Network Reconnaissance

Slides:



Advertisements
Similar presentations
Module II Footprinting
Advertisements

NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
SYSTEM ADMINISTRATION Chapter 19
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
System Security Scanning and Discovery Chapter 14.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Chapter 5 Phase 1: Reconnaissance. Reconnaissance  Finding as much information about the target as possible before launching the first attack packet.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
1 ICMP – Using Ping and Trace CCNA Semester
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Networking Basics: DNS IP addresses are usually paired with more human-friendly names: Domain Name System (DNS). internet.rutgers.edu HostnameOrganizationTop-level.
Port Scanning.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 9 Internet Control Message.
 Find out initial information ◦ Open Source ◦ Whois ◦ Nslookup  Find out address range of the network ◦ ARIN (American registry for internet numbers)
Information Gathering Lesson 4. Steps for Gathering Information Find out initial information Open Source Whois Nslookup Find out address range of the.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Institute of Technology Sligo - Dept of Computing Semester 2 Chapter 10 IP Addressing.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
CIS 450 – Network Security Chapter 3 – Information Gathering.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Communication Between Networks How the Internet Got Its Name.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 4 Internet Control Message Protocol (ICMP)
1 IP : Internet Protocol Computer Network System Sirak Kaewjamnong.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
ROAD TO EXPLOITATION Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
© Mike D. Schiffman. Synopsis  Introduction  Overview  Impetus  Internals  Implementation  Risk Mitigation  Futures.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Footprinting and Scanning
Semester 2v2 Chapter 8: IP Addressing. Describe how IP addressing is important in routing. IP addresses are specified in 32-bit dotted-decimal format.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Footprinting. Traditional Hacking The traditional way to hack into a system the steps include: Footprint: Get a big picture of what the network is Scan.
Scanning.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Network Devices and Firewalls Lesson 14. It applies to our class…
Footprinting and Scanning
Traceroute traceroute is a Unix utility designed by Van Jacobson in 1987 The Windows equivalent is called tracert The Linux equivalent is called tracepath.
Network Tools and Utilities
Footprinting (definition 1)
8 Network Layer Part V Computer Networks Tutun Juhana
ICMP – Using Ping and Trace
Footprinting and Scanning
ICMP – Using Ping and Trace
FootPrinting CS391.
ITL Simple Diagnostic Tools
Presentation transcript:

Network Reconnaissance

Military reconnaissance What is? Military reconnaissance a mission conducted to confirm or deny prior intelligence (if any) about enemy threat and or the terrain of a given area. Network reconnaissance process of acquiring information about a network

Why? Hackers use reconnaissance as the first step in an effective attack Seeing what is on the "other side of the hill" is crucial to decide what type of attack to launch Generally, goals of reconnaissance on a target network are to discover: IP addresses of hosts Accessible UDP and TCP ports OS type

Footprinting/Fingerprinting steps Information Gathering accumulating data regarding a specific network environment, usually for the purpose of finding ways to intrude into the environment Locate the network What addresses can be targeted and are available for additional scanning and analysis Identify active machines Which machine is actively connected to the network and reachable Open ports and underlying applications Which ports and applications are accessible OS Fingerprinting Identifying targeted Oss as well as systems response Network mapping Create blueprint of organization

Information Gathering Get data regarding network environment such as Organization web site, Location, contact person, Phone number Common Tools Registrar query : whois Domain name and resource lookup Search Tools

Locate the network range What range of IP addresses are available for scanning and further enumeration Common Tools : whois

Tool: WHOIS Search WhoIs – Query of Internet Registries Ref: http://www.arin.net/community/rirs.html AfriNIC – Africa APNIC - Asia/Pacific ARIN – North America LACNIC - Central and South America RIPE NCC – Europe, Middle East, Central Asia InterNIC– ICANN Public Domain Name Registration Info 3rd Party Whois Tools Geektools - http://www.geektools.com/whois.php DomainTools – http://www.domaintools.com/ DNSStuff – http://www.dnsstuff.com Explain each bullet in this slide.

Tool: WHOIS web interface

Google, Yahoo, Live.com, etc. Tool: - Google Google, Yahoo, Live.com, etc. Gather information about a targeted organization Evaluate web sites for known security issues Identify files that are accidentally exposed to the public Explain each bullet in this slide.

Helpful Google Queries Tool: - Google search Helpful Google Queries Related sites: related:www.someaddr.com Search a specific site: site:www.someaddr.com search_terms Use Google to search group or blog postings

Tool: – Google operators Google Advanced Operators AND: “+” OR: “|” Synonym: “~” site:www.jeffersonwells.com inurl:robots.txt link:www.jeffersonwells.com intitle:“jefferson wells” filetype:xls

Tool: NSLOOKUP Queries Domain Name Server information IP and Domain Name Mapping Zone Transfer – Dumps entire table Check mail server Explain each bullet in this slide.

