๐Ÿ“ก CEH Module 3: Scanning & Enumeration – Uncovering Open Doors in Networks

 

๐Ÿ“ก CEH Module 3: Scanning & Enumeration – Uncovering Open Doors in Networks

Welcome to Module 3 of the Certified Ethical Hacking (CEH) course — Scanning and Enumeration.
After gathering information in the Footprinting phase, it’s time to take it a step further: we now interact with the target system to find live hosts, open ports, and running services.

Let’s explore how hackers and security professionals detect what’s vulnerable before launching a real attack.


๐Ÿ” What is Scanning?

Scanning involves using tools to actively probe the target system or network for open ports, services, and systems.

Three types of scanning:

  • Port Scanning – Detect open ports.

  • Network Scanning – Identify active devices and IPs.

  • Vulnerability Scanning – Find security loopholes or misconfigurations.

  • view


๐Ÿงฉ What is Enumeration?

Enumeration digs deeper. After identifying live systems, it retrieves specific data like:

  • Usernames

  • Network shares

  • System details

  • Active Directory data

It’s like opening the doors we found during scanning and checking what’s inside.


๐Ÿ› ️ Essential Tools, Commands, and Websites

Let’s look at tools and their purpose in Scanning & Enumeration.


๐Ÿงช 1. Nmap – Network Mapper

๐Ÿ”น Command:

nmap -sS -Pn -T4 example.com

๐Ÿ”น Scan all ports:

nmap -p- example.com

๐Ÿ”น Website:
๐Ÿ‘‰ https://nmap.org

๐Ÿ”น Purpose:
Detects open ports, services, and OS type. Also supports scripts for vulnerability detection.


๐ŸŒ 2. Netdiscover – Live Host Finder

๐Ÿ”น Command:

netdiscover -r 192.168.1.0/24

๐Ÿ”น Purpose:
Detects live devices in a local network via ARP requests.


๐Ÿ” 3. Nikto – Web Server Scanner

๐Ÿ”น Command:

nikto -h http://example.com

๐Ÿ”น Website:
๐Ÿ‘‰ https://cirt.net/Nikto2

๐Ÿ”น Purpose:
Scans for vulnerabilities in web servers such as outdated software, dangerous files, and misconfigurations.


⚙️ 4. Netcat – The Swiss Army Knife of Networking

๐Ÿ”น Command:

nc -nv example.com 80

๐Ÿ”น Purpose:
Check if a port is open, send raw data, or even create reverse shells.


๐Ÿ“ก 5. Enum4linux – SMB Enumeration Tool

๐Ÿ”น Command:

enum4linux -a 192.168.1.5

๐Ÿ”น Purpose:
Enumerates Windows users, shares, group memberships, and more via SMB.


๐Ÿงฌ 6. Hping3 – Advanced TCP/IP Packet Tool

๐Ÿ”น Command:

hping3 -S -p 80 -c 3 example.com

๐Ÿ”น Purpose:
Performs stealth port scanning and firewall testing.


๐Ÿ›‘ 7. OpenVAS – Vulnerability Assessment System

๐Ÿ”น Website:
๐Ÿ‘‰ https://www.greenbone.net/en/

๐Ÿ”น Purpose:
Powerful vulnerability scanner for scanning networks and identifying weaknesses.


๐Ÿ”ง 8. Xprobe2 – OS Fingerprinting Tool

๐Ÿ”น Command:

xprobe2 -v 192.168.1.10

๐Ÿ”น Purpose:
Performs active OS fingerprinting to identify the operating system of a remote host.


๐Ÿ“‹ Quick Table Summary

ToolFunctionCommand Example
NmapPort/OS detectionnmap -sS -Pn example.com
NetdiscoverLive host discoverynetdiscover -r 192.168.1.0/24
NiktoWeb server vulnerability scannikto -h http://example.com
NetcatManual port check & shellnc -nv example.com 80
Enum4linuxSMB enumeration on Windowsenum4linux -a 192.168.1.5
Hping3Stealth scan / firewall testinghping3 -S -p 80 -c 3 example.com
OpenVASNetwork vulnerability scanningWeb-based tool
Xprobe2OS fingerprintingxprobe2 -v 192.168.1.10

⚠️ Legal Note

๐Ÿšจ Use these tools only on systems you are authorized to scan. Unauthorized scanning is illegal and unethical.


๐Ÿ“š Conclusion

The Scanning and Enumeration phase is all about finding weaknesses before they’re exploited. As an ethical hacker, mastering this step helps you strengthen systems, audit networks, and report vulnerabilities responsibly.


๐Ÿ”œ Next Module

In Module 4, we’ll dive into System Hacking, where we explore password cracking, privilege escalation, and backdoors.


๐Ÿ”— Stay Connected with Us

Looking for exciting tech content, ethical hacking guides, and helpful tools?
Make sure you’re following us everywhere!

๐Ÿ“บ YouTube Channel:
TechFusionPro09
๐ŸŽฅ Tutorials, Tips & Tech Insights — Subscribe Now!

๐Ÿ“ธ Instagram:
@blackops404
๐Ÿ”ฅ Behind-the-scenes content, updates, and community vibes!

๐ŸŒ Official Website:
mannutanwar.odoo.com
๐Ÿ“š Explore all our blogs, tools, and free courses in one place.

Comments

Popular posts from this blog

๐Ÿ” CEH Module 2: Scanning and Enumeration – The Art of Finding Open Doors

Main Home