Presentation is loading. Please wait.

Presentation is loading. Please wait.

Scanning CS-480b Dick Steflik. What Can We Scan For Modems (and other telephone devices) Live Hosts TCP ports UDP ports Promiscuous NICs.

Similar presentations

Presentation on theme: "Scanning CS-480b Dick Steflik. What Can We Scan For Modems (and other telephone devices) Live Hosts TCP ports UDP ports Promiscuous NICs."— Presentation transcript:

1 Scanning CS-480b Dick Steflik

2 What Can We Scan For Modems (and other telephone devices) Live Hosts TCP ports UDP ports Promiscuous NICs

3 Modems Repeatedly dial phone numbers looking for a modem to answer or other things War Dialers – used to find modems ToneLoc – 1994 by Minor Threat & Mucho Maas –THC-Scan 2.0 – VanHouser, releaces by Hackers Choice Win9x, NT, W2000 100 lines/hour TBA – LOpht ( –War dialing on a PALM Demon Dialers – once a modem is found repeatedly dial it and guess passwords Other things Free phone calls – if the phone answers and gives a dial tone you have dialed into a number the will let you dial another number, some companies do this so that roaming employees can dial into the company or into a company owned 800 number

4 Live Hosts Try pinging (ICMP Echo request) all hosts on a particular subnet to see who replies No reply indicates host is not live Incoming ICMP messages are blocked It’s a good idea to block incoming ICMP messages at the firewall If no reply a hacker would try connecting to a commonly open port (TCP port 80) or sending a UDP packet to a commonly open port. In java (which doesn’t do ICMP) send a ping using JNI to execute the ping command as an OS command line command.

5 Mapping your network Once the live hosts are known, a map of your network can be arrived at by determining how the hosts are connected together traceroute (unix/linux) / tracert (w2000) Microsoft(R) Windows NT(TM) (C) Copyright 1985-1996 Microsoft Corp. C:\users>tracert Tracing route to [] over a maximum of 30 hops: 1 <10 ms <10 ms <10 ms 2 <10 ms <10 ms <10 ms 3 <10 ms <10 ms <10 ms [] Trace complete.

6 Mapping (more) By doing repetitive traceroutes to the hosts discovered in the host scan the network topology can be discovered. Another way to do this is by using a mapping program like Cheops (> runs on Linux and automates the process of inventorying a network does operating system identification by using TCP Stack Fingerprinting

7 Port Scanning Once and attacker knows the topology of your network the tedious task of identifying open ports and services TCP and UDP scans are fine if you are scanning your own network looking for vulnerabilities but are to easily detectable for a hacker Nmap ( most versions of Unix ported to W/NT by eEye ( does many types of scans

8 Port Scanning (more) TCP Connect - completes 3-way handshake TCP SYN - sends only initial SYN and waits for SYN-ACK TCP FIN - send TCP FIN to each port, reset indicates port is closed; violates the protocol TCP Xmas Tree - Sends packet with FIN, URG, PUSH set; reset indicates port is closed, no resp. may mean port is open. This actually violates the protocol; doesn’t work on Windows machine as MS didn’t follow the RFC NULL - send packet with no code bits set, reset indicates port closed; TCP ACK - Send a packet with ACK bit set, helps determine a packet filter’s rules Window - similar to ACK scan but focuses on TCP window size to determine if ports are open or closed

9 Port Scanning (more) FTP Bounce - Bounces a TCP scan off of an FTP server to obscure the originator of the scan RPC Scanning - Scans for Remote Procedure Call (RPC) services on the target machine, send an RPC null command to determine if an RPC program is listening

10 Windows Specific Services NetBIOS (TCP Ports 137, 138, 139) – used for Windows networking to connect clients to file and print servers. Should never be allowed through the Firewall except through an encrypted tunnel (as in a VPN) RPC Locator (TCP Port 135) – used by Windows networking to locate network services that use the RPC protocol. Should never be allowed through the Firewall. Terminal Services (TCP Port 3389) – gives the connecting complete control over the host machine. Should never be allowed through the Firewall except through an encrypted tunnel (as in a VPN)

