Introduction: Checking the Locks
Imagine a burglar walking down a street at 3 AM. They aren't breaking into houses yet; they are just walking up to every door and quietly turning the handle to see if it’s unlocked. In cybersecurity, this is a Port Scan. A port scan is a process that probes an IP address to see which services are 'listening' and potentially vulnerable to attack.
In this guide, we'll explain how port scanning works and why it is almost always the very first step in a cyberattack.
How It Works: The Probe
A hacker uses a tool like **Nmap** to send thousands of tiny 'Hello' messages to your IP address, each one targeting a different port number. Depending on the response (or lack thereof), the hacker can tell:
- Open: A service is listening. This is a potential doorway.
- Closed: The door is locked and there is no one 'home'.
- Filtered: A firewall is blocking the scan, which tells the hacker you have some protection in place.
The Goal: Information Gathering
Port scanning isn't just about finding open doors; it’s about finding **outdated** ones. If a scan reveals that Port 80 is open and running an old version of a web server from 2018, the hacker knows exactly which 'exploit' to use to break in.
Conclusion
A port scan is a rattle of your digital doorknob. While not an attack itself, it is a warning that an attack might be coming. Scan your own ports for vulnerabilities here.