0 ratings0% found this document useful (0 votes) 478 views103 pagesCEHv10 Module 03 Scanning Networks PDF
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Module 03
Scanning NetworksThis page is intentionally left blank.
ir peter ny of vc,segs ‘iam 25 cre naar
Vere tekey aera
Module Objectives
[After identifying the target system and performing the initial reconnaissance as discussed in the
Footprinting and Reconnaissance module, attackers begin to search for an entry point into the
target system. it should be noted that the scanning itself is not the actual intrusion, but an
extended form of reconnaissance in which the attacker learns more about Nis/her target,
including information about operating systems, services, and any configuration lapses. The
information gleaned from this reconnaissance helps the attacker select strategies for the attack
onthe target system or network.
This module starts with an overview of network scanning and provides an insight into various
techniques that can be used to check for live systems and open ports It goes onto discuss various
scanning techniques and ends with an overview of penetration testing (also called pen-testing)
steps that an ethical hacker should follow to perform the security assessment ofthe target.
[At the end of this module, you willbe able to:
‘+ Describe the network scanning concepts
"+ Use various scanning tools
‘+ Perform scanning to check for live systems and open ports
‘+ Perform scanning by using various scanning techniques
‘Scan beyond intrusion detection system (105) and firewall
‘Perform banner grabbing
+ Draw network diagrams using network discovery tools
‘+ Perform scanning penetration testing
Mesieos rset (ineliningand ourtemeaires prt Oy Kame
‘line ricnas Remon Hohe
ste perc coy of cue,‘Network Scanning Concepts
As already discussed, footprinting isthe frstphase of hacking In which the attacker gains primary
Information about a potential target. He/she then uses this information in the scanning phase in
order to gather more detailed information about the target.
16. a personal py oF devon,Semi etrone
Se en
Objectives of ator Scanning
odovere hosts, ant cpengonset neha
Fenn
“eacover vei nie os
Overview of Network Scanning
‘Scanning is the process of gathering adcitional detailed information about the target by using
highly complex and aggressive reconnaissance techniques. Network seanning refers toa set of|
procedures used for identifying hosts, ports, and services in 2 network. It is one of the most
Important phases of intelligence gathering for an attacker which enables him/her to create @
profile of the target organization. In the process of scanning, the attacker tries to gather
Information, Including the specific IP addresses that can be accessed over the network, the
target's operating systems and system architecture, and the services running on each computer.
‘The purpose of scanning is to discover exploitable communications channels, probe as many
listeners as possible, and keep track of the ones that are responsive or useful to an attacker's
particular needs. In the scanning phase of an attack, the attacker tries to find various ways to
intrude into a target system, The attacker also tees to discover more about the target systern to
find out if there are any configuration lapses in it. The attacker then uses the information
‘obtained during the scan to develop an attack strategy.
‘Types of Scanning
Port Scanning —Lists the open ports and services. Port scanning isthe process of checking
the services running on the target computer by sending a sequence of messages in an
attempt to break in. Port scanning involves connecting to or probing TCP and UDP ports
fon the target system to determine ifthe services are running of are ina listening state.
The listening state provides information about the operating system and the application
currently in use. Sometimes, active services that are listening may allow unauthorized
ser access to misconfigure systems or to run software with vulnerabilities.
Network Scanning — Lists IP addresses, Network scanning is a procedure for identifying
active hosts on a network, elther to attack them or to assess the security ofthe network
Me 8 ge 273 ha cigar eters ng © EE aed
ATR owes Ropomcontsny Pomerat
rite pra ef ring,‘+ Vulnerability Scanning ~ Shows the presence of known weaknesses, Vulnerability
scanning is @ method used to check whether a system is exploitable by identifying its
‘winerablities. A vulnerability scanner consists of a scanning engine and 2 catalog. The
‘catalog includes a list of common files with known vulnerabilities and common exploits
for a range of servers. A vulnerability scanner may, for example, look for backup files or
directory traversal exploits. The scanning engine maintains logic for reading the exploit
list, transferring the request to the Web server, and analyzing the requests to ensure the
safety of the server, These tools generally target vulnerabilities that secure host
configurations can fx easily, updated security patches, and a clean Web document.
‘The access points that a thief who wants to break into a house looks for are the doors and
‘windows. These are usually the house's points of vulnerability, as they are easily accessible.
‘When it comes to computer systems and networks, ports are the doors and windows of the
system that an intruder uses to gain access. A general rule for computer systems is that mare the
‘number of open ports on a system, more vulnerable isthe system. However, there are cases, in
“which a system has fewer open ports compared to anather machine, but the open ports present.
‘a much higher level of vulnerabil
Objectives of Network Scanning
‘The more the Information at hand about a target organization, the greater the chances of
knowing a network’ security loopholes and consequently, for gaining unauthorized access to it.
Below are some objectives for scanning a network
‘Discover the network’ live hosts, IP addresses, and open ports of ive. Using open ports,
‘the attacker will determine the best means of entry into the system.
Discover the operating system and system architecture of the target. This is also known
2s fingerprinting. An attacker can formulate an attack strategy based on the operating,
system's vulnerabilities.
"+ Discover the services running/lstening on the target system. Doing so gives the attacker
‘an indication of vulnerabilities (based on the service) exploitation for gaining access to
the target system.
‘+ Identify specific applications or versions ofa particular service.
Identify vulnerabilities In any of the network systems. This helps an attacker to
‘compromise the target system or network through various exploits
EC‘TCP Communication Flags
TCP header contains various flags that control the transmission of data across a TCP connection.
‘Six TCP control fags manage the connection between hosts and give instructions tothe system,
Four of these fags (namely: SYN, ACK, FIN, and RST] govem the establishment, maintenance, and
termination of a connection. The other two flags (namely: PSH and URG) provide instructions to
the system, The size ofeach fag is 1 bit. As there are six lags inthe TCP Flags section, the size of
this sections 6 bits, When a flag value is set to 1, "that flag is automatically turned on.
‘The following are the TCP communication flags:
‘Synchronize alias "SYN": It notifies the transmission of a new sequence number. This fag
‘generally represents the establishment of a connection (3-way handshake) between two
hosts.
‘Acknowledgement alias “ACK It confirms the receipt of transmission and identifies next
expected sequence number. When the system successfully receives a packet, it sets the
value of its flag to “1,” implying that the receiver should pay attention to it
Push alias "PSH": When its flag is set to “1,” it incicates that the sender has raised the
push operation to the receiver; this implies that the remote system should inform the
receiving application about the buffered data coming from the sender. The system raises
‘the PSH flag atthe time of start and end of data transfer and sets it on the last segment
of file to prevent buffer deadlocks.
Urgent alias “URG": It instructs the system to process the data contained in packets as
soon as possible. When the system sets the flag to "1," the remote system gives priority
‘to the urgent data and processes i first, stopping allhe other data processing
Maa 3 Fe 25 ho nga aterenurs Cn ty
ecm
retracts iy Petes
rss a perera ctpyo anvrncorg,Scien
Finish alias "FIN": slag is setto“1" to announce that itwill not send more transmissions
to the remote system and terminates the connection established by the SYN flag,
Reset alias “RST": When there isan ertor in the current connection, its flag i set to “2,”
and itaborts the connection in response to the error. Attackers make use ofthis to scan
host in search of open ports.
‘SYN scanning mainly deals with three of the flags: SYN, ACK, and RST. You can use these three
‘lags for gathering illegal information from servers during the enumeration process
ot Fase ce Hang courtamesae opt Oy Hane
‘fan foesne tepctonnsvisy sete
rasan aneSom sete
TCP/IP Communication
‘TP Seaton Extaten mat
TCP/IP Communication
TCP is connection-oriented, which prioritizes connection establishment before data transfer
between applications This connection between protocols is possible through the process ofthe
three-way handshake.
‘TCP Session initiates using a three-way handshake mechanism:
= To launch a TCP connection, the source (10.0.0.2:21) sends a SYN packet to the
destination (10.0.0.3:21).
= Onreceiving the SYN packet, the destination responds by sending a SYN/ACK packet back
to the source,
‘The ACK packet confirms the arrival ofthe first SYN packet to the source.
"To conclude, the source sends an ACK packet for the ACK/SYN packet transmitted by the
destination.
This riggersan "OPEN" connection, allowing communication between the source andthe
destination; this continues until one of them issues a "FIN" or *RST™ packet to close the
connection.
The TCP protocol maintains stateful connections for all connection-oriented protocols
‘throughout the Internet, and works lie an ordinary telephone communication, in which one
picks up a telephone receiver, hears a dial tone, and dials a number that triggers ringing atthe
‘other end, until a person picks up the receiver and says, “Hello.”
‘The system terminates the established TCP Session as follows:
After completing all the data transfers through the established TCP connection, the sender sends
the connection termination request to the receiver by sending @ FIN of RST packet. Upon
Meer ae 27 ‘thal nga outeren cpg 9 EO ame
Aitghnnenes Ropodsct oa Pete
iis eral cy fcr.receiving the connection termination request, the receiver acknowledges the termination
requests by sending ACK packet to the sender and finally sends its own FIN packet; then the
system will terminate the established connection.
osior Pan 8 hcl ing outarene cpgh Keane
‘Aifgrnkoewee Foros enh Monee
ist ere cy of cerSm to
Ror steerer Be tonig = BN Batt]
‘oat Packt alr eres the ceo of extom neva pockets ude neva for eros acs
| Ataders ana sett eae amend kaso bypass Hremas and Systems ine etert
Pace Crating Tools
scat opens etsonoalscom|
creat /osintser]
Wer ita slomscom)
cit ip poersacsogeet
Laners it (ep/semrconséocncom)
Creating Custom Packet Using TCP Flags
Packet Crafting Tools
Packet crafting tool ae used to generate and analyze network traffic. These tools craft and send
Packet streams by using diferent protocols at different transfer rates.
