4.1 Given a scenario, use the appropriate tool to assess organizational security. Flashcards
traceroute
determines a route a packet takes to a destination
- maps the entire path
tracert(windows) or traceroute(Unix,Linux.macOS
It uses ICMP Time to Live exceed the error message. TTL=0 means TTL exceeded error is sent back to the sender and gives the IP address on the hop it failed on until the final hop is used on the destination.
Not all devices will reply with ICMP time exceeded messages
Windows Sends an ICMP echo request
IOS - sends UDP datagrams over port 33434
Give two common ways to query or lookup information from DNS server.
nslookup and dig
nslookup
Used to Query a DNS server to find names and IP addresses.
Could be depracated.
Dig command
Domain information groper
More advanced DNS query than nslookup.
1st choice to use. can install it in windows.
ipconfig/ifconfig
Gather ip address details
ipconfig=Windows
ifconfig=Linux
ping
test reachability
determines round trip time
uses ICMP
Netstat
network statistics
netstat -a : shows all active connections on that device
netstat - b shows binaries(windows)
netstat -n shows just the IP addresses, does not resolve the names
ARP
Address resolution protocol
Has arp table that shows us the mac addresses per each IP
command:
arp -a
route print : shows route tables
pathping
combines ping and traceroute
1st phase - runs a traceroute to build a map
2nd Phase - measures round tip time and packet loss at each hop.
It takes a few minutes to run.
curl
client URL ( uniform resource locator)
retreives data using url
can grab info from web [ages, FTP, emails databases
Grabs the raw data, search, parse and automate
What do IP scanners do?
Search a network Ipaddress
Locate active devices
Avoid doing work on the IP address that isn’t there
Techniques:
ARP( if on local subnet)
ICMP request (ping)
TCP ACK
ICMP timestamp request
hping
TCP/IP Packet assembler/analyzer
It is a ping that can send almost anything.
You can send crafted frames. You can modify all IP, TCP, UDP and ICMP values.
Easy to DOS accidently.
nmap
network mapper:
finds and learns more about network devices.
Port Scan:
Finds devices and identify open ports
OS scan:
Discover the OS without logging into the device
Service Scan:
What service is available on a device, name, version details.
Additional scripts:
Nmap scripting engine can extend capabilities and vulnerability scans.
theHarvester
Gather OSINT
Open source intelligence
The harvester cam scrape info from google or bing
Like a list of people from LinkedIn,
DNS brute forces, find unknown host like VPN or chat or email servers.
sn1per
Combine many recon tools into a single framework
- dnsenum,metasploit,nmap,theHarvester and much more.
Options can be intrusive or non-intrusive
This tool could lead to DDOS so be careful. This tool is available on kali linux.
scanless
It runs a port scan from a different host. It is a proxy so that you are not the source of the scan.
dnsenum
Enumerates DNS information - finds host names
View host info from DNS Servers - many services and host are listed in DNS
Nessus
Industry-leading vulnerability scanning.
Extensive support
Free and commercial options
Identity known vulnerabilities
- Find systems before they can be exploited
Extensive reporting
- checklist of issues
- filter out false positives.
Cuckoo
A sandbox for malware
- Test a file in a safe environment
Virtualized environment in Windows, macos, linux and android
- Track and trace things like API calls, network traffic, memory analysis, traffic captures and screenshots.