Tools to Scan Network Ports Flashcards
1
Q
Network Visibility
A
- What is connected to network and what is being communicated over it
2
Q
IP Scanner
A
- Tool that performs host discover and can establish overall logical topology
- Tool used like Nmap, AngryIP or PRTG
3
Q
IPAM
A
IP Address Managment
- Functionality to perform IP scan and combine it with asset or inventory informtation
4
Q
Host Disovery
A
- Basic type of IP scanning that only determines if host is “up”
- Most basic use ping, arp and traceroute tools
- Some done with SNMP queries whichi also report more detailed information about interface.
- Security ortiend scanners can probe for hosts configured not to respond
5
Q
Nmap Security Scanner
A
- Widely used for Ip scanning
- As auditing tool and pen-testing tool
- Operated Command line or via Zenamp GUI
- Sends TCP ACK packets to Port 80 and 443 to determine if a host is present
- Will also perform ARP and Network Discover sweeps
- Performs port scan on discovered hosts to determine which services are running.
- Can be run with -sn to suppress port sca
6
Q
Netstat
A
- Checks states of ports on a local host
- Can be used to check for service misconfigurations
- Can also indentify suspicious remote connections to services on local host
- Using -a switch displays all open ports, including TCP and UDP connections and listening state
7
Q
Port Scanner
A
- Performs port probes form another machine or machines on other networks
8
Q
Protocol Analyzer
A
- Works in conjunction with packet capture or sniffer tool
- Can analyze live capture or open a saved capture (.pcap) file.
- Parses each fram to reveal header fields and payload contents in readable format (Packet analysis).
- ## Helps to identify provol misconfigurations
9
Q
TCP SYN
A
- Fast technique (half-opening scanning)
- Scanning host requests connection without acknowledging it
- Targets response to SYN packet identifies port state
10
Q
TCP Connect
A
- Half open scan
- Requires Nmap to have privileged access to the network driver so that it can craft packets
- If privileged access is not available, it must use OS to attempt full TCP connection
- Less stealthy
11
Q
UDP Scans
A
- Scan UDP ports
- Becausae there are no ACKs, Nmap needs to wait for response or timeout to determine port state
- Can take a long time
12
Q
Port range
A
- By default Nmap scans 1000 commonly used ports
- Use -p argument to specify port range
13
Q
Fingerprinting
A
- Identifying software application from responses in port scanning