Introduction

Computer networking is the study of how computers communicate with each other.

Learning about computer networks is especially important to Whitehat hackers, as billions of data are being shared along countless network links every second.

In this module, we learn some networking basics. We also gain some practical know-how on scanning tools that can help us spot vulnerabilities in computer networks.

Prerequisites

nmap

Nmap allows us to scan networks for other devices, and perform many other network-related functions. It is an extremely popular and powerful tool for enumeration and reconnaissance.

<aside> ❓ What does nmap stands for?

</aside>

Scanning

Scanning is an active reconnaissance method.

Like burglars trying to open your doors and windows to check if they are unlocked.

At this stage, you are actively looking for weaknesses, and can be detected. For instance, intrusion detection systems such as OSSEC and Snort can easily detect scanning attempts.

Why scan?

If we are more easily detected, why we want to scan instead of performing passive reconnaissance?

The answer depends on your risk appetite.

At the risk of exposing yourself, you can reveal more information such as:

Networking Basics