SlideShare a Scribd company logo
MODULE 3 SCANNING
Objective Definition of scanning Types and objectives of Scanning Understanding CEH Scanning methodology Checking live systems and open ports Understanding scanning techniques Different tools present to perform Scanning Understanding banner grabbing and OS fingerprinting Drawing network diagrams of vulnerable hosts Preparing proxies Understanding anonymizers Scanning countermeasures
One of the three components of intelligence gathering for an attacker The attacker finds information about the specific IP addresses Operating Systems system architecture services running on each computer The various types of scanning are as follows : Port Scanning Network Scanning Vulnerability Scanning Scanning - Definition
Types of Scanning Port Scanning A series of messages sent by someone attempting to break into a computer to learn about the computer’snetwork services Each associated with a "well-known" port number Network Scanning A procedure for identifying active hosts on a network Either for the purpose of attacking them or for network security assessment Vulnerability Scanning The automated process of proactively identifying vulnerabilities of computing systems present in a network
Objectives of Scanning To detect the  live systems  running on the network To discover which  ports  are active/running To discover the operating system running on the target system ( fingerprinting ) To discover the  services  running/listening on the target system To discover the  IP  address of the target system
Checking for Live Systems – ICMP Scanning Ping send out an ICMP Echo Request packet and awaits an ICMP Echo Reply message from an active machine. Alternatively, TCP/UDP packets are sent if incoming ICMP messages are blocked. Ping helps in assessing network traffic by time stamping each packet. Ping can also be used for resolving host names. Tools include  Pinger, WS_Ping ProPack, NetScan Tools, HPing, icmpenum
Checking for open ports Port Scanning  is one of the most popular reconnaissance techniques used by hackers to discover services that can be compromised. A potential target computer runs many 'services' that listen at ‘well-known’ 'ports'.  By scanning which ports are available on the victim, the hacker finds potential vulnerabilities that can be exploited.
Port Scanner - Nmap Nmap is a free open source utility for network exploration It is designed to rapidly scan large networks  Features Nmap is used to carry out port scanning, OS detection, version detection, ping sweep, and many other techniques It scans a large number of machines at one time It is supported by many operating systems It can carry out all types of port scanning techniques
Nmap: Scan Methods
TCP Communication Flags Standard TCP communications are controlled by flags in the TCP packet header The flags are as follows: Synchronize  - also called "SYN” –  Used to initiate a connection between hosts Acknowledgement  - also called "ACK” –  Used in establishing a connection between hosts Push  - "PSH” –  Instructs receiving system to send all buffered data immediately Urgent  - "URG” –  States that the data contained in the packet should be processed immediately Finish  - also called "FIN" –  Tells remote system that there will be no more transmissions Reset  - also called "RST” –  Also used to reset a connection
Three Way Handshake
SYN Stealth / Half Open Scan It is often referred to as half open scan because it does not open a full TCP connection First a SYN packet is sent to a port of the machine, suggesting a request for connection, and the response is awaited If the port sends back a SYN/ACK packet, then it is inferred that a service at the particular port is listening. If an RST is received, then the port is not active/ listening. As soon as the SYN/ACK packet is received, an RST packet is sent, instead of an ACK, to tear down the connection The key advantage is that fewer sites log this scan
Stealth Scan Client sends a single  SYN  packet to the server on the appropriate port If the port is open then the server responds with a  SYN/ACK  packet If the server responds with an  RST  packet, then the remote port is in "closed” state The client sends  RST  packet to close the initiation before a connection can ever be established This scan also known as “half-open” scan
Xmas Scan
FIN Scan
NULL Scan
IDLE Scan
IDLE Scan: Basics Most network servers listen on TCP ports, such as web servers on port 80 and mail servers on port 25 A port is considered "open" if an application is listening on the port, otherwise it is closed One way to determine whether a port is open is to send a "SYN" (session establishment) packet to the port The target machine will send back a "SYN|ACK" (session request acknowledgment) packet if the port is open, and an "RST" (Reset) packet if the port is closed A machine which receives an unsolicited SYN|ACK packet will respond with an RST. An unsolicited RST will be ignored Every IP packet on the Internet has a "fragment identification" number Many operating systems simply increment this number for every packet they send So probing for this number can tell an attacker how many packets have been sent since the last probe
