Visible to the public Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool

TitlePenetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool
Publication TypeConference Paper
Year of Publication2019
AuthorsShah, Mujahid, Ahmed, Sheeraz, Saeed, Khalid, Junaid, Muhammad, Khan, Hamayun, Ata-ur-rehman
Conference Name2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)
Date PublishedJan. 2019
PublisherIEEE
ISBN Number978-1-5386-9509-8
Keywordsactive reconnaissance phase, Bandwidth, composability, computer network security, footprinting, Internet, Mathematics, Metrics, Monitoring, network accountability, network traffic, nmap tool, optimized port scanning, passive information gathering techniques, passive scanning, port scanning, pubcrawl, Reconnaissance, resilience, Resiliency, scanning perimeter, Task Analysis, telecommunication traffic, Tools
Abstract

Reconnaissance might be the longest phase, sometimes take weeks or months. The black hat makes use of passive information gathering techniques. Once the attacker has sufficient statistics, then the attacker starts the technique of scanning perimeter and internal network devices seeking out open ports and related services. In this paper we are showing traffic accountability and time to complete the specific task during reconnaissance phase active scanning with nmap tool and proposed strategies that how to deal with large volumes of hosts and conserve network traffic as well as time of the specific task.

URLhttps://ieeexplore.ieee.org/document/8673520
DOI10.1109/ICOMET.2019.8673520
Citation Keyshah_penetration_2019