Download presentation
Presentation is loading. Please wait.
Published byHugh Kimbel Modified over 9 years ago
1
Scanning Determining if the system is alive IP Scanning Port Scanning War Dialing
2
PING Sweeps PING is used to send ICMP Echo type 8 packets to determined if a Type 0 reply is received indicating the system is alive. Type 0 Echo Reply Type 3 Destination unreachable Type 4 Source Quench Type 8 Echo Type 11 Time exceeded Type 13 Timestamp Reply Type 15 Info Request Type 16 Info Reply
3
FPING Fping for unix systems, can read the contents of a file listing a range of IP addresses Fping –a –f in.txt
4
NMAP NMAP –Sp 192.168.1.0/24 www.insecure.org/nmap
5
Superscan for Windows www.foundstone.com
6
Port Scanning Determining what services are running or listening by connecting to TCP and UDP ports
7
Scan Types TCP Connect (full three way hand shake SYN, SYN/ACK, ACK) TCP SYN (half open scan SYN/ACK listening state, RST/ACK not listening) TCP FIN (UNIX, if closed a RST is replied) TCP xmas tree FIN, URG and PUSH if closed a RST is replied) TCP Null (if closed a RST is replied) TCP Ack (Firewall rule sets, stateful firewalls) TCP Windows (detects open and filter ports) TCP RPC (Unix, detect RPC ports) UDP (connectionless, used to receive an ICMP unreachable message for closed ports) SYN SYN/ACK ACK Server Client
8
Netcat Nc –v –x –w2 192.168.1.1 1-140
9
Nmap Unix based Nmap –Ss 192.168.1.1
10
Port Scanners Unix Strobe Tcp_scan Nmap Netcat Windows Netcat Superscan Winscan ipEye WUPS ScanLine
11
Banner Grabbing Banner Grabbing is the act of connecting to a network available service or application Ports 135, 139, 445: generally denotes a Windows system Ports 512-514: Unix ‘r’ commands
12
Banner Grabbing Nmap –O 192.168.1.10 port state Protocol Service 21Opentcpftp We could also use packet filtering to grab information!
13
Banner Grabbing Automated discovery tools give graphical displays of networks such as Tkined, cheops and Scotty
14
War Dialing Used to dial Telephone numbers searching for remote access/modem connections
15
Countermeasures Detect a potential attack early Use an IDS such as www.snort.org or Genius at www.indiesoft.comwww.snort.orgwww.indiesoft.com Filter ICMP traffic through Firewall Use ACLs
16
Exercise Download an IP scanner, port scanner and network IDS in groups of three perform scans, banner grabbing and NID
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.