First page Back Continue Last page Overview Graphics

Port Scanning


Notes:

The first step of attacking someone, is figuring out how they are vulnerable. Port scanning is an absolute must, to find out any services that might be vulnerable to remote attacks, or authentication services that might allow an attacker to guess/brute force a set of credentials.