Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool
Title | Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Shah, Mujahid, Ahmed, Sheeraz, Saeed, Khalid, Junaid, Muhammad, Khan, Hamayun, Ata-ur-rehman |
Conference Name | 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET) |
Date Published | Jan. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-5386-9509-8 |
Keywords | active reconnaissance phase, Bandwidth, composability, computer network security, footprinting, Internet, Mathematics, Metrics, Monitoring, network accountability, network traffic, nmap tool, optimized port scanning, passive information gathering techniques, passive scanning, port scanning, pubcrawl, Reconnaissance, resilience, Resiliency, scanning perimeter, Task Analysis, telecommunication traffic, Tools |
Abstract | Reconnaissance might be the longest phase, sometimes take weeks or months. The black hat makes use of passive information gathering techniques. Once the attacker has sufficient statistics, then the attacker starts the technique of scanning perimeter and internal network devices seeking out open ports and related services. In this paper we are showing traffic accountability and time to complete the specific task during reconnaissance phase active scanning with nmap tool and proposed strategies that how to deal with large volumes of hosts and conserve network traffic as well as time of the specific task. |
URL | https://ieeexplore.ieee.org/document/8673520 |
DOI | 10.1109/ICOMET.2019.8673520 |
Citation Key | shah_penetration_2019 |
- optimized port scanning
- tools
- telecommunication traffic
- Task Analysis
- scanning perimeter
- Resiliency
- resilience
- Reconnaissance
- pubcrawl
- port scanning
- passive scanning
- passive information gathering techniques
- active reconnaissance phase
- nmap tool
- network traffic
- network accountability
- Monitoring
- Metrics
- Mathematics
- internet
- footprinting
- computer network security
- composability
- Bandwidth