Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • DSA
  • Practice Problems
  • C
  • C++
  • Java
  • Python
  • JavaScript
  • Data Science
  • Machine Learning
  • Courses
  • Linux
  • DevOps
  • SQL
  • Web Development
  • System Design
  • Aptitude
  • GfG Premium
Open In App
Next Article:
Port Scan in Ethical Hacking
Next article icon

Port Scan in Ethical Hacking

Last Updated : 31 May, 2022
Comments
Improve
Suggest changes
Like Article
Like
Report

Port Scanning is the name of the technique used to identify available ports and services on hosts on a network. Security engineers sometimes use it to scan computers for vulnerabilities, and hackers also use it to target victims. It can be used to send connection requests to target computers and then track ports. Network scanners do not actually harm computers; instead, they make requests that are similar to those sent by human users who visit websites or connect to other computers using applications like Remote Desktop Protocol (RDP) and Telnet. A port scan is performed by sending ICMP echo-request packets with specific flags set in the packet headers that indicate the type of message being transmitted: Type 8 indicates the request to be an echo-reply packet with the source IP address as the responding host, while Type 0 indicates that no response is expected from the responding host.

Port Scanning on internet
 

Types of Port Scans:

To protect your network from port scans, it is essential to understand the different types of port scans used by hackers.

  • Vanilla: The scanner tries to connect to all 65,535 ports ) - The scanner looks for open UDP ports
  • Sweep:  The scanner pings an identical port on over one computer to envision which pc is active
  • FTP Bounce: The scanner goes through an FTP server to mask the source
  • Stealth: The scanner locks scanned computer records Scan of port

Types of Ports:

  • Open: The host replies and announces that it is listening and open for queries. An undesired open port means that it is an attack path for the network.
  • Closed: The host responds but notices that no application is listening. Hackers will scan again if it is opened.
  • Filtered: The host does not respond to a request. This could mean that the packet was dropped due to congestion or a firewall.

Tools Used in Port Scanning:

  • Nmap
  • Angry IP Scan
  • Netcat
  • Zenmap
  • Advanced Port Scanner
  • MASSCAN

Next Article
Port Scan in Ethical Hacking

P

priyampatel9911
Improve
Article Tags :
  • Ethical Hacking
  • Ethical Hacking - Basics

Similar Reads

    Ethical Hacking Tutorial
    This Ethical Hacking tutorial covers both basic and advanced concepts of Ethical Hacking. Whether you are a beginner or an experienced cybersecurity professional, this tutorial is the perfect resource to learn how to tackle vulnerabilities and weaknesses in systems before malicious hackers can explo
    13 min read
    Ethical Hacking - Sniffing Tools
    Packet Sniffing is the process of expanding monitors checks every packet that passes through any network. Packet Sniffers will give network administrators the to monitor their networks and get insights into that. Thus, you can detect the root cause of network issues, troubleshoot the networking issu
    7 min read
    Introduction to Ethical Hacking
    Today, computer and network security against cyber threats of increasing sophistication is more important than it has ever been. Such an endeavor cannot be accomplished without ethical hacking. Ethical hacking means that authorized individuals work at exposing a security vulnerability and ultimately
    10 min read
    Remote Access in Ethical Hacking
    Remote access is a vulnerability through which attackers can control any device. Most commonly, payloads are used for remote control. Payloads are sent through social engineering or phishing attacks. Once the payload is injected, the actual attack begins. The payload will provide a reverse connectio
    5 min read
    Ethical Hacker Salary In India
    Ethical hacking, also known as white hat hacking or penetration testing, is the practice of simulating cyberattacks on a computer system or network with permission from the owner. An Ethical Hacker is a person who, with permission, tries to break into computer systems to find weaknesses. With the ri
    7 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences