Port Scanning

In this chapter, we will cover the following recipes:

  • How to specify a target
  • How to perform host discovery
  • How to identify open ports
  • How to manage specification and scan order
  • How to perform script and version scan
  • How to detect operating system
  • How to detect and bypass network protection systems
  • How to use Zenmap

Get Securing Network Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.