Introduction to Network Scanning

Slides:



Advertisements
Similar presentations
Network Mapping  Identify Live Hosts  Determine running Services TCP Port Scanning UDP Port Scanning Banner Grabbing ARP Discovery  Identify Perimeter.
Advertisements

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 2 Scanning 1.
System Security Scanning and Discovery Chapter 14.
Network Attacks Mark Shtern.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Week 3-1 Week 3 Scanning Determine if system is alive Determine which services are running or listening Determine the OS.
Computer Security and Penetration Testing
COEN 252: Computer Forensics Router Investigation.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Port Scanning.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
4/13/2010.  CSS Meeting  Stephen Crane on Programming Contests  1pm  Building 8 room /11/10.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Wireless Networks and the NetSentron By: Darren Critchley.
--Harish Reddy Vemula Distributed Denial of Service.
MIS Week 4 Site:
Port Scanning and Enumeration (NMAP)
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
Chapter 2 Scanning Last modified Determining If The System Is Alive.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Module 10: How Middleboxes Impact Performance
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Footprinting and Scanning
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Scanning.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network Devices and Firewalls Lesson 14. It applies to our class…
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Protection (tools).
Enumeration The First Step.
Click to edit Master subtitle style
Module 3: Enabling Access to Internet Resources
Footprinting and Scanning
CITA 352 Chapter 5 Port Scanning.
The Linux Operating System
Intro to Ethical Hacking
Network Commands 2 Linux Ubuntu A.S.
Unit 4: Transport protocols
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Chapter 2: Basic Switching Concepts and Configuration
Network Architecture Introductory material
TCP/IP Networking An Example
Footprinting and Scanning
Chapter 9 Objectives Understand TCP/IP Protocol.
Introduction to TCP/IP
Intro to Ethical Hacking
Review of Important Networking Concepts
6. Operating Systems Finger printing & Scanning
Intro to Ethical Hacking
RECONNAISSANCE & ENUMERATION
TCP/IP Networking An Example
TCP/IP Networking An Example
Lecture 2: Overview of TCP/IP protocol
Networking Essentials For Firewall-1 Administrators
Host and Small Network Relaying Howard C. Berkowitz
EVAPI - Enumeration Auburn Hacking club
Presentation transcript:

Introduction to Network Scanning By: Ace Xor

Summary Scanning Methodologies Tools for Scanning Arpscan / netdiscover Nbtscan Netcat Etherape nmap Zmap Masking your scans Tor/Proxychains Firewall detection/evasion Advanced nmap scripts

Scanning Methodologies Understand the target network Local scans / Internet scans Protocol scanning / Application scanning Consider Scope Noisy / Quiet scanning Breaking up scans for efficiency Passive recon DNS / Whois / ASN info Passive listen with tcpdump or etherape Active recon Http / telnet | ssh / rdp / WiFi Arpscans / netbios scans

Tools: arpscan / netdiscover Scan Category: ARP arpscan usage- Arp-scan --interface=eth0 --localnet This will find mac to IP address of each host in the same subnet as the interface Netdiscover usage- https://acexor.com/tools/netdiscover-usage/ Netdiscover will show MAC address to IP and Hostname information

Tool: nbtscan Scan Category: NetBios Nbtscan usage- https://acexor.com/tools/nbtscan-usage/ Nbtscan will resolve IP to hostname You can limit bandwidth so you aren't as chatty on the network Also support CIDR and IP ranges or list scanning

Tool: Netcat Scan Category: TCP/UDP Netcat usage: https://acexor.com/tools/netcat/ Netcat is considered the TCP/IP swiss army knife for a reason It can connect to a port and read write in that protocol It can operate in scan mode to do a port scan sweep It can act as a backdoor and send a shell over a TCP connection It can act as a chat client even =) It can also send files over the network

Tool: Etherape Scan Category: Passive Listener Etherape usage- Etherape has an interactive GUI which is where the options for the tool are set; such as capture protocol and interface Etherape is best used from a good ‘vantage’ point as it passively listens to traffic going across the network (broadcast) If etherape is run on a network tap/ router machine it will see all traffic to the network.. Also see arp poison attacks for better results

Tool: Nmap Scan Category: Full Network Stack Nmap usage - https://acexor.com/tools/nmap-usage/ Nmap is a very powerful tool for scanning all the things Fits most scanning methodologies from quicker surface scans all the way to deep slow scans taking weeks Has Service and Operating system fingerprints for most machines and services that exist Also has a powerful scripting engine which can do vulnerability scanning and much more

Tool: Zmap Scan Category: Internet Wide Scan/ Fast Scanner Zmap usage- zmap -B 10M -p 80 -n 10000 -o results.csv Based on which type of scan being performed zmap can scan the internet in under a day It has options for blacklisting for the inevitable abuse complaints you will receive It has options for sending specific probes to detect certain vulnerabilities or versions of services check out the --list-probe-modules option or you can craft your own

Masking Scans Proxies SOCKS 4/5 and HTTP proxies TOR The onion router – routes through a decentralized distributed network of nodes and comes out of an exit node Proxychains Allows programs that are not proxy aware to use one or multiple proxies Always remember the saying: VPN before TOR feds at your door :-)

Firewall Detection / Evasion Nmap has options for dealing with firewalls and troubleshooting scans and connections Nmap will allow you to spoof IP’s left in logs Use different protocols when dealing with firewalls such as ICMP/UDP/TCP By sending the wrong state of a TCP packet you might see the firewall act differently Using the -Pn or -P0 option will disable the ICMP probe and assume the host is up

NSE – nmap scripting engine Nmap has an advanced feature which allows LUA scripts to be launched once a service/ port is scanned These scripts have the .nse file extension These scripts range from deeper web scans and vulnerability detections to using max-mind for geo-IP location information Scripts also have categories which can be run in bulk for an more comprehensive scan

The End