Your Perfect Assignment is Just a Click Away

Starting at $8 per Page

100% Original, Plagiarism Free, Customized to Your instructions!


Port Scanning Response

Port Scanning Response

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.


There are several port scanning tools available to users that allow for the scanning and/or mapping of a network.  Such tools include Nmap, Unicornscan or Angry IP Scanner, but for the sake of providing different information, I will discuss Unicornscan. 

Unicornscan is another port scanning tool that utilizes distributed TCP scanning.  Unlike Nmap, Unicornscan has its own TCP/IP stack, which doesn’t use the host’s operating system, and allows for faster network scans (Unicornscan, 2018).  This concept becomes more important as the size of a network increases, and any time saved when performing scans that keep a network safe can make a world of difference.  Unicornscan is also capable of performing OS fingerprinting, so that a user can identify what operating systems are active on a network, and the program allows for the scanning of the packets related to the operating systems that are in use (Unicornscan, 2018). 

Unfortunately, I wasn’t able to find a specific cyber-attack using Unicornscan, but I did take this opportunity to at least research the role port scanning plays in a cyber-attack.  Similar to the reasons why a security professional would use a port scanning tool to identify active/inactive ports on a network, a hacker would also do the same to identify points of entry to a network.  It is also important to recognize that some of the port scanning tools are capable of identifying an OS on the network, for a hacker, this can help further identify potential targets.

Thank you for reading, and I hope everyone has a wonderful week!



Unicornscan. (2018, March 27). Retrieved July 15, 2020, from


This week we are asked to search the internet for a tool used to conduct port scanning. I chose to talk about Nmap after doing some research as it seems to be the most commonly used tool. On the Nmap website, the program is described as “is a free and open source utility for network discovery and security auditing” (Nmap, 2020). While this is what the program was intended for and widely used as, it has also been a long time favorite of hackers to scan potential targets. I found several websites claiming that it is very user-intuitive, easy to use, and most importantly very effective with regular updates. Others however claim that it has a steep learning curve if the user is new to this kind of tool and that unless special care is taken the server being scanned can see the scanner’s IP address.  

Even though I searched pretty hard (all the way to page 4 of google!) I could not find a specific attack from a creditable source that specifically mentioned Nmap. I am assuming this is because most people write their own code to run with Nmap mixed with the fact that in hacking instances the authorities don’t like to release the methods used. I did however find numerous forums and websites claiming that they had successfully carried out attacks using Nmap including the group AnonSec claiming to hack NASA drones using Nmap. I could not find this information from a credible source however it is posted on the AnonSec website that Ill link below.

Nmap has also been seen in several big Hollywood films that have attempted to showcase hacking correctly. Movies such as The Matrix, Oceans 8, Snowden, Elysium, Fantastic Four, and The Girl with the Dragon Tattoo all showed Nmap being used to exploit vulnerabilities (Namp, 2020). While the Nmap websites specifically state that their tool is used to help companies find vulnerabilities so they can increase their security they seem really proud of being used by black hat hackers in movies.  

Best Wishes,


Nmap. (2020). Nmap. Retrieved July 15, 2020, from

Tiobe. (2015, January 28). AnonSec Hacked Drone. Retrieved July 15, 2020, from

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.