IDLE Scan: Step 1
IDLE Scan: Step 2.1 (Open Port)
IDLE Scan: Step 2.2 (Closed Port)
IDLE Scan: Step 3
ICMP Echo Scanning/List Scan ICMP echo scanning This isn't really port scanning, since ICMP doesn't have a port abstraction But it is sometimes useful to determine which hosts in a network are up by pinging them all nmap -P cert.org/24 152.148.0.0/16 List Scan This type of scan simply generates and prints a list of IPs/Names without actually pinging or port scanning them A DNS name resolution will also be carried out
TCP Connect / Full Open Scan
NMAP Scan Options Output options
NMAP Timing Options
NetScan Tools Pro
IPScanner
FloppyScan
FloppyScan Steps
Vulnerability scanning
SAINT
ISS Security Scanner
Nessus Nessus is a  vulnerability scanner , which looks for bugs in software An attacker can use this tool to violate the security aspects of a software product Features Plug-in-architecture NASL (Nessus Attack Scripting Language) Can test unlimited number of hosts simultaneously Smart service recognition Client-server architecture Smart plug-ins Up-to-date security vulnerability database
GFI LANGuard GFI LANGUARD analyzes the operating system and the applications running on a network and finds out the security holes present It scans the entire network, IP by IP, and provides information such as the service pack level of the machine and missing security patches, to name a few GFI LANGuard Features Fast TCP and UDP port scanning and identification Finds all the shares on the target network It alerts the pinpoint security issues Automatically detects new security holes Checks password policy Finds out all the services that are running on the target network Vulnerabilities database includes UNIX/CGI issues
GFI LANGuard ScreenShot
Draw Network Diagrams  of Vulnerable Hosts
Cheops
FriendlyPinger
Preparing Proxies
Proxy Servers Proxy is a network computer that can serve as an intermediate for connection with other computers They are usually used for the following purposes: As a firewall, a proxy protects the local network from outside access As an IP addresses multiplexer, a proxy allows the connection of a number of computers to the Internet when having only one IP address Proxy servers can be used (to some extent) to anonymize web surfing Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material Proxy servers can afford some protection against hacking attacks
Free Proxy Servers
Use of Proxies for Attack
ProxyManager Tool
Happy Browser Tool (Proxy-based)
MultiProxy
How Does MultiProxy Work?
Anonymizers
Surfing Anonymously
Some anonymizer sites  Many anonymizer sites create an anonymized URL by appending the name of the site the user wishes to access to their own URL, e.g.: http://anon.free.anonymizer.com/http://www.yahoo.com/ Anonymizer.com Anonymize.net @nonymouse.com Iprive.com MagusNet Public Proxy MuteMail.com PublicProxyServers.com Rewebber.de SilentSurf.com Surfola.com Ultimate-anonymity.com
Anonymizers’ limitations  HTTPS. Secure protocols like "https:" cannot be properly anonymized, since the browser needs to access the site directly to properly maintain the secure encryption. Plugins. If an accessed site invokes a third-party plugin, then there is no guarantee that they will not establish independent direct connections from the user computer to a remote site. Logs. All anonymizer sites claim that they don't keep a log of requests. Some sites, such as the Anonymizer, keep a log of the addresses accessed, but don't keep a log of the connection between accessed addresses and users logged in. Java. Any Java application that is accessed through an anonymizer will not be able to bypass the Java security wall. Active X. Active-X applications have almost unlimited access to the user's computer system. JavaScript. The JavaScript scripting language is disabled with url-based anonymizers
HTTP Tunneling Techniques
Why Do I Need HTTP Tunneling? Let’s say your organization has blocked all the ports in your firewall and only allows port 80/443 and you want to use FTP to connect to some remote server on the Internet In this case you can send your packets via http protocol
Httptunnel for Windows httptunnel creates a bidirectional virtual data connection tunnelled in HTTP requests. The HTTP requests can be sent via an HTTP proxy if so desired This can be useful for users behind restrictive firewalls If WWW access is allowed through an HTTP proxy, it's possible to use httptunnel and, say, telnet or PPP to connect to a computer outside the firewall On the server you must run hts. If I wanted to have port 80 (http) redirect all traffic to port 23 (telnet) then it would go something like: hts -F server.test.com:23 80 On the client you would run htc. If you are going through a proxy, the -P option is needed otherwise omit it. htc -P proxy.corp.com:80 -F 23 server.test.com:80 Then telnet localhost and it will redirect the traffic out to port 80 on the proxy server and on to port 80 of the server, then to port 23.
How to Run Httptunnel?
Ad

