ethical hacking chapter 6 - port scanning - eric vanderburg

21
Ethical Hacking CHAPTER 6 – PORT SCANNING ERIC VANDERBURG

Upload: eric-vanderburg

Post on 16-Jan-2015

76 views

Category:

Technology


3 download

DESCRIPTION

Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg

TRANSCRIPT

Page 1: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

Ethical HackingCHAPTER 6 – PORT SCANNING

ERIC VANDERBURG

Page 2: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

2Objectives

Describe port scanning

Describe different types of port scans

Describe various port-scanning tools

Explain what ping sweeps are used for

Explain how shell scripting is used to automate security tasks

Page 3: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

3Introduction to Port Scanning

Port Scanning Finds out which services are offered by a host Identifies vulnerabilities

Open services can be used on attacks Identify a vulnerable port Launch an exploit

Scan all ports when testing Not just well-known ports

Page 4: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

4Introduction to Port Scanning (continued)

Port scanning programs report Open ports Closed ports Filtered ports Best-guess assessment of which OS is running

Page 5: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

5Types of Port Scans

SYN scan Stealthy scan

Connect scan Completes the three-way handshake

NULL scan Packet flags are turned off

XMAS scan FIN, PSH and URG flags are set

Page 6: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

6Types of Port Scans (continued)

ACK scan Used to past a firewall

FIN scan Closed port responds with an RST packet

UDP scan Closed port responds with ICMP “Port Unreachable” message

Page 7: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

7Using Port-Scanning Tools

Nmap

Unicornscan

NetScanTools Pro 2004

Nessus

Page 8: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

8Nmap

Originally written for Phrack magazine

One of the most popular tools

GUI version Xnmap

Open source tool

Standard tool for security professionals

Page 9: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

9Unicornscan

Developed in 2004

Ideal for large networks

Scans 65,535 ports in three to seven seconds

Handles port scanning using TCP

ICMP

IP

Optimizes UDP scanning

Page 10: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

10NetScanTools Pro 2004

Robust easy-to-use commercial tool

Supported OSs *NIX

Windows

Types of tests Database vulnerabilities

E-mail account vulnerabilities

DHCP server discovery

IP packets and name servers

OS fingerprinting

Page 11: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

11Nessus

First released in 1998

Open source tool

Uses a client/server technology

Conducts testing from different locations

Can use different OSs for client and network

Page 12: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

12Nessus (continued)

Server Any *NIX platform

Client Can be UNIX or Windows

Functions much like a database server

Ability to update security checks plug-ins Scripts

Some plug-ins are considered dangerous

Page 13: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

13Nessus (continued)

Finds services running on ports Finds vulnerabilities associated with identified services

Page 14: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

14Conducting Ping Sweeps

Ping sweeps Identify which IP addresses belong to active hosts Ping a range of IP addresses

Problems Computers that are shut down cannot respond Networks may be configured to block ICMP Echo Requests Firewalls may filter out ICMP traffic

Page 15: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

15FPing

Ping multiple IP addresses simultaneously www.fping.com/download Command-line tool Input: multiple IP addresses

Entered at a shell -g option

Input file with addresses -f option

Page 16: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

16Hping

Used to bypass filtering devices Allows users to fragment and manipulate IP packets

www.hping.org/download

Powerful tool All security testers must be familiar with tool

Supports many parameters (command options)

Page 17: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

17Crafting IP Packets

Packet components Source IP address

Destination IP address

Flags

Crafting packets helps you obtain more information about a service

Tools Fping

Hping

Page 18: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

18Understanding Shell Scripting

Modify tools to better suit your needs

Script Computer program that automates tasks

Time-saving solution

Page 19: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

19Scripting Basics

Similar to DOS batch programming

Script or batch file Text file

Contains multiple commands

Repetitive commands are good candidate for scripting

Practice is the key

Page 20: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

20Summary

Port scanning Also referred as service scanning

Process of scanning a range of IP address

Determines what services are running

Port scan types SYN

ACK

FIN

UDP

Others: Connect, NULL, XMAS

Page 21: Ethical hacking   Chapter 6 - Port Scanning - Eric Vanderburg

21Summary (continued)

Port scanning tools Nmap

Nessus

Unicornscan

Ping sweeps Determine which computers are “alive”

Shell scripting Helps with automating tasks