Speak directly to a qualified member of staff 0845 301 5778

A Decade of Success!

Step 2 - Scanning and Enumeration

Scanning refers to the stage where the hacker scans the network with specific information gathered from the reconnaissance phase.

Scanning and Enumeration are intelligent ways of gathering sensitive information about the target company's network architecture. Information relating to the company's IP addresses, OS, DNS servers and Zone Transfer information can sometimes be extracted using specialist techniques that fall into this category. Scanning can essentially be considered the rational extension of reconnaissance.

Scanning involves steps such as intelligent system port scanning which is used to determine open ports and vulnerable services. In this stage the attacker can use different automated tools to discover system vulnerabilities.

Other techniques used in this phase include:

  • Network Mapping;
  • Sweeping;
  • Use of Diallers; and
  • Vulnerability Scanners;

The risk to a network if this stage of a real life security attack was successful is considered to be very high. At the end of this stage the hacker would have established the points of entry with which to launch an attack.

Brochures & Newsletter Subscription

Digital evidence is now more important than ever to the construction of a successful case. Unfortunately, the correct way to handle and examine such evidence is in a seemingly constant state of flux. Keep up to date with the latest changes and stay ahead of the curve by subscribing to our newsletter. Simply enter your email address in the box below then click subscribe:

About Us


Fields Associates is a consultancy firm specialising in digital forensics, security and electronic discovery who have, following our formation in 1999, assisted numerous high-profile and prestigious clients from solicitors firms, law-enforcement agencies and numerous organisations within both the private and public sectors.

Technology now plays a prominent role in our everyday lives and the need to have a robust, skilled and reliable team of experts to hand cannot be understated. Irrespective of whether you require assistance discovering evidence stored on any kind of electronic device, an expert report or witness testimony to assist with litigation or to implement new and more dependable information security systems, Fields Associates has the expertise and experience to meet your needs.

  • checked
  • acs
  • acs
  • acs
  • acs