More Related Content

What's hot (20)

Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
 
Network scanning
Network scanningNetwork scanning
Network scanning
oceanofwebs
 
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
Vi Tính Hoàng Nam
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
Shyama Bhuvanendran
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
CHETAN THAKRE
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
n|u - The Open Security Community
 
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
Vi Tính Hoàng Nam
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
Bhavya Chawla
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
Port scanning
Port scanningPort scanning
Port scanning
Hemanth Pasumarthi
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
Er. Shiva K. Shrestha
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
RomSoft SRL
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
Rand W. Hirt
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
 
Network scanning
Network scanningNetwork scanning
Network scanning
oceanofwebs
 
Introduction to foot printing
Introduction to foot printingIntroduction to foot printing
Introduction to foot printing
CHETAN THAKRE
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
Sam Bowne
 
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
Vi Tính Hoàng Nam
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
Bhavya Chawla
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
Suvrat Jain
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
Er. Shiva K. Shrestha
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
RomSoft SRL
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
Rand W. Hirt
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 

Viewers also liked (20)

Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
Hafiza Abas
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
skpatel91
 
CyberLab CCEH Session - 3 Scanning Networks
CyberLab CCEH Session - 3 Scanning NetworksCyberLab CCEH Session - 3 Scanning Networks
CyberLab CCEH Session - 3 Scanning Networks
CyberLab
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
Asep Sopyan
 
Chapter 3 footprinting
Chapter 3 footprintingChapter 3 footprinting
Chapter 3 footprinting
Setia Juli Irzal Ismail
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking Illustrated
InfoSec Institute
 
CEH - Module 5 : System Hacking
CEH - Module 5 : System HackingCEH - Module 5 : System Hacking
CEH - Module 5 : System Hacking
Avirot Mitamura
 
Basics of pointer, pointer expressions, pointer to pointer and pointer in fun...
Basics of pointer, pointer expressions, pointer to pointer and pointer in fun...Basics of pointer, pointer expressions, pointer to pointer and pointer in fun...
Basics of pointer, pointer expressions, pointer to pointer and pointer in fun...
Jayanshu Gundaniya
 
Disk scheduling
Disk schedulingDisk scheduling
Disk scheduling
Agnas Jasmine
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processing
Opher Etzion
 
Installing Complex Event Processing On Linux
Installing Complex Event Processing On LinuxInstalling Complex Event Processing On Linux
Installing Complex Event Processing On Linux
Osama Mustafa
 
Reactconf 2014 - Event Stream Processing
Reactconf 2014 - Event Stream ProcessingReactconf 2014 - Event Stream Processing
Reactconf 2014 - Event Stream Processing
Andy Piper
 
Tutorial in DEBS 2008 - Event Processing Patterns
Tutorial in DEBS 2008 - Event Processing PatternsTutorial in DEBS 2008 - Event Processing Patterns
Tutorial in DEBS 2008 - Event Processing Patterns
Opher Etzion
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
Vishal Punjabi
 
Comparative Analysis of Personal Firewalls
Comparative Analysis of Personal FirewallsComparative Analysis of Personal Firewalls
Comparative Analysis of Personal Firewalls
Andrej Šimko
 
Access control attacks by nor liyana binti azman
Access control attacks by nor liyana binti azmanAccess control attacks by nor liyana binti azman
Access control attacks by nor liyana binti azman
Hafiza Abas
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
cclay3
 
Complex Event Processing with Esper and WSO2 ESB
Complex Event Processing with Esper and WSO2 ESBComplex Event Processing with Esper and WSO2 ESB
Complex Event Processing with Esper and WSO2 ESB
Prabath Siriwardena
 
