Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
376 views
103 pages
CEHv10 Module 03 Scanning Networks PDF
Uploaded by
Abu Jalal
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save CEHv10 Module 03 Scanning Networks.pdf For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
376 views
103 pages
CEHv10 Module 03 Scanning Networks PDF
Uploaded by
Abu Jalal
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save CEHv10 Module 03 Scanning Networks.pdf For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save CEHv10 Module 03 Scanning Networks.pdf For Later
You are on page 1
/ 103
Search
Fullscreen
Module 03 Scanning NetworksThis page is intentionally left blank. ir peter ny of vc,segs ‘iam 25 cre naar Vere tekey aera Module Objectives [After identifying the target system and performing the initial reconnaissance as discussed in the Footprinting and Reconnaissance module, attackers begin to search for an entry point into the target system. it should be noted that the scanning itself is not the actual intrusion, but an extended form of reconnaissance in which the attacker learns more about Nis/her target, including information about operating systems, services, and any configuration lapses. The information gleaned from this reconnaissance helps the attacker select strategies for the attack onthe target system or network. This module starts with an overview of network scanning and provides an insight into various techniques that can be used to check for live systems and open ports It goes onto discuss various scanning techniques and ends with an overview of penetration testing (also called pen-testing) steps that an ethical hacker should follow to perform the security assessment ofthe target. [At the end of this module, you willbe able to: ‘+ Describe the network scanning concepts "+ Use various scanning tools ‘+ Perform scanning to check for live systems and open ports ‘+ Perform scanning by using various scanning techniques ‘Scan beyond intrusion detection system (105) and firewall ‘Perform banner grabbing + Draw network diagrams using network discovery tools ‘+ Perform scanning penetration testing Mesieos rset (ineliningand ourtemeaires prt Oy Kame ‘line ricnas Remon Hohe ste perc coy of cue,‘Network Scanning Concepts As already discussed, footprinting isthe frstphase of hacking In which the attacker gains primary Information about a potential target. He/she then uses this information in the scanning phase in order to gather more detailed information about the target. 16. a personal py oF devon,Semi etrone Se en Objectives of ator Scanning odovere hosts, ant cpengonset neha Fenn “eacover vei nie os Overview of Network Scanning ‘Scanning is the process of gathering adcitional detailed information about the target by using highly complex and aggressive reconnaissance techniques. Network seanning refers toa set of| procedures used for identifying hosts, ports, and services in 2 network. It is one of the most Important phases of intelligence gathering for an attacker which enables him/her to create @ profile of the target organization. In the process of scanning, the attacker tries to gather Information, Including the specific IP addresses that can be accessed over the network, the target's operating systems and system architecture, and the services running on each computer. ‘The purpose of scanning is to discover exploitable communications channels, probe as many listeners as possible, and keep track of the ones that are responsive or useful to an attacker's particular needs. In the scanning phase of an attack, the attacker tries to find various ways to intrude into a target system, The attacker also tees to discover more about the target systern to find out if there are any configuration lapses in it. The attacker then uses the information ‘obtained during the scan to develop an attack strategy. ‘Types of Scanning Port Scanning —Lists the open ports and services. Port scanning isthe process of checking the services running on the target computer by sending a sequence of messages in an attempt to break in. Port scanning involves connecting to or probing TCP and UDP ports fon the target system to determine ifthe services are running of are ina listening state. The listening state provides information about the operating system and the application currently in use. Sometimes, active services that are listening may allow unauthorized ser access to misconfigure systems or to run software with vulnerabilities. Network Scanning — Lists IP addresses, Network scanning is a procedure for identifying active hosts on a network, elther to attack them or to assess the security ofthe network Me 8 ge 273 ha cigar eters ng © EE aed ATR owes Ropomcontsny Pomerat rite pra ef ring,‘+ Vulnerability Scanning ~ Shows the presence of known weaknesses, Vulnerability scanning is @ method used to check whether a system is exploitable by identifying its ‘winerablities. A vulnerability scanner consists of a scanning engine and 2 catalog. The ‘catalog includes a list of common files with known vulnerabilities and common exploits for a range of servers. A vulnerability scanner may, for example, look for backup files or directory traversal exploits. The scanning engine maintains logic for reading the exploit list, transferring the request