Notes

Footprinting & scanning

Back to cyber security page


Mapping network & scanning targets


How to do scanning?

First we need ip of network to scan.


Port scanning methods

TCP Port scanner

TCP_IP_3_way_handshake


About TCP TCP Full Scan


TCP SYN Scan


OS Fingerprinting

What is OS fingerprinting

Tools:


Sources :