Nmap scripting engine
Nmap scripting engineNmap scripting engine
Nmap scripting engine
n|u - The Open Security Community
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
Hafiza Abas
 
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
Detection of Idle Stealth Port Scan Attack in Network Intrusion Detection Sys...
skpatel91
 
CyberLab CCEH Session - 3 Scanning Networks
CyberLab CCEH Session - 3 Scanning NetworksCyberLab CCEH Session - 3 Scanning Networks
CyberLab CCEH Session - 3 Scanning Networks
CyberLab
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
Asep Sopyan
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong
 
Man In The Middle - Hacking Illustrated
Man In The Middle - Hacking IllustratedMan In The Middle - Hacking Illustrated
Man In The Middle - Hacking Illustrated
InfoSec Institute
 
CEH - Module 5 : System Hacking
CEH - Module 5 : System HackingCEH - Module 5 : System Hacking
CEH - Module 5 : System Hacking
Avirot Mitamura
 
Basics of pointer, pointer expressions, pointer to pointer and pointer in fun...
Basics of pointer, pointer expressions, pointer to pointer and pointer in fun...Basics of pointer, pointer expressions, pointer to pointer and pointer in fun...
Basics of pointer, pointer expressions, pointer to pointer and pointer in fun...
Jayanshu Gundaniya
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processing
Opher Etzion
 
Installing Complex Event Processing On Linux
Installing Complex Event Processing On LinuxInstalling Complex Event Processing On Linux
Installing Complex Event Processing On Linux
Osama Mustafa
 
Reactconf 2014 - Event Stream Processing
Reactconf 2014 - Event Stream ProcessingReactconf 2014 - Event Stream Processing
Reactconf 2014 - Event Stream Processing
Andy Piper
 
Tutorial in DEBS 2008 - Event Processing Patterns
Tutorial in DEBS 2008 - Event Processing PatternsTutorial in DEBS 2008 - Event Processing Patterns
Tutorial in DEBS 2008 - Event Processing Patterns
Opher Etzion
 
Comparative Analysis of Personal Firewalls
Comparative Analysis of Personal FirewallsComparative Analysis of Personal Firewalls
Comparative Analysis of Personal Firewalls
Andrej Šimko
 
Access control attacks by nor liyana binti azman
Access control attacks by nor liyana binti azmanAccess control attacks by nor liyana binti azman
Access control attacks by nor liyana binti azman
Hafiza Abas
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
cclay3
 
Complex Event Processing with Esper and WSO2 ESB
Complex Event Processing with Esper and WSO2 ESBComplex Event Processing with Esper and WSO2 ESB
Complex Event Processing with Esper and WSO2 ESB
Prabath Siriwardena
 
Ad

Similar to Module 3 Scanning (20)

Port Scanning in computer networks with .ppt
Port Scanning in computer networks with .pptPort Scanning in computer networks with .ppt
Port Scanning in computer networks with .ppt
imranahmadrana28
 
Scanning
ScanningScanning
Scanning
Ashok kumar sandhyala
 
Port Scanning Overview
Port Scanning  OverviewPort Scanning  Overview
Port Scanning Overview
Publicly traded global multi-billion services company
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
MahdiHasanSowrav
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Boston Institute of Analytics
 
CYBER FORENSICS-scanning and enumuration.ppt
CYBER FORENSICS-scanning and enumuration.pptCYBER FORENSICS-scanning and enumuration.ppt
CYBER FORENSICS-scanning and enumuration.ppt
jayaprasanna10
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
amiable_indian
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
Karen Oliver
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Eric Vanderburg
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
Utkarsh Verma
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.ppt
VarunBehere1
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
What is a Port Scan in data visualization
What is a Port Scan in data visualizationWhat is a Port Scan in data visualization
What is a Port Scan in data visualization
Komal Khanna
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...
Naomi Hansen
 
Week 10 - Packet Sssdssssssssniffers.ppt
Week 10 - Packet Sssdssssssssniffers.pptWeek 10 - Packet Sssdssssssssniffers.ppt
Week 10 - Packet Sssdssssssssniffers.ppt
fzbshf
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
ShainaBoling829
 