to the Web server, and analyzing the requests to ensure the safety of the server, These tools generally target vulnerabilities that secure host configurations can fx easily, updated security patches, and a clean Web document. ‘The access points that a thief who wants to break into a house looks for are the doors and ‘windows. These are usually the house's points of vulnerability, as they are easily accessible. ‘When it comes to computer systems and networks, ports are the doors and windows of the system that an intruder uses to gain access. A general rule for computer systems is that mare the ‘number of open ports on a system, more vulnerable isthe system. However, there are cases, in “which a system has fewer open ports compared to anather machine, but the open ports present. ‘a much higher level of vulnerabil Objectives of Network Scanning ‘The more the Information at hand about a target organization, the greater the chances of knowing a network’ security loopholes and consequently, for gaining unauthorized access to it. Below are some objectives for scanning a network ‘Discover the network’ live hosts, IP addresses, and open ports of ive. Using open ports, ‘the attacker will determine the best means of entry into the system. Discover the operating system and system architecture of the target. This is also known 2s fingerprinting. An attacker can formulate an attack strategy based on the operating, system's vulnerabilities. "+ Discover the services running/lstening on the target system. Doing so gives the attacker ‘an indication of vulnerabilities (based on the service) exploitation for gaining access to the target system. ‘+ Identify specific applications or versions ofa particular service. Identify vulnerabilities In any of the network systems. This helps an attacker to ‘compromise the target system or network through various exploits EC‘TCP Communication Flags TCP header contains various flags that control the transmission of data across a TCP connection. ‘Six TCP control fags manage the connection between hosts and give instructions tothe system, Four of these fags (namely: SYN, ACK, FIN, and RST] govem the establishment, maintenance, and termination of a connection. The other two flags (namely: PSH and URG) provide instructions to the system, The size ofeach fag is 1 bit. As there are six lags inthe TCP Flags section, the size of this sections 6 bits, When a flag value is set to 1, "that flag is automatically turned on. ‘The following are the TCP communication flags: ‘Synchronize alias "SYN": It notifies the transmission of a new sequence number. This fag ‘generally represents the establishment of a connection (3-way handshake) between two hosts. ‘Acknowledgement alias “ACK It confirms the receipt of transmission and identifies next expected sequence number. When the system successfully receives a packet, it sets the value of its flag to “1,” implying that the receiver should pay attention to it Push alias "PSH": When its flag is set to “1,” it incicates that the sender has raised the push operation to the receiver; this implies that the remote system should inform the receiving application about the buffered data coming from the sender. The system raises ‘the PSH flag atthe time of start and end of data transfer and sets it on the last segment of file to prevent buffer deadlocks. Urgent alias “URG": It instructs the system to process the data contained in packets as soon as possible. When the system sets the flag to "1," the remote system gives priority ‘to the urgent data and processes i first, stopping allhe other data processing Maa 3 Fe 25 ho nga aterenurs Cn ty ecm retracts iy Petes rss a perera ctpyo anvrncorg,Scien Finish alias "FIN": slag is setto“1" to announce that itwill not send more transmissions to the remote system and terminates the connection established by the SYN flag, Reset alias “RST": When there isan ertor in the current connection, its flag i set to “2,” and itaborts the connection in response to the error. Attackers make use ofthis to scan host in search of open ports. ‘SYN scanning mainly deals with three of the flags: SYN, ACK, and RST. You can use these three ‘lags for gathering illegal information from servers during the enumeration process ot Fase ce Hang courtamesae opt Oy Hane ‘fan foesne tepctonnsvisy sete rasan aneSom sete TCP/IP Communication ‘TP Seaton Extaten mat TCP/IP Communication TCP is connection-oriented, which prioritizes connection establishment before data transfer between applications This connection between protocols is possible through the process ofthe three-way handshake. ‘TCP Session initiates using a three-way handshake mechanism: = To launch a TCP connection, the source (10.0.0.2:21) sends a SYN packet to the destination (10.0.0.3:21). = Onreceiving the SYN packet, the destination responds by sending a SYN/ACK packet back to the source, ‘The ACK packet confirms the arrival ofthe first SYN packet to the source. "To conclude, the source sends an ACK packet for the ACK/SYN packet transmitted by the destination. This riggersan "OPEN" connection, allowing communication between the source andthe destination; this continues until one of them issues a "FIN" or *RST™ packet to close the connection. The TCP protocol maintains stateful connections for all