Lisa Bock reviews NetScan tools, a graphical user interface tool for Windows that is used to help collect information on a network for assessing irregularities and vulnerabilities. The demo version is used to explore built-in tools for port scanning, OS system fingerprinting, time sync, traceroute, arp scans and others.
- [Voiceover] There are a number of tools out there…that we can use to monitor…and assess our network for irregularities.…NetScan tools helps us to collect information,…and we can also do some port scanning,…operating system fingerprinting, ARP scanning,…also a lot of other tools that we can use…in order to test our network,…and monitor to see what's visible.…I'm at the NetScan tool's pro site…where you can actually download a demo version.…I did, I downloaded the demo version,…you have to request a trial,…and of course,…register like most other trial versions.…
You can read some of the information about NetScan tools,…and now I'm gonna bring that up,…and show you exactly what the tools are in the demo.…As you can see,…this gives us a little bit of information.…One of the things is you can't save the results,…but it does give you an idea of what's happening,…it's how it can do the scanning.…I'm going to start the demo.…I already created a little database,…but once you go in and start the demo,…you can create a new database,…
This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security.
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.
- Scanning overview
- Port scanning countermeasures
- Scanning and querying DNS
- Scanning with ICMP
- Mapping (or blueprinting) a network
- Scanning for vulnerabilities
- Using tools such as hping and NetScan
- Evading detection
- Concealing your network traffic
- Preventing tunneling
Skill Level Intermediate
1. Scanning Overview and Methodology
2. Identifying Live Systems Using Protocols
3. Blueprint the Network
4. Vulnerability Scanning
Commercial and free scanners3m 17s
5. Scanning Tools
6. Evading Detection
7. Concealing and Spoofing
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.