Contents namp
Contents nampContents namp
Contents namp
shwetha mk
 
Contents namp
Contents nampContents namp
Contents namp
shwetha mk
 
Node finder presentation
Node finder presentationNode finder presentation
Node finder presentation
Varun Varshney
 
Port Scanning in computer networks with .ppt
Port Scanning in computer networks with .pptPort Scanning in computer networks with .ppt
Port Scanning in computer networks with .ppt
imranahmadrana28
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
MahdiHasanSowrav
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Boston Institute of Analytics
 
CYBER FORENSICS-scanning and enumuration.ppt
CYBER FORENSICS-scanning and enumuration.pptCYBER FORENSICS-scanning and enumuration.ppt
CYBER FORENSICS-scanning and enumuration.ppt
jayaprasanna10
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
amiable_indian
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
Karen Oliver
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Eric Vanderburg
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
Utkarsh Verma
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.ppt
VarunBehere1
 
What is a Port Scan in data visualization
What is a Port Scan in data visualizationWhat is a Port Scan in data visualization
What is a Port Scan in data visualization
Komal Khanna
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...
Naomi Hansen
 
Week 10 - Packet Sssdssssssssniffers.ppt
Week 10 - Packet Sssdssssssssniffers.pptWeek 10 - Packet Sssdssssssssniffers.ppt
Week 10 - Packet Sssdssssssssniffers.ppt
fzbshf
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
ShainaBoling829
 
Node finder presentation
Node finder presentationNode finder presentation
Node finder presentation
Varun Varshney
 
Ad

More from leminhvuong (20)

Proxy
ProxyProxy
Proxy
leminhvuong
 
Lession2 Xinetd
Lession2 XinetdLession2 Xinetd
Lession2 Xinetd
leminhvuong
 
Module 7 Sql Injection
Module 7   Sql InjectionModule 7   Sql Injection
Module 7 Sql Injection
leminhvuong
 
Iptables
IptablesIptables
Iptables
leminhvuong
 
Lession1 Linux Preview
Lession1 Linux PreviewLession1 Linux Preview
Lession1 Linux Preview
leminhvuong
 
Http
HttpHttp
Http
leminhvuong
 
Dns
DnsDns
Dns
leminhvuong
 
Net Admin Intro
Net Admin IntroNet Admin Intro
Net Admin Intro
leminhvuong
 
Lession4 Dhcp
Lession4 DhcpLession4 Dhcp
Lession4 Dhcp
leminhvuong
 
Lession3 Routing
Lession3 RoutingLession3 Routing
Lession3 Routing
leminhvuong
 
Module 1 Introduction
Module 1   IntroductionModule 1   Introduction
Module 1 Introduction
leminhvuong
 
Net Security Intro
Net Security IntroNet Security Intro
Net Security Intro
leminhvuong
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
leminhvuong
 
Module 9 Dos
Module 9   DosModule 9   Dos
Module 9 Dos
leminhvuong
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
leminhvuong
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
leminhvuong
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
leminhvuong
 
Call Back
Call BackCall Back
Call Back
leminhvuong
 

Recently uploaded (20)

Image processinglab image processing image processing
Image processinglab image processing  image processingImage processinglab image processing  image processing
Image processinglab image processing image processing
RaghadHany
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
Asthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdfAsthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdf
VanessaRaudez
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko
Fwdays
 
Rock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning JourneyRock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning Journey
Lynda Kane
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Image processinglab image processing image processing
Image processinglab image processing  image processingImage processinglab image processing  image processing
Image processinglab image processing image processing
RaghadHany
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
Asthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdfAsthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdf
VanessaRaudez
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko
Fwdays
 
Rock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning JourneyRock, Paper, Scissors: An Apex Map Learning Journey
Rock, Paper, Scissors: An Apex Map Learning Journey
Lynda Kane
 
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersAutomation Dreamin' 2022: Sharing Some Gratitude with Your Users
Automation Dreamin' 2022: Sharing Some Gratitude with Your Users
Lynda Kane
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 

