instead, they make requests that are similar to those sent by human users who visit websites or connect to other computers using applications like Remote Desktop Protocol (RDP) and Telnet. A port scan is performed by sending ICMP echo-request packets with specific flags set in the packet headers that indicate the type of message being transmitted: Type 8 indicates the request to be an echo-reply packet with the source IP address as the responding host, while Type 0 indicates that no response is expected from the responding host. Types of Port Scans:To protect your network from port scans, it is essential to understand the different types of port scans used by hackers. Vanilla: The scanner tries to connect to all 65,535 ports ) - The scanner looks for open UDP portsSweep: The scanner pings an identical port on over one computer to envision which pc is activeFTP Bounce: The scanner goes through an FTP server to mask the sourceStealth: The scanner locks scanned computer records Scan of portTypes of Ports:Open: The host replies and announces that it is listening and open for queries. An undesired open port means that it is an attack path for the network.Closed: The host responds but notices that no application is listening. Hackers will scan again if it is opened.Filtered: The host does not respond to a request. This could mean that the packet was dropped due to congestion or a firewall.Tools Used in Port Scanning:NmapAngry IP ScanNetcatZenmapAdvanced Port ScannerMASSCAN Comment More infoAdvertise with us Next Article Port Scan in Ethical Hacking P priyampatel9911 Follow Improve Article Tags : Ethical Hacking Ethical Hacking - Basics Similar Reads Ethical Hacking Tutorial This Ethical Hacking tutorial covers both basic and advanced concepts of Ethical Hacking. Whether you are a beginner or an experienced cybersecurity professional, this tutorial is the perfect resource to learn how to tackle vulnerabilities and weaknesses in systems before malicious hackers can explo 13 min read Ethical Hacking - Sniffing Tools Packet Sniffing is the process of expanding monitors checks every packet that passes through any network. Packet Sniffers will give network administrators the to monitor their networks and get insights into that. Thus, you can detect the root cause of network issues, troubleshoot the networking issu 7 min read Introduction to Ethical Hacking Today, computer and network security against cyber threats of increasing sophistication is more important than it has ever been. Such an endeavor cannot be accomplished without ethical hacking. Ethical hacking means that authorized individuals work at exposing a security vulnerability and ultimately 10 min read Remote Access in Ethical Hacking Remote access is a vulnerability through which attackers can control any device. Most commonly, payloads are used for remote control. Payloads are sent through social engineering or phishing attacks. Once the payload is injected, the actual attack begins. The payload will provide a reverse connectio 5 min read Ethical Hacker Salary In India Ethical hacking, also known as white hat hacking or penetration testing, is the practice of simulating cyberattacks on a computer system or network with permission from the owner. An Ethical Hacker is a person who, with permission, tries to break into computer systems to find weaknesses. With the ri 7 min read Like