PHASE 2: SCANNING

Once we have information about the target, we start scanning—actively probing systems to identify open doors. This is where tools like Nmap come in. We're looking for open ports, running services, and potential vulnerabilities.
02
SCANNING
Once the attacker has enough information, they begin scanning perimeter and internal network devices looking for weaknesses.
🔌 Open Ports
Identifying entry points into systems
Nmap Netcat
🛠️ Open Services
What's running on those ports
Service Version Detection
💥 Vulnerable Applications
Outdated software, misconfigurations
Vulnerability Scanners
🔐 Weak Protection
Data in transit vulnerabilities
🏷️ Device Fingerprinting
Make and model of network equipment
📊 Network Mapping
Understanding network topology
Goal: Create a detailed map of the target's attack surface