TCP XMAS.

Slides:



Advertisements
Similar presentations
TCP/IP Christopher Zacky. lolwut Decimal Numbers.
Advertisements

COEN 252 Computer Forensics Using TCPDump / Windump for package analysis.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Nmap Experiment.
NMAP Scanning Options. EC-Council NMAP  Nmap is the most popular scanning tool used on the Internet.  Cretead by Fyodar ( it.
Packets and Protocols Chapter Seven Real World Packet Captures.
1 Reading Log Files. 2 Segment Format
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Xmas Tree Scan Detection with Snort Presented by: Aqila Dissanayake University of Windsor Olalekan Kadri University of Windsor
IP Network Scanning.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
TRANSPORT LAYER  Session multiplexing  Segmentation  Flow control (TCP)  Connection-oriented (TCP)  Reliability (TCP)
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 2 Scanning 1.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
System Security Scanning and Discovery Chapter 14.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Port Scanning Yiqian Zhang CS 265 Project. What is Port Scanning? port scanning is equivalent to knocking on the walls to find all the doors and windows.
Transmission Control Protocol (TCP) and Packet-Switching Hardware Devang Parekh EE290F 4/15/04.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Beyond Security Ltd. Port Knocking Beyond Security Noam Rathaus CTO Sunday, July 11, 2004 Presentation on.
Port Scanning.
A Brief Taxonomy of Firewalls
Ana Chanaba Robert Huylo
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
COMT 429 The Internet Protocols COMT 429. History 1969First version of a 4 node store and forward network, the ARPAnet 1972Formal demonstration of ARPAnet.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
Circuit & Packet Switching. ► Two ways of achieving the same goal. ► The transfer of data across networks. ► Both methods have advantages and disadvantages.
Port Scanning and Enumeration (NMAP)
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
Retina Network Security Scanner
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Hands-On Ethical Hacking and Network Defense
© 2002, Cisco Systems, Inc. All rights reserved..
Chien-Chung Shen Cyber Scanning Chien-Chung Shen
Planning the Addressing Structure
Protection (tools).
IP: Addressing, ARP, Routing
Introduction To TCP/IP Networking Mr. Zeeshan Ali, Asst. Professor
Port Scanning James Tate II
Introduction to TCP/IP networking
Port Connection Status
CITA 352 Chapter 5 Port Scanning.
Hping2.
Chapter 17 and 18: TCP is connection oriented
Port Scanning (based on nmap tool)
Lec 2: Protocols.
© 2003, Cisco Systems, Inc. All rights reserved.
CIT 480: Securing Computer Systems
Module 18 (More Network Discovery)
Overview of Networking & Operating System Security
TASK 4 Guideline.
Real GPEN GIAC Information Security Study Guide Killtest
Syara Hamdani Sandi Reza Fitroh
DINA YOGA RIAN HASBI YANA
Planning the Addressing Structure
Networks and the Internet
IIT Indore © Neminath Hubballi
Protocols 2 Key Revision Points.
Applications Layer Functionality & Protocols
Do not use a calculator for the following!!.
EVAPI - Enumeration Auburn Hacking club
TCP Connection Management
Presentation transcript:

TCP XMAS

STEALTH Stealth tcp port scanning, involves sending one or more data packets to a target TCP port to avoid the 3-way TCP handshake with the objective of evading firewall/IDS detection.

XMAS XMAS scans send a packet with the FIN, URG, and PSH flags set XMAS scans work only on target systems that follow the RFC 793 implementation of TCP/IP and don’t work against any version of Windows.

XMAS If the port is open, there is no response; but if the port is closed, the target responds with a RST/ACK packet.

ADVANTAGES Since no TCP sessions are created for any of these scans, they are remarkably quiet from the perspective of the remote device's applications. Therefore, none of these scans should appear in any of the application logs.

DISADVANTAGES On a Windows-based computer, all ports will appear to be closed regardless of their actual state. These scan types are using packets that don’t follow the rules of TCP

When to use XMAS They don't show up in application log files, they take little network bandwidth, and they provide extensive port information on non-Windows based systems.

3. What were the IP addresses of the targets Mr. X discovered? Answer : 10.42.42.25 10.42.42.50 10.42.42.56

4. What was the MAC address of the Apple system he found? Answer : TTL으로 어느 프로콜에를 확인 할 수 있다 10.42.42.25 10.42.42.56

5. What was the IP address of the Windows system he found? Answer : packet time to live for OS 10.42.42.50

6. What TCP ports were open on the Windows system 6. What TCP ports were open on the Windows system? (Please list the decimal numbers from lowest to highest.) 열린 Tcp port들을 알아내기 위한 필터는? 그리고 윈도우즈 시스템이라는 걸 나타내는 필터는? Answer : 135 & 136