Tools to Scan Network Ports Flashcards

1
Q

Network Visibility

A
  • What is connected to network and what is being communicated over it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP Scanner

A
  • Tool that performs host discover and can establish overall logical topology
  • Tool used like Nmap, AngryIP or PRTG
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPAM

A

IP Address Managment

- Functionality to perform IP scan and combine it with asset or inventory informtation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Host Disovery

A
  • Basic type of IP scanning that only determines if host is “up”
  • Most basic use ping, arp and traceroute tools
  • Some done with SNMP queries whichi also report more detailed information about interface.
  • Security ortiend scanners can probe for hosts configured not to respond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nmap Security Scanner

A
  • Widely used for Ip scanning
  • As auditing tool and pen-testing tool
  • Operated Command line or via Zenamp GUI
  • Sends TCP ACK packets to Port 80 and 443 to determine if a host is present
  • Will also perform ARP and Network Discover sweeps
  • Performs port scan on discovered hosts to determine which services are running.
  • Can be run with -sn to suppress port sca
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Netstat

A
  • Checks states of ports on a local host
  • Can be used to check for service misconfigurations
  • Can also indentify suspicious remote connections to services on local host
  • Using -a switch displays all open ports, including TCP and UDP connections and listening state
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port Scanner

A
  • Performs port probes form another machine or machines on other networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol Analyzer

A
  • Works in conjunction with packet capture or sniffer tool
  • Can analyze live capture or open a saved capture (.pcap) file.
  • Parses each fram to reveal header fields and payload contents in readable format (Packet analysis).
  • ## Helps to identify provol misconfigurations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP SYN

A
  • Fast technique (half-opening scanning)
  • Scanning host requests connection without acknowledging it
  • Targets response to SYN packet identifies port state
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP Connect

A
  • Half open scan
  • Requires Nmap to have privileged access to the network driver so that it can craft packets
  • If privileged access is not available, it must use OS to attempt full TCP connection
  • Less stealthy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

UDP Scans

A
  • Scan UDP ports
  • Becausae there are no ACKs, Nmap needs to wait for response or timeout to determine port state
  • Can take a long time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port range

A
  • By default Nmap scans 1000 commonly used ports

- Use -p argument to specify port range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fingerprinting

A
  • Identifying software application from responses in port scanning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly