Authors :
Moona Olakara Mohammed
Volume/Issue :
Volume 5 - 2020, Issue 9 - September
Google Scholar :
http://bitly.ws/9nMw
Scribd :
https://bit.ly/36aGsmm
DOI :
10.38124/IJISRT20SEP503
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
In a computer network, an attack is an
attempt to destroy or steal unauthorized information or
make use of information as an asset. One of the attacks
is a reconnaissance attack considered as the first step of
a computer attack. This type of attack is mostly done by
a black hat, an expert in the programmer, by scanning
the internal network devices and gather vulnerability
information. In this paper, shows the identification of
open ports and services through the network and
available IP on the network are possible to attack.
Keywords :
Open Ports, Nmap tool, Automatic Scanner, IP
In a computer network, an attack is an
attempt to destroy or steal unauthorized information or
make use of information as an asset. One of the attacks
is a reconnaissance attack considered as the first step of
a computer attack. This type of attack is mostly done by
a black hat, an expert in the programmer, by scanning
the internal network devices and gather vulnerability
information. In this paper, shows the identification of
open ports and services through the network and
available IP on the network are possible to attack.
Keywords :
Open Ports, Nmap tool, Automatic Scanner, IP