connection-oriented protocols ‘throughout the Internet, and works lie an ordinary telephone communication, in which one picks up a telephone receiver, hears a dial tone, and dials a number that triggers ringing atthe ‘other end, until a person picks up the receiver and says, “Hello.” ‘The system terminates the established TCP Session as follows: After completing all the data transfers through the established TCP connection, the sender sends the connection termination request to the receiver by sending @ FIN of RST packet. Upon Meer ae 27 ‘thal nga outeren cpg 9 EO ame Aitghnnenes Ropodsct oa Pete iis eral cy fcr.receiving the connection termination request, the receiver acknowledges the termination requests by sending ACK packet to the sender and finally sends its own FIN packet; then the system will terminate the established connection. osior Pan 8 hcl ing outarene cpgh Keane ‘Aifgrnkoewee Foros enh Monee ist ere cy of cerSm to Ror steerer Be tonig = BN Batt] ‘oat Packt alr eres the ceo of extom neva pockets ude neva for eros acs | Ataders ana sett eae amend kaso bypass Hremas and Systems ine etert Pace Crating Tools scat opens etsonoalscom| creat /osintser] Wer ita slomscom) cit ip poersacsogeet Laners it (ep/semrconséocncom) Creating Custom Packet Using TCP Flags Packet Crafting Tools Packet crafting tool ae used to generate and analyze network traffic. These tools craft and send Packet streams by using diferent protocols at different transfer rates. Colasoft Packet Builder Source: http://www colasoft.com Colasoft Packet Bullderis a too! that allows an attacker to create custom network packets and helps security professionals to assoss the network. The attacker can select a TCP packet from the provided templates and change the parameters in the decoder editor, hexadecimal editor, or ASC editor to create a packet. In addition to bullding packets, Colasoft Packet Bullder supports saving packets to packet files and sending packets to the network. ‘There are three views in the Packet Builder: scket List, Decode Editor, and Hex Editor. (© The Packet List displays all constructed packets. When you select one or more packets in the Packet List, the frst highlighted packet displays in both Decode Editor and Hex Editor for eiting. © Inthe Hex Editor, the data of the packet are represented as hexadecimal values and ASCII characters; nonprintable characters are represented by a dot ("") in the ASCII section. You can edt either the hexadecimal values or the ASCII characters. (© Decode editor allows the attacker to edit packets without remembering value length, byte order, and offsets, You can select a feld and change value inthe edit box. Me ae 29 ts Manga Geter Cn Esme nite news Repoascons say Monet eral ey af cern.Sm etn For creating a packet, you can use the add or insert packet command in the Edit menu or fon the Toolbar to create a new packet. The attacker can send a constructed packet to wire directly and control how Colasoft Packet Builder sends the packets, specifying, for example, the interval between every packet, loop times, and the delay time between loops. This packet builder audits networks and checks network protection against attacks and Intruders. Attackers may use this packet builder to create fragmented packets to bypass ‘network firewalls and IDS systems. They can also create packets and flood the victim with 2 very large number of packets, which could result in denial-of service attacks. Some ofthe packet crafting tools include: NetScanTools Pro (https,//mwu.netscantools.com) Ostinato heepy/ostinato.org) WAN Killer (http://www solarwinds.com) Packeth (http//packeth,sourceforge.net) LANForge FIRE (http://www condelatech.com) Bit-Twist (tp: //bittwist sourceforge.net) WireEdit(htps://wireedit.com) Moi Pe 280 handing ort Copy © Kegaue aig tenad eroacon sone teed re pesca ean of cevencor,ehh ouere (hs poem te tart oo tom bet 8 ppt more wk sng ‘ie ‘actin nwo scamnng chou wibecompuntenay es ease na eae seach Sze SUBS ars spears poe bye v6 Waser ‘Sannirgn hs stark rare cet nd cpl won compares the Pe. Analy, Sumber af zamingtniaaotuppot ane weezer Ps Remon i aS ce are ee SRS RR STE TE ‘bl ocompromis estos nthe sine he or chetan pos tea hast los ‘mute cares Scanning in IPv6 Networks. v6 increases the size of IP address space from 32 bits to 128 bits to support more levels of addressing hierarchy. Traditional network scanning techniques are computationally less feasible because of larger search space (64 bts of host address space, or 2" addresses) provided by IPv6 Jina subnet. Scanning in the IPG network is more difficult and complex when compared to the |Pv4.Additionally, a number of scanning tools do not support ping sweeps on IPvS networks. ‘Atackersneed to harvest IPv6 addresses from network traf, recorded logs, or "Recelved from” and other header lines in archived email or Usenet news messages to identify IPv6 addresses for subsequent port scanning, Scanning an IPv6 network, however, offers a large number of hosts in ‘a subnet; ifan attacker can compromise one subnet host, he can probe the “all hosts link local ‘multicast address, fhosts numbers are sequential, or use any regular scheme. An attacker needs to analyze 2* addresses to verify fa particular open service Is running on a host in that subnet. ‘Ata conservative