Scanning Flashcards
What is the TCP handshake?
- SYN
- SYN/ack
- RST
What are the TCP header flags?
Syn (Synchronize) - used to negotiate parameters and sequence numbers for communication establishment.
Ack (Acknowledgement) - set on all segments after the initial SYN flag.
RST -forces a termination of communication in both directions.
FIN - This flag signifies an ordered close to communications.
PSH (PUSH) - This flag forces the delivery of data without concern for any buffering.
URG (Urgent) - when this flag is set, it indicates the data inside is being sent out of band.
What is EC council’s scanning methodology?
- Check for live systems.
- e.g. Something as simple as a ping. - Check for open ports
- Scan beyond IDS
- scanning to avoid intrusion detection systems - Perform banner grabbing
- Banner grabbing and OS fingerprinting indicates the OS on the machine - Scan for vulnerabilities
- Draw network diagrams
- network diagram will display all the logical and physical pathways to targets you might like. - Prepare proxies
- e.g. This obscure your efforts to keep hidden.
5.
What are the TCP number ranges?
The number ranges are:
Well-known: 0 - 1023
Registered: 1024 - 49151
Dynamic: 49152 - 65535
What are the well known port numbers ?
- FTP 8. POP3
- SSH 9. RPC
- Telnet 10. NetBIOS
- SMTP 11. IMAP
- DNS 12. SNMP
- TFTP 13. HTTPS
- HTTP 14. SMB
- FTP -20/21- TCP 8. POP3-110 -TCP
- SSH- 22-TCP 9. RPC- 135 - TCP
- Telnet-23 -TCP 10. NetBIOS- 137-139 -TCP and UDP
- SMTP-25-TCP. 11. IMAP -143 - TCP
- DNS- 53- TCP and UDP 12. SNMP- 161/162 -UDP
- TFTP-69 - UDP 13. HTTPS- 443- TCP
- HTTP- 80- TCP 14. SMB - 445 - TCP
- DHCP- 67-UDP 16. LDAP -389- TCP and UDP
What are the common NMAP commands?
- SA (Ack scan)
- sF (FIN scan)
- sI (IDLE scan)
- sL (DNS scan (a.ka. List scan)
- sN (NULL scan)
- sO (Protocol scan)
- sP (Ping scan)
- sR( RPC scan)
- sS (SYN scan)
- sT (TCP connect)
- sW ( Windows scan)
- PI (ICMP Ping)
- Po (No ping)
- PS (SYN ping)
- PT ( TCP ping)
- oN (Normal output)
- oX (XML output)
- T0 (serial, slowest scan)
- T1 (Serial, slowest scan)
- T2 (Serial, normal speed scan)
- T3 (Parallel, normal speed scan)
- T4 (Parallel, fast scan)
What are the scan types and the associated responses?
1. Scan type - FULL (TCP Connect) Initial Flag set = SYN Open Port Response = SYN/ACK Closed Port Response = RST NOTES= Noisiest but most reliable.
- Scan type = Half open (Stealth or SYN Scan)
Initial Flags Set= SYN
Open Port Response= SYN/ACK
Closed Port Response= RST
NOTES= No completion of three-way handshake; desoigned for stealth but may be picked up on IDS sensors.
3. Scan Type=XMAS Initial Flag set= FIN/URG/PSH Open Port Response=No response Closed Port Response= RST/ACK NOTES: Doesn't work on Windows machines
4. Scan Type= FIN Initial Flag set= FIN Open Port Response=No response Closed Port Response= RST/ACK NOTES: Doesn't work on Windows machines
5. Scan Type= NULL Initial Flag set= No flags set Open PORT response= No response Closed Port Response= RST/ACK NOTES: Doesn't work on Windows Machines
6. Scan Type= ACK Initial Flag set = ACK Open Port Response= RST Closed Port Response = No Response Notes: Used in firewall filter tests