11 Standard UNIX Services Chargen (TCP and/or UDP port 19) Daytime (TCP and/or UDP Port 13) Discard (TCP and/or UDP Port 9) Echo (TCP and/or UDP Port 7) Finger (TCP Port 79) NFS (TCP and/or UDP Port 2049) Quote (UDP Port 17) RPC (UDP Port 111) RSH (TCP Port 514) SSH (TCP Port 22)

12 Platform Neutral Services Telnet (TCP Port 23) TFTP (UDP Port 69) Bootp (UDP Port 67) DHCP (UDP Port 68) LDAP (TCP and/or UDP Port 389) SNMP (UDP Port 161) VNC (TCP Ports 5800+, 5900+) HTTP (TCP Port 80) HTTPS (TCP Port 443)

13 UDP Scans Because UDP is a much simpler protocol than TCP is it is inherently less reliable for scanning A UDP packet is sent to each UDP port If an ICMP “Port Unreachable” message is received then interpret the port as being closed Otherwise assume the port is open False positives are very common

14 TCP Stack Fingerprinting The TCP RFC defines how TCP should respond under normal conditions (no protocol violations) but not how to act in response to protocol violation If you spend the time attempting a number of protocol violation and record the responses they will always be the same for specific operating systems/versions These responses can be treated as fingerprints and allow a hacker to determine what OS is being addressed. Nmap maintains a rather complete database of known operating system fingerprints and can pretty reliably identify most major operating systems

15 Defenses Against Port Scanning Harden your systems Make sure all OS patches are installed Close all ports not needed Delete all programs associated with closed ports If you are comfortable managing your server via a command line interface remember to disable the GUI interface Don’t forget to delete the X Windows software Remove all unneeded software from your server A production web server shouldn’t need software development software, so remove all of the compilers Scan your systems before the hackers do, find your vulnerabilities before they do.

16 Defenses (more) Use stateful packet filtering so that not only the current packet is taken into consideration Intruders can scan right past a standard packet filter Use a proxy based firewall Gives application layer protection Requires complete connections SYN Scans and ACK Scans can’t get through

17 Determining Firewall Rules Firewalk Allows you to determine what packets are allowed through a firewall Nmap allows you to check what is happening at the end-point machines, Firewalk allows you to send packets through a packet filtering device to determine what it is set up to pass Similar to traceroute, works off of the TTL field in the IP header

18 Review List of Live Hosts – Ping and Cheops Network Topology – traceroute and Cheops List of Open Ports – Nmap Operating Systems on Live Hosts – Nmap Ports Open Through Packet Filters - Firewalk

19 Vulnerability Scanning Connect to a host and automatically detect if a vulnerability exists Common configuration errors Default configuration weaknesses Well known system vulnerabilities

20 Vulnerability Scanning Tools Vulnerability Database User Configuration Tool Scanning Engine Knowledge base of current active scan Results repository and Report Generator Vulnerability Database User Configuration Tool Scanning Engine Knowledge Base of Active Scan Results Repository And Reports Target

21 Bunch of Vulnerability Scanners Free SARA – SAINT – VLAD – Nessus – Commercial CyberCop Scanner – ISS Internet Scanner – eEye Retina Scanner – Qualys’ QualysGuard – subscription based – Vigilante SecureScan – subscription based –

22 Wi-Fi Wardriving Name comes from movie War Games Similar in concept to Wardialing Also Warwalking and Warbiking Drive around and discover wireless hot spots Publish where located (GPS coordinates) : Legality US : Not clearly defined –New Hampshire – working on bill to clarify responsibility to secure wireless networks UK : "use of a computer for a purpose for which one does not have permission" is against the law Tools Netstumbler –Windows active mode tool that polls looking for wi-fi networks Kismet –Most platforms – passive mode tool; does network detection, packet sniffing and IDS

Download ppt "Scanning CS-480b Dick Steflik. What Can We Scan For Modems (and other telephone devices) Live Hosts TCP ports UDP ports Promiscuous NICs."

Similar presentations

Ads by Google