rate of one probe per second, such a scan would take about 5 billion years to complete, ae 3 Pye 282 tthatiigand outemens cpg Ea ‘aig trond apo tsa Ponte, Ths apernal epyofdeurwcangAUC gtd Scanning Tools ‘Scanning tools scan and Identify live hosts, open ports, running services on a target network, location-info, NetBIOS info and information about all TCP/IP, UDP open ports. Information ‘obtained from these tools will assist an ethical hacker in creating the profile of the target ‘organization and to scan the network for open ports of the devices connected. Me ge 82 ing Goatees Cnty fea Aikete renee Rewoascons say Mone iris ately of devasSede Nmap Source: httpsi/nmap.org "Nmap is a security scanner for network exploration and hacking It allows you to discover hosts and services on a computer network, thus creating a "map" of the network. Itsends specially crafted packets to the target host and then analyzes the responses to accomplish Its goal, Either a network administrator or an attacker can use this tool for thelr specific needs. Network administrators can use Nmap for network inventory, managing service Upgrade schedules, and monitoring hast or service uptime. Attackers se Nmap toextract Information such a live hosts on the network, services (application name and version), type of packet fiters/irewalls, operating systems, and OS versions. Nmap includes a flexible data transfer, redirection, and debugging too! (Neat), a utility for comparing scan results (Nef, and a packet generation and response analysis tool (Nping) ‘Some of the features of Nmap are: It scans vast networks of literally hundreds of thousands of machines. © It supports dozens of advanced techniques for mapping out networks fled with IP Titers, frewalls, routers, and other obstacles, Nmap includes many port scanning ‘mechanisms (TCP and UDP), OS detection, version detection, ping sweeps, and so on. Mees Page 283 ic ing center ope ly EEG ris apersonalepy of evraa (Eh cerrado scmning and pack eating tol the TOP pte - jj "cn id ar mr wary ming Frew tng mana path MTU icy aban HOS, a ‘emate 5 fingering ramate ptne wes, TOY lacs ein e + Hing? / Hpings Source: htte//wer hing ora Hping2/iping3 isa command ine-orented network scanning and packet crating tol for the TCP/IP protocol that sends MP echo requests and supports TCP, UDP, ICMP, and raw? protocols. it performs network security auditing, firewall testing, manual path MTU discovery, advanced traceroute, remate OS fingerprinting, remote uptime gue Tee/iP stacks auditing, and other functions. Hping2/Mping3 has a Traceroute mode which enables youtosend flesbetween covert channels. Itean send custom TCP/IP packets and display target replies, as doesa ping program with ICMP replies. tt handlesfragmentation, arbitrary packets’ body and size, and uses them to transfer encapsulated les under supported protocols. It supports idle host scanning. IP-spocfing and network/host Scanning can be used to perform an anonymous probe for serves. An attacker studies the behavior of anil host to gan information about the target, such as the services thatthe host offers, the ports supporting the servles, andthe operating system of the target. This type of scan is a predecessor to either heavier probing or outright atacs. ‘The following ae some ofthe Features of Hping2/HpingS: ©. It determines whether the hos is up even when the host locks ICMP packets. © Itaids advanced port scanning and test net performance using different protocols, packet sizes, TOS, and fragmentation, © Manual path MTU discovery Firewalllke usage allows discovery of cpen ports behind firewalls Remote 0S fingerprinting and TCP/IP stack audlting Woe Pe 254 ‘atau atemanine a iy WEL ne pera coy or evennerg,ICMP Seanning [A ping sweep or Internet Control Message Protocol (ICMP) scanning is @ process of sending an ICMP request or ping to all hosts on the network to determine which one Is up. ‘The operating system, router, switch, internet protocol-based devices use this protocol via the ping command to Echo request and Echo response as a connectivity tester between diferent hosts [ACK Scanning on Port 80, You can use this scan technique to probe forthe existence ofa firewall and its rule sets. Simple packet fitering allows you to establish a connection (packets with the ACKbitset), Whereas a sophisticated stateful firewall does not allow you to establish a connection, oes ree ‘stages cam mms ar © Sm “se perc capy of eves.Semi ts ES | ices Hping Commands Below are various Hping commands: = ICMP ping Ex. ping? -2 10.0.0.25 Hping performs an ICMP ping scan by specifying the argument -1 on the command line. ‘You may use ~ICMP of -1 argument in the command line. By issuing the above command, bhping sends ICMP-echo request to 10.0.0.25 and receives ICMP-teply the same as with a ping uty ACK sean on port 80 Ex. ping’ -A 10.0.0.25 -p 60 Hing can be configured to perform an ACK scan by speddfving the argument -A inthe command line. Here, you are setting ACK flag inthe probe packets and performing the scan. You perform this sean when a host does not respond to a ping request. By Issuing this command, Hping checks if a hosts alive on a network. fit finds a live host and an ‘open por, itreturns an RST response. = UDP scan on port 80 Ex. hping3 -2 10.0.0.25 ~p 80 Hping