Colasoft Packet Builder
Source: http://www colasoft.com
Colasoft Packet Bullderis a too! that allows an attacker to create custom network packets
and helps security professionals to assoss the network. The attacker can select a TCP
packet from the provided templates and change the parameters in the decoder editor,
hexadecimal editor, or ASC editor to create a packet. In addition to bullding packets,
Colasoft Packet Bullder supports saving packets to packet files and sending packets to the
network.
‘There are three views in the Packet Builder:
scket List, Decode Editor, and Hex Editor.
(© The Packet List displays all constructed packets. When you select one or more packets
in the Packet List, the frst highlighted packet displays in both Decode Editor and Hex
Editor for eiting.
© Inthe Hex Editor, the data of the packet are represented as hexadecimal values and
ASCII characters; nonprintable characters are represented by a dot ("") in the ASCII
section. You can edt either the hexadecimal values or the ASCII characters.
(© Decode editor allows the attacker to edit packets without remembering value length,
byte order, and offsets, You can select a feld and change value inthe edit box.
Me ae 29 ts Manga Geter Cn Esme
nite news Repoascons say Monet
eral ey af cern.Sm etn
For creating a packet, you can use the add or insert packet command in the Edit menu or
fon the Toolbar to create a new packet.
The attacker can send a constructed packet to wire directly and control how Colasoft
Packet Builder sends the packets, specifying, for example, the interval between every
packet, loop times, and the delay time between loops.
This packet builder audits networks and checks network protection against attacks and
Intruders. Attackers may use this packet builder to create fragmented packets to bypass
‘network firewalls and IDS systems. They can also create packets and flood the victim with
2 very large number of packets, which could result in denial-of service attacks.
Some ofthe packet crafting tools include:
NetScanTools Pro (https,//mwu.netscantools.com)
Ostinato heepy/ostinato.org)
WAN Killer (http://www solarwinds.com)
Packeth (http//packeth,sourceforge.net)
LANForge FIRE (http://www condelatech.com)
Bit-Twist (tp: //bittwist sourceforge.net)
WireEdit(htps://wireedit.com)
Moi Pe 280 handing ort Copy © Kegaue
aig tenad eroacon sone teed
re pesca ean of cevencor,ehh ouere
(hs poem te tart oo tom bet 8 ppt more wk sng
‘ie
‘actin nwo scamnng chou wibecompuntenay es ease na eae seach
Sze SUBS ars spears poe bye v6 Waser
‘Sannirgn hs stark rare cet nd cpl won compares the Pe. Analy,
Sumber af zamingtniaaotuppot ane weezer Ps Remon i
aS
ce are ee
SRS RR STE TE
‘bl ocompromis estos nthe sine he or chetan pos tea hast los
‘mute cares
Scanning in IPv6 Networks.
v6 increases the size of IP address space from 32 bits to 128 bits to support more levels of
addressing hierarchy. Traditional network scanning techniques are computationally less feasible
because of larger search space (64 bts of host address space, or 2" addresses) provided by IPv6
Jina subnet. Scanning in the IPG network is more difficult and complex when compared to the
|Pv4.Additionally, a number of scanning tools do not support ping sweeps on IPvS networks.
‘Atackersneed to harvest IPv6 addresses from network traf, recorded logs, or "Recelved from”
and other header lines in archived email or Usenet news messages to identify IPv6 addresses for
subsequent port scanning, Scanning an IPv6 network, however, offers a large number of hosts in
‘a subnet; ifan attacker can compromise one subnet host, he can probe the “all hosts link local
‘multicast address, fhosts numbers are sequential, or use any regular scheme. An attacker needs
to analyze 2* addresses to verify fa particular open service Is running on a host in that subnet.
‘Ata conservative rate of one probe per second, such a scan would take about 5 billion years to
complete,
ae 3 Pye 282 tthatiigand outemens cpg Ea
‘aig trond apo tsa Ponte,
Ths apernal epyofdeurwcangAUC gtd
Scanning Tools
‘Scanning tools scan and Identify live hosts, open ports, running services on a target network,
location-info, NetBIOS info and information about all TCP/IP, UDP open ports. Information
‘obtained from these tools will assist an ethical hacker in creating the profile of the target
‘organization and to scan the network for open ports of the devices connected.
Me ge 82 ing Goatees Cnty fea
Aikete renee Rewoascons say Mone
iris ately of devasSede
Nmap
Source: httpsi/nmap.org
"Nmap is a security scanner for network exploration and hacking It allows you to discover
hosts and services on a computer network, thus creating a "map" of the network. Itsends
specially crafted packets to the target host and then analyzes the responses to accomplish
Its goal, Either a network administrator or an attacker can use this tool for thelr specific
needs. Network administrators can use Nmap for network inventory, managing service
Upgrade schedules, and monitoring hast or service uptime. Attackers se Nmap toextract
Information such a live hosts on the network, services (application name and version),
type of packet fiters/irewalls, operating systems, and OS versions. Nmap includes a
flexible data transfer, redirection, and debugging too! (Neat), a utility for comparing scan
results (Nef, and a packet generation and response analysis tool (Nping)
‘Some of the features of Nmap are:
It scans vast networks of literally hundreds of thousands of machines.
© It supports dozens of advanced techniques for mapping out networks fled with IP
Titers, frewalls, routers, and other obstacles, Nmap includes many port scanning
‘mechanisms (TCP and UDP), OS detection, version detection, ping sweeps, and so on.
Mees Page 283 ic ing center ope ly EEG
ris apersonalepy of evraa
(Eh cerrado scmning and pack eating tol the TOP pte - jj
"cn id ar mr wary ming Frew tng mana path MTU icy aban HOS,
a
‘emate 5 fingering ramate ptne wes, TOY lacs ein e
+ Hing? / Hpings
Source: htte//wer hing ora
Hping2/iping3 isa command ine-orented network scanning and packet crating tol for
the TCP/IP protocol that sends MP echo requests and supports TCP, UDP, ICMP, and
raw? protocols. it performs network security auditing, firewall testing, manual path
MTU discovery, advanced traceroute, remate OS fingerprinting, remote uptime gue
Tee/iP stacks auditing, and other functions. Hping2/Mping3 has a Traceroute mode which
enables youtosend flesbetween covert channels. Itean send custom TCP/IP packets and
display target replies, as doesa ping program with ICMP replies. tt handlesfragmentation,
arbitrary packets’ body and size, and uses them to transfer encapsulated les under
supported protocols. It supports idle host scanning. IP-spocfing and network/host
Scanning can be used to perform an anonymous probe for serves.
An attacker studies the behavior of anil host to gan information about the target, such
as the services thatthe host offers, the ports supporting the servles, andthe operating
system of the target. This type of scan is a predecessor to either heavier probing or
outright atacs.
‘The following ae some ofthe Features of Hping2/HpingS:
©. It determines whether the hos is up even when the host locks ICMP packets.
© Itaids advanced port scanning and test net performance using different protocols,
packet sizes, TOS, and fragmentation,
© Manual path MTU discovery
Firewalllke usage allows discovery of cpen ports behind firewalls
Remote 0S fingerprinting and TCP/IP stack audlting
Woe Pe 254 ‘atau atemanine a iy WEL
ne pera coy or evennerg,ICMP Seanning
[A ping sweep or Internet Control Message Protocol (ICMP) scanning is @ process of
sending an ICMP request or ping to all hosts on the network to determine which one Is
up.
‘The operating system, router, switch, internet protocol-based devices use this protocol
via the ping command to Echo request and Echo response as a connectivity tester
between diferent hosts
[ACK Scanning on Port 80,
You can use this scan technique to probe forthe existence ofa firewall and its rule sets.
Simple packet fitering allows you to establish a connection (packets with the ACKbitset),
Whereas a sophisticated stateful firewall does not allow you to establish a connection,
oes ree ‘stages cam mms ar © Sm
“se perc capy of eves.Semi ts
ES
| ices
Hping Commands
Below are various Hping commands:
= ICMP ping
Ex. ping? -2 10.0.0.25
Hping performs an ICMP ping scan by specifying the argument -1 on the command line.
‘You may use ~ICMP of -1 argument in the command line. By issuing the above command,
bhping sends ICMP-echo request to 10.0.0.25 and receives ICMP-teply the same as with a
ping uty
ACK sean on port 80
Ex. ping’ -A 10.0.0.25 -p 60
Hing can be configured to perform an ACK scan by speddfving the argument -A inthe
command line. Here, you are setting ACK flag inthe probe packets and performing the
scan. You perform this sean when a host does not respond to a ping request. By Issuing
this command, Hping checks if a hosts alive on a network. fit finds a live host and an
‘open por, itreturns an RST response.
