Scanning Networks

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 36

Scanning Networks

• Scanning is an important phase and a hacker needs to


have knowledge of operating systems, ports, protocols
and networks.
• In this phase the target system is scanned to look for
open ports and vulnerabilities.
• One can find reach ability of devices using the ping
command and then run port scans on the active IPs.
• This phase is still a part of the information gathering
but is more interesting than the footprinting phase and
this begins to give you the feel of hacking.
It is in this phase that we get to know:
• Live systems on the network by pinging
• Find out services that are run on target
• Find the TCP and UDP ports and services
• Find the Operating System running on the
target
Types of Scanning
• Port Scanning : To find open ports and
services on target
• Network Scanning:  Find IP address in the
network of the target
• Vulnerability Scanning: Find weakness or
vulnerabilities on the target
• Port Scanning: Port scanning is the process of
identifying open and available TCP/IP ports on a
system. Port-scanning tools enable a hacker to learn
about the services available on a given system. Each
service or application on a machine is associated with a
well-known port number.
The ports numbers can be in these three ranges:
• Well known Ports from 0 to 1023
• Registered ports  from 1024 to 49151
• Dynamic Ports from 49152 to 65535
• Network Scanning: This means to look for
active machines or targets on the network. This
can be done using tools or scripts that ping to
all IP addresses on the networks and get a list of
the alive nodes and their IP addresses.
• Vulnerability Scanning: This is the mechanism where the
target is scanned or looked for any vulnerability.
• In this scan the Operating system is found out with installed
patches etc and then based on the information vulnerabilities
are found in that particular version of Operating System.
• If you use scanning on a target network, if the target network
has Intrusion Detection System (IDS) installed, then the
hacker or scanner can be traced back easily.
• The IDS then send alert on the system that someone is trying
to seek information from the system.
• Being a CEH if you perform any scans it should not be
detected, as we would not want target systems to know
someone is trying to attack their system.
Scanning Methodology
• This is the sequence or steps how the
scanning needs to be carried out and what
information needs to be collected and
documented so it can be used for further
phases of hacking.
• Looking for Live systems, this is done either using the normal
PING command or using third party tools or scripts to run
multiple pings to destination or target.
• As we know PING uses the protocol ICMP, thus an ICMP echo
request is sent to the destination or target IP address, if the
target is active or alive it would respond with an ICMP Reply. This
also informs if ICMP can be passed through a firewall. Mostly
organizations have started blocking ICMP requests to be safe
from attacks.
• NMAP is a very popular tool used for scanning. It can be
downloaded from the below link.
• https://nmap.org/download.html
• It is available for Windows GUI (Zenmap) and
CLI (nmap).
• The installation is simple and once installed you can see the
screen like below. You need to specify the target IP or range,
the type of scan you want to perform under “Profile”.
• If you note, Zenmap also give you a command line equivalent
when you fill in the details, you can directly copy the syntax
or command from here and run it on CLI.
• The types of scans in nmap are as below; you
can see it in the drop down list.
The syntax and example of types of scans are mentioned as below:
• Intense scan, all TCP Ports
• nmap -p 1-65535 -T4 -A -v 192.168.12.131
• Intense Scan
• nmap -T4 -A -v 192.168.12.131
• In the above screenshot we see that scan is complete
and it shows the port numbers and service.
• When you check the Ports /Host tab, you see the
ports and the corresponding service name. 
• To Find the Operating System of a host, you
need to use the ‘O’ switch as below
• nmap -O 192.168.12.131
To Scan multiple IP address or subnet (IPv4)
• nmap 192.168.1.1/24
To scan a range of IP address:
• nmap 192.168.1.1-20
For scanning you can mention the IP addresses in a file and have NMAP read these IP
from the file. The -iL option is used.
Create a file as below:
• cat > /temp/test_ips.txt
Sample outputs:
• server1.domain1.com
• 192.168.1.0/24
• 192.168.1.1/24
Now to run the command the syntax is:
• nmap -iL /temp/test_ips.txt
To Exclude some hosts/networks
You can exclude hosts from a scan if you do not want to access the full network.
• nmap 192.168.2.0/24 –exclude 192.168.2.10
• nmap 192.168.2.0/24 –exclude 192.168.2.10,192.168.2.234
To find if a machine or network is behind a firewall and protected
• nmap -sA 192.168.2.25
• nmap -sA server1.domain1.com
To scan a device even if it is protected by the firewall
• nmap -PN 192.168.2.25
• nmap -PN server1.domain1.com
If you want to scan IPv6 addresses, use the -6 option.
• nmap -6 server1.domain1.com
