Загрузка...

Chapter 6 - Reconnaissance & Network Scanning for Beginners | Cybersecurity Lesson

Reconnaissance & Network Scanning for Beginners | Cybersecurity Lesson

In this lesson, I explains one of the most important stages in cybersecurity and penetration testing: **Reconnaissance**.

Reconnaissance is the **first stage of a cyber attack**, where attackers gather information about a system before attempting to exploit it. Think of it like **a burglar walking around a neighborhood checking doors and windows before attempting a break-in.**

This video explains these ideas using **simple analogies and beginner-friendly demonstrations** so new learners can clearly understand how attackers explore networks and how defenders detect them.

---

## What You Will Learn

### 🔎 Reconnaissance – The First Attack Stage

Learn how attackers collect information about networks before launching attacks.

### 📡 Pinging a Network

One of the simplest ways to check if a device is online is with **ping**.

Example shown in the video:

```
ping 192.168.1.1
```

Ping works like **knocking on a door to see if someone is home.**

---

## Passive vs Active Information Gathering

**Passive Information Gathering**

Information collected **without touching the target system**, such as:

• LinkedIn profiles
• Company websites
• Public documents
• Job advertisements

Job postings often reveal technologies a company uses such as servers, cloud platforms, or security tools.

**Active Information Gathering**

Direct interaction with the network using tools like **Nmap** to discover:

• Live hosts
• Open ports
• Running services

---

## Port Scanning Explained

Ports are like **doors into a computer system**.

Examples:

**TCP Port 80** → Web servers
**UDP Port 53** → DNS services

### SYN Scan (Stealth Scan)

A **quick, quiet check** that does not complete the full connection.
It is harder to detect.

### TCP Connect Scan

Completes the **full handshake**, making it reliable but easier to detect.

### UDP Scan

Used for services like DNS or VoIP.
It is **slower but harder to notice.**

---

## Viewing Listening Ports

The video demonstrates using **netstat** to view open ports:

```
netstat -an
```

This shows **services actively listening for connections.**

---

## Network Mapping

Network mapping is like **drawing a map of houses in a neighborhood and the roads connecting them.**

Attackers use mapping tools to identify:

• Devices on a network
• Open services
• System relationships

---

## Vulnerability Scanning

Attackers often search for **old or unpatched software** such as:

• Outdated web servers
• Unpatched operating systems
• Vulnerable applications

Security teams rank weaknesses using **CVSS scores** to determine which issues must be fixed first.

---

## Basic Network Defenses

Key defenses discussed include:

• **Firewalls** blocking suspicious traffic
• **Network segmentation** separating systems like rooms in a house
• **Intrusion Detection Systems (IDS)** identifying scanning activity

---

This lesson helps beginners understand **how attackers discover systems and how defenders detect reconnaissance activity early.**

---

#CyberSecurity
#EthicalHacking
#PenetrationTesting
#NetworkSecurity
#Nmap
#InformationSecurity
#CyberSecurityTraining

Видео Chapter 6 - Reconnaissance & Network Scanning for Beginners | Cybersecurity Lesson канала GREATMIND Isreal Joshua
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять