Holm Security's scanning engine determine active & inactive hosts during the first step of the network scan.
There are different methods the scan engine use, one is simply by pinging the host and see if it responds either on TCP or ICMP. Another example is the use of TCP SYN/ACK which can also be disabled in case of firewall interference.
What is the difference between active & inactive hosts?
Have more questions? Submit a request
Please sign in to leave a comment.
0 Comments