"Port scans and ping sweeps" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 26 of 50 - About 500 Essays
  • Satisfactory Essays

    Case Study #1

    • 549 Words
    • 2 Pages

    Principles Info Sys Security Ping sweeps and port scans are used for hackers and intruders to find a way into a network and is a problem for all companies. These are two ways that are used to try and hack into networks to steal information. Port scans and ping sweeps are two very common ways that hackers use to gain access into a network. A ping sweep is a kind of network probe to try and gain access by pinging a machine (computer) to see if it is on. During a ping sweep‚ the intruder sends a set of

    Premium IP address Internet Protocol Web server

    • 549 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    about more information on ping sweeps and port scans‚ I am going to provide you with some information to help you with any confusing that you may have. Port scans and ping sweeps are networking tools that admins use to perform normal and common functions such as‚ checking server to see if it is running correct or to determine with services are open so they can receive important updates. Hackers use the same function which can provide a hacker with information. Port scans‚ like I stated earlier‚ are

    Premium IP address Dynamic Host Configuration Protocol Computer security

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    Week 1 Report Class SEC 280 In today’s report I will give a basic definition of and explain to the best of my ability what port scanning is and also what a ping sweep is and I will also try to provide examples of these techniques. Lastly I will show how these simple this can be done and or avoided and how they can affect us as a company. In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates

    Premium Internet IP address

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    CEH™ Official Certified Ethical Hacker Review Guide Kimberly Graves Wiley Publishing‚ Inc. CEH™ Official Certified Ethical Hacker Review Guide CEH™ Official Certified Ethical Hacker Review Guide Kimberly Graves Wiley Publishing‚ Inc. Acquisitions and Development Editor: Jeff Kellum Technical Editor: Sondra Schneider Production Editor: Rachel Meyers Copy Editor: Tiffany Taylor Production Manager: Tim Tate Vice President and Executive Group Publisher: Richard Swadley Vice President

    Premium Computer security Security

    • 27476 Words
    • 110 Pages
    Good Essays
  • Satisfactory Essays

    week 1 2520

    • 261 Words
    • 2 Pages

    Received 12540 4. . 5. Nmap-T4-A-v-PE-P522‚25‚80-PA21‚23‚80‚3389 172.30.0.0/24 6. Ping Scan Regular Scan Quick Scan Plus Intense Scan no Ping Intense Scan 7. Arp Scan Parallel DND Syn Stealth Services OS Detection NSE 8. The APR Ping Scan was scanning for host. They SYN Stealth Scan discovered ports opened on the IP address. 9. 14 Active 68 Total 10. Identifies holes in the Network‚ open ports and ways to penetrate the network.   1. Windows Application loaded Starts as Service

    Premium IP address Domain Name System Subnetwork

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system. Home computing has security issues quite different from yet includes all of the ones we face at work. At work Network Administrators secure everything for us and limit what

    Premium Computer Computer virus Malware

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes‚ how many ICMP echo-request packets were sent back to the IP source? Yes‚ 4 were sent and 4 were received. 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server‚ which fields in the ICMP echo-request/echo-replies vary? Time 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? nmap -T4 -A -v -PE

    Premium Microsoft Windows IP address User interface

    • 362 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    used Wireshark to capture and analyze network traffic and OpenVAS to scan the network. You reviewed a sample collection of data using NetWitness Investigator‚ connected to a remote Windows machine‚ and explored two file transfer applications‚ FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally‚ you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment

    Premium Transmission Control Protocol

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes‚ how many ICMP echo-request packets were sent back to the IP source? >> Yes‚ all 4 packets sent were received back to the source with 0% loss. 4. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24? >> nmap –T<0-5> -A –v –PE –PS –PA -T<0-5>: Set

    Premium IP address Transmission Control Protocol

    • 1258 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Lab#1

    • 335 Words
    • 2 Pages

    an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes‚ how many ICMP echo-request packets were sent back to the IP source? Yes‚ 4 packets were sent‚ and all four returned. 4. If you ping the TargetWindows01 server and the UbuntuTarget01 server‚ which fields in the ICMP echo-request/echo-replies vary? The TTL (Time to Live) fields vary. 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24?

    Free Linux Subnetwork Internet Protocol

    • 335 Words
    • 2 Pages
    Satisfactory Essays
Page 1 23 24 25 26 27 28 29 30 50