03: Scanning Networks Flashcards

1
Q

What information should you obtain from network and port scanning?

A
  • Open ports
  • Open services
  • OSes
  • Configuration laps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is network scanning?

A

The process of gathering additional detailed information about the target by using highly complex and agressive reconnaissance techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the objective of network scans?

A
  • Check live systems and open ports
  • Identify services running in live systems
  • Perform banner grabbing/OS fingerprinting
  • Identify network vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of scanning?

A
  • Port scanning: lists open ports and services
  • Network scanning: lists the active hosts and IP addresses
  • Vulnerability scanning: shows the presence of known weaknesses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nmap commands (flags)

A

-sn: disable port scan
-PR: ARP ping scan
-PU: UDP ping scan
-PE: ICMP ECHO ping scan
—–Ikke så vigtige ——
-PP: ICMP timestamp ping scan
-PM: ICMP address Mask Ping Scan
-PS: TCP SYN ping scan
-PA: TCP ACK ping scan
-PO: IP protocol ping scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of protocols are there

A
  • ICMP
  • UDP
  • TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe ICMP protocol

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe UDP protocol

A

User Datagram Protocol
- Provides a connectionless datagram service that prioritizes time over reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe TCP protocol

A

Transmission Control Protocol (TCP/IP)
- TCP is connection-oriented and is used for reliable data stream.
- TCP vulnerabilities: DNS, connection hijacking, TCP veto and reset attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the TCP Communication Flags

A
  • URG: data should be processed immidiately
  • FIN: no further transmissions
  • RST: reset a connection
  • PSH: push (send all buffered data
  • ACK: acknowledge a packet
  • SYN: initiates a connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network administrators can use Nmap for?

A
  • Inventorying a network
  • Managing service upgrade schedules
  • Monitoring host or service uptime
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attackers can use Nmap to extract information about?

A
  • live hosts on the network
  • open ports
  • services (application name and version)
  • types of packet filters/firewalls
  • operating systems and versions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tools for networkscanning

A
  • Nmap
  • Hping3
  • Wireshark
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Host discovery techniques:

A
  • ARP Ping Scan
  • UDP Ping Scan
  • ICMP Ping Scan (ECHO, Timestamp, Address Mask)
  • TCP Ping Scan (SYN, ACK)
  • IP Protocol Ping Scan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a ARP Ping Scan look for

A

Command: nmap -sn -PR <Target>
Request: ARP request probe
Response: ARP response -> host is active; No response -> host is inactive
Advantages: more efficient and accurate and therefore useful for system discovery, where one may need to scan large address spaces.</Target>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does a UPD Ping scan look for?

A

Command: nmap -sn -PU <Target>
Request: UDP request
Response: UDP response -> host is active; Error message -> host is inactive
Advantages: detects systems behind firewalls with strict TCP filtering</Target>

17
Q

What does a ICMP ECHO Ping scan look for?

A

Command: nmap -sn -PE <Target>
Request: ICMP ECHO request
Response: ICMP ECHO reply -> host is active; No response -> host is inactive
Advantages: useful for locating active devices or determining if the ICMP message passes through a firewall
Disadvantages: does not work on Windows-based networks</Target>

18
Q

NSE (Nmap Script Engine) commands?

A

-A: aggressive scan => open ports, running services and target details (OS, computer name, NetBIOS)
-O: OS discovery => open ports, running services and OS

19
Q

Techniques to evade IDS (Intrusion Detection System)/firewall?

A
  • Packet Fragmentation: send fragmented probe packets to the intended target, which re-assembles it after receiving all the fragments.
  • Source Routing: specifies the routing path for the malformed packet to reach the intended target
  • Source Port Manipulation: manipulate the actual source port wirh the common source port to evade IDS/firewall
  • IP Address Decoy: generate or manually specify IP addresses of the decoys so that the IDS/firewall cannot determine the actual IP address
  • IP Address Spoofing_ change source IP addresses so that the attack appears to be coming in as someone else
  • Creating Custom Packets: send cestuom packets to scan the intended target beyond the firewalls
  • Randomizing Host Order: scan the number of hosts in the target network in a random order to savn the intended target that is lying beyond the firewall
  • Sending Bad Checksums: send the packets with bad or bogus TCP/UDP checksums to the intended target
  • Proxy Servers: use a chain of proxy servers to hide the actual source of a scan and evade certain IDS/firewall
  • Anonymizers: use anonymizers that allow them to bypass Internet censors and evade certain IDS and firewall rules
20
Q

Name two mechanism to prevent unauthorized persons from accessing a network?

A
  • IDS (Intrusion Detection System)
  • Firewall
21
Q
A