What is Network Scanning || Cyber security || Lecture in Urdu/Hindi

Описание к видео What is Network Scanning || Cyber security || Lecture in Urdu/Hindi

What is Network Scanning?
Why do we scan a network?
What is Network Scanning in Cyber Security?

Network scanning is the process of identifying active devices on a network, their services, and their vulnerabilities. It involves sending packets of data to target devices and analyzing their responses to gather information about the network's topology, hosts, services, and potential security weaknesses. Network scanning helps administrators understand the structure of their networks, identify potential security risks, and implement appropriate measures to mitigate them. It's commonly used for network management, security assessments, and troubleshooting.

Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response. Most network scanning today is used in monitoring and management, but scanning can also be used to identify network elements or users for attacks. The specific protocol features used in scanning depends on the network, but for IP networks scanning normally sends a simple message (a ping for example) to each possible IP address in a specified range, and then uses another protocol to obtain data on the devices if a response to the ping is received.

When used by monitoring and management systems, scanning is used to identify current network users, determine the state of systems and devices, and take an inventory of network elements. Often an inventory of devices is compared against a list of expected devices as a measure of health. All these are legitimate management functions and are used routinely by network administrators.

Scanning used by attackers relies on the same tools and protocols as monitoring/management scanning. An attacker would normally first obtain the IP address range assigned to a company using the domain name system (DNS) or the WHOIS protocol. Addresses within that address range would then be scanned looking for servers, their operating systems, the system architecture, and the services running on each. The attacker can then attempt to breach the target systems and applications.

Комментарии

Информация по комментариям в разработке