scanning and enumeration - metropolitan state university...

5
. 1 Scanning and Enumeration Chapter #3: CIS 4500 Outline n Understand EC-Council’s scanning methodology n Describe scan types and the objectives of scanning n Understand the use of various scanning and enumeration tools n Describe TCP communication (three-way handshake and flag types) n Understand basic subnetting n Understand enumeration and enumeration techniques n Describe vulnerability scanning concepts and actions n Describe the steps involved in performing enumeration Scanning and Enumeration 2 CIS 4500 Phases of Hacking Scanning and Enumeration 3 CIS 4500 Scanning n Scanning is the process of discovering systems on the network and taking a look at what open ports and applications may be running n Footprinting – general network information about its makeup n Scanning – goes into the network and start touching each device to find out more about them Scanning and Enumeration 4

Upload: tranthuy

Post on 02-Jul-2019

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Scanning and Enumeration - Metropolitan State University ...rowdysites.msudenver.edu/~fustos/cis4500/pdf/chapter03.pdf · Phases of Hacking 3 Scanning and Enumeration CIS 4500 Scanning

.

1

Scanning and Enumeration

Chapter #3:

CIS 4500

Outline

n  Understand EC-Council’s scanning methodology

n  Describe scan types and the objectives of scanning

n  Understand the use of various scanning and enumeration tools

n  Describe TCP communication (three-way handshake and flag

types)

n  Understand basic subnetting

n  Understand enumeration and enumeration techniques

n  Describe vulnerability scanning concepts and actions

n  Describe the steps involved in performing enumeration

Scanning and Enumeration 2

CIS 4500

Phases of Hacking

Scanning and Enumeration 3 CIS 4500

Scanning

n  Scanning is the process of discovering systems on the

network and taking a look at what open ports and

applications may be running

n  Footprinting – general network information about its

makeup

n  Scanning – goes into the network and start touching each

device to find out more about them

Scanning and Enumeration 4

Page 2: Scanning and Enumeration - Metropolitan State University ...rowdysites.msudenver.edu/~fustos/cis4500/pdf/chapter03.pdf · Phases of Hacking 3 Scanning and Enumeration CIS 4500 Scanning

.

2

CIS 4500

TCP/IP Networking

n  Recipient system gets a frame

n  it checks the physical address

n  if the address is indeed correct, it opens the frame, checks to

make sure the frame is valid

n  then ditches the header and trailer, passing the remainder up

to the Network layer.

Scanning and Enumeration 5 CIS 4500

TCP/IP Networking

n  Layer 3 address is verified in the packet header and the

header is stripped off

n  The remaining PDU (Protocol Data Unit), now called a

segment, is passed to Layer 4

Scanning and Enumeration 6

CIS 4500

TCP/IP Networking

n  At the Transport layer, a whole host of important stuff

happens—end-to-end delivery, segment order, reliability,

and flow control are all Layer 4 functions—including TCP

flags and port numbering.

Scanning and Enumeration 7 CIS 4500

Connectionless Communication

n  At the Transport layer, connectionless communication is

accomplished with UDP

n  It is a low-overhead, simple, and fast transport protocol

n  Generally application protocols that use this transport

method are moving small amounts of data

n  Examples of protocols using UDP are TFTP, DNS (for

lookups), and DHCP

Scanning and Enumeration 8

Page 3: Scanning and Enumeration - Metropolitan State University ...rowdysites.msudenver.edu/~fustos/cis4500/pdf/chapter03.pdf · Phases of Hacking 3 Scanning and Enumeration CIS 4500 Scanning

.

3

CIS 4500

Connectionless Communication

Scanning and Enumeration 9 CIS 4500

Connection-Oriented Communication

n  TCP is a lot slower than connectionless but a much more

orderly form of data exchange

n  Sender will establish connection before data transfer

n  Flow control during communication

n  Three-way handshake

Scanning and Enumeration 10

CIS 4500

Connection-Oriented Communication

Scanning and Enumeration 11 CIS 4500

Connection-Oriented Communication

Scanning and Enumeration 12

Page 4: Scanning and Enumeration - Metropolitan State University ...rowdysites.msudenver.edu/~fustos/cis4500/pdf/chapter03.pdf · Phases of Hacking 3 Scanning and Enumeration CIS 4500 Scanning

.

4

CIS 4500

TCP Header Flags

n  SYN (Synchronize) This flag is set during initial communication

establishment. It indicates negotiation of parameters and sequence

numbers.

n  ACK (Acknowledgment) This flag is set as an acknowledgment to SYN

flags. This flag is set on all segments after the initial SYN flag.

n  RST (Reset) This flag forces a termination of communications (in both

directions).

n  FIN (Finish) This flag signifies an ordered close to communications.

n  PSH (Push) This flag forces the delivery of data without concern for any

buffering. In other words, the receiving device need not wait for the buffer

to fill up before processing the data.

n  URG (Urgent) When this flag is set, it indicates the data inside is being

sent out of band. Cancelling a message mid-stream is one example.

Scanning and Enumeration 13 CIS 4500

Ports

n  Inside the Transport-layer protocol header (TCP or UDP) a

port number identifies which upper-layer protocol should

receive the information

Scanning and Enumeration 14

CIS 4500

Ports

n  Well-known ports 0–1023

n  Registered ports 1024–49,151

n  Dynamic ports 49,152–65,535

Scanning and Enumeration 15 CIS 4500

Active Ports

Scanning and Enumeration 16

Page 5: Scanning and Enumeration - Metropolitan State University ...rowdysites.msudenver.edu/~fustos/cis4500/pdf/chapter03.pdf · Phases of Hacking 3 Scanning and Enumeration CIS 4500 Scanning

.

5

CIS 4500

netstat

n  netstat –a vs. netstat -an

n  netstat –at vs. netstat –au

n  netstat –lt vs. netstat –lu vs. netstat –lx

n  netstat –s vs. netstat –st vs. netstat -su

Scanning and Enumeration 17

Stay Alert!

There is no 100 percent secure system,

and there is nothing that is foolproof!