Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Network scanning is the process of finding out all of the active devices on a

network and its open ports by using features in the network protocol to ping them
and wait for responses.

Network scanners are the tool used for network scanning.

An IP scanner is a type of network scanner that scans a network finding active IP


addresses, their associated devices, and other information that can be known
remotely.

Port scanners are geared towards scanning individual devices in a network to


discover open ports.

DIFFERENT USES OF NETWORK SCANNERS


1. Security
2. Troubleshooting Networks and Connected Devices
3. Auditing Network

EXAMPLE OF NETWORK SCANNERS


1. NMAP
2. WIRESHARK
3. ADVANCE IP SCANNER
4. ANGRY IP SCANNER
5. ACUNETIX
6. INTRUDER
Nmap is short for Network Mapper. It is an open-source Linux command-line tool
that is used to scan IP addresses and ports in a network and to detect installed
applications.
Zenmap is the official graphical user interface (GUI) for the Nmap Security
Scanner.

192.168.0.1 – is the default IP address of a router.

A TCP (Transfer Control Protocol) connection is achieved though a 3 way hand


shake. SYN, SYN ACK, ACK
SYN is the first step or handshake in the 3 way hand shake
The second hand shake is called SYN ACK and
ACK for the third handshake.

BASIC SCANS OF NMAP


1. Ping Scans –
Scans the list of devices up and running on a given subnet.

Command Syntax: nmap -sp target device or Ip


Examples: nmap -sp 192.168.1.1/24
nmap -sp Pornhub.com
2. Scan a single host –

Scans a single host for 1000 well-known ports. These ports are the
ones used by popular services like SQL, Apache, and others.

Command Syntax: nmap target device or Ip


Examples: nmap 192.168.1.104
nmap PinayFlix.com

3. Stealth scan–

Stealth scanning is performed by sending an SYN packet and


analyzing the response. If SYN/ACK is received, it means the port is open,
and you can open a TCP connection.

Command Syntax: nmap -sS target device or Ip


Examples: nmap 192.168.1.104
nmap PinayFlix.com
4. Version and OS scanning–

Scan applications/services versions.


It makes your life easier since you can find an existing vulnerability
from the Common Vulnerabilities and Exploits (CVE) database for a
particular version of the service.

Command Syntax: nmap -sV target device or Ip


Examples: nmap -sV 192.168.1.104
nmap -sV 192.168.1.1/24

5. Aggressive scanning–

Nmap has an aggressive mode that enables OS detection, version


detection, script scanning, and traceroute. You can use the -A argument to
perform an aggressive scan.

Command Syntax: nmap -A target device or Ip


Examples: nmap -A 192.168.1.104
nmap -A 192.168.1. 1/24
The Utility Software is system software that helps to maintain the proper and
smooth functioning of a Computer System. It assists the Operating System to
manage, organize, maintain, and optimize the functioning of the computer
system.

TYPES OF UTILITY SOFTWARE


1. Antivirus
2. File Management Sytem
3. Compression Tools
4. Disk Management Tools
5. Disk Fragmenter
6. Backup Utility

1. Antivirus - An antivirus is a utility software that helps to keep the computer


virus-free.
Examples of Antivirus
a. Avast
b. Windows Defender
c. McAfee Antivirus

2.. File Management System - are used to manage files of the computer system.
Since files are an important part of the system as all the data is stored in the files.
Therefore, this utility software help to browse, search, arrange, find information,
and quickly preview the files of the system.
Examples of Antivirus
a. Windows Explorer
b. Google Desktop
c. Directory Opus
3. Compression Tools - compress big files and decrease their size
Examples of Antivirus
a. WinZip
b. WinRAR
c. WinACE

4. Disk Management Tools - These utility software are used to manage data on
disks. Moreover, they perform functions like partitioning devices, manage drives,
etc.
Examples of Antivirus
a. MiniTool Partition Wizard
b. Paragon Partition Manager

5. Disk Cleanup Tools - This utility software helps to free up the disk space. In
addition, the files which are no longer in use are removed from the disk.
Examples of Antivirus
a. Razer Cortex
b. Piriform Cleaner

6. Disk Defragmenter- This utility software helps to reduce the fragmentation and
hence, reduces the access speed. Defragmenting refers to rearranging files and
storing them in contiguous memory locations
Examples of Antivirus
a. Perfect disk
b. Deflaggler
6. Backup Utillity - This utility software helps to back up the files, folders,
databases, or complete disks. Moreover, backup refers to duplicating the disk
information so that the data can be restored if any data loss happens.

ADVANTAGES USING UTILITIES

1. Enhances Performance
2. Manage Space
3. Manage Files and Data
4. Help to remove useless File
5. Helps to recover files after a loss.
Cisco Packet Tracer is a free and powerful network simulation software designed
for teaching and learning.

Switch
A network switch (also called switching hub, bridging hub, and, by the IEEE, MAC
bridge) is networking hardware that connects devices on a computer network by
using packet switching to receive and forward data to the destination device.
A network switch is a multiport network bridge that uses MAC addresses to
forward data at the data link layer (layer 2) of the OSI model.

Main Types Of Network Cables

1. Coaxial Cables
- coaxial cable (also called coax) was best known as the kind of
cable that connected television sets to home antennas. Coaxial
cable is also a standard for 10 Mbps Ethernet cables.

2. Twisted Pair Cables –


2 types of Twisted Pair Cables

a. Unshielded Twisted Pair (UTP)


b. Shielded Twisted Pair (STP)

3. Fiber Optics - Instead of insulated metal wires transmitting electrical


signals, fiber optic network cables use strands of glass and pulses of light.
The 6 layers of the OSI model
OSI stands for Open Systems Interconnection

4. Physical Layer
5. Data Link Layer
6. Network Layer
7. Transport Layer
8. Session Layer
9. Presentation Layer
10. Application Layer

TIA
- Stands for Telecommunications Industry Association
- TIA is a wiring standards for commercial and telecommunications
wiring

Ethernet Cable
- Ethernet Cables are the standard cables used for almost purposes.
Ethernet Cables are also called Patch Cables.

RJ45 (Registered Jack 45 )


- RJ45 is an eight wire connector that connects a computer to a
LAN(Local Area Network). It is physical connector for network
cables.
TWO WIRING STANDARDS FOR RJ45

TIA/EIA 568A WIRING

1. Green-White
2. Green
3. Orange-White
4. Blue
5. Blue-White
6. Orange
7. Brown-White
8. Brown

TIA/EIA 568B WIRING

1. Orange-White
2. Orange
3. Green -White
4. Blue
5. Blue-White
6. Green
7. Brown-White
8. Brown

You might also like