Module 3 Scanning

  • 2. Objective Definition of scanning Types and objectives of Scanning Understanding CEH Scanning methodology Checking live systems and open ports Understanding scanning techniques Different tools present to perform Scanning Understanding banner grabbing and OS fingerprinting Drawing network diagrams of vulnerable hosts Preparing proxies Understanding anonymizers Scanning countermeasures
  • 3. One of the three components of intelligence gathering for an attacker The attacker finds information about the specific IP addresses Operating Systems system architecture services running on each computer The various types of scanning are as follows : Port Scanning Network Scanning Vulnerability Scanning Scanning - Definition
  • 4. Types of Scanning Port Scanning A series of messages sent by someone attempting to break into a computer to learn about the computer’snetwork services Each associated with a "well-known" port number Network Scanning A procedure for identifying active hosts on a network Either for the purpose of attacking them or for network security assessment Vulnerability Scanning The automated process of proactively identifying vulnerabilities of computing systems present in a network
  • 5. Objectives of Scanning To detect the live systems running on the network To discover which ports are active/running To discover the operating system running on the target system ( fingerprinting ) To discover the services running/listening on the target system To discover the IP address of the target system
  • 6. Checking for Live Systems – ICMP Scanning Ping send out an ICMP Echo Request packet and awaits an ICMP Echo Reply message from an active machine. Alternatively, TCP/UDP packets are sent if incoming ICMP messages are blocked. Ping helps in assessing network traffic by time stamping each packet. Ping can also be used for resolving host names. Tools include Pinger, WS_Ping ProPack, NetScan Tools, HPing, icmpenum
  • 7. Checking for open ports Port Scanning is one of the most popular reconnaissance techniques used by hackers to discover services that can be compromised. A potential target computer runs many 'services' that listen at ‘well-known’ 'ports'. By scanning which ports are available on the victim, the hacker finds potential vulnerabilities that can be exploited.
  • 8. Port Scanner - Nmap Nmap is a free open source utility for network exploration It is designed to rapidly scan large networks Features Nmap is used to carry out port scanning, OS detection, version detection, ping sweep, and many other techniques It scans a large number of machines at one time It is supported by many operating systems It can carry out all types of port scanning techniques
  • 10. TCP Communication Flags Standard TCP communications are controlled by flags in the TCP packet header The flags are as follows: Synchronize - also called "SYN” – Used to initiate a connection between hosts Acknowledgement - also called "ACK” – Used in establishing a connection between hosts Push - "PSH” – Instructs receiving system to send all buffered data immediately Urgent - "URG” – States that the data contained in the packet should be processed immediately Finish - also called "FIN" – Tells remote system that there will be no more transmissions Reset - also called "RST” – Also used to reset a connection
  • 12. SYN Stealth / Half Open Scan It is often referred to as half open scan because it does not open a full TCP connection First a SYN packet is sent to a port of the machine, suggesting a request for connection, and the response is awaited If the port sends back a SYN/ACK packet, then it is inferred that a service at the particular port is listening. If an RST is received, then the port is not active/ listening. As soon as the SYN/ACK packet is received, an RST packet is sent, instead of an ACK, to tear down the connection The key advantage is that fewer sites log this scan
  • 13. Stealth Scan Client sends a single SYN packet to the server on the appropriate port If the port is open then the server responds with a SYN/ACK packet If the server responds with an RST packet, then the remote port is in "closed” state The client sends RST packet to close the initiation before a connection can ever be established This scan also known as “half-open” scan
  • 18. IDLE Scan: Basics Most network servers listen on TCP ports, such as web servers on port 80 and mail servers on port 25 A port is considered "open" if an application is listening on the port, otherwise it is closed One way to determine whether a port is open is to send a "SYN" (session establishment) packet to the port The target machine will send back a "SYN|ACK" (session request acknowledgment) packet if the port is open, and an "RST" (Reset) packet if the port is closed A machine which receives an unsolicited SYN|ACK packet will respond with an RST. An unsolicited RST will be ignored Every IP packet on the Internet has a "fragment identification" number Many operating systems simply increment this number for every packet they send So probing for this number can tell an attacker how many packets have been sent since the last probe