= UDP scan on port 80
Ex. hping3 -2 10.0.0.25 ~p 80
Hping uses TCP as Its default protocol. Using the argument -2 in the command tine
specifies that Hping operates in UDP mode. You may use either ~udp of -2 arguments in
‘the command tne
By issuing the above command, Hping sends UDP packets to port 80 on the host
(20.0.0.25). It returns an ICMP port unreachable message if it finds the port closed, and
ddoes not respond with a messageif the port is open.
a2 Page 6 {hal gad ote: cop yam
“aig trons Rapa bia Potanes
tiie are my of devs= Collecting Initial Sequence Number
Bx. hping3 192.168.1.103 -9 -p 139 ~*
By using the argument -G in the command tine, Hping collects all the TCP sequence
numbers generated by the target host (192,168.1.103).
‘= Firewalls and Time Stamps
Ex. hping3 -5 72.14.207.99 -p 60 --tep-tinostamp
Many firewalls drop those TCP packets that do not have TCP Timestamp option set. By
adding the ~tep-imestamp argument in the command line, you can enable TCP
‘timestamp option in Hping and try to guess the timestamp update frequency and uptime
of the target host (72.14.207.99).
‘= SyNsean on port 50-60
Ex. hping3 -8 50-60 -s 10.0.0.25 -v
By using the argument - (or) ~scan in the command, you are operating Hping in scan
‘mode in order to scan a range of ports on the target host. Adding the argument allows
you to perform a SYN scan,
‘Therefore, the above command performs SYN scan on ports 50-60 on the target host.
‘+ FIN, PUSH and URG scan on port 80,
x. pping3 -F -P -0 10.0.0.25 -p 60
By adding the arguments ~f,-P, and -U in the command, you are setting FIN, PUSH, and
LURG packets in the probe packets, By issuing this command, you are performing FIN,
PUSH, and URG scans on port 80 on the target host (1040.0.25) f port 80 is open on the
target, you will not recelve a response. Ifthe port is closed, Hping will return an RST
response.
‘+ Scan entire subnet for live host
4x. mping3 -1 10.0.1. —-zand-dest -r otho
By issuing this command, Hping performs an ICMP ping scan on the entire subnet 10.0.1;
in other words, it sends ICMP-echo request randomly (-rand-dest) to all the hosts from
10,0.1,0 ~10.0.1.255 that are connected tothe interface eth0, The hosts whase ports are
‘open wil espond with an ICMP-reply In this case, you have nat seta por, so Hplng sends
packets to port 0 on all IP addresses by default
= Intercept all traffic containing HTTP signature
Ex. nping3 -9 HTTP -1 ono
‘The argument -9 wil set the Hping to listen mode. So, by issuing the command -9 HTTP,
Hping starts listening on port 0 (ofall the devices connected in the network to interface
th0), interceptsall the packets containing HTTP signature, and dump from signature end
to the packet's end
For example, on issuing the command nping2 -9 rz, if Hping reads 2 packet that
contains data 234-09safljs45-HTTPhello_world it wil display the result as hello_world
oahu henoiedonkoway Montes
“se apercralcapy of ovine.= SYN flooding a victim
Bx. hping? -8 192.168.1.1 -a 192.168.1.254 -p 22 --£lo0d
‘The attacker employs TCP SYN flooding techniques by using spoofed IP addresses to
perform Dos attack,
‘The following table ists the various scanning methods and their respective Hping commands:
Sean Commands
TO pine ‘apings -1 20.0.0.25
‘Acksanon par 80 ‘pping3 -A 10.0.0.25 -p 60
‘UDP scan on por 8 ‘pings -2 10.0.0.25 ~p 60
Colecting intel sequeneesuriber | Bpiaga 192.260.1.103 -g -p 139
Frewalt andtineatamps
Taping -5 72.14,207.99 -p 80 —-top-tineatanp
‘Si scan on por sO-60
Tpplagi -8 50-56 -8 10.0.0.25 -¥
FIN, PUSH and URS san on por 80
‘Sean entire sdbt fre host
Intercept al fic containing HTTP
sienature
‘pings -F =P 0 10.0.0.25 ~p 80
‘ppingS “1 10.0.1. —-rand-dest -1 etho
‘apingS -9 WITP -r tho
‘SW ooang avctin
TapingS -8 192.168.1.1 -a 192.168.1.284 -—p 22
“elo
‘hcl cing cumemennes Capris Oy Home
alti tenes Napaascoe asia) eabtos
ri apace py of dori© moors mash maleate
hers tang moni ob)
+ Seen eon
ome massa pany
+ onan inon
«etree mnnoneit om)
Scanning Tools
+ NetSeanTools Pro
Source: hite/www.netscantooks.com
\NetscanTools Pro is an investigation tool that allows you to troubleshoot, monitor,
discover, and detect devices on your network. You can easily gather information about
the local LAN, 25 wells Internet users, IP addresses, ports, and soon using this tool. You
can find vulnerabilities and exposed ports in your system. NetScanTools Pro combines
‘many network tools and utilities categorized by their functions, such as active, passive,
DNS, and local computer,
© Active Discovery and Diagnostic Tools: Used for tasting and locating devices
connected to your network.
(©. Passive Discovery Tools: Monitor the activities of the devices connected to your
network and gather information from third parties.
(©. DNS Tools: Help to detect DNS problems.
(©. Local Computer and General Information Tools: Provide details about your local
‘computer's network
Benefts:
‘©. The information gathering process is made simpler and faster by automating the use
‘of many network tools.
(©. Clearly produces the result reports in your web browser.
tte petra ony ot aruSome of the scanning tools are listed below:
Supersean(tps//aww.mcafee.com)
PRTG Network Monitor (htess/mw:paessler com)
Comieck (hetas/imm.sewvius. com)
IMiTeC Network Scanner (http://www mitec.ce)
[NEWT Professional (htip/www komodolabs.com)
MegaPing (tp:/muw.magnetosoft.com)
Sithers Network Discovery (http//www.komodolabs com)
TamoSof’s CommView (htp//wwrtomos.com)
IP Scanner (itps//eammunity spiceworks.com)
Tools (hiips://uww ks softnet)
Network Scanner (htip/www.10strke.com)
Global Network loventory (http//ww.magnetosoft.com)
SoftPerfect Network canner (hitps/mwwsoftperfect corm)
‘Advanced Port Scanner (hitps//wmw.advanced-port-scanner.com)
CcurePors(htps//mnwnirsof.net)
‘Masscan (htips//aithub.com)
DDRACNMAP (https:/othub.com)
NEET (netps://athub.com)
of deere
“hele apetanal oySeam etn
===] scanning Tools for Mobile
Scanning Tools for Mobile
= wscanner
‘Source: http//10base-t.com
1P Scanner for 105 scans your local area network to determine the identity of allits active
‘machines and Internet devices.
Features:
© In-bulltPing, Portscan, and WOL tools
(©. Traverse to native VNC, web browser, or any custom service directly from the scan
resus,
(© Customizable eisplay options for assigning names and icons to discovered devices
‘© Ability to create your custom device categories with your images.
© Ability to export, email, and print scan results.
+ Fing
Source: https://wwnw fing io
Fing is @ mobile app for Android and IOS that scans and provides complete network
information, such as IP address, MAC address, device vendor, and ISP location.
Features:
‘© Discovers all devices connected to a Wi-Fi network
© Displays MAC Address and device manufacturer
Med ge 21 se ingore Ch Fea
Aifete tenes Hepoascont say Monet
titi areal ey of crurncr.© Fullsearch by IP, MAC, Name, Vendor, and Notes
Displays NetBIOS names and properties
Tracks when a device has gone online or o
Launch Apps for specfic ports, such as Browser, SSH, FTP
Ping and traceroute: Assesses network performance
[Automatic DNS lookup and reverse lookup
Supports identification by IP address for bridged networks
Sort by IP, MAC, Name, Vendor, State, and Last Change
‘Some of the scanning tools for mobile devices include:
"= Hackode (https//play. google.com)
ANT (htepsi//www.zimperium.com)
= eSploit (http://www. esploit.org)
= Faceniff (http://www effecthacking.com)
= PortDroid Network Analysis (https://play. google.com)
= Pamn ip Scanner (https//play. google.com)
er Pe?
Wake On LAN: Allows you to switch on your devices from mobil or tablet
ire fees Rom
yan
ie cereal ey f cer.Scanning Techniques
‘Scanning isthe process of gathering information about systems that are “alive” and responding
fon the network, Port scanning techniques help an attacker to identify the open ports on a
targeted server or host. Administrators often use port scanning techniques to verify security
polices oftheir networks, whereas attackers use them to identity running services ona host with
the intent of compromising the network
‘The first step in scanning networks isto check for lve systems. Ths section highlights how to
check for lve systems with the help of ICMP scanning, how to ping a system and various ping
sweep tools Once the attackers detect ive systems inthe target network, they try to find open
ports in the discovered lve systems. The next step in the network scanning process involves,
‘checking the open ports in live systems. Sometimes users unknowingly Keep unnecessary open
ports on their systems, Attacker takes advantages of such open ports to launch attacks, Th
section describes the tols and techniques used by an attacker to do so,
osc [-B] [-f fromhost] [-d delay] [-T tine) targe
Where, is one of
CMP timestamp request (default)
IMP address maskrequest
“di delay to sleep between packets isin microseconds
specifies the number of seconds to walt fr a host to respond. The default ie 5.
