USD ($)
$
United States Dollar
Euro Member Countries
India Rupee
د.إ
United Arab Emirates dirham
ر.س
Saudi Arabia Riyal

Basic Scanning Tools Overview

Lesson 15/37 | Study Time: 20 Min

Scanning tools are essential in cybersecurity for discovering and analysing network devices, open ports, services, and potential vulnerabilities. These tools enable security professionals and ethical hackers to map an organisation’s external and internal networks, understand the attack surface, and identify security weaknesses.

Among these tools, Nmap is one of the most widely used for network scanning, while various online reconnaissance tools provide accessible ways to gather intelligence without installing software.

Nmap Basics

Nmap (Network Mapper) is an open-source port scanning and network discovery tool that helps identify hosts and services on a computer network. It works by sending packets to target systems and analysing responses to infer details about the network.


Key Features: 


1. Host discovery to find live devices on a network.

2. Port scanning to detect open, closed, or filtered ports.

3. Service and version detection to identify running services and their versions.

4. OS detection to infer the operating system of hosts.

5. Scriptable interaction through the Nmap Scripting Engine (NSE) for advanced scanning and vulnerability detection.


Use Cases: Nmap is used in penetration tests, network audits, and security assessments to gather detailed, actionable network information.

Online Reconnaissance Tools

Online reconnaissance tools are web-based services that provide scanning and information gathering capabilities without the need to install software. They are user-friendly and accessible, often requiring only a target domain or IP address as input.


Examples of Online Tools:


1. Shodan: A search engine for internet-connected devices, revealing server details, open ports, vulnerabilities, and device types.

2. Censys: Continuously scans the internet to inventory devices and certificates, detecting security issues and exposures.

3. VirusTotal: Aggregates multiple scanners to analyse URLs and files for malware and suspicious behaviour.

4. Google Dorking: Uses advanced Google search queries to find sensitive or misconfigured servers and information.

Combining Scanning Tools in Reconnaissance

Using both passive and active tools allows analysts to obtain comprehensive network data while minimising risk and maximising insight. Listed here are the main ways these methods complement each other in reconnaissance:


1. Security professionals often begin with passive, online reconnaissance tools to collect open-source intelligence.

2. Nmap and similar active scanning tools follow to validate findings and perform deeper network analysis with explicit permission.

3. Combining both approaches provides comprehensive visibility and aids in accurate vulnerability assessment.

Jake Carter

Jake Carter

Product Designer
5.00
Profile

Class Sessions

1- What is Ethical Hacking? Purpose, Scope & Limitations 2- Types of Hackers 3- Cyber Kill Chain & Basic Attack Lifecycle 4- Legal & Ethical Considerations (Laws, Permissions, Responsible Disclosure) 5- Basics of Networking (IP, MAC, Ports, Protocols) 6- OSI & TCP/IP Models 7- Common Network Devices & Architectures (Routers, Switches, LAN/WAN) 8- Understanding Firewalls, NAT & Basic Packet Flow 9- Operating Systems Overview 10- File Systems, Users, Permissions & Access Controls 11- Introduction to Web Applications (HTTP/HTTPS, Cookies, Sessions) 12- Client vs Server Architecture Basics 13- Types of Recon (Passive vs Active) 14- Footprinting Techniques (DNS lookup, WHOIS, Website & Metadata Analysis) 15- Basic Scanning Tools Overview 16- Identifying Publicly Exposed Information & Attack Surface Basics 17- Vulnerability, Threat, Exploit: Definitions & Differences 18- Common Vulnerabilities: Misconfigurations. Default Credentials, Weak Passwords ,and Unpatched Software 19- Social Engineering Basics 20- Basic Malware Categories 21- Port Scanning Basics (Open/Closed/Filtered Ports) 22- Network Mapping Essentials 23- Service & Version Enumeration Concepts 24- Identifying Common Services (HTTP, FTP, SSH, SMB) 25- Password Security Essentials (Strength, Hashing Concepts, Common Weaknesses) 26- OS Weaknesses 27- Network Weaknesses 28- Basics of Web Vulnerabilities 29- Security Hardening Fundamentals (System, Network, User Practices) 30- Patch Management & Configuration Hygiene 31- Secure Password & Authentication Practices 32- Basic Network Security Controls (Firewalls, IDS/IPS—concept only) 33- Safe Browsing & User Awareness Essentials 34- Documenting Findings 35- Communicating Risks to Non-Technical Stakeholders 36- Responsible Disclosure Process 37- Ethical Hacker Code of Conduct