Scanning is a vital step in hacking processes. In this section, you will learn how to scan and map networks. The aim of network scanning is identifying the live hosts, including their network services. But before diving into in-depth network scanning techniques, let's begin with the basic TCP communication sequences.
In-depth network scanning
TCP communication
The Transmission Control Protocol (TCP) is one of the most well-known internet protocols. It is used in reliable host-to-host communications as a connection-oriented protocol. That means the connection is maintained until the message is fully transmitted. The TCP communications are handled by TCP flags called control bits, in a structured format known as TCP Headers...