A port scanner is tool useful to an attacker to identify possible vulnerabilities in a potential victim system. cite a situation in which someone who is not an attacker could use a port scanner for a non-malicious purpose
Answers
Answered by
0
If you understand your question it talks about the fundamental case of Something used by an attacker to harm
And you are asking how would a non-attacker use it for ,other than harming purposes.
This is the same as driving, or using knife or anything which gives one HIGH ABILITY or POWER. For a Computer Tech context, there exists an ETHICAL HACKER and a HACKER(whatever one calls them, you got the difference). One uses the same thing to defend for a GOOD CAUSE , and the other ATTACKS.
If an attacker uses the PORT SCANNER for attack, one can inform the authorities or the user about the loopholes in it. That is a widespread practice among Ethical Hackers.
Hope you are satisfied with the answer!
And you are asking how would a non-attacker use it for ,other than harming purposes.
This is the same as driving, or using knife or anything which gives one HIGH ABILITY or POWER. For a Computer Tech context, there exists an ETHICAL HACKER and a HACKER(whatever one calls them, you got the difference). One uses the same thing to defend for a GOOD CAUSE , and the other ATTACKS.
If an attacker uses the PORT SCANNER for attack, one can inform the authorities or the user about the loopholes in it. That is a widespread practice among Ethical Hackers.
Hope you are satisfied with the answer!
Answered by
0
if tx tdycyocycyocoyvyovyicoycyc
Similar questions