Alright so we don't even know what type of software or what operating system that this system is running.Ģ) NMAP - Port Scanner - Has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgement to guess what operating system its running. These are all theoretical points of entry where we could wiggle into the computer system. This is the beginning of your targets record. 80-HTTP 25-SMTP Etc Etc.) Simply take all that information and paste it into notepad or the editor of your choice.
Most of them will be paired up with the type of protocol that uses that port (IE. Take note of all the ports that you see listed before you. In example 1 now we see that there are a variety of ports open on this box. (The 65522 ports scanned but not shown below are in state: closed) Protocols use these ports to communicate with other services and resources on the network.ġ) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. Well first ping the IP Address to make sure that its alive.
You can get the IP address of the victim using this post.