A target isa lst of hostnames or adéresses.
Mesie os rae inalindingand ortemaures prt Oy Kea
‘lint rconas Rewoasconesncy Hohe
is perc ey of cee,ere seep esr E cy
"gonna onetime eho meee of are by erg CEO rene aml
‘olou ste neirnen Eon eo
© Aeterna co mete mmbrtha rete
"pases nny pgp rete a oer pans tee
‘Ping Sweep- Checking for Live Systems
‘A ping sweep (also known as an ICMP sweep) Is a basic network scanning technique that Is
employed to determine which range of IP addresses map to live hosts (computers). Although a
single ping wil tell the user whether one specified host computer exists on the network, a ping
sweep consists of ICMP ECHO requests sent to multiple hasts. Ifa specified host is actve, i wil
return an ICMP ECHO reply.
Ping sweeps are among the oldest and slowest methods used to scan a network. This utility
distributed across almost al the platforms acts as a rol call for systems; a system that fs active
fn the natworkanswers the ping query that another system sends out.
‘To understand pings better, one should be able to understand the TCP/IP packet. When a system
pings, it sends a single packet across the network toa specific IP address. Tis packet contains 64
bytes (56 data bytes and 8 bytes of protocol ade information), The sender then wats or listens
{for a return packet from the target system. Ifthe connections are good and the target computer
's “alive,” a good return packet Is expected. However, this wil not be the case If there is a
alisruption in the communication. Ping also details the amount of time it takes for a packet to
‘make the complete trp called the “rouné-trip time.” Ping also helps in resolving hostnames. In
this case, if the packet bounces back when sent tothe IP address, But pot when sent to the name,
‘then the system is unable to resolve the name to the specific IP address.
[Attackers calculate subnet masks using Subnet Mask Cakulators to identify the number of hosts
that are present inthe subnet. Attackers subsequently use ping sweep to create an inventory of,
live systems inthe subnet,
terse nc actin aterm Coy yam
hiker ncwee heponscon sector
“ste apesanleapycbumiangSaree ede}
[Angry iP Scanner
sane pg teh atest hey
Se gai rae
Ping Sweep Tele
(evfraserscon)
9 Nescracl Poh /wmtcotcan)
9 coke nee anita
9 Venn 60 (ee/Ane segs
© opus tps marapengne cn)
Ping Sweep Tools
Ping sweep toolsping en entire range of network P addresses toidentity the lve systems. Given
below are ping sweep tools that enable one to determine live hosts on the target network by
sending muitile KMP ECHO requests to various hosts on the network ata time.
+ Angry IP Scanner
Source: htt//www.angryi.org
‘Angry IP scanners an IP address and port scanner. It can scan IP addresses at any range
as well as any oftheir ports t pings each IP address to check f they are alive, then it
optionally resolves its hostname, determines the MAC address, scans ports, and So on.
‘The amount of data gathered about each host extends with plugins. Angry P scanner has
additional features, such as NetBIOS information (computer name, workgroup name, and
currently logged in Windows usr), favorite P address ranges, web server detection, and
customizable openers. The tool allows the user to save the Scanning results to CSV, TXT,
XML, oF P-Pot list ile, To increase scanning speed, it uses a multithreaded approach: 3
separate scanning thread created for each scanned IP address
Listed below area few more ping sweep tools that an attacker one to determine live hosts on the
target network:
+ SolarWinds Engineer's Toolset (http://www solanwinds.com)
+ NetscanTools Pro (httos//wvmmnetscantools.com)
* Colasoft Ping Tool [http://www colasoft.com)
+ Visual Ping Tester (htt//www.pingtesternet)
+ Oputilshttps:/Awww.manageengine.com)
rd courte pet © Keane
Ture tpsecar sot Ponce
re peril eo a cron,Hlatgns ene ances taker
"Advanced IP Scanner (http://mww.advanced-ip-scanner.com)
= Pinginfoview (http://wwm.nisoft.net)
= Ping Moritor (http://wmniliand.com)
= Pinkie (htp://wiw uptime. net)
= MegaPing (http://www. magnetosoft.com)
Mose) Pen 303 hal aad outer cnet 0 Fame
‘i igh hac faposon ssc ootes
“hse aporseral copy of bvEe] Ben Pasties
© Howeve it sometnes stlin
retorhisuo rene ofthe
mene
2
ICMP Echo Scanning
ICMP echo scanning pings all the machines in the target network to discover live machines.
[Attackers send ICMP probes to the broadcast or network address which relays to all the host
addresses in the subnet. The live systems wil send ICMP echo reply message to the source ofthe
eM echo probe.
UNIX/Linux and BSD-based machines use ICMP echo scanning; the TCP/IP stack implementations
in these operating system respond to the ICMP echo requests to the broadcast addresses, This
‘technique does not work on Windows-based networks, as their TCP/IP stack implementation
does not reply to ICMP probes directed at the broadcast address.
ICMP echo scanning is not same as port scanning because it does not have a port abstraction.
CMP echo scanning is used to determine the particular hosts that are active in @ network by
pinging al of them. Active hosts are displayed in Zenmap as “Host is up (0.0000s latency),” as
“shown in the sereenshot above,
ose) Pg 0¢ ‘halal corte op Oy Kame
‘aig uence Roponcenteray Poh
si porn oppo anricongSere tons
‘Srpling te tee eyo
"oan by semsingan Spa
"6 doesnot eit the superna
‘TCP Connect / Full Open Scan
Source: htte://insecure.org
‘TCP Connect/Full Open Scan is one of the most reliable forms of TCP scanning, In TCP Connect
scanning, the operating system's TCP connect() system call tries to open a connection to every
interesting port on the target machine. If the port is listening, the connect) call wil result in a
successful connection with the host on that particular port; otherwise, it will return an error
message stating that the port isnot reachable,
‘TCP Connect scan completes a three-way handshake with the target machine. Inthe TCP three-
‘way handshake, the client sendsa SYN packet, which the recipient acknowledges with a SYNACK
packet Inturn, the client acknowledges the SYN+ACK packet with an ACK packet to complete the
‘connection. Once the handshake is completed, the scanner sends a RST packet to end the
‘connection.
“Making a separate connect) call fr every targeted por ina linear fashion would take along time
‘over a slow connection. The attacker can accelerate the scan by using, many sockets In parallel
Using nor-blocking, VO allows the attacker to seta low time-out period and watch all the sockets
simultaneous.
‘The drawback of this type of scan is thatitis easily detectable and filterable, The logs inthe target
system will disclose the connection, This type of scanning does not require the superuser
privileges.
Mots e305 hating outers aight iy HER
‘inn fseweeRgoselcn say Poe
ine anna apy of ceroStealth Scan (Half-open Scan)
Aheclon andre abrupt bom competion of theewey Ther
inhale sens Fence ok theetneten hal oer sme,
seca eat sng tue toby fea eee
‘dc loggngmecaramsnchide theres aad er sei!
‘Steatth sean Procers
aco rts ep ne ru
sath
Stealth Scan (Half-open Scan)
The Stealth scan involves resetting the TCP connection between client and server abruptly before
completion of the three-way handshake signals, hence, making the connection half open. A
stealth scan sends a single frame toa TCP port without any TCP handshaking or addtional packet
transfers. This type of scan sends a single frame with the expectation ofa single response. The
half-open scan partially opens a connection but stops halfway through. The stealth scan is also
called a “SYN scan,’ becauseit only sends the SYN packet. This preventsthe service from notifying,
the incoming connection. TCP SYN or hal-open scanning isa stealth method of port scanning.
‘The stealth scan also implements the threeway handshake methodology. Inthe last stage, It
‘examines the packets entering the interface and terminating the connection before triggering a
‘new initialization to identity remote ports. The stealth scan process is shown below.
‘+ The dient sendsa single SYN packet to the server on the appropriate port
‘+ IF the port i open, subsequently, the server responds with an SYN/ACK packet.
‘= Ifthe server responds with an RST packet, then the remote port isin the “dosed! state
"+ The client sends the RST packet to clase the initiation before a connection can ever be
established.
Attackers use stealth scanning techniques to bypass firewall rules, logging mechanism, and hide
themselves as usual under network traffic.
i i eatin Mieet
“Hse aparmal copy of dummy.Eel eee
Attackers send TCP probe packets with a TP flag (FIN, URG, PSH) stor with no lags,
no response implies thatthe port is open while RST means that the pot closed
Portia
cloned
Inverse TOP Flag Scanning
[Attackers send TCP probe packets with a TCP flag (FIN, URG, PSH) set, or with no flags. When the
port is open, the attacker does not get any response from the host, whereas when the port is
closed, he or she receives the RST from the target host.
Security mechanisms such as firewalls and IDS detect the SYN packets sent tothe sensitive ports
of the targeted hosts, Programs such as Synlogger and Courtney are available to log half-open,
'SYN flag scan attempts. At times, the probe packets enabled with TCP flags can pass through
fiers undetected, depending on the security mechanisms installed
Inverted Technique is an act of probing a target using a half-open SYN flag because the closed
ports can only send the response back. According to RFC 793, an RST/ACK packet sent for
connection reset, wien the host closes @ port. Attackers take advantage of this feature to send
‘TCP probe packets to each port of the target host with various TCP flags set.
Common flag configurations used for a probe packet include:
‘+ AFIN probe with the FIN TCP flag set
‘= An XMAS probe with the FIN, URG, and PUSH TOP flags set
‘+ ANULL probe with no TCP fags sot
+ ASYN/ACK probe
All closed ports on the targeted host will send an RST/ACK response. Since operating systems
such as the Windows completely ignore the RFC 793 standard, you cannot see the RST/ACK
response when connected to a closed port on the target host. However, this technique is
effective when used with UNIX-based operating systems.
ease 03 ge387 icttengand ourmesaee cpg © femme
‘aga sence eeseon sae Hokotes
pin esp rn,Advantages
Avoids many IDS and logging systems, highly stealthy
Disadvantages
‘= Needs raw access to network sockets, thus requiring super-user privileges
= Mostly effective against hosts using @ BSD-derived TCP/IP stack (not effective against
Microsoft Windows hosts, in particular).
Note: Inverse TCP flag scanring is known as FIN, URG, and PSH scanning based on the flag set in
the probe packet if there is no fag set, It is known as null scanning,
Meine Pgs 508 ha agar otrmnans Cope © y EOE
“ifghe Ascved horcactontsvay Pemtes
ipsa eny 0f cernrms ety eth cen gC 5D 28 TRE
eure
Xmas scan isa port scan technique with FIN, URG, and PUSH flags set to send a TCP frame toa
remote device if the target has opened the port, then you will receive no response from the
remote system. ifthe target has lased the port, then you willrecelve aremote system reply with
{2 RST. You can use this port scanning technique to scan large networks and find which host is up
and what services it is offering. It's a technique to describe all CP flag sets. When all lags are
set, some systems hang; so the flags most often set are the nonsense pattern URG-PSH-FIN.
‘Attackers use TCP XMAS scan to determine if ports are closed on the target machine via RST
ppacket. This scan only works when systems. are compliant with RFC 793-based TCP/IP
Implementation. twill not work against any current version of Microsoft Windows.
BSD Networking Code
‘This method relies on 8SD networking code. Thus, you can use this only for UNDK hosts; it does
not support Windows NT. Ifthe user scans any Microsoft system, it will show that all the ports
‘on the host are open,
‘Transmitting Packets
You can initialize al the flags when transmitting the packet toa remote host, I the target system
‘accepts the packet and does not send any response, it means that the port open. I the target
system sends RST flag, then itimplies thatthe port is closed.
Advantages
* Itavolds the IDS and TCP throe-way handshake.
Disadvantages
*Itworks on the UNIX platform only
sneer ante er St
“ea pereal ey of deumcargFe Sg ep ees cysts]
“6 Atacar send TP probe pacts wth ACK flag st aemate deve anthem anaes the header
Information (T.and WINDOW eld) ofrecved RST pacts ond out the port Bopen or loved
‘unset ACKtagpibe sennog ‘WoDoW base AO ag ede vetmig
fac fa
the vila pct on spat pat ist the WIDOT packt on sae
‘Pontietountay alate then tatpais epee pathos non soovaun, hehe por open
© Ack tg oberg an tn bets check the ering tem eget
6 anscrserdan Ack poe pat wth sfancom ceuence nue ro respares npr that pated
{sat reals ese sn AS expore meh he pa at eee
‘ACK Flag Probe Scanning
[Attackers send TCP probe packets withthe ACK flag set toa remote device and then analyze the
header information (TTL and WINDOW fel ofthe received RST packets to find out f the port is.
‘open or dosed. The ACK flag probe scanning exploits the vulnerabilities within BSD derived TCP/IP
stack, Thus, this scanning is effective only on those operating systems and platforms on which
‘the BSD derives TCP/IP stacks.
odes ree 230 {stagaand cam mms ar © me
“esa paral cy of deumaargCategories of ACK Flag Probe Scanning include:
= TrLsbased ACK fag probe scanning
In this scanning technique, you wil first need to send ACK probe packets (thousands in
number) to different TCP ports, and then analyze the TTL field value of the RST packets
received.
Ifthe TTL value of RST packet on a particular port i less than the boundary value of 64,
then that port is open. Here is an example displaying a lg of the first four RST packets
received
In the above example, port 22 has returned 2 TTL value of 50, whichis less than 64; all
other ports returned a TTL value of 80, which is greater than 64, Therefore, port 221s
open.
= WINDOW based ACK fag probe scanning.
In this scanning technique, you wil fist need to send ACK probe packets (thousands in
‘rumber) to different TCP ports, and then analyze the Window field value ofthe received
RST packets. The user can use this scanning technique when all the ports return the same
‘TTL value.
I the WINDOW value of RST packet on a particular port has a non-zero value, then that
Portis open. Here isan example displaying alg ofthe fst four RST packets received:
_peranal apy of eran.
‘The above figure shows thatthe TTL value returned for each packet isthe same, so vou
cannot perform TTL based ACK flag probe scanring to find the open ports. Therefore,
when you observe the window value, the third packet has a non-zero window value,
‘which means thatthe port is open
‘Advantages:
‘= This type of scan can evade IDS in most cases.
Disadvantages:
‘= This scan is very low and can exploit only older operating systems with vulnerable BSD
Aerived TCP/IP stacks.
eaieos gest) tomesa cingand Castner ‘em 2 59 cone aad
Sonieewons
(Checking the Filtering Systems of Target Networks
The ACK flag probe scanning technique also assists in checking the fitering systems of target
networks. The attacker sends an ACK probe packet to check the filtering mechanism (Firewall)
‘of packets employed by the target network
Sending an ACK probe packet with # random sequence number and getting No Response from
the target means thatthe port i filtered (stateful firewalls present); an RST response from the
target means thatthe port isnot filtered (No Firewal is Present).
Starting amap §.49087A4 (nttpe
Naap acan report for 10.10.0.25
Host is up (0-00076= Latency)
ALI 1000 seanned porte on 10-10.0.25 are unsittared,
/Insap org) at 2017-07-210
2 EDT
snap done: 1 P address (1 host up) scanned in 1,72 seconds,
Meaie 03 get? fhatadingad oto ns ph Oy Kame
‘taht vows Rowen Pohne
ici teil cy of devsIDLE/IPID Header Scan
2 spon scone pete mneanenentnteteone,
> Arama momen Ane
‘et re cong wee See
‘ciapactoneetamoemenne sina ne
+ Sretarkce tomentose
* Snotandnesine Beaman
* Leta see enteba
6 haute 0a PO ned ti
“noemsonnes ieee
IDLE/IPID Header Sean
‘The IDLE/IPIO Header scan is a TCP port scan method that you can use to send a spoofed source
address to a computer to find out what services are available. it offers complete blind scanning
of a remote host. Mast network servers listen on TCP ports, such as web servers on port 80 and
mail servers on port 25. Portis considered “open” if an application is listening on the port. One
\way to determine whether a port is open is to send a "SYN" (session establishment) packet tothe
port The target machine will send back a "SYN|ACK" (session request acknowledgment) packet
ifthe port is open, and an "RST" (Reset) packet ifthe port is closed. A machine that receives an
unsolicited SYN|ACK packet wil respond with an RST. An unsolicited RST will be ignored. Every
|W packet on the Internet has a Nragment identification" number (PID). OS increases the PID for
leach packet sent, thus probing an IPID gives an attacker the number of packets sent since the last
probe.
GUE DLE/P IO Heder san ng ewap
‘The attacker performs this scan by impersonating another computer through spoofing, The
attacker does not send a packet from her/his own IP address; instead, they use another host,
often called a "zombie," to scan the remote host and identify any open ports. In this attack, the
‘ee aparanal py of devinattacker expects the sequence numbers ofthe zombie host, and ifthe remote host checks the IP
of the scanning party, the IP of the zombie machine wal display.
IDLE Sean
Every P packeton the internet hasa fragment Intemet protocol identification (PID) number that
Uniquely identifies fragments of an original IP datagram. As many operating systems simply
Increase this number for each packet they send, probing for the IID can tell an attacker how
‘many packets the user sent since the last probe.
+ steps
‘The firs stepin performing an idle scans to find an appropriate zombie. The zombie that
assigns IID packets incrementally on a global basis is an appropriate or idle zombie to
perform the idle sean. The lower the time interval for request/response between the
attacker-2omble and the zomble-target, the faster the scan,
(Choose a “Zombie” and Probe for Its Current IP Identification (IPID) Number
In the first step, you will send the SYNSACK packet to the zombie machine to probe its
IPID number, Here, the reason for sending the SYN*ACK packet Is to probe the IPID
number but not establish a TCP connection (3-way handshake).
{As the zombie does not expect a SYN#ACK packet, It will deny the connection by sending
back an RST packet. Analyze the RST packet sent by the zombie machine to extract the
IPiD. In the diagram shown in the slide above, assume the zombie responds with
1Pi0=31337. Assume this PIDs x.
+ step2
‘The attacker sends an SYN packet tothe target machine on port 80 spoofing the IPaddress
of the Zombie.
