Problem solve Get help with specific problems with your technologies, process and projects.

Free port scan: How to use Angry IP scanner

Scanning IP ports is a critical part of maintaining enterprise information security. In this screencast, Peter Giannoulis explains how to use the free tool Angry IP scanner for these port scans.

Quick and effective port scanners can always come in handy as part of an information security pro's tool box. And...

if they're free, it's even better.

This month, Peter Giannoulis from shows how to use the Angry IP scanner for a thorough, free port scan that gathers MAC address, port, hostname and NetBIOS information.


Want more demos of free security tools? Visit our screencast page.

About the author:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains The Academy Pro, which provides streaming video for enterprises and consumers on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.

This was last published in June 2010

Dig Deeper on IPv6 security and network protocols security



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.







  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...