Scan for live devices on a network. Gather information about open ports, OS’s, Services, etc.

Methodology

— Check for live systems (Ping or other way to determine live hosts)

— Check for open ports (Scan the live hosts for listening ports)

— Scan beyond IDS (If needed, scan with IDS evasion)

— Perform banner grabbing (Grab data from servers, OS fingerprinting)

— Scan for vulnerabilities (Look at vulnerabilities of open systems)

— Draw network diagram (Shows pathways into networks)

— Use proxies (Obscures efforts to keep you hidden)

— Pentest report (Document everything that you find)

Tools

Nmap

Arp-Scan

Dirb

hPing3

How To’s

Scanning a network (Pentest)

Footprinting basics with Windows CLI