Lisa Bock reviews NetScan tools, a graphical user interface tool for Windows that is used to help collect information on a network for assessing irregularities and vulnerabilities. The demo version is used to explore built-in tools for port scanning, OS system fingerprinting, time sync, traceroute, arp scans and others.
- View Offline
- [Voiceover] There are a number of tools out there…that we can use to monitor…and assess our network for irregularities.…NetScan tools helps us to collect information,…and we can also do some port scanning,…operating system fingerprinting, ARP scanning,…also a lot of other tools that we can use…in order to test our network,…and monitor to see what's visible.…I'm at the NetScan tool's pro site…where you can actually download a demo version.…I did, I downloaded the demo version,…you have to request a trial,…and of course,…register like most other trial versions.…
You can read some of the information about NetScan tools,…and now I'm gonna bring that up,…and show you exactly what the tools are in the demo.…As you can see,…this gives us a little bit of information.…One of the things is you can't save the results,…but it does give you an idea of what's happening,…it's how it can do the scanning.…I'm going to start the demo.…I already created a little database,…but once you go in and start the demo,…you can create a new database,…
This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security.
Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50). This course maps to the 03 Scanning Networks domain.
- Scanning overview
- Port scanning countermeasures
- Scanning and querying DNS
- Scanning with ICMP
- Mapping (or blueprinting) a network
- Scanning for vulnerabilities
- Using tools such as hping and NetScan
- Evading detection
- Concealing your network traffic
- Preventing tunneling