uses TCP as Its default protocol. Using the argument -2 in the command tine specifies that Hping operates in UDP mode. You may use either ~udp of -2 arguments in ‘the command tne By issuing the above command, Hping sends UDP packets to port 80 on the host (20.0.0.25). It returns an ICMP port unreachable message if it finds the port closed, and ddoes not respond with a messageif the port is open. a2 Page 6 {hal gad ote: cop yam “aig trons Rapa bia Potanes tiie are my of devs= Collecting Initial Sequence Number Bx. hping3 192.168.1.103 -9 -p 139 ~* By using the argument -G in the command tine, Hping collects all the TCP sequence numbers generated by the target host (192,168.1.103). ‘= Firewalls and Time Stamps Ex. hping3 -5 72.14.207.99 -p 60 --tep-tinostamp Many firewalls drop those TCP packets that do not have TCP Timestamp option set. By adding the ~tep-imestamp argument in the command line, you can enable TCP ‘timestamp option in Hping and try to guess the timestamp update frequency and uptime of the target host (72.14.207.99). ‘= SyNsean on port 50-60 Ex. hping3 -8 50-60 -s 10.0.0.25 -v By using the argument - (or) ~scan in the command, you are operating Hping in scan ‘mode in order to scan a range of ports on the target host. Adding the argument allows you to perform a SYN scan, ‘Therefore, the above command performs SYN scan on ports 50-60 on the target host. ‘+ FIN, PUSH and URG scan on port 80, x. pping3 -F -P -0 10.0.0.25 -p 60 By adding the arguments ~f,-P, and -U in the command, you are setting FIN, PUSH, and LURG packets in the probe packets, By issuing this command, you are performing FIN, PUSH, and URG scans on port 80 on the target host (1040.0.25) f port 80 is open on the target, you will not recelve a response. Ifthe port is closed, Hping will return an RST response. ‘+ Scan entire subnet for live host 4x. mping3 -1 10.0.1. —-zand-dest -r otho By issuing this command, Hping performs an ICMP ping scan on the entire subnet 10.0.1; in other words, it sends ICMP-echo request randomly (-rand-dest) to all the hosts from 10,0.1,0 ~10.0.1.255 that are connected tothe interface eth0, The hosts whase ports are ‘open wil espond with an ICMP-reply In this case, you have nat seta por, so Hplng sends packets to port 0 on all IP addresses by default = Intercept all traffic containing HTTP signature Ex. nping3 -9 HTTP -1 ono ‘The argument -9 wil set the Hping to listen mode. So, by issuing the command -9 HTTP, Hping starts listening on port 0 (ofall the devices connected in the network to interface th0), interceptsall the packets containing HTTP signature, and dump from signature end to the packet's end For example, on issuing the command nping2 -9 rz, if Hping reads 2 packet that contains data 234-09safljs45-HTTPhello_world it wil display the result as hello_world oahu henoiedonkoway Montes “se apercralcapy of ovine.= SYN flooding a victim Bx. hping? -8 192.168.1.1 -a 192.168.1.254 -p 22 --£lo0d ‘The attacker employs TCP SYN flooding techniques by using spoofed IP addresses to perform Dos attack, ‘The following table ists the various scanning methods and their respective Hping commands: Sean Commands TO pine ‘apings -1 20.0.0.25 ‘Acksanon par 80 ‘pping3 -A 10.0.0.25 -p 60 ‘UDP scan on por 8 ‘pings -2 10.0.0.25 ~p 60 Colecting intel sequeneesuriber | Bpiaga 192.260.1.103 -g -p 139 Frewalt andtineatamps Taping -5 72.14,207.99 -p 80 —-top-tineatanp ‘Si scan on por sO-60 Tpplagi -8 50-56 -8 10.0.0.25 -¥ FIN, PUSH and URS san on por 80 ‘Sean entire sdbt fre host Intercept al fic containing HTTP sienature ‘pings -F =P 0 10.0.0.25 ~p 80 ‘ppingS “1 10.0.1. —-rand-dest -1 etho ‘apingS -9 WITP -r tho ‘SW ooang avctin TapingS -8 192.168.1.1 -a 192.168.1.284 -—p 22 “elo ‘hcl cing cumemennes Capris Oy Home alti tenes Napaascoe asia) eabtos ri apace py of dori© moors mash maleate hers tang moni ob) + Seen eon ome massa pany + onan inon «etree mnnoneit om) Scanning Tools + NetSeanTools Pro Source: hite/www.netscantooks.com \NetscanTools Pro is an investigation tool that allows you to troubleshoot, monitor, discover, and detect devices on your network. You can easily gather information about the local LAN, 25 wells Internet users, IP addresses, ports, and soon using this tool. You can find vulnerabilities and exposed ports in your system. NetScanTools Pro combines ‘many network tools and utilities categorized by their functions, such as active, passive, DNS, and local computer, © Active Discovery and Diagnostic Tools: Used for tasting and locating devices connected to your network. (©. Passive Discovery Tools: Monitor the activities of the devices connected to your network and gather information from third parties. (©. DNS Tools: Help to detect DNS problems. (©. Local Computer and General Information Tools: Provide details about your local ‘computer's network Benefts: ‘©. The information gathering process is made simpler and faster by automating the use ‘of many network tools. (©. Clearly produces the result reports in your web browser. tte petra ony ot aruSome of the scanning tools are listed below: Supersean(tps//aww.mcafee.com) PRTG Network Monitor (htess/mw:paessler com) Comieck (hetas/imm.sewvius. com) IMiTeC Network Scanner (http://www mitec.ce) [NEWT Professional (htip/www komodolabs.com) MegaPing (tp:/muw.magnetosoft.com) Sithers