Idle Scan: Stop 2.1 (Open Port)
Ifthe port is open, the target will send the SYNACK packet to the zombie (as the IP
address was spoofed) to proceed with the 3-way handshake. Since the zombie did not
‘expecta SYN¢ACK packot from the target machine, it wil respond with a RST packet.
sie os rgeatt inaliningand orem prt Oy Kame
‘lint rconas Rowena) Pohntet
ii ance ey of cre,Since every IP packet has a “fragment kertification” number, which Increases by one for
every packet transmission, this time the zombie will use itsnext available PID, ie, 31338
(ca),
Idle Sean: Step 2.2 (Closed Port)
‘Assume that the port on the target is closed. Subsequently, on receiving the SYN packet
{rom the attacker (you), the target wil respond with a RST, and the zombie will remain
Idle without taking any further action.
HOURE 6 Por cess
+ Stops
Now, follow step 1 again to probe the IP 1D number.
salen Zombie
Send a SYN+ACKpacket to the zombie, and it wll respond with a RST packet containing
‘the IPID. Assuming thatthe port on the target was open, and the zombie has already sent
‘RST packet tothe target; then the IPID number has increased by . Thistime the zombie
responds with a RST packet to the attacker by using its next IPID, Le, 31339 (K + 2)
Consequently, the IPID has increased by 2, which implies that the port on the target
machine was open. Thus, using an Idle scan, an attacker can find out the open ports and
services on the target machines by spoofing hs /her IP address witha zombie's IP address.
eenet commence tet
“tea parcanal copy of uring,UDP Scanning
UDP Raw ICMP Port Unreachable Scanning
UDP por scanners use the UDP protocol instead of the TCP. There ls nothree-way handshake for
UDP scan. The UDP protocol can be more challenging to use than the TCP scanning because you
can send a packet, but you cannot determine whether the host fs alive, dead, or fiered
However, you can use one ICMP that check for open or closed ports. I you send 3 UDP packet
toa port without an application bound to, the IP stack wl return an ICMP port unreachable
packet. f ary por returns an ICMP erro, it wl close up thereby, leaving the ports that id not
answer if they ae open or filtered through the firewall
This happens because open ports do not have to send an acknowledgement In response to a
probe, and closes ports are nat even required to send an error packet.
UDP Packets
Source: htps//amap.org
When you send a packet oa closed UDP pot, most ofthe hosts send an ICMP_PORT_UNREACH
error. Thus, ouan determine whether aportis NOT openif UDP packet o IMP erors re not
fuaranteed to arrive, Thus, UDP seanners ofthis sort must implement retransmission of packets
that appear lost. UDP scanners interpret lost traffic 3s open ports,
In addition, this scanning technique is slow because it imits the ICMP error message rate as
compensation to machines that apply RFC 1812 section 4.3.2.8, Aremote host will require access
tothe raw ICMP socket to distinguish closed from unreachable ports.
UDP RECVFROM () and WRITE () Scanning
Mees Pe sit it eign rarer a Py Em
rr pre copy of eure.Although non-root users cannot read unreachable port errors directly, Linux Informs you
Indiectly when they receive messages.
= Example:
For example, a second write ()callto a closed port will usually fal, Various scanners, such
{5 Netcat and Pluvial pscan.c do recvfrom () on non-blocking UDP sockets, and usually
return EAGAIN ("Try Again," errno 13) if the ICMP error has not been received, and
ECONNREFUSED ("Connection refused," ermo 111), it has. This isthe technique used
‘or determining open ports when non-root users use -u (UDP). The root users can alsouse
the 4 (lamer UDP scan) options to force this process.
‘Advantage:
The UDP scan is less informal regarding an open port because there is no overhead of a TCP
handshake. However, ifICMPis responding to each unavailable port, the number of total frames
can exceed thase from a TCP scan. Microsoft-based operating systems do not usually implement
any ICMP rate limiting, so this scan operates very efficiently on Windows-based devices
Disadvantage:
The UDP scan provides port information only. f the additional version of information is needed,
the scan must be supplemented with a version detection scan (-sV) of the operating system
fingerprinting option (0).
The UDP scan requires privileged access; hence, this scan options onlyavallable on systems with
the appropriate user permissions.
‘Most networks have huge amounts of TCP traffic; as result, the efficiency of the UDP scan is
lost. The UDP scan will locate these open ports and provide the security manager with valuable
Information for identifying successful attacker invasions on open UDP ports caused by spyware
applications, Trojan horses, and other malicious software,
Mein Fae 22? thea eingand ortemeions cpr © Eee
rit rae ric,Soest,
Feats
seit
ay any nen
(oestriol
List Scanning
Ina list scan, the discovery ofthe active network hast Is indirect. list scan simply generates and
prints alist of Ps/Names without actually pinging or scanning the hosts. Asa result, thelist scan
shows all IP addresses as “not scanned” (O hosts up). By default, a reverse DNS resolution is stil
carried out on each host by Nmap for learning their names,
Advantages:
*Allist scan can perform a good sanity check
The ist scan detects incorrectly defined IP addresses on the commana line orn an option
filo. t primary repairs the detected errors to run any “active” sean,
SSDP Scanning
‘SSDP (Simple Service Discovery Protocol) isa network protocol that generally communicates with
‘machines when querying them with routable IPvd or IPv6 multicast addresses. The SSOP service
‘controls communication forthe Universal Plug and Play (UPnP) feature. It generally works when.
the machine is not firewalled; however, it can sometimes work through a firewall. The SSOP
service will respond to the query sent over IPv4 or 1Pv6 broadcast addresses. This response
Includes information about the Universal Plug and Play (UPnP) feature associated with It. The
attacker uses SSDP scanning to detect UPnP vulnerabilities that may allow him/her to launch
buffer overflow or DoS attacks.
‘The attacker may use the UPnP SSOP M SEARCH information discovery tool tocheck whether the
machine is wlnerable to the UPnP exploits. The UPnP SSDP M-SEARCH information discovery tool
«leans Information from UPnP-enabled systems as shown Inthe above slide.
Moasees regent hol ecard outereaes Cpe by Kame
“gia haces tepsacton say ota
ne persnal apy aturebea geceiurniteRereiterrn etary
ram rr at ig om aornmeyaae it
‘Seepage Beemer
moet ote 05 dtr Lnarthte msoring fee gotng
init tarccmneroe “meen
Port Scanning Countermeasures
‘Asdiscussed previously, port scanning provides alot of useful information, such as P addresses,
host names, open ports, and services running on ports to the attacker. Open ports specifically
offer an easy means for the attacker to break into the network. But there is nothing to worry
about, provided that you secure your system or network against port scanning by applying the
following countermeasures:
Configure firewall and IDS rules to detect and block probes
The firewall should be capable enough to detect probes sent by the attackers using port
scanning tools. it should not allow traffic to pass through it after simply inspecting the
TCP header. The firewall should be able to examine the data contained in each packet
before allowing the traffic to pas through it
Run the port scanning tools against hosts on the network to determine whether the
firewall accurately detects the port scanning activity
= Some firewalls doa better job than others at detecting stealth scans. For example, many
firewalls have specific options to detect SYN scans, while others completely ignore the
FIN scans,
= Ensure that the router, IDS, and firewall firmware are updated to their latest
releases/version.
Configure commercial firewalls to protect your network against fast port scans and SYN
floods. You can run tools such as ports entry to detect and stop port scan attempts on
inux/UNDX systems.
Mose) Pee s18 hal ual outermeas cont 0 Fame
“he a porseral copy af buena.Hackers use tools such as Nmap and perform OS-detection methods to sniff the details of
2 remote operating system. Thus, its important to employ intrusion detection systems
in such cases. Snort (http://www-snortorg) is an intrusion detection and prevention
technology that can be very useful, mainly because signatures are frequently available
‘rom the public authors.
Keep as few ports open as necessary and fiter the ret, as the Intruder wil tryto enter
‘through any open port. Use @ custom rule set to lock down the network, block unwanted
ports at the firewall, and liter the following ports: 135-159, 256-258, 389, 445, 1080,
1745, and 3268,
Block inbound ICMP message types and all outbound ICMP type-3 unreachable messages
{a border routers arranged infront ofa campany/s main firewall
[Attackers try to perform source routing and send packets to the targets (which may not
be reachable via the Internet) by making use of an intermediate host that can interact
with the target. Such mechanisms can be adapted for hacking purposes to ensure that
‘your firewall and router can block such source-routing techniques.
Ensure that the mechanism used for routing and fitering at the routers and firewalls
respectively cannot be bypassed using a particular source port or source-routing
methods.
Test your IP address space using TCP and UDP port scans as well as ICMP Probes to
determine network configuration and accessible ports.
Ensure thatthe antiscanning and anté-spoofing rules are configured,
Ifa commercial firewalls in use, then ensure that:
© Itis patched with the latest updates
© Ithas correctly defined antispoofing rules
fo Its Fastmode services are unusable in Check Point Fiewall-1 environments
Modine teen tho cial arte cpr Oy omeScanning Beyond IDS and Firewall
‘An Intrusion Detection System (IDS) and firewall ae the security mechanism intended to prevent
‘an attacker from accessing a network. But even IDSs and firewalls have some security limitations.
‘Attackers try to launch attacks withthe aim of exploiting these imitations. This section highlights
various IDS/frewall evasion techniques such as packet fragmentation, source routing, IPaddress.
spoofing et.
on Paes thal tiga orto: cop ya
‘tins foes eonctnssiay Poeose ee oC Bere heey
— ic
: sncetane craven nen nanene amis
a
IIS server and
Windows platform.
Given below are the four areas that typically determine the operating system:
(© TIL{time to live) ofthe packets: What does the operating system sets as the Time To
Live on the outbound packet?
