الاثنين، 21 أكتوبر 2013

Port Scanning Tools


What is  port Scanning?
      You should understand what is port scanning .  Port scanning is the process of checking which port is opened and which ports are locked.  Just like a thief who searching for a gate opened house.

What is the Use?
   By finding which port is opened ,you can try to communicate with victim system remotely and access their data .    


EG:- 

* 21: FTP
* 22: SSH
* 23: Telnet
* 53: Domain Name System
* 80: World Wide Web HTTP
* 119: Network News Transfer Protocol
* 443: HTTP over Transport Layer Security/Secure Sockets Layer
* 445: microsoft-ds, Server Message Block over TCP


If these ports are not secure a hacker can communicate with these ports and cause havoc 
The list given below are some of the best port scanners 
You can download from the links given below:
Nmap:
This tool developed by Fyodor is one of the best unix and windows based port scanners. This 
advanced port scanner has a number of useful arguments that gives user a lot of control over the 
process.
From:
Download:
Superscan 
A Windows-only port scanner, pinger, and resolver SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.
From
Download

Angry IP Scanner 
A fast windows IP scanner and port scanner. Angry IP Scanner can perform basic
host discovery and port scans on Windows. Its binary file size is very small compared to other scanners and other pieces of information about the target hosts can be extended with a few plugins.

From
Download

Unicornscan :
Unicornscan is an attempt at a User-land Distributed TCP/IP stack for information gathering
and correlation. It is intended to provide a researcher a superior interface for introducing a stimulus into and measuring a response from a TCP/IP enabled device or network. Some of its features include asynchronous stateless TCP scanning with all variations of TCP flags, asynchronous stateless TCP banner grabbing, and active/passive remote OS, application, and component identification by analyzing responses.

From
Download

0 التعليقات:

إرسال تعليق