Lesson 3 Flashcards
Footprinting
Scanning the network layout and roque system detection. Scanning for hosts, IP ranges and routes.
Ipconfig ifconfig
IPconfig (windows) ifconfig (linux)
Reports on local IP configuration
ping
Uses Internet control measure protocol (ICMP)
- Test connectivity with a host
- Use a ping sweep to detect live hosts on a subnet
subnet
locl network segment. All hosts ona subnet will have similar ip address
arp
Address Resolution Protocol (ARP) cache
Shows IP to Media Access Control (MAC) address mapping
• Detect spoofing (validate MAC of default gateway)
route
*If the host is not a router, additional entries in teh routing table could be suspicious
- Show the local routing table
- Identify default route and local subnet
- Check for suspicious entries
tracert/ traceroute
tracert (windows) traceroute (linux)
Test the path to a remote host
route vs tracert/traceroute vs pathping/mtr
route - local routing table
tracert/traceroute - path to remote host
pathping/mtr - measures latency and packet loss along a route
pathping/ mtr
pathping = windows mtr = linux
measures latency and packet loss along a route
Nmap
network mapper - type of IP scanner
host discovery => port scan => service discovery
Host discovery
• Test whether host in
IP range responds to
probes
Port scan
• Test whether TCP or
UDP port allows connections and are open
Service discovery
• Scan custom TCP/UDP
port ranges
Service and version detection • Fingerprinting each port • Protocol (tenet, http, ftp, etc) • Application/version • OS type • Device type
netstat & nslookup(dig)
Basic service discovery tasks can also be performed using tools built into the Windows
and Linux operating systems:
netstat
• Report TCP/UDP port status on local machine
4
nslookup (windows) dig (linux
nslookup/dig—query name records for a given domain using a particular DNSresolver under Windows (nslookup) or Linux (dig). An attacker may test a
network to find out if the DNS service is misconfigured. A misconfigured DNS may allow a zone transfer, which will give the attacker the complete records of every host in the domain, revealing a huge amount about the
way the network is configured.
theHarvester
Collate open source intelligence (OSINT)
dnsenum
• Collate DNS hosting information, name records, and IP schemas
scanless
• Collate results from third-party port scanning sites
curl
• Craft and submit protocol requests
curl is a command-line client for performing data transfers over many types of
protocol (curl.haxx.se). This tool can be used to submit HTTP GET, POST, and PUT
requests as part of web application vulnerability testing. curl supports many other
data transfer protocols, including FTP, IMAP, LDAP, POP3, SMB, and SMTP.
Nessus
• Perform automated vulnerability scanning
• Packet analysis versus protocol analysis
• Packet analysis refers to deep-down frame-by-frame scrutiny of captured frames.
• Protocol analysis means using statistical tools to analyze a sequence of packets, or
packet trace.
Sniffer
tool for capturing network frames. Can identify malicious traffice that got past the firewall
tcpdump
is a command-line packet capture utility for Linux
- Write to pcap
- Read from pcap
- Filters
Wireshark
Packet analyzer
• Packet injection
- Crafting spoofed packets
* Dsniff, Ettercap, Scapy, hping
hping
Packet injection tool for pen testers. also does a lot of stuff that nmap does
- Host/port detection and firewall testing
- Traceroute
- Denial of service (DoS)
tcpreplay
tcpreplay - takes packet previously captured traffic that has been saved to a pcap file and replays it
• Stream a packet capture through an interface
• Sandbox analysis and intrusion detection testin