Zone Transfer – Dumps entire table Tool: NSLOOKUP Zone Transfer – Dumps entire table $ nslookup > server = A.B.C.D > ls somedomain.com Explain each bullet in this slide.

Tool: NSLOOKUP MX record $ nslookup > set type = MX > somedomain.com Explain each bullet in this slide.

Network Identifier Tools Identifying active computers and services Common Tools ping, ping6 help verifying whether a host is active traceroute, traceroute6 determine the route to a node

Tool: ping ping [hostname|ip_address] ping6 [hostname|ip_address] ping -R [hostname|ip_address]

Tool: traceroute tracert Windows traceroute Unix

Tool: How Traceroute work Launch a probe packet towards DST, with a TTL of 1 Every router hop decrements the IP TTL of the packet by 1 When the TTL hits 0, packet is dropped, router sends ICMP TTL Exceed packet to SRC with the original probe packet as payload SRC receives this ICMP message, displays a traceroute “hop” Repeat from step 1, with TTL incremented by 1 each time, until.. DST host receives probe, returns ICMP Dest Unreachable

Tool: Traceroute Report Hop Traceroute packet with TTL of 1 enters router via the ingress interface. Router decrements TTL to 0, drops packet, generates ICMP TTL Exceed ICMP packet dst address is set to the original traceroute probe source (SRC) ICMP packet src address is set to the IP of the ingress router interface Traceroute shows a result based on the src address of the ICMP packet The above traceroute will read:172.16.2.1 10.3.2.2 You have NO visibility into the return path or the egress interface used

Tool: Traceroute Latency Calculation How is traceroute latency calculated? Timestamp when the probe packet is launched Timestamp when the ICMP response is received Calculate the difference to determine round-trip time Routers along the path donot do anytime “processing” They simply reflect the original packet’s data back to the SRC Many implementations encode the original launch timestamp into the probe packet, to increase accuracy and reduce state Most Importantly: only the ROUNDTRIP is measured Traceroute is showing you the hops on the forward path But showing you latency based on the forward PLUS reverse path. Any delays on the reverse path will affect your results!

Tool: Interprete Traceroute DNS Interpreting DNS is one of the most important aspects of correctly using traceroute Information you can uncover includes: Physical Router Locations Interface Types and Capacities Router Type and Roles Network Boundaries and Relationships

Tool: Traceroute Reading Tips Router’s name may include Exchange Point MAE, NAP, PAIX Router names may be the IATA 3-letter code of the nearest airport or CLLI code in their node name Other abbreviation http://www.sarangworld.com/TRACEROUTE/showdb-2.php3 Interface name

Tool: Common Location US Major Cities

Tool: Common Location Major Cities

Tool: Common Interface Naming

Tool: Router Type/Role Knowing the role of a router can be useful But every network is different, and uses different naming conventions May not always follow naming rules Generally speaking, May need guessing the context and get a basic understanding of the roles Core routers–CR, Core, GBR, BB Peering routers–BR, Border, Edge, IGR, Peer Customer routers–AR, Aggr, Cust, CAR, GW

Tool: DNS Interface type Most networks will try to put interface info into DNS Though this many not always be up to date Many large networks use automatically generated DNS As well as capacity, and maybe even the make/model of router Examples: xe-11-1-0.edge1.Washington1.Level2.net XE-#/#/# is Juniper 10GE port. The device has at least 12 slots It’s at least a 40G/slot router since it has a 10GE PIC in slot 1 It must be Juniper MX960, no other device could fit this profile

Tool: Sample Traceroute $ traceroute www.hellers.com $ traceroute www.mit.edu

Identifying Active Machines Attackers will want to know if machines are alive before they attempt to attack. One of the most basic methods of identifying active machines is to perform a sweep Common Tools ping, traceroute Network scanning tools nmap, superscan

Finding Open Ports Open services Common tools Port scanning tools nmap, superscan

OS Fingerprinting Passive fingerprint Active Fingerprint Sniffing technique Examine packets for certain characteristics such as The IP TTL value The TCP Window Size The IP DF Option The IP Type of Service (TOS) Option Active Fingerprint Injects the packets into the network Examines the subtle differences that exist between different vendor implementations of the TCP/IP stack Common tools : nmap

Mapping the Network Gained enough information to build network map Network mapping provides the hacker with a blueprint of the organization. May use manual or automated ways to compile this information

Summary Method Technique Common Tools Information gathering Passive Whois, nslookup Determining network range RIPE, LACNIC, APNIC, ARIN Identify active machines Active ping, hping, traceroute, nmap, SuperScan Finding open ports/applications nmap, Amap, SuperScan OS fingerprinting Active/passive nmap, Winfigerprint, P0f, Xprobe2, ettercap Mapping the network CartoReso, traceroute, NeoTrace

Q&A