• nmap -6 2302:f0e0:1001:41::3
If need to look only at open ports
• nmap –open 192.168.1.5
• nmap –open server1.domain1.com
• The screenshot above shows the open ports and also shows the response coming from
Windows System, as IIS is active, NetBIOS is being used.
To see the target interfaces and routes
• nmap –iflist < IP Address of target>
• nmap –iflist 192.168.12.131
• The above screenshot has some MAC address hidden, but in an actual scan you
can see all the information. Also you see routes used on the device.
To scan for specific ports
• map -p [port] Target name or IP address
• nmap -p 80 192.168.12.131
• The above screenshot shows that the HTTP
service is being used. We used the port 80 to
do a scan.
• Tools for ping sweep are:
• Angry IP scanner –
http://angryip.org/download/#windows
• SolarWinds Engineer Ping Sweep ->
http://www.solarwinds.com/engineers-toolset
/ping-sweep.aspx
TCP 3 Way handshake
• As TCP is a connection oriented protocol, it does need to establish a
connection before data transfer. It uses process in which SYN, SYN+ACK and
an ACK packet are used and is known as 3 way handshake.
• The process goes like this:
• First the Computer A, send a SYN packet, initiating the connection and then
Computer B, sends a SYN+ACK, confirming it is ok for communication.
Finally, Computer A, acknowledges the connection and thus connection is
established.
Different Type of Scanning:
• a)      TCP Connect / Full Open: This scan technique is used to detect open ports by
completing the 3 way handshake. The connection is teared down using the RST flag.
• b)     Stealth Scan: Half Open, XMAS Scan, FIN Scan, NULL Scan: This technique is used
by hackers to hide themselves from firewalls by bypassing them and any other logging
system.
• c)      IDLE Scan: Web servers are usually listening on port 80, it waits for a client to
form connection. If a SYN is sent to a target machine and if the sender receives SYN +
ACK, it means the port is open. If a RST is received then the port is closed on target.
• d)     SYN /FIN Scanning: In this scanning only either a SYN or FIN is sent in the TCP
Frame. It works with older version of Windows and not with the current ones.  If FIN is
sent and no response it means the port is open. But if it gets a RST /ACK, it means the
port is closed.
• e)      ICMP Scan: This is the scanning technique where PING is used to get information
from the target system. It tells if the target machine is ALIVE.
• f)       NULL Scan: In this technique, none of the flags are set. TCP Frame is sent with
NO Flags. This also does not work with newer versions of Windows OS. This avoid the
IDS and 3 way handshake but only woks on UNIX.
Some ways to be protected from Scanning
a)      Use of Firewalls and IDS
b)     Do not keep unnecessary ports Open
c)      Do not keep sensitive data on public
servers
d)     Keep latest release packets updated on all
devices
Vulnerability Scanning
• This is done using a very popular tool called
Nessus. It is the most popular tool and gives
all information about the vulnerability on the
target.
• http://www.tenable.com/products/nessus-vul
nerability-scanner
This tool helps in:
–          Data collection
–          Identify hosts
–          Scan Ports
–          Report the information found
• Some screenshots below show how Nessus is helpful.
• In the below screenshot we see that Nessus shows vulnerabilities in some
Databases, it gives a brief description about it.
• This below screenshot shows the risk level or
severity of the vulnerabilities.
• This screenshot below will show the hosts and
the level of risk on each host
• GFI LAN guard is another important tool that
helps in handling the network inventory and
also looking for vulnerabilities on the nodes or
servers.
Draw Network Diagram
• Tools like Solar Winds LAN Surveyor can be helpful to make a network
diagram of the network. These diagrams can them be moved to Visio for
documenting it.
Proxy Servers
• A Proxy server means some other computer is used as an alternative to
connect with other computers. Organizations configure Proxy servers so the
main servers are not directly accessible to outside world. Thus the IPs etc are
not released in public and the servers can be safe.
• The basic working is as such:  If a hacker wants to access some page, the
request goes to proxy server and then from the Proxy server to the Main
server. Thus the main server is isolated from the outside network.
• The use of proxy can also be done by Hacker, to avoid them from being caught.
Hackers try and attack a target computer from some other computer using
Proxies, so the actual IP address is not traced back or is very difficult to trace
back.
• There are several free proxies available on the Internet if you use those your IP
address is not revealed, the IP of the proxy server is sued.  An attacker can also
make use of multiple Proxies and do a final attack, since the attacker uses a
chain of proxies it is known as Proxy chaining.
• Some tools used are: Proxy Work bench, Proxifier, Proxy Switcher, TOR (The
Onion routing) is a very popular one.. Gproxy, Fillder etc.

You might also like