Ajj hum apko is Post mai What is Network Scanning or Network Scanning ke types ke bare mai btayege. Agar aap ek Ethical Hacker bana chahte hai. Tab apko ache se sabhi topics ke bare mai knowledge honi chhaiye tabhi aap Ethical hacker ban sakte hai. Phir chahe veh website hacking ho ya Network Scanning ho.
Vaise to Ethical hacking sikhne vale person Footprinting ,Network scanning Jaise topics ko jada important nahi samjhte hai. Lekin yeh bhi ethical hacking mai hi ata hai. Kyoki agar apko Network ke bare mai knowledge nahi hoti hai. Tab aap kisi Network mai hacking nahi kar sakte hai.
Network scanning?
yeh Footprinting ke baad kiya jane vala process hota hai. Footprinting se information ko collect kiya jata hai. Lekin Footprinting se sabhi tarah ki information ko collect nahi kiya ja sakta hai. Isliye iska use kiya jata hai.
Network scanning mai ek hacker open ports , operating system , targeted services jaise information ko collect karta hai. Aisa isliye kiya jata hai. Kyoki ek hacker ko pata hona chahiye ki veh kis tarah se apne targeted computer mai enter ho sakta hai. Open ports ka use karke bhi hacking ki jati hai.

ALSO READ
Types Of Network scanning
Port scanning
Iska use karke target ke open ports ke bare mai pata kiya jata hai. Sath hi yeh bhi pata kiya jata hai ki target computer par kis type ki services run ho rahi hai . Jaise kisi hacker ka target computer hai. Tab port Scanning ki help se hacker targeted computer mai open ports or chal rahi services ke bare mai information collect karta hai.

Network Scanning
Isme hacker apne target ka IP Address ko scan karta hai. Iska use se kisi ek network mai connected sabhi computers ka IP Address bhi nikala ja sakta hai.
vulnerability Scanning
Vulnerability Scanning mai targeted computer par run ho rahe softwares ke version ki information ko collect karke un Softwares mai milne vali vulnerability ke through kisi computer ko access bhi kar sakte hai. Isliye vulnerability Scanning kisi bhi Network Scanning mai bht important hoti hai. Kyoki hacker apne target ko hack karne ke liye vulnerability ko scan karke use access karne ki koshish karte hai.

Port
Kisi bhi tarah ka data jab kisi Network mai flow hota hai. Tab veh inhi ports ki help se enter hota hai. Sabhi tarah ke ports par alag alag tarah ki services run hoti hai. Yeh pahle se hi define kiya jata hai ki kis port par konsi services kaam karegi jaise HTTP ka port 8080 hota hai. Https ka port 443 hota hai. Total Port 65536 hote hai or jadatar use hone vale ports 1024 hote hai.
Services
Services veh hoti hai jo kisi computer par chal rahi hoti hai. Phir chahe veh background mai run ho. Services ka use karke hacker kisi computer ko Remotely access kar sakte hai. Isliye hume apne Computer par unhi services ko run karna chahiye. Jinka use kiya ja raha hota hai telnet , ftp , Netbios jaisi services agar humare computer par rehti hai. Tab inke through computer ko remotely access kiya ja sakta hai.
ICMP Scanning
ICMP ka pura naam Internet Control Message protocol hota hai. Ise Network scanning mai isliye rakha gaya hai. Kyoki ICMP ki help se active devices ka pata lgaya ja sakta hai. Agar ICMP request kisi computer par send ki jati hai or agar reply ata hai. Tab veh computer active hota hai ICMP firewall ko bhi bypass kar sakta hai.

Ping Sweep
Ping Sweep ka use isme tab kiya jata hai. Jab hume bahut sare computers par ek sath Ping Command ka use karna hota hai. Tab ise Ping Sweep kaha jata hai. Ping sweep ki help se kisi network ke sabhi computer mai se kon kon se computer live hai unka pata lgaya ja sakta hai. Isliye ping sweep ka use kiya jata hai.
Banner grabbing
Iska use Network scanning mai kiya jata hai. Banner grabbing ki help se Operating system or server ke bare mai pata lgaya jata hai. Jaise operating system konsa hai, server konsa hai. in sabke bare mai Banner grabbing ki help se pata lgaya jata hai. Jaise Target computer par konsa operating system hai iske bare mai pata lgane ko Banner grabbing kaha jata hai.

Steps Following for Network Scanning
Check for live systems
Check for open ports
Banner grabbing
Prepare proxy
Scan for vulnerblity
Draw network diagram
Ping and Ping sweep Tools
ping Sweep
ping Monitor
Tools for Network Scanning
Net Tools
Nexpose
Nessus
network View
Apko btaye gaye tools ka use isme kiya jata hai in sabhi tools ka alag alag tarike se use kiya jata hai. Sabhi tools ka apna ek unique feature hai. Sabhi tools ka kisi na kisi kaam ko karne ke liye use kiya jata hai inke alava bhi bahut sare tools ka use kiya jata hai.
The Conclusion
Main umeed karta hu ki apko Network Scanning ke bare mai pata chal gaya hoga. Network Scanning ko ethical Hacking sikhne vale person jada importance nahi dete hai. Lekin agar apko sach kahe to yeh ek bahut important topic hai. Agar hacker footprinting or Scanning sahi se karta hai tab kisi attack ke success hone ke chances bhi badh jate hai.
Agar apka kisi bhi tarah ka koi question hai tab aap humse comment box mai puch sakte hai. Apko CEH v10 ke kafi topics ke bare mai bata diya gaya hai age ane vali posts mai apko sabhi ke bare mai bata diya jayga. Agar apko humari posts achi lag rahi hai. Tab aap inhe jarur share kare or humre blog ko bhi jrur subscribe karen.
Thankyou
Hy bhaiya I am beginner(started 2 days ago can you please tell me a sequence kyonki abhi jab Mene apki web se do teen topics read kiye to Jaise aap likhte ho na ki we already told about it kafi Sare topics me ye Likha hota h to read krne me problem Hoti h so can you please tell me a sequence ki Kahan se start Kru and then what then what I hope you understand my problem so please help
aap ceh archives mai jakar pahle sab theory ko read karle aisa karne par apko sabhi tarah ke practical easily samjh mai a jayege or jaha apko yeh likha hua milta hai we already have told usi article mai apko veh article ka link mil jata hai jaha btaya hota hai