Window Size: What isthe Window size cet by the operating system?
‘Whether the OF (Don't Fragment bit is set: Does the operating system set the Don't
Fragment bit?
©. TOS (Type of Service}: Does the oparating system set the Type of Service, and if so,
what setting ist?
Passive fingerprinting has to be neither fully accurate nor be limited to these four
signatures. However, one can improve accuracy by looking at several signatures, and
combining the information. The folowing isan analysis ofa sniffed packet dissected by
Lance Spitzner in his-—spaper on passive ‘fingerprinting
(hteps://uwu. symantec com/connect/artices/passve-fingerprinting):
(04/20-21:41:48.129662 129.142.224.3:659 —> 172.16.1.107:404
‘rep 71:45 1OS:0x0 20:56257
seeptear seq: 0190090553
Ack: OXEIC6SD7 Win: 0x7078
‘According to the four criteria, the following are identified:
© Tas.
(© Window Size: 0x7078 (or 32120 in decimal)
(©. DF: The Don't Fragment bits set
© TOS:0x0
Compare this information to a database of signatures
‘TTL: The TLL from the analysis is 45, The original packet went through 19 hops to get to
the target, ot sets the original TL to 64. Based on this TL, it appears that the user sent
the packet from a Linux or FreeBSD box (however, more system signatures need to be
‘added to the database). This TL confirms itby implementing traceroute to the remote
hhost If th trace needs to be done stealthily the traceroute TTL (default 30 hops) can be
set to one of two hops less than the remote host (-m option). Setting the traceroute in
this manner reveals path information (including the upstream provider) without actually
touching the remote host.
Window size: In his step, window sizes are compared. Window siz is another effective
tool for determining precisely what window size Is used and how often It's changed. In
ode o3 gens ating ad acme igh 8the previous signature, the window sizes set at 0x7078, a default window size commonly
used by Linux. In addition, FreeBSD and Solaris tend to maintain the same window size
throughout a session. However, Cisco routers and Microsoft Windows NT window sizes
constantly change. Window size is more accurate when measured after the intial three
‘way handshake (due to TCP slow stat).
DF bit: Most systems use the DF bit set, s0 this is of limited value. However, this does
make it easier to identity few systems that do not use the DF flag (such as $CO or
‘Open8s0}
‘TOS: 0Sisalso of limited value, asit seems to be more session-based than OS-based. In
‘other words, itis not so much the OS that determines the TOS, but the protocol used
determines i to a large extent.
From the information obtained from the packet, specifically the TTL and the window size,
‘one can compare the results to the database of signatures, and with some degree of
Confidence, determine the OS (in this case, Linux kernel 2.2.)
Passive fingerprinting, like active fingerprinting, has some limitations. First, applications
that build their own packets (eg., Nmap, Hunt, Nemesis, etc) will not use the same
signatures asthe OS. Second, itis relatively simple for a remote host to adjust the TTL,
window size, DF, or TOS setting on packets
Passive fingerprinting has several other uses. For example, Crackers can use stealthy
fingerprinting to determine the operating system of a potential target such as a Web
server. A user only needs to request a Web page from the server and then analyze the
sniffer traces. This bypasses the need for using an active tool that various IDS systems can
detect. Passive fingerprinting also helps in identifying remote proxy firewalls. tt may be
possible to ID proxy firewalls from the signatures as discussed above, simply because
proxy firewalls rebulld connections for clients, Simlary, passive fingerprinting can be
Used to identity rogue systems.
Why Banner Grabbing?
[An attacker uses banner grabbing to identify the OS used on the target host and thus determine
system vulnerabilities and the exploits that might work on that system to further carry out
additional atacks.
‘hat inane aucamsaas pg yO mtE
“figs hea ematon tay Peaig tan a 359i hater
‘How to Identify Target System OS
Finding out the target operating system is one of the important tasks for an attacker to
compromise the target network/machine. In @ network, various standards are implemented in
order to allow different operating systems to communicate with each other. These standards
‘govern the functioning of various protocols ike IP, TCP, UDP, etc. By analyzing certain
parameters/felds In these protocols, one can reveal the detals of the operating system.
Parameters lke Time to Live (TTL) and TCP window size in the IP header ofthe first packet in a
‘TCP session are helpful in identifying the operating system running on the target machine. The
‘TTL field determines the maximum time a packet can remain in a network, and the TCP window
size determines the length of the packet reported. These values differ for different operating
systems as presonted in the following table:
Operating System Time Totive | TCP Window Size
Linux (Kern! 2.4 and 2.6) 6 840
Google Linux 6 sno
Freebso 4 65535
Opents0 4 16364
‘Windows95 32 e192
‘Windows 2000 28 16364
Windows xP 28 65535
‘Windows 98, Vista and 7 (Server 2008) 28 192
th ing punters Cori by HOES
nifgh sence Nepamsconaseiay Pebeee105124 (cisco Routers) 25 4128
solaris 7 255 8760
Kaa o* 16384
Inorder to identify the target 05, sriff/capture the response generated from the target machine
to the request-originated machine using packet sniffing tools ike Wireshark, etc. and observe
the TTLand TCP window size fields in the captured first TCP packet. Comparing these values to
that ofthe above table, you can determine the target operating system that has generated the
response.
lol eng ancarterenres Cnr ©
‘Aifgrencencs Rewessconesy Petesee Be kee oa keene)
Disabling or Changing Banner ‘Hiding Pile Extensions rome Pages
‘terete one
tel tans tomate wi cao
se srs hi gots car)
‘ccbtcaintierchrgetamer ntemaicn nse spleen maps such a pth
tna fon eo agatha
‘remvenndanga sonics argeeseret
‘ominon esters server New ere ome” vosceuezen teed seston cbs
treo rate Sarvarsiguatszelie suas see ies agen mao
‘sttestgantace ortivnttya sone te feces
Banner Grabbing Countermeasur
Disabling or Changing
Whenever a ports open, it implies that a service banner is running on it. When attackers
connectto the open port using banner grabbing techniques, the system presents abanner
containing sensitive information such as 0S, server type, and version. With the help of
the information gathered, the attacker Identifies specific vulnerabilities to exploit and
thereafter launches attacks. The countermeasures to defend against banner grabbing
attacks areas follows:
(© Display false banners to mislead or deceive attackers
© Turn off unnecessary services on the network host to limit information disclosure,
© Use ServerMask (https://www.port80software.com) tools to disable or change
banner information.
© SorverMask removes unnecessary HTTP header and response data and camouflages
the server by providing false signatures. It also provides you with the option of
climinating file extensions such as asp or aspx, andit clearly indicates that a site is
running on a Microsoft server.
© Apache 2.x with mod_headers module: use a directive In httpd.conf file to change
banner information Header set Server "New Server Name”.
© Altematively, change the Sexversignature line to Serversignatureoft in the
inetpa. cone Mle
Seal come nec tetHiding File Extensions from Web Pages
File extensions reveal information about the underiying server technology that an
attacker can utilze to launch attacks. The countermeasures to defend against banner
[grabbing attacks are as follows:
(© Hide file extensions to mask the web technology.
(© Change application mappings such as .asp with .htm or foo, etc. to disguise the
Identity ofthe servers
(© Apache users can use mod_negotiation directives
(© iSusers use tools such as Pagexchanger to manage the fle extensions.
Note: It is better ifthe file extensions are not used at al
adie gost fhatadingal orto phy EOE
‘ans oesndepoactonsiey SeesScien
Draw Network Diagrams
‘A network diagram helps in analyzing complete network topology. This section highlights the
Importance of the network diagram, how to draw one, how an attacker uses one to launch an
attack, and the tools that help in drawing network maps.
Mot ae 386 the adngand Carteret ty KE
‘ig ened cpsactontoney PenttesDrawing Network Diagrams
Drawing @ network diagram helps an attacker identify the topology or architecture of a target
network. The network diagram also helps to trace out the path to the target host in the network
‘and enables the attacker to understand the postion of firewalls, IDSs, routers, and other access
control devices. Once the attacker has ths information, he/she can try to find the vulnerabilities
‘of weak points of those security mechanisms. Then, the attacker can exploit those security
‘weaknesses to find his/her way into the victims network.
‘The network diagram also helps the network administrators to manage thelr networks.
‘Attackers use network discovery or mapping tools to draw network diagrams of target
networks,rs Sate ee Cause iooed
ee...
