1 / 16

Week 3 Scanning

Week 3 Scanning. Determine if system is alive Determine which services are running or listening Determine the OS. Week 3: Scanning. Determining if the system is alive? Once you have the target host or network IP range next step is find out if the system is up. Week 3: Scanning.

marlo
Download Presentation

Week 3 Scanning

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Week 3 Scanning • Determine if system is alive • Determine which services are running or listening • Determine the OS

  2. Week 3: Scanning • Determining if the system is alive? • Once you have the target host or network IP range next step is find out if the system is up.

  3. Week 3: Scanning Detecting the type of OS involves • Active stack fingerprinting • Send pkt to target and check response. Type of response will tell help guess OS. • Passive stack fingerprinting • Monitor ntwk traffic to determine OS

  4. Week 3: Scanning • Hacking Tool: Pinger • Hacking Tool: WS_Ping_Pro • Hacking Tool: Netscan Tools Pro 2000 • Hacking Tool: Hping2 • Hacking Tool: icmpenum

  5. Week 3: Scanning • Detecting Ping sweeps • ICMP Queries

  6. Week 3: Scanning • Hacking Tool: netcraft.com • Port Scanning

  7. Week 3: Scanning • TCPs 3-way handshake • TCP Scan types

  8. Week 3: Scanning • Hacking Tool: IPEye • Hacking Tool: IPSECSCAN • Hacking Tool: nmap

  9. Week 3: Scanning • Port Scan countermeasures • Hacking Tool: HTTrack Web Copier

  10. Week 3: Scanning • Network Management Tools • SolarWinds Toolset

  11. Week 3: Scanning • NeoWatch • War Dialing

  12. Week 3: Scanning • Hacking Tool: THC-Scan • Hacking Tool: PhoneSweep War Dialer • Hacking Tool: Queso • Hacking Tool: Cheops

  13. Week 3: Scanning • Proxy Servers • Hacking Tool: SocksChain • Surf the web anonymously • TCP/IP through HTTP Tunneling

  14. Week 3: Scanning • Hacking Tool: HTTPort

  15. Week 3: Scanning • Summary

  16. Some Uses of Port Scanning • Network Inventory • Want to know IP addresses of all your servers? • Want to how many machines are running? • Ntwk/Svr Optimization • Can find which svcs are running on each server and delete which services you don’t need to improve security and performance • Finding Spyware, Trojans, and Worms • Eg. Many well known trojans use large port #s. For Back Orifice uses 54321 • Looking for unauthorized and Illicit services

More Related