  • 20. IDLE Scan: Step 2.1 (Open Port)
  • 21. IDLE Scan: Step 2.2 (Closed Port)
  • 23. ICMP Echo Scanning/List Scan ICMP echo scanning This isn't really port scanning, since ICMP doesn't have a port abstraction But it is sometimes useful to determine which hosts in a network are up by pinging them all nmap -P cert.org/24 152.148.0.0/16 List Scan This type of scan simply generates and prints a list of IPs/Names without actually pinging or port scanning them A DNS name resolution will also be carried out
  • 24. TCP Connect / Full Open Scan
  • 25. NMAP Scan Options Output options
  • 32. SAINT
  • 34. Nessus Nessus is a vulnerability scanner , which looks for bugs in software An attacker can use this tool to violate the security aspects of a software product Features Plug-in-architecture NASL (Nessus Attack Scripting Language) Can test unlimited number of hosts simultaneously Smart service recognition Client-server architecture Smart plug-ins Up-to-date security vulnerability database
  • 35. GFI LANGuard GFI LANGUARD analyzes the operating system and the applications running on a network and finds out the security holes present It scans the entire network, IP by IP, and provides information such as the service pack level of the machine and missing security patches, to name a few GFI LANGuard Features Fast TCP and UDP port scanning and identification Finds all the shares on the target network It alerts the pinpoint security issues Automatically detects new security holes Checks password policy Finds out all the services that are running on the target network Vulnerabilities database includes UNIX/CGI issues
  • 37. Draw Network Diagrams of Vulnerable Hosts
  • 41. Proxy Servers Proxy is a network computer that can serve as an intermediate for connection with other computers They are usually used for the following purposes: As a firewall, a proxy protects the local network from outside access As an IP addresses multiplexer, a proxy allows the connection of a number of computers to the Internet when having only one IP address Proxy servers can be used (to some extent) to anonymize web surfing Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material Proxy servers can afford some protection against hacking attacks
  • 43. Use of Proxies for Attack
  • 45. Happy Browser Tool (Proxy-based)
  • 50. Some anonymizer sites Many anonymizer sites create an anonymized URL by appending the name of the site the user wishes to access to their own URL, e.g.: http://anon.free.anonymizer.com/http://www.yahoo.com/ Anonymizer.com Anonymize.net @nonymouse.com Iprive.com MagusNet Public Proxy MuteMail.com PublicProxyServers.com Rewebber.de SilentSurf.com Surfola.com Ultimate-anonymity.com
  • 51. Anonymizers’ limitations HTTPS. Secure protocols like "https:" cannot be properly anonymized, since the browser needs to access the site directly to properly maintain the secure encryption. Plugins. If an accessed site invokes a third-party plugin, then there is no guarantee that they will not establish independent direct connections from the user computer to a remote site. Logs. All anonymizer sites claim that they don't keep a log of requests. Some sites, such as the Anonymizer, keep a log of the addresses accessed, but don't keep a log of the connection between accessed addresses and users logged in. Java. Any Java application that is accessed through an anonymizer will not be able to bypass the Java security wall. Active X. Active-X applications have almost unlimited access to the user's computer system. JavaScript. The JavaScript scripting language is disabled with url-based anonymizers
  • 53. Why Do I Need HTTP Tunneling? Let’s say your organization has blocked all the ports in your firewall and only allows port 80/443 and you want to use FTP to connect to some remote server on the Internet In this case you can send your packets via http protocol
  • 54. Httptunnel for Windows httptunnel creates a bidirectional virtual data connection tunnelled in HTTP requests. The HTTP requests can be sent via an HTTP proxy if so desired This can be useful for users behind restrictive firewalls If WWW access is allowed through an HTTP proxy, it's possible to use httptunnel and, say, telnet or PPP to connect to a computer outside the firewall On the server you must run hts. If I wanted to have port 80 (http) redirect all traffic to port 23 (telnet) then it would go something like: hts -F server.test.com:23 80 On the client you would run htc. If you are going through a proxy, the -P option is needed otherwise omit it. htc -P proxy.corp.com:80 -F 23 server.test.com:80 Then telnet localhost and it will redirect the traffic out to port 80 on the proxy server and on to port 80 of the server, then to port 23.
  • 55. How to Run Httptunnel?