mayorredbeard
Daemon Poster
- Messages
- 1,246
More and more white hat hacking has caught my attention. I've realized that most hackers use a port scanner to find weak ports in a network. So it's to my understanding that port scanners, and port scanning is legal? Correct?
Also, in a port scanner a hacker simply enters in a persons IP and it scans for weak ports correct? With this weak port what are the steps (be vaugue I understand you guys and I could probably get in trouble for getting too specific), that a hacker takes with this/these weak port(s) that he has to launch a malicious attack.
Also, in a port scanner a hacker simply enters in a persons IP and it scans for weak ports correct? With this weak port what are the steps (be vaugue I understand you guys and I could probably get in trouble for getting too specific), that a hacker takes with this/these weak port(s) that he has to launch a malicious attack.