03: Scanning Networks Flashcards
What information should you obtain from network and port scanning?
- Open ports
- Open services
- OSes
- Configuration laps
What is network scanning?
The process of gathering additional detailed information about the target by using highly complex and agressive reconnaissance techniques.
What are the objective of network scans?
- Check live systems and open ports
- Identify services running in live systems
- Perform banner grabbing/OS fingerprinting
- Identify network vulnerabilities
Types of scanning?
- Port scanning: lists open ports and services
- Network scanning: lists the active hosts and IP addresses
- Vulnerability scanning: shows the presence of known weaknesses
Nmap commands (flags)
-sn: disable port scan
-PR: ARP ping scan
-PU: UDP ping scan
-PE: ICMP ECHO ping scan
—–Ikke så vigtige ——
-PP: ICMP timestamp ping scan
-PM: ICMP address Mask Ping Scan
-PS: TCP SYN ping scan
-PA: TCP ACK ping scan
-PO: IP protocol ping scan
What types of protocols are there
- ICMP
- UDP
- TCP
Describe ICMP protocol
Internet Control Message Protocol
…
Describe UDP protocol
User Datagram Protocol
- Provides a connectionless datagram service that prioritizes time over reliability.
…
Describe TCP protocol
Transmission Control Protocol (TCP/IP)
- TCP is connection-oriented and is used for reliable data stream.
- TCP vulnerabilities: DNS, connection hijacking, TCP veto and reset attack
…
What are the TCP Communication Flags
- URG: data should be processed immidiately
- FIN: no further transmissions
- RST: reset a connection
- PSH: push (send all buffered data
- ACK: acknowledge a packet
- SYN: initiates a connection
Network administrators can use Nmap for?
- Inventorying a network
- Managing service upgrade schedules
- Monitoring host or service uptime
Attackers can use Nmap to extract information about?
- live hosts on the network
- open ports
- services (application name and version)
- types of packet filters/firewalls
- operating systems and versions
Tools for networkscanning
- Nmap
- Hping3
- Wireshark
Host discovery techniques:
- ARP Ping Scan
- UDP Ping Scan
- ICMP Ping Scan (ECHO, Timestamp, Address Mask)
- TCP Ping Scan (SYN, ACK)
- IP Protocol Ping Scan
What does a ARP Ping Scan look for
Command: nmap -sn -PR <Target>
Request: ARP request probe
Response: ARP response -> host is active; No response -> host is inactive
Advantages: more efficient and accurate and therefore useful for system discovery, where one may need to scan large address spaces.</Target>