4.1 Flashcards
Network Reconnaissance and Discovery
Networks are like most infrastructure—you never see or care about it until it isn’t working. And when you do want to look, how do you do it? A wide range of tools can be used to permit you to see the inner workings of a network, and they are covered in the sections that follow.
tracert/traceroute
This shows the route taken from a computer to a remote host—for example, a website. It can show any latency traveling through a particular router. It is like traffic going into a city center; the closer the traffic is to the center, the slower it is. It shows information for a maximum of 30 hops.
nslookup/dig
Nslookup is a diagnostic tool for verifying the IP address of a hostname in the DNS server database. We can also use the set type=MX command, which brings back the DNS details on all mail servers in the domain.
Dig is the equivalent of nslookup in a Linux/Unix environment.
ipconfig/ifconfig
These commands show the IP configuration. The Windows version is ipconfig, but Unix/Linux can use ifconfig.
nmap
Nmap is a free and open-source network mapper that can be used to create an inventory of all of the devices on your network and can be used for bannergrabbing.
ping/pathping
Ping is used to test connectivity to another host.
hping
This tool can be used as a TCP/IP packet assembler and analyzer. It allows you to test the security of your network devices, such as firewall rules and open ports, and analyzes network traffic, including packet formats and traceroute.
netstat
Netstat is a native tool that is incorporated into a Windows operating system. It used to see the established connections and the listening ports. It can also let you know what services are running a computer. If you reboot the computer, all established ports will disappear.
netcat
Netcat, or nc, is a utility for showing network connections in a Linux/Unix environment.
IP scanners
It will show IP addresses that are active and responding, those that are active but not responding, and those that are inactive. An attacker could use an inactive IP address to gain access to your network as they know it is not allocated to anyone.
arp
ARP is used to translate the IP address to a MAC address; the arp -a command shows the ARP cache. An attacker could use ARPSpoof, ARPoison, and Ettercap to poison your ARP cache. These tools could be used to create ARP broadcasts by sending unsolicited ARP replies.
route
The route command works in Linux and Windows systems to provide information on current routing parameters and to manipulate these parameters. In addition to listing the current routing table, it has the ability to modify the table.
curl
This is a command-line tool used to transfer data. It can also be used in banner grabbing; this fetches remote banner information from web servers. -s is silent and -I is fetching the HTTP headers.
theHarvester
This is a passive tool that comes with Kali Linux and we can use it to harvest the email addresses of an organization.
sn1per
This is a pen test reconnaissance tool that can be used for automated tests. This tool can be used by pen testers, bug bounty researchers, and security teams. It can look for vulnerabilities in your network, open ports, it can diagnose DNS issues, has Nmap capabilities, and it can find application
scanless
This is a port scanner that can be anonymous so that the scan cannot be traced back to your IP address.