Network Discovery (http//www.komodolabs com) TamoSof’s CommView (htp//wwrtomos.com) IP Scanner (itps//eammunity spiceworks.com) Tools (hiips://uww ks softnet) Network Scanner (htip/www.10strke.com) Global Network loventory (http//ww.magnetosoft.com) SoftPerfect Network canner (hitps/mwwsoftperfect corm) ‘Advanced Port Scanner (hitps//wmw.advanced-port-scanner.com) CcurePors(htps//mnwnirsof.net) ‘Masscan (htips//aithub.com) DDRACNMAP (https:/othub.com) NEET (netps://athub.com) of deere “hele apetanal oySeam etn ===] scanning Tools for Mobile Scanning Tools for Mobile = wscanner ‘Source: http//10base-t.com 1P Scanner for 105 scans your local area network to determine the identity of allits active ‘machines and Internet devices. Features: © In-bulltPing, Portscan, and WOL tools (©. Traverse to native VNC, web browser, or any custom service directly from the scan resus, (© Customizable eisplay options for assigning names and icons to discovered devices ‘© Ability to create your custom device categories with your images. © Ability to export, email, and print scan results. + Fing Source: https://wwnw fing io Fing is @ mobile app for Android and IOS that scans and provides complete network information, such as IP address, MAC address, device vendor, and ISP location. Features: ‘© Discovers all devices connected to a Wi-Fi network © Displays MAC Address and device manufacturer Med ge 21 se ingore Ch Fea Aifete tenes Hepoascont say Monet titi areal ey of crurncr.© Fullsearch by IP, MAC, Name, Vendor, and Notes Displays NetBIOS names and properties Tracks when a device has gone online or o Launch Apps for specfic ports, such as Browser, SSH, FTP Ping and traceroute: Assesses network performance [Automatic DNS lookup and reverse lookup Supports identification by IP address for bridged networks Sort by IP, MAC, Name, Vendor, State, and Last Change ‘Some of the scanning tools for mobile devices include: "= Hackode (https//play. google.com) ANT (htepsi//www.zimperium.com) = eSploit (http://www. esploit.org) = Faceniff (http://www effecthacking.com) = PortDroid Network Analysis (https://play. google.com) = Pamn ip Scanner (https//play. google.com) er Pe? Wake On LAN: Allows you to switch on your devices from mobil or tablet ire fees Rom yan ie cereal ey f cer.Scanning Techniques ‘Scanning isthe process of gathering information about systems that are “alive” and responding fon the network, Port scanning techniques help an attacker to identify the open ports on a targeted server or host. Administrators often use port scanning techniques to verify security polices oftheir networks, whereas attackers use them to identity running services ona host with the intent of compromising the network ‘The first step in scanning networks isto check for lve systems. Ths section highlights how to check for lve systems with the help of ICMP scanning, how to ping a system and various ping sweep tools Once the attackers detect ive systems inthe target network, they try to find open ports in the discovered lve systems. The next step in the network scanning process involves, ‘checking the open ports in live systems. Sometimes users unknowingly Keep unnecessary open ports on their systems, Attacker takes advantages of such open ports to launch attacks, Th section describes the tols and techniques used by an attacker to do so, osc
[-B] [-f fromhost] [-d delay] [-T tine) targe Where,
is one of CMP timestamp request (default) IMP address maskrequest “di delay to sleep between packets isin microseconds specifies the number of seconds to walt fr a host to respond. The default ie 5. A target isa lst of hostnames or adéresses. Mesie os rae inalindingand ortemaures prt Oy Kea ‘lint rconas Rewoasconesncy Hohe is perc ey of cee,ere seep esr E cy "gonna onetime eho meee of are by erg CEO rene aml ‘olou ste neirnen Eon eo © Aeterna co mete mmbrtha rete "pases nny pgp rete a oer pans tee ‘Ping Sweep- Checking for Live Systems ‘A ping sweep (also known as an ICMP sweep) Is a basic network scanning technique that Is employed to determine which range of IP addresses map to live hosts (computers). Although a single ping wil tell the user whether one specified host computer exists on the network, a ping sweep consists of ICMP ECHO requests sent to multiple hasts. Ifa specified host is actve, i wil return an ICMP ECHO reply. Ping sweeps are among the oldest and slowest methods used to scan a network. This utility distributed across almost al the platforms acts as a rol call for systems; a system that fs active fn the natworkanswers the ping query that another system sends out. ‘To understand pings better, one should be able to understand the TCP/IP packet. When a system pings, it sends a single packet across the network toa specific IP address. Tis packet contains 64 bytes (56 data bytes and 8 bytes of protocol ade information), The sender then wats or listens {for a return packet from the target system. Ifthe connections are good and the target computer 's “alive,” a good return packet Is expected. However, this wil not be the case If there is a alisruption in the communication. Ping also details the amount of time it takes for a packet to ‘make the complete trp called the “rouné-trip time.” Ping also helps in resolving hostnames. In this case, if the packet bounces