Ping Sweeps and Port Scans

506 Words3 Pages
As your boss has heard of infamous computer activities called ping sweeps and port scans, and if he should be informed on if they are dangerous or not, it is best to discuss with your boss on the impact they might have on the company, explain what they are, and if he should be worried or not. A ping sweep is used to determine a range of IP addresses to figure out which networks were running. Hackers will use a ping sweep since it consists of an “ICMP (Internet Control Message Protocol) ECHO requests sent to multiple hosts. (Rouse) Tools that can be used to do a ping sweep are such commands as hackers to find which computers are running to get into the system to either steal information or send viruses without our knowledge can use gping, fping, and nmap. Administrators are able to disable ping sweeps by blocking ICMP ECHO requests from outside sources since they are an older and slower method of scanning a network. Port scans are a favorite approach by a computer hacker since this will give the assailant a very good idea on where to probe the network for any weakness in order to access such things as your own personal information and send nasty viruses through the firewalls if possible. The port scan is a “series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a “well-known” port number, the computer provides.”(Rouse) In order to perform a port scan, all you would need to do it connect to a series or ports on the machine and figure out which ports respond to your command. A port scanner can be written in such languages as Java or Perl by a good programmer to find which port can be hacked into and have viruses sent into the computers determined. However, the port scan is detectable by the operating system that is targeted at that target machine, so since it is detectable, “most

More about Ping Sweeps and Port Scans

Open Document