Probing past an IDS

Probing past an IDS
What is the benefit of being able to probe past an IDS and/or firewall in the context of scanning?
Initial Post:
What are some of the tools that allow port scanning? List 3
Provide command syntax and describe what type of scan will be performed and expected results? List 5 different and distinct scans with expected results.
What is this information telling you about the victims’ environment?
Given Identity is the new security perimeter, discuss what benefit port scanning plays in today’s intrusion scenarios. What difference does port scanning really make?
As you read your classmates’ postings, think of areas where you can expand on the subject, conduct more research to further explore the topic, or examine the subject through different lenses and perspectives.
Regarding your response to your classmates: Please highlight a new facet to build on what your classmate stated, add to the conversation, or find an alternative viewpoint and support your response with citations. It’s important to have more than “I agree” or “good point,” when responding!