back when sent tothe IP address, But pot when sent to the name, ‘then the system is unable to resolve the name to the specific IP address. [Attackers calculate subnet masks using Subnet Mask Cakulators to identify the number of hosts that are present inthe subnet. Attackers subsequently use ping sweep to create an inventory of, live systems inthe subnet, terse nc actin aterm Coy yam hiker ncwee heponscon sector “ste apesanleapycbumiangSaree ede} [Angry iP Scanner sane pg teh atest hey Se gai rae Ping Sweep Tele (evfraserscon) 9 Nescracl Poh /wmtcotcan) 9 coke nee anita 9 Venn 60 (ee/Ane segs © opus tps marapengne cn) Ping Sweep Tools Ping sweep toolsping en entire range of network P addresses toidentity the lve systems. Given below are ping sweep tools that enable one to determine live hosts on the target network by sending muitile KMP ECHO requests to various hosts on the network ata time. + Angry IP Scanner Source: htt//www.angryi.org ‘Angry IP scanners an IP address and port scanner. It can scan IP addresses at any range as well as any oftheir ports t pings each IP address to check f they are alive, then it optionally resolves its hostname, determines the MAC address, scans ports, and So on. ‘The amount of data gathered about each host extends with plugins. Angry P scanner has additional features, such as NetBIOS information (computer name, workgroup name, and currently logged in Windows usr), favorite P address ranges, web server detection, and customizable openers. The tool allows the user to save the Scanning results to CSV, TXT, XML, oF P-Pot list ile, To increase scanning speed, it uses a multithreaded approach: 3 separate scanning thread created for each scanned IP address Listed below area few more ping sweep tools that an attacker one to determine live hosts on the target network: + SolarWinds Engineer's Toolset (http://www solanwinds.com) + NetscanTools Pro (httos//wvmmnetscantools.com) * Colasoft Ping Tool [http://www colasoft.com) + Visual Ping Tester (htt//www.pingtesternet) + Oputilshttps:/Awww.manageengine.com) rd courte pet © Keane Ture tpsecar sot Ponce re peril eo a cron,Hlatgns ene ances taker "Advanced IP Scanner (http://mww.advanced-ip-scanner.com) = Pinginfoview (http://wwm.nisoft.net) = Ping Moritor (http://wmniliand.com) = Pinkie (htp://wiw uptime. net) = MegaPing (http://www. magnetosoft.com) Mose) Pen 303 hal aad outer cnet 0 Fame ‘i igh hac faposon ssc ootes “hse aporseral copy of bvEe] Ben Pasties © Howeve it sometnes stlin retorhisuo rene ofthe mene 2 ICMP Echo Scanning ICMP echo scanning pings all the machines in the target network to discover live machines. [Attackers send ICMP probes to the broadcast or network address which relays to all the host addresses in the subnet. The live systems wil send ICMP echo reply message to the source ofthe eM echo probe. UNIX/Linux and BSD-based machines use ICMP echo scanning; the TCP/IP stack implementations in these operating system respond to the ICMP echo requests to the broadcast addresses, This ‘technique does not work on Windows-based networks, as their TCP/IP stack implementation does not reply to ICMP probes directed at the broadcast address. ICMP echo scanning is not same as port scanning because it does not have a port abstraction. CMP echo scanning is used to determine the particular hosts that are active in @ network by pinging al of them. Active hosts are displayed in Zenmap as “Host is up (0.0000s latency),” as “shown in the sereenshot above, ose) Pg 0¢ ‘halal corte op Oy Kame ‘aig uence Roponcenteray Poh si porn oppo anricongSere tons ‘Srpling te tee eyo "oan by semsingan Spa "6 doesnot eit the superna ‘TCP Connect / Full Open Scan Source: htte://insecure.org ‘TCP Connect/Full Open Scan is one of the most reliable forms of TCP scanning, In TCP Connect scanning, the operating system's TCP connect() system call tries to open a connection to every interesting port on the target machine. If the port is listening, the connect) call wil result in a successful connection with the host on that particular port; otherwise, it will return an error message stating that the port isnot reachable, ‘TCP Connect scan completes a three-way handshake with the target machine. Inthe TCP three- ‘way handshake, the client sendsa SYN packet, which the recipient acknowledges with a SYNACK packet Inturn, the client acknowledges the SYN+ACK packet with an ACK packet to complete the ‘connection. Once the handshake is completed, the scanner sends a RST packet to end the ‘connection. “Making a separate connect) call fr every targeted por ina linear fashion would take along time ‘over a slow connection. The attacker can accelerate the scan by using, many sockets In parallel Using nor-blocking, VO allows the attacker to seta low time-out period and watch all the sockets simultaneous. ‘The drawback of this type of scan is thatitis easily detectable and filterable, The logs inthe target system will disclose the connection, This type of scanning does not require the superuser privileges. Mots e305 hating outers aight iy HER ‘inn fseweeRgoselcn say Poe ine anna apy of ceroStealth Scan (Half-open Scan) Aheclon andre abrupt bom competion of theewey Ther inhale sens Fence ok theetneten hal oer sme, seca eat sng tue toby fea eee ‘dc loggngmecaramsnchide theres aad er