Week 3-1 Week 3 Scanning Determine if system is alive Determine which services are running or listening Determine the OS.

Slides:



Advertisements
Similar presentations
Overview The TCP/IP Stack. The Link Layer (L2). The Network Layer (L3). The Transport Layer (L4). Port scanning & OS/App detection techniques. Evasion.
Advertisements

Gathering Network & Host Information: Scanning & Enumeration.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Network Mapping  Identify Live Hosts  Determine running Services TCP Port Scanning UDP Port Scanning Banner Grabbing ARP Discovery  Identify Perimeter.
Nmap Experiment.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Scanning CS-480b Dick Steflik. What Can We Scan For Modems (and other telephone devices) Live Hosts TCP ports UDP ports Promiscuous NICs.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Scanning Determining if the system is alive IP Scanning Port Scanning War Dialing.
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 2 Scanning 1.
System Security Scanning and Discovery Chapter 14.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
Computer Security and Penetration Testing
Deff Arnaldy
Network Security With nmap By *** *****. Installing nmap netlab-2# cd /usr/ports/security/nmap netlab-2# make install all.
Networking in a Linux Environment Pete Eby Dan Thomas Robert Zurawski.
Port Scanning.
Ana Chanaba Robert Huylo
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
 Find out initial information ◦ Open Source ◦ Whois ◦ Nslookup  Find out address range of the network ◦ ARIN (American registry for internet numbers)
Information Gathering Lesson 4. Steps for Gathering Information Find out initial information Open Source Whois Nslookup Find out address range of the.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
CIS 450 – Network Security Chapter 3 – Information Gathering.
COEN 350 Security Threats. Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
MIS Week 4 Site:
Port Scanning and Enumeration (NMAP)
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Port Scanners.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Chapter 2 Scanning Last modified Determining If The System Is Alive.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
COEN 250 Security Threats. Network Based Exploits Phases of an Attack Reconnaissance Scanning Gaining Access Expanding Access Covering Tracks.
TCOM Information Assurance Management System Hacking.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Footprinting and Scanning
Hands-On Ethical Hacking and Network Defense
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Defending against Hitlist Worms using NASR Khanh Nguyen.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Scanning.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network and Port Scanning Chien-Chung Shen
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Hands-On Ethical Hacking and Network Defense
Jen Beveridge and Joe Kolenda
Port Scanning James Tate II
Introduction to Network Scanning
Footprinting and Scanning
CITA 352 Chapter 5 Port Scanning.
Foot Printing / Scanning Tools Lect 4 – NETW 4006
Footprinting (definition 1)
CIT 480: Securing Computer Systems
Footprinting and Scanning
Presentation transcript:

Week 3-1 Week 3 Scanning Determine if system is alive Determine which services are running or listening Determine the OS

Week 3-2 Week 3: Scanning Determining if the system is alive? –Once you have the target host or network IP range next step is find out if the system is up.

Week 3-3 Week 3: Scanning Detecting the type of OS involves –Active stack fingerprinting Send pkt to target and check response. Type of response will tell help guess OS. –Passive stack fingerprinting Monitor ntwk traffic to determine OS

Week 3-4 Week 3: Scanning –Hacking Tool: Pinger –Hacking Tool: WS_Ping_Pro – Hacking Tool: Netscan Tools Pro 2000 – Hacking Tool: Hping2 – Hacking Tool: icmpenum

Week 3-5 Week 3: Scanning –Detecting Ping sweeps – ICMP Queries

Week 3-6 Week 3: Scanning –Hacking Tool: netcraft.com – Port Scanning

Week 3-7 Week 3: Scanning –TCPs 3-way handshake – TCP Scan types

Week 3-8 Week 3: Scanning –Hacking Tool: IPEye – Hacking Tool: IPSECSCAN – Hacking Tool: nmap

Week 3-9 Week 3: Scanning –Port Scan countermeasures – Hacking Tool: HTTrack Web Copier

Week 3-10 Week 3: Scanning Network Management Tools SolarWinds Toolset

Week 3-11 Week 3: Scanning NeoWatch War Dialing

Week 3-12 Week 3: Scanning Hacking Tool: THC-Scan Hacking Tool: PhoneSweep War Dialer Hacking Tool: Queso Hacking Tool: Cheops

Week 3-13 Week 3: Scanning Proxy Servers Hacking Tool: SocksChain Surf the web anonymously TCP/IP through HTTP Tunneling

Week 3-14 Week 3: Scanning Hacking Tool: HTTPort

Week 3-15 Week 3: Scanning –Summary

Week 3-16 Some Uses of Port Scanning Network Inventory –Want to know IP addresses of all your servers? –Want to how many machines are running? Ntwk/Svr Optimization –Can find which svcs are running on each server and delete which services you don’t need to improve security and performance Finding Spyware, Trojans, and Worms –Eg. Many well known trojans use large port #s. For Back Orifice uses Looking for unauthorized and Illicit services