‘Network Discovery and Mapping Tools
Network discovery and mapping tools allow you to view the map of your network. They help you
detect rogue hardware and software violations and notify you whenever a particular host
becomes active or goes down. Thus, you can also determine server outages or problems related
to performance. An attacker can use the same tools to draw a diagram of the target network,
analyze the topology, find the vulnerabilities or weak points, and launch an attack by exploiting
them,
‘+ Network Topology Maps
Source:hitp://www solarwinds com
Network Topology Mapper tool allows one to automatically discover and create 2
network map of the target network. [tis also able to display in-depth connections such as
(OSI Layer 2 and Layer 3 topology data (eg, displaying switch-to-switch, switch-to-node,
‘and switeh-to-router connections). It can keep track of network changes and allow the
user to perform inventory management of hardware and software assets
Features:
© Network topology discovery and mapping,
‘Automatically discovers the entire network and creates comprehensive and detailed
network maps
© Exportnetwork diagrams to Visio
Exports network diagrams to Microsoft Offce® Visio®, Orion Network Atlas, PDF, and
PNG formats
Meine fae 362 tha erga otemanons copy Came
‘itaan cowed Repent Pele© Network mapping for regulatory compliance
Allows one to directly addess PCI compliance and other regulations that require
‘maintenance ofan up-to-date network diagram,
© Multi-level network discovery
Performs multilevel network discovery to produce an integrated OSI Layer 2 and
Layer 3 network map that includes detailed device information
(© Auto-detection of changes to network topology
‘Automatically detects new devices and changes to network topology with scheduled
network scanning,
Some of the network discovery and mapping toolsan attacker uses to create a network map
are discussed below:
OpManager (httzs://www.mnanageengine.com)
‘The Dude (htips://www.mikrotk.com)
NetSurveyor(httpy/nutsaboutnets.com)
NetBrain (https//mww.netbraintech.com)
‘Spiceworks Inventory (htps://www.spiceworks.com)
Lanstate (nti://uww10-strike.com)
Friendly Pinger (http,//ww.klievich.com)
‘WhatsConnected (hetps://wwwu jpswitch.com)
Lan-Secure Switch Center (http/www.lan-secure.com)
Intermapper (httas://www helpsystems.com)
SteelCentral Netauditor(https//www.riverbed.com)
sonar (http //www.lumeta.com)
ease 03 Fae 362 ol eng anCnamterenires cont © Game
‘ATtgnenaenca Rewessconesay Perecanna m2. conta neater
BN Se Se emis mio soa aI Cy
Set ere aan
ey Sede Ae
‘Network Discovery Tools for Mobile
Given below are network discovery tools for mobile devices:
Seany
‘Source: http://happymagenta.com
‘Scary, @ network scanner app for iPhone and iPad, scans LAN, Wi networks, websites,
‘open ports, discovers network devices, and digs network info. It supports @ numiber of
networking protocols and antéstealth technologies. It is a multifunctional networking
instrument for finding connected devices, looking up detailed device information,
network troubleshooting, scanning ports, and testing network security and firewalls.
Feature
© Scan both LAN and the Internet
© Scan any IP address or network range
© Bonjour hostnames lookup
(© Windows hostnames lookup (NetBIOS, Samba)
© Device names lookup (UPnP, SSOP, DLNA)
© Detects country of origin and the network owner
© Network range and AS number lockup
© MACaddress and hardware vendor lockup
(© Wake on LAN or Wi-Fi (by MAC address)
Modine rpc 364 ‘ic ating rte oy Ee
he tsencs Reoseion bray Monet(© Wake over the intemet (using proper routers)
ing/Trace hosts with integrated tools
© WHOIShastnames, IP addresses, ASNS
(© Know Wi-Fi, VEN, 36/EDGE, and external IPs
(© Checks MP, TCP, and UDP
(© Fasterasynchronaus network YO
(© Works with WIFI, 36, EDGE, and GPRS
Network *Swiss-Army-Knife”
Source: htt://foobang.weebly.com
"Network "Swiss-Army-Knife" is a network application for iPhone to perform a number of
‘tasks mentioned below:
(© Calculate 1Pv4 subnet (Classful and Classless) and all the related valid subnet
information
(© Find Offline hardware MAC address to organization lookup and vice versa
(©. Perform Single/Batch Domain-name lookup: For alist of domain names, equivalent IP
address can be found
©. Perform WHOIS lookup directly from the idevice. WHOIS lookup permits one to query
the list fF NICes for detailed information. Lookup relays on IP addresses- either IPwa
fr IPv6, domain name or AS Number. Results can be stored in a local repository for
future reference.
©. Offline IANA Port number lookup: allows JANA assigned port number tothe name and
view versa
‘© IANA Top level domain lookup: identifies which countries domain end with cz, .cv, su
ete
© My device WIFI IP addr: allows identification of your local device WI-Fi IPaddress
‘Some of the network discovery tools for mobile include:
PortDroid Network Analysis (https://play. google.com)
NetX- Network Discovery Tools (https://play. google.com)
Network Mapper (https://play. google.com)
Fing - Network Tools (ttps://wurw fng.io)
etNetScan (https://play google.com)
Moai 03 rae 355 hol aking term Cnty eR
‘i ga ced foposcin rset abateScanning Pen Testing
It s advisable to pen-test the target network to Identify Its security posture, Pen-testing In
anticipation of a possible problem helps to find and fix any security loopholes present in the
target network. Such proactive prevention practices can keep an entire network from being
compromised. This section describes the steps involved in pen-testing the target network and
the various scanning tools used to accomplish ths task
Meaiaes e366 hl nga countemenans Cp © amd
‘ifn ones soonest metedscatman am 2 Scone cach
Sass Scanning Pen Testing
—————_————————————
1 Theneteorcnlg pertalontest este dekrnte ener ety oa br erg
Ine sts dicvering open ports, stating serves, ary atlng stm banners om 2 emote
best smut snenrerkhackig tere
“6 The pneucton ttgepar il ape ten amr
‘The network scanning penetration test helps to determine a network's security posture by
Identifying live systems, discovering open ports and associated services, and grabbing system
banners from a remote location to simulate anetwork hacking attempt. You, a8 an ethical hacker
‘or pen-tester, should scan and test the network in every manner possible to ensure that there is
no security loophole in the system,(Once you are done with the penetration testing, document all your findings at every stage of the
testing. This documentation will help the system administrators to:
* Close unused ports if unnecessary/unknown open ports are found
Disable unnecessary services
+ Hide or customize banners
Troubleshoot service configuration errors
* Calibrate firewall rules to impose more restriction
‘The more ports that are open on the server, the easier it willbe for an attacker to connect to It.
‘The first thing an attacker does is monitor network traffic for vulnerabilities such as open ports
and services running, through which the network could be compromised. Admins may instal,
configure some unwanted services, leave services with default settings, and turn them on during
(5 and application installations. This can cause unwanted traffic to the server or a way for an
attacker to intrude into the systorn. Attackers might also "banner grab” to trace the server name
and its version, and then use this information to break into a network. Therefore, close al the
‘unused/unnecessary open ports, unwanted services, and so on, and configure the serverin such
‘away that ithides the cispay of the banner. Also create inbound and outbound firewall rules to
block all the unwanted ports from allowing any connections from outside the network.
Here is how you can conduct a pen-test ofa target network.
Step 1: Perform host discovery
‘The first step of network penetration testing is to detect live hosts onthe target network.
You can attempt to detect the ivehosts (accessible hosts in the target network), using
‘network scanning tools such as Nmap, Angry IP Scanner, SolarWinds Engineers toolset,
and NetScanTools Pro. Its dificult to detect live hasts behind a firewall
step 2: Perform port scanning
Perform port scanning using tools such as Nmap, NetScanTools Pro, Hping3, PRTG
[Network Moniter, nd SuperScan. These tools help to probe a server or host on the target
retwork for open ports. Open ports are the doorways through which an attacker installs
malware on a system. Therefore, you should always check for open ports and close them
If they are not necessary.
‘Step 3: Scan beyond IDS and firewall
Scan beyond IDS and firewall; this helps you to understand the organization's security
limitations, Use 1DS/frewall evasion techniques such as packet fragmentation, source
routing, IP address spoofing etc, to bypass IDS and firewall rules,
Use proxy tools such a5 Proxy Switcher, Proxy Workbench, CyberGhost, Tor,
Suite to hide yourself from detection
nd Burp
Moai 3 tae 6 ‘ct ating Gaerne Co 4 EESci nenrone
Step 4: Perform banner grabbing or OS fingerprinting
Perform banner grabbing/OS fingerprinting by sending specially crafted packets to the
target machine and then comparing the responses with the database. This determines
the operating system running on the target host of a network and its version, Once you
know the version and the operating system runningon the target system, find and exploit
the vuinersbiltes related to that OS, Try to gain control over the system and compromise
the whole network.
Step 5: Draw network diagrams
Draw a network diagram ofthe vulnerable hosts that helps you to understand the logical
connection and path to them in the network. You can draw the network diagram with the
help of tools such as Network Topology Mapper, OpManeger, The Dude, NetSurveyor,
land NetBain. The network diagrams provide valuable information about the network and
Itsarchitecture.
‘Step 6: Document all the findings
‘The last but the mostimportant step in penetration testing isto preserve al the outcomes
of tests conducted in previous steps in 2 document. This document wil assist in finding
potential vulnerabilities in the network which you can use to suggest countermeasures.
Thus, penetration testing helps in assessing the security posture of the network and fixing
any security loopholes before they can cause trouble and resultin severe organizational
loss.
Mosse ts roses tha dingo artes cpt by EO ame
‘tah orend epesctonh say estesModule Summary
1 Ata detains he ve os oma age cf aes by setcrg UP ECHO regent mutine
1 Atco sors scanning eras oy owl ues and lusrgmechanin andi
© Baw tetnnet ans dag herein sere ast een
1 Aces se prosemeso tide he aul oueof aan al ead cen DSewall ests
1 Actalnefpotercanbecetedto cndes tet the stacer
Module Summary
‘This module ends with an overview discussion of network scanning concepts. nthe next module,
‘we will see how attackers, ethical hackers, and pen-testers perform enumeration to collect
Information about a target before an attack or audit,
sere i