
Ping scans are internet control message protocol (ICMP) requests and send out an automated blast of several ICMP requests to different servers to bait responses. In a network, a ping is used to verify whether or not a network data packet can be distributed to an IP address without errors.

Using these two protocols, there are several different techniques for performing port scans. Data sent via the UDP protocol is delivered without concern for the destination therefore, it is not guaranteed that the data will even make it.

While TCP is a reliable, two-way connection-based transmission of data that relies on the destination’s status in order to complete a successful send, UDP is connectionless and unreliable. They are both data transmission methods for the internet but have different mechanisms. The general protocols used for port scanning are TCP (transmission control protocol) and UDP (user datagram protocol). What are the protocols used in port scanning? Ports 49,151 through 65,536 are dynamic and private ports - and can be used by nearly everyone. Numbers 1024 through 49151 are considered “registered ports” meaning they are registered by software corporations.

They are administered by the Internet Assigned Numbers Authority (IANA). Ports 0 to 1023 are well known port numbers that are designed for Internet use although they can have specialized purposes as well. Ports range from 0 to 65,536 and basically rank by popularity. The port number combined with an IP address form the vital information kept by every Internet Service Provider in order to fulfill requests. Port numbers are used for consistency and programming. Think of it as the parking spot for data to be exchanged through electronic, software, or programming-related mechanisms.

Computer ports are the central docking point for the flow of information from a program or the Internet, to a device or another computer in the network and vice versa.
