Advanced Port Scanner

Advanced Port Scanner is the act of port scanning with some more abilities then just to detect if port is open on close, it will also try to detect the service that is after the open port.

With lots of new security threats coming in daily, protecting your system and digital files is more than important. One threat right now is port scanning.

Port scanning happens to many people whether or not they realize it. Protecting yourself against port scans will let you secure and protect your system from malicious users.

All computers have ports and services run on these ports. Every time your computer connects to your mail server to check your email, it will open one of these ports to make a connection to download your new email.

But at times these ports are always on and listening. A port scan happens when an attacker scans a host to find out which ports are open and which are closed or not being used.

Advanced Port Scanner Information:

Visualize a port scan similar to someone closely checking the doors and windows of your house to find out if they are shut or not. Although the attacker will most likely break into your house he may be aware that there is a window unlocked and access can be achieved very easily.

A port scanner works in much the same way as it checks ports on your computer to see which is closed or open. It is not outlawed in many places to do a port scan since you are just checking if the connection can be made and not really making a connection to the host.

Advanced Port Scanner will scan for open ports it will support several scanning techniques and the ability to detect the service that behind the open port.

Here are two examples for advanced port scanner:

( credit for the tools description belong to the tool athor/owner/tool wesite, I copy it to here for a brief information about the tool, please visit the tool website for more information about the tool)

  1. Advanced Port Scanner  – Advanced Port Scanner is a free network scanner allowing you to quickly find open ports on network computers and retrieve versions of programs running on the detected ports. The program has a user-friendly interface and rich functionality. is a free network scanner allowing you to quickly find open ports on network computers and retrieve versions of programs running on the detected ports. The program has a user-friendly interface and rich functionality.

  2. Nmap – Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).

Nevertheless it is possible to create a Denial of Service attack if port scans are made continually. A lot of firewalls can protect you against port scans. A firewall is a program that monitors outgoing and incoming connections to your system.

A firewall may open up all ports on your computer to systematically stop scans from showing any ports. Although this approach works in a lot of cases, Port Scans have advanced with modern techniques like ICMP port unreachable scans. Hence, open ports on your computer can result in a system compromise leading to lost data, and perhaps identity theft.

Even though a port scan may not mean your system is about to be attacked. It’s crucial that you note that if a port scan takes place, someone has seen a weakness in your system if there is one. This idea alone is enough for you to give some thought on how best to secure and protect your computer.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.