sei! ‘Steatth sean Procers aco rts ep ne ru sath Stealth Scan (Half-open Scan) The Stealth scan involves resetting the TCP connection between client and server abruptly before completion of the three-way handshake signals, hence, making the connection half open. A stealth scan sends a single frame toa TCP port without any TCP handshaking or addtional packet transfers. This type of scan sends a single frame with the expectation ofa single response. The half-open scan partially opens a connection but stops halfway through. The stealth scan is also called a “SYN scan,’ becauseit only sends the SYN packet. This preventsthe service from notifying, the incoming connection. TCP SYN or hal-open scanning isa stealth method of port scanning. ‘The stealth scan also implements the threeway handshake methodology. Inthe last stage, It ‘examines the packets entering the interface and terminating the connection before triggering a ‘new initialization to identity remote ports. The stealth scan process is shown below. ‘+ The dient sendsa single SYN packet to the server on the appropriate port ‘+ IF the port i open, subsequently, the server responds with an SYN/ACK packet. ‘= Ifthe server responds with an RST packet, then the remote port isin the “dosed! state "+ The client sends the RST packet to clase the initiation before a connection can ever be established. Attackers use stealth scanning techniques to bypass firewall rules, logging mechanism, and hide themselves as usual under network traffic. i i eatin Mieet “Hse aparmal copy of dummy.Eel eee Attackers send TCP probe packets with a TP flag (FIN, URG, PSH) stor with no lags, no response implies thatthe port is open while RST means that the pot closed Portia cloned Inverse TOP Flag Scanning [Attackers send TCP probe packets with a TCP flag (FIN, URG, PSH) set, or with no flags. When the port is open, the attacker does not get any response from the host, whereas when the port is closed, he or she receives the RST from the target host. Security mechanisms such as firewalls and IDS detect the SYN packets sent tothe sensitive ports of the targeted hosts, Programs such as Synlogger and Courtney are available to log half-open, 'SYN flag scan attempts. At times, the probe packets enabled with TCP flags can pass through fiers undetected, depending on the security mechanisms installed Inverted Technique is an act of probing a target using a half-open SYN flag because the closed ports can only send the response back. According to RFC 793, an RST/ACK packet sent for connection reset, wien the host closes @ port. Attackers take advantage of this feature to send ‘TCP probe packets to each port of the target host with various TCP flags set. Common flag configurations used for a probe packet include: ‘+ AFIN probe with the FIN TCP flag set ‘= An XMAS probe with the FIN, URG, and PUSH TOP flags set ‘+ ANULL probe with no TCP fags sot + ASYN/ACK probe All closed ports on the targeted host will send an RST/ACK response. Since operating systems such as the Windows completely ignore the RFC 793 standard, you cannot see the RST/ACK response when connected to a closed port on the target host. However, this technique is effective when used with UNIX-based operating systems. ease 03 ge387 icttengand ourmesaee cpg © femme ‘aga sence eeseon sae Hokotes pin esp rn,Advantages Avoids many IDS and logging systems, highly stealthy Disadvantages ‘= Needs raw access to network sockets, thus requiring super-user privileges = Mostly effective against hosts using @ BSD-derived TCP/IP stack (not effective against Microsoft Windows hosts, in particular). Note: Inverse TCP flag scanring is known as FIN, URG, and PSH scanning based on the flag set in the probe packet if there is no fag set, It is known as null scanning, Meine Pgs 508 ha agar otrmnans Cope © y EOE “ifghe Ascved horcactontsvay Pemtes ipsa eny 0f cernrms ety eth cen gC 5D 28 TRE eure Xmas scan isa port scan technique with FIN, URG, and PUSH flags set to send a TCP frame toa remote device if the target has opened the port, then you will receive no response from the remote system. ifthe target has lased the port, then you willrecelve aremote system reply with {2 RST. You can use this port scanning technique to scan large networks and find which host is up and what services it is offering. It's a technique to describe all CP flag sets. When all lags are set, some systems hang; so the flags most often set are the nonsense pattern URG-PSH-FIN. ‘Attackers use TCP XMAS scan to determine if ports are closed on the target machine via RST ppacket. This scan only works when systems. are compliant with RFC 793-based TCP/IP Implementation. twill not work against any current version of Microsoft Windows. BSD Networking Code ‘This method relies on 8SD networking code. Thus, you can use this only for UNDK hosts; it does not support Windows NT. Ifthe user scans any Microsoft system, it will show that all the ports ‘on the host are open, ‘Transmitting Packets You can initialize al the flags when transmitting the packet toa remote host, I the target system ‘accepts the packet and does not send any response, it means that the port open. I the target system sends RST flag, then itimplies thatthe port is closed. Advantages * Itavolds the IDS and TCP throe-way handshake. Disadvantages *