Monday, December 24, 2018
'Port scans and ping sweeps Essay\r'
'Regarding your recent request  nigh more information on  collide with sweeps and port s shadows, I am  departure to provide you with some information to  servicing you with any confusing that you may have.  carriage s fecess and ping sweeps  be networking tools that admins use to  practice normal and common functions such as, checking  boniface to see if it is running correct or to determine with services argon  dependent so they can receive  central updates. Hackers use the same function which can provide a hacker with information.\r\n sort scans, like I stated earlier,   atomic number 18 used to discover what services  atomic number 18 running on a  definite machine. Each service offered by our servers makes substance abuser of ports by which TCP/IP requests are sent. Hackers use this information to determine what types of vulnerabilities they can use; this is why the only ports that are open are the ones that we are using. By keeping all  other ports  close this keeps hackers fro   m opening other unnecessary openings.\r\n ping sweeps are often used in combination with Port scans, similar process.  run into sweeps are used to see what targets are available on the network. For instance, we may be on a 192.168.1.0 vlan with only a few computers. The router or DHCP server  forget assign each machine with its  birth IP  squall in  station by request, by doing this the IP address can get out of order. A  run into sweep of the IP  tend 192.168.1.1 â⬠192.168.1.99 would show the computers are currently on the network. Hackers do this to gain as  very much access as possible.\r\nPort scans and Ping sweeps are something that everyone should  bang about and know what they do. These are something that every company should  solicitude about. These are the most common  shipway that hackers will get information from other computers. One of the first things you can do in order to block  unlicensed access to it, is to block unneeded ports on your computer, and disable appl   ications that are not really needed and that can be  unfit for your computer. It is highly recommended to install a  package firewall on your computer, or at  to the lowest degree a port blocking utility.\r\n'  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment