Download presentation
Presentation is loading. Please wait.
Published byGonzalo Bowns Modified over 9 years ago
1
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning
2
Hands-On Ethical Hacking and Network Defense2 Objectives Describe port scanning Describe different types of port scans Describe various port-scanning tools Explain what ping sweeps are used for Explain how shell scripting is used to automate security tasks
3
Hands-On Ethical Hacking and Network Defense3 Introduction to Port Scanning Port Scanning Finds out which services are offered by a host Identifies vulnerabilities Open services can be used on attacks Identify a vulnerable port Launch an exploit Scan all ports when testing Not just well-known ports
4
Hands-On Ethical Hacking and Network Defense4
5
5 Introduction to Port Scanning (continued) Port scanning programs report Open ports Closed ports Filtered ports Best-guess assessment of which OS is running
6
Hands-On Ethical Hacking and Network Defense6 Types of Port Scans SYN scan Stealthy scan Connect scan Completes the three-way handshake NULL scan Packet flags are turned off XMAS scan FIN, PSH and URG flags are set
7
Hands-On Ethical Hacking and Network Defense7 Types of Port Scans (continued) ACK scan Used to past a firewall FIN scan Closed port responds with an RST packet UDP scan Closed port responds with ICMP “Port Unreachable” message
8
Hands-On Ethical Hacking and Network Defense8 Using Port-Scanning Tools Nmap Unicornscan NetScanTools Pro 2004 Nessus
9
Hands-On Ethical Hacking and Network Defense9 Nmap Originally written for Phrack magazine One of the most popular tools GUI version Xnmap Open source tool Standard tool for security professionals
10
Hands-On Ethical Hacking and Network Defense10
11
Hands-On Ethical Hacking and Network Defense11 Unicornscan Developed in 2004 Ideal for large networks Scans 65,535 ports in three to seven seconds Handles port scanning using TCP ICMP IP Optimizes UDP scanning
12
Hands-On Ethical Hacking and Network Defense12 NetScanTools Pro 2004 Robust easy-to-use commercial tool Supported OSs *NIX Windows Types of tests Database vulnerabilities E-mail account vulnerabilities DHCP server discovery IP packets and name servers OS fingerprinting
13
Hands-On Ethical Hacking and Network Defense13
14
Hands-On Ethical Hacking and Network Defense14
15
Hands-On Ethical Hacking and Network Defense15 Nessus First released in 1998 Open source tool Uses a client/server technology Conducts testing from different locations Can use different OSs for client and network
16
Hands-On Ethical Hacking and Network Defense16 Nessus (continued) Server Any *NIX platform Client Can be UNIX or Windows Functions much like a database server Ability to update security checks plug-ins Scripts Some plug-ins are considered dangerous
17
Hands-On Ethical Hacking and Network Defense17
18
Hands-On Ethical Hacking and Network Defense18 Nessus (continued) Finds services running on ports Finds vulnerabilities associated with identified services
19
Hands-On Ethical Hacking and Network Defense19
20
Hands-On Ethical Hacking and Network Defense20 Conducting Ping Sweeps Ping sweeps Identify which IP addresses belong to active hosts Ping a range of IP addresses Problems Computers that are shut down cannot respond Networks may be configured to block ICMP Echo Requests Firewalls may filter out ICMP traffic
21
Hands-On Ethical Hacking and Network Defense21 FPing Ping multiple IP addresses simultaneously www.fping.com/download Command-line tool Input: multiple IP addresses Entered at a shell -g option Input file with addresses -f option
22
Hands-On Ethical Hacking and Network Defense22
23
Hands-On Ethical Hacking and Network Defense23
24
Hands-On Ethical Hacking and Network Defense24 Hping Used to bypass filtering devices Allows users to fragment and manipulate IP packets www.hping.org/download Powerful tool All security testers must be familiar with tool Supports many parameters (command options)
25
Hands-On Ethical Hacking and Network Defense25
26
Hands-On Ethical Hacking and Network Defense26
27
Hands-On Ethical Hacking and Network Defense27
28
Hands-On Ethical Hacking and Network Defense28 Crafting IP Packets Packet components Source IP address Destination IP address Flags Crafting packets helps you obtain more information about a service Tools Fping Hping
29
Hands-On Ethical Hacking and Network Defense29 Understanding Shell Scripting Modify tools to better suit your needs Script Computer program that automates tasks Time-saving solution
30
Hands-On Ethical Hacking and Network Defense30 Scripting Basics Similar to DOS batch programming Script or batch file Text file Contains multiple commands Repetitive commands are good candidate for scripting Practice is the key
31
Hands-On Ethical Hacking and Network Defense31
32
Hands-On Ethical Hacking and Network Defense32
33
Hands-On Ethical Hacking and Network Defense33 Summary Port scanning Also referred as service scanning Process of scanning a range of IP address Determines what services are running Port scan types SYN ACK FIN UDP Others: Connect, NULL, XMAS
34
Hands-On Ethical Hacking and Network Defense34 Summary (continued) Port scanning tools Nmap Nessus Unicornscan Ping sweeps Determine which computers are “alive” Shell scripting Helps with automating tasks
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.