Module 18 (More Network Discovery)

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

COEN 252 Computer Forensics Using TCPDump / Windump for package analysis.
TCP/IP Fundamentals A quick and easy way to understand TCP/IP v4.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
Network Mapping  Identify Live Hosts  Determine running Services TCP Port Scanning UDP Port Scanning Banner Grabbing ARP Discovery  Identify Perimeter.
Nmap Experiment.
NMAP Scanning Options. EC-Council NMAP  Nmap is the most popular scanning tool used on the Internet.  Cretead by Fyodar ( it.
Network Security of Labnet ******. Introduction Test the network security of the servers on our Labnet domain Find Potential Weaknesses Find Security.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Xmas Tree Scan Detection with Snort Presented by: Aqila Dissanayake University of Windsor Olalekan Kadri University of Windsor
IP Network Scanning.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Scanning Determining if the system is alive IP Scanning Port Scanning War Dialing.
TCP segment structure source port # dest port # 32 bits application data (variable length) sequence number acknowledgement number rcvr window size ptr.
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 2 Scanning 1.
Port Scanning CT1406 lab#5.
Scanning slides (c) 2012 by Richard Newman based on Hacking Exposed 7 by McClure, Scambray, and Kurtz.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
1 Anti-Hacker Tool Kit Port Scanners Chapter 6. 2 Introduction The first step in the process of hacking –Discover the services –Version label –Operation.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Port Scanners.
Lecture 23: Network Primer 7/15/2003 CSCE 590 Summer 2003.
Port Scanning Yiqian Zhang CS 265 Project. What is Port Scanning? port scanning is equivalent to knocking on the walls to find all the doors and windows.
Computer Security and Penetration Testing
Port Scanning.
Ana Chanaba Robert Huylo
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
EECS 354 Network Security Metasploit Features. Hacking on the Internet Vulnerabilities are always being discovered 0day vulnerabilities Every server or.
Port Scanning 0x470~0x480 Presenter SangDuk Seo 1.
1 CSCD434 Lecture 8 Spring 2014 Scanning Activities Network Mapping and Scanning.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Port Scanners.
 network appliances to filter network traffic  filter on header (largely based on layers 3-5) Internet Intranet.
Chapter 2 Scanning Last modified Determining If The System Is Alive.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
1 CSCD434 Lecture 7 Spring 2012 Scanning Activities Network Mapping and Scanning.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
DoS/DDoS attack and defense
Hands-On Ethical Hacking and Network Defense
Scanning.
Network and Port Scanning Chien-Chung Shen
COMP265 --Pentesting Tools nmap. Tons of Tools Top 125 Network Security Tools – “I also point newbies to this.
Protection (tools).
Hands-On Ethical Hacking and Network Defense
Networks Fall 2009.
Penetration Testing Scanning
Port Scanning James Tate II
FIREWALL configuration in linux
CITA 352 Chapter 5 Port Scanning.
Intro to Ethical Hacking
Port Scanning (based on nmap tool)
© 2003, Cisco Systems, Inc. All rights reserved.
8 Network Layer Part V Computer Networks Tutun Juhana
CIT 480: Securing Computer Systems
Introduction to Networking
Information Gathering
Overview of Networking & Operating System Security
Internet Control Message Protocol (ICMP)
Intro to Ethical Hacking
TCP/IP Networking An Example
Acknowledgement Content from the book:
CSC Advanced Unix Programming, Fall 2015
TCP XMAS.
EVAPI - Enumeration Auburn Hacking club
Transport Layer 9/22/2019.
Presentation transcript:

Module 18 (More Network Discovery) At the end of this module, you should know a little bit more about nmap scanning. You should know one way to identify machines that don't respond to ping request, and you should know how nmap classifies ports that it interrogates. Module 18

Do Ping Scans Always Work? If hosts don't respond to ping, we must find an alternate way of finding them. By default, nmap will perform host discovery. In addition to ICMP ECHO REQUEST, nmap sends ICMP TIMESTAMP, TCP SYN to port 443 and TCP ACK to port 80. To disable host discovery and still do a default network scan, we provide the -Pn parameter to nmap: nmap -Pn 172.16.28.0/24 Module 18

Demonstrate This Scan In my virtual network, I am running kali and another host as well. The other host will show up because of services it is running. Module 18

Some Scan Types Different types of scans might be used to identify ports on devices that are offering services: TCP connect scan (SYN, SYN/ACK, ACK) available in nmap if you are not root TCP SYN scan (half-open scanning, stealthy) SYN/ACK response from listening host RST/ACK from non-listening port TCP FIN scan (Unix hosts send RST for closed ports) TCP Xmas Tree (FIN, URG, PUSH – should get back RST for closed ports) TCP Null scan (should send RST for all closed ports) TCP ACK scan (some firewall rules only allow established connections, i.e, those with ACK set) UDP scan (port unreachable response = closed) Module 18

Identifying Services With nmap By default, nmap scans the 1,000 most popular service ports. It identifies ports as being in one of six different states: Open Closed Filtered Unfiltered Open|Filtered Closed|Filtered Module 18

Port Classifications Open Actively accepting TCP connections, UDP datagrams, or SCTP associations Closed Accessible, but no application is listening on it. May come alive later. Filtered nmap cannot determine whether open or closed. Unfiltered ACK scan shows that packets can get through firewall, but no other response is identified. Module 18