enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Nmap - Wikipedia

    en.wikipedia.org/wiki/Nmap

    License. NPSL [3] or modified GPLv2 [4] or proprietary. Website. nmap.org. Nmap (Network Mapper) is a network scanner created by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich). [5] Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.

  3. ZMap (software) - Wikipedia

    en.wikipedia.org/wiki/ZMap_(software)

    ZMap (software) ZMap is a free and open-source security scanner that was developed as a faster alternative to Nmap. ZMap was designed for information security research and can be used for both white hat and black hat purposes. The tool is able to discover vulnerabilities and their impact, and detect affected IoT devices.

  4. Ping sweep - Wikipedia

    en.wikipedia.org/wiki/Ping_sweep

    Well-known tools with ping sweep capability include nmap for Unix and Windows systems, and the Pinger software from Rhino9 for Windows NT. [4] [5] There are many other tools with this capability, including: [2] [5] Hping, IEA's aping, Simple Nomad's ICMPEnum, SolarWind's Ping Sweep, and Foundstone's SuperScan. There is also a ping sweep tool ...

  5. Banner grabbing - Wikipedia

    en.wikipedia.org/wiki/Banner_grabbing

    Banner grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network. However, an intruder can use banner grabbing in order to find network hosts that are running versions of applications ...

  6. netcat - Wikipedia

    en.wikipedia.org/wiki/Netcat

    netcat. netcat (often abbreviated to nc) is a computer networking utility for reading from and writing to network connections using TCP or UDP. The command is designed to be a dependable back-end that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and investigation ...

  7. Network enumeration - Wikipedia

    en.wikipedia.org/wiki/Network_enumeration

    Network enumeration. Network enumeration is a computing activity in which usernames and info on groups, shares, and services of networked computers are retrieved. It should not be confused with network mapping, which only retrieves information about which servers are connected to a specific network and what operating system runs on them.

  8. TCP/IP stack fingerprinting - Wikipedia

    en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting

    TCP/IP stack fingerprinting. Passive OS Fingerprinting method and diagram. TCP/IP stack fingerprinting is the remote detection of the characteristics of a TCP/IP stack implementation. The combination of parameters may then be used to infer the remote machine's operating system (aka, OS fingerprinting), or incorporated into a device fingerprint.

  9. Idle scan - Wikipedia

    en.wikipedia.org/wiki/Idle_scan

    An idle scan is a TCP port scan method for determining what services are open on a target computer [ 1 ] without leaving traces pointing back at oneself. This is accomplished by using packet spoofing to impersonate another computer (called a " zombie ") so that the target believes it's being accessed by the zombie.