Network Scanner and Network Probing
The second phase in ethical hacking is the network scanning phase. Network scanning is the phase where a hacker identifies hosts, ports, and services on the target network. In socket-based programming, the server is the host that provides a service and the client is the host that accesses or uses the service. Socket itself is a combination of IP address and port number, for example is the mail service that uses socket 202....