Lost universe of Programing
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Lost universe of Programing

USERNAME :- Forum Post:-114
 
HomePortalGalleryLatest imagesRegisterLog in

 

 Identifying Active Machines (Scanning and Footprinting) 6

Go down 
AuthorMessage
Er Amit Tripathi

Er Amit Tripathi


Male
Number of posts : 37
Age : 38
Location : Lucknow
Job/hobbies : Software Engeener
What U like To do ? : I Rocks With Computer System.
Registration date : 2008-01-09

Identifying Active Machines (Scanning and Footprinting)  6 Empty
PostSubject: Identifying Active Machines (Scanning and Footprinting) 6   Identifying Active Machines (Scanning and Footprinting)  6 I_icon_minitime2/10/2008, 2:33 am

Quote :

Attackers will want to know if machines are alive before they attempt
to attack. One of the most basic methods of identifying active machines
is to perform a ping sweep. Although ping is found on just about every
system running TCP/IP, it has been restricted by many organizations.

Ping uses ICMP and works by sending an echo request to a system and waiting
for the target to send an echo reply back. If the target device is unreachable,
a request time out is returned. Ping is a useful tool to identify active
machines and to measure the speed at which packets are moved from one
host to another or to get details like the TTL.


Ping does have a couple of drawbacks: First, only one system at a time
is pinged and second, not all networks allow ping. To ping a large amount
of hosts, a ping sweep is usually performed. Programs that perform ping
sweeps typically sweep through a range of devices to determine which
ones are active. Some of the programs that will perform ping sweeps include


- Angry IP Scanner
- Pinger
- WS_Ping_ProPack
- Network scan tools
- Super Scan
- Nmap
Back to top Go down
http://www.aspx.forumotion.com
 
Identifying Active Machines (Scanning and Footprinting) 6
Back to top 
Page 1 of 1
 Similar topics
-
» Port Scanning (Scanning and Footprinting) 7
» SCANNING AND FOOTPRINTING 1
» DNS Enumeration (SCANNING AND FOOTPRINTING) 3
» TRACEROOT (SCANNING AND FOOTPRINTING) 5
» Nmap (scanning and Footprinting) 9

Permissions in this forum:You cannot reply to topics in this forum
Lost universe of Programing :: --=| TUTORIALS |=-- :: ETHICAL HACKING & NETWORKING-
Jump to: