(5) Pings, Port Scans, And Device Fingerprinting Flashcards
What is the ping command?
The ping command is a low level network command that sends an echo request to a remote IP address. It uses Internet Control Message Protocol (ICMP)
What do we need to remember about ping commands and the potential echo replies?
If an echo reply doesn’t come back, it doesn’t mean that the remote host isn’t there. Firewalls block ping requests, and individual systems might be set up to ignore echo packets
What is hping?
Hping is an advanced version of ping that lets one customized echo request to increase the chance of detection. handcrafted packets can be constructed here as part of a penetration test.
What are port scanning tools designed to do?
Port scanning tools are designed to send traffic to remote systems and then get responses that give info about systems and services that they provide.
What are the common features of port scanners?
Common features or port scanners include:
-Host discovery
-Port scanning and service identification
-Device fingerprinting
-Service version identification
-Operating system identification
What can basic knowledge of how to read a scan is particularly useful?
The basic knowledge that is useful is that scans provide info about hosts on the network, running services, and clues about if they are vulnerable to attack
What is operating system fingerprinting?
Operating system fingerprinting is identifying an operating system based on the network traffic that it sends
Summarize the basic idea of what operating system fingerprinting does
Operating system fingerprinting is usually done by utilizing TCP/IP stack fingerprinting techniques that focus on comparing responses to TCP and UDP packets sent to remote hosts.
What is device fingerprinting?
Device fingerprinting is about the collection and relation of information about a device including details about software, services, and operating system(s) that it runs on that allows for identification
What is device fingerprinting particular useful for?
Device fingerprinting is particularly useful for identifying printers and other networked devices but can identify others well too.
Can devices still be fingerprinted if they are firewalled?
Devices can still be fingerprinted even if they are firewalled if access to their network traffic and network device logs is possible.