Scanning Networks Flashcards

1
Q

why is scanning for networks crucial?

A

n the process of scanning, you attempt to gather information, including the specific IP addresses of the target system that can be accessed over the network (live hosts), open ports, and respective services running on the open ports and vulnerabilities in the live hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what will portscanning help me with? How does it work, and what does it discover?

A

Port scanning will help you identify open ports and services running on specific ports, which involves connecting to Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) system ports. Port scanning is also used to discover the vulnerabilities in the services running on a port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are network scans needed?

A
  1. Check live systems and open ports
  2. Identify services running in live systems
  3. Perform banner grabbing/OS fingerprinting
  4. Identify network vulnerabilities
  5. Draw network diagrams of vulnerable hosts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is network scanning? how is it done? what is its purpose

A

Network scanning is the process of gathering additional detailed information about the target by using highly complex and aggressive reconnaissance techniques. The purpose of scanning is to discover exploitable communication channels, probe as many listeners as possible, and keep track of the responsive ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the types of scanning

A

Port Scanning: Lists open ports and services
Network Scanning: Lists the active hosts and IP addresses
Vulnerability Scanning: Shows the presence of known weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what should you be able to do as a pen tester and what will be your first task during this phase?

A

you should be able to scan and detect the active network systems/devices in the target network. During the network scanning phase of security assessment, your first task is to scan the network systems/devices connected to the target network within a specified IP range and check for live systems in the target network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is host discovery? what does it provide? How does this help

A

Host discovery is considered the primary task in the network scanning process. It is used to discover the active/live hosts in a network. It provides an accurate status of the systems in the network, which, in turn, reduces the time spent on scanning every port on every system in a sea of IP addresses in order to identify whether the target host is up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are some host discovery techniques?

A

ARP ping scan
UDP ping scan
ICMP ping scan (ICMP ECHO ping, ICMP timestamp, ping ICMP, and address mask ping)
TCP ping scan (TCP SYN ping and TCP ACK ping)
IP protocol scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is nmap and what tasks does it do

A

Nmap is a utility used for network discovery, network administration, and security auditing. It is also used to perform tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does the nmap -sn -PR [Target IP Address] do

A

want to see that the Host is up

-sn: disables port scan and -PR: performs ARP ping scan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how to perform a UDP ping scan

A

nmap -sn -PU 10.10.10.16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how can i tell if the target host is offline or unreachable?

A

various error messages such as “host/network unreachable” or “TTL exceeded” could be returned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how to perform an ICMP ECHO Ping scan and why is it useful?

A

nmap -sn -PE [Target IP Adress]

This scan is useful for locating active devices or determining if the ICMP is passing through a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to perform an ICMP ECHO ping sweep and what does it determine and how does it work?

A

nmap -sn -PE[Target Range of IP Addresses]

determines the live hosts from arange of IP addresses by sending ICMP ECHO requests to multiple hoss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what to do if administrators block the ICMP ECHO pings

A
ICMP Timestamp and Address Mask Ping Scan
# nmap -sn -PP [target IP address]
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to send empty TCP SYN packets to the target host and how do you know if the host is active

A

nmap -sn -PS [target IP address]

an ACK response meanse that the host is active

17
Q

how to send and empy TCP ACK packet to the target host how to know if the host is active

A

nmap -sn -PA [target IP address

RST response means the host is active

18
Q

how to send and IP Protocol Ping Scan and what does it do?

A

nmap -sn -PO [target IP address]

This technique sends different probe packets of different IP protocols to the target host, any response from any probe indicates that a host is active

19
Q

Task 2

A

PERFORM HOST DISCOVERY USING ANGRY IP SCANNER

20
Q

what is an angry ip scanner, how does it work, and how can the data be extended?

A

Angry IP Scanner is an open-source and cross-platform network scanner designed to scan IP addresses as well as ports. It simply pings each IP address to check if it is alive; then, optionally by resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with plugins.