1 00:00:00,060 --> 00:00:07,140 ‫Port Scan with end map allows you to discover which TCP or UDP ports are open on your target host. 2 00:00:08,020 --> 00:00:14,230 ‫Network ports are the entry points to a machine that is connected to the internet, a service that listens 3 00:00:14,230 --> 00:00:20,380 ‫on a port is able to receive data from a client application, process it and send a response back. 4 00:00:21,250 --> 00:00:26,950 ‫Malicious clients can sometimes exploit vulnerabilities in the server code so they can gain access to 5 00:00:26,950 --> 00:00:31,480 ‫sensitive data or execute malicious code on the machine remotely. 6 00:00:32,320 --> 00:00:38,710 ‫That is why testing for all ports is necessary in order to achieve a thorough security verification. 7 00:00:39,650 --> 00:00:45,920 ‫Port scanning is usually done in the initial phase of a penetration test in order to discover all network 8 00:00:45,920 --> 00:00:47,750 ‫entry point into the target system. 9 00:00:48,740 --> 00:00:54,800 ‫Port Scan takes the biggest part of our end map lectures in what I would call the most basic port scan 10 00:00:54,800 --> 00:00:55,970 ‫types lectures. 11 00:00:56,000 --> 00:00:57,260 ‫We see the following. 12 00:00:58,190 --> 00:01:00,230 ‫And map options of port scanning. 13 00:01:01,190 --> 00:01:10,850 ‫Since scan TCP scan comparison between the since scan and TCP scan, UDP scan and some other types of 14 00:01:10,850 --> 00:01:11,630 ‫port scans.