StudentForm ScanNetwork Enumeration
StudentForm ScanNetwork Enumeration
Purpose:
Recognize available UDP and TCP network services running on the targeted hosts.
Recognize filtering systems between the user and the targeted hosts.
Determine the operating systems (OSs) in use by assessing IP responses.
Evaluate the target host's TCP sequence number predictability to determine sequence prediction attack and
TCP spoofing.
Requirements:
Kali Linux (Attacker machine): connected to Internet (config DHCP and choose adapter in virtual box is
“bridged adapter”)
Windows 10 (Target machine): connected to Internet (config DHCP and choose adapter in virtual box is
“bridged adapter”)
Results:
1 hping3 Results Notes
hping3 -c 3 192.168.1.7 PING 192.168.1.7 (eth0 192.168.1.7): NO FLAGS are If required permission -> type
set, 40 headers + 0 data bytes sudo hping3 -c 3 <Target IP
len=46 ip=192.168.1.7 ttl=128 DF id=12438 sport=0 address>
flags=RA seq=0 win=0 rtt=5.0 ms
len=46 ip=192.168.1.7 ttl=128 DF id=12439 sport=0
flags=RA seq=1 win=0 rtt=4.8 ms
len=46 ip=192.168.1.7 ttl=128 DF id=12440 sport=0
flags=RA seq=2 win=0 rtt=8.3 ms
2. Enumeration
Enumeration is the process of extracting user names, machine names, network resources, shares, and
services from a system, and its conducted in an intranet environment.
In this phase, the attacker creates an active connection to the system and performs directed queries to gain
more information about the target. The gathered information is used to identify the vulnerabilities or weak points in
system security and tries to exploit in the System gaining phase.
Windows Firewall:
- In Kali, type ping 172.16.1.4 -> we see that no reply from Win10
- In Kali, type ping 172.16.1.4 again -> we see the reply from Win10