Port scanning and sniffing explained
Port scanning presents a method used to recognize ports for the open network in the computer system that they can break into. Port scanning has different legitimate uses that it performs in a system. It can be used to send a request to connect to the aimed computer and note the ports that responds or appears to open. Port scanning is also used to configure applications for network security to inform the administrators incase they detect some connections across a wide range of ports from a single host.
There are other port scanning processes that enable leaking of usernames to the owner of any kind of process that is connected even though the process did not start the connection. The port scan mainly entails sending of messages to every port. The type of response one gets will indicate if the port is in use and can further be probed for weaknesses.
Some other port scanning infers whether the port is open or not. However, if the port happens to be blocked by a firewall, this method of scanning will detect that the port is open. There are other types of port scanning used to determine whether the ports are filtered or unfiltered while at other time they are used to verify whether the window field for packet is modified. Port scanning can also be used to determine the types of hosts in the network that are in use through pinging them.
Port scanning is the well known reconnaissance technique that is usually used by hackers. Hackers normally use it because they can easily discover services that they can use to break into. By use of port scanning, hackers have the potential to open the ports to penetrate to the computer. Hacker also user port scanners to perform test for the open ports on PCs that are connected to the internet, searching for a door that they can use to get into the computer.
Old drivers harm system performance and make your PC vulnerable to errors and crashes.
Posted in Networks