PING SWEEPS

Running Head: PING SWEEPS

Ping Sweeps

Introduction

The boom of the cutting-edge technological equipment and gadgets has ushered in a simplified technological lifestyle. However, as the adage goes that you never know what lies behind a sparkling facade, there has been the negative side of the technology too (Baskin, 2008). Some unscrupulous people who use technology have other ideas in their minds: using the technological gadgets and equipment as crude forms of ‘poaching’ information and other types of data from companies and firms their own benefits.

Among the methods used, there are two ways, these are: ping sweeps and port scans.

Ping sweeps

This method is referred to as Internet Control Message Protocol or truncated as ICMP. According to expatriates, a single ping can determine one type of host that’s on the computer (Baskin, 2008). This is a process that entails the use of a method that scrutinizes and settles on the type of range of IP address plan to computers and equipment. Reverberation is fed to many hosts prior to which if they emit a reverberation of the ICMP, the user knows that there is a kind of existing address.

The ping sweep comes in various varieties name that are used in different types of systems (like UNIX system) and in form of software. Some of them used for the systems are: nmap, gping and fping. On the other hand the one used as software are: ping sweeps and rhino9 both of which are used most windows systems (Chris, 2007). The network programmers can counter-measure and hinder the ping sweeps used by the ‘poachers’ by obstructing the reverberations of the ICMP that penetrate through from alien sources. The limitation of this is that it, not only is it outdated but also very slow.

Port scans

This is signals sent by an individual who is trying to hack into a computer networking where each port scan is related with a familiar port number. This method of port scanning is like the boxing ring where a boxer punches half to full nelsons (punches to his opponent).The scans guide him where it is easily to crack the codes. The scans are sent to all the ports, one after another until the aim is achieved. The types of scans vary from strobes, connecting to only earmarked ports (Chris, 2007). Stealth scans that keep the way clear as they avert the link requests from, being closed. Sweep-scans involve scanning a relegated port among chosen computers. Vanilla tries to link to all the ports. File Transfer Protocol Bounce scans are aims at the desired spot under the camouflage of the F.T.P server. The last is U.D.P scans that are aimed at unclosed datagram protocol.

Is there need to worry? there is not the need to tense since you can opt for self-destructing emails that either destroy themselves automatically or are given the day due expiry. Secondly there is the memory sharing in computer; this is the method by which the networking processes swap over data swiftly that when it would have been read. Stock keeping unit; which are the goods that can be followed for inventory decisions (Chris, 2007). Among others are: permittivity, software developer’s kit, angular velocity and cardinality.

Conclusion

There are two types of information ‘poaching’ namely: ping sweeps (uses nmap, gping, fping and rhino9).Port scans (uses strobes, stealth, sweep, and vanilla, F.T.P., and U.D.P scans.) The two processes pose no immediate threats as: the ping sweeps is outdated and very slow, while the port scan is counter-measured by: using self-destructive emails, memory sharing, stock keeping unit, permittivity, angular velocity, software developer’s kit and cardinality.

 

References

Baskin Brian, K. (2008). Netcat Power Tools. Berlimgton: Syngress.

Chris, H. (2007). Penetration Testers Open Source Toolkit. Burlington: Syngress.