Port Scans / Host Scans
Usually the first part of the attack
Used to determine weaknesses
Pay attention to the non-normal ones
DNS scan of the entire class B network
Host scan for only machines ending in *-nt
Previous slide
Next slide
Back to first slide
View graphic version