Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
32 views1 page

Scanning

Scanning is the second phase of penetration testing where vulnerability scanning tools are used to scan the target system or network for known vulnerabilities. This includes port scanning to identify open ports and services running on them, service enumeration to determine operating systems and software versions, and vulnerability scanning to compare the system against a database of known vulnerabilities and report any findings. Overall, the scanning phase is critical for identifying potential weaknesses by using various scanning techniques.

Uploaded by

Klaus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views1 page

Scanning

Scanning is the second phase of penetration testing where vulnerability scanning tools are used to scan the target system or network for known vulnerabilities. This includes port scanning to identify open ports and services running on them, service enumeration to determine operating systems and software versions, and vulnerability scanning to compare the system against a database of known vulnerabilities and report any findings. Overall, the scanning phase is critical for identifying potential weaknesses by using various scanning techniques.

Uploaded by

Klaus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Scanning is the second phase of the penetration testing process.

In this phase, vulnerability


scanning tools are used to scan the target system or network for known vulnerabilities and
weaknesses. This may include port scanning, service enumeration, and vulnerability
scanning.
Here are some details about the scanning phase of penetration testing:
1. Port scanning: Port scanning is a technique used to identify open ports on a target
system or network. By scanning for open ports, the penetration tester can identify
potential entry points for attackers and determine which services are running on each
port.
2. Service enumeration: Service enumeration involves identifying the services that are
running on open ports. This can provide valuable information about the target system
or network, such as the operating system, software versions, and configurations.
3. Vulnerability scanning: Vulnerability scanning involves using automated tools to scan
the target system or network for known vulnerabilities and weaknesses. The
vulnerability scanner will compare the system or network against a database of known
vulnerabilities and report any findings.
4. Credential testing: Credential testing involves testing the strength of user credentials,
such as usernames and passwords. This can involve using brute-force attacks or
password cracking tools to attempt to gain access to the target system or network.
5. Wireless scanning: In some cases, the penetration tester may need to perform wireless
scanning to identify potential vulnerabilities in wireless networks. This can involve
scanning for wireless access points, identifying encryption methods, and attempting to
crack wireless passwords.
Overall, the scanning phase of penetration testing is critical for identifying potential
vulnerabilities and weaknesses in the target environment. By using a combination of port
scanning, service enumeration, vulnerability scanning, credential testing, and wireless
scanning techniques, the penetration tester can gain a comprehensive understanding of the
target system or network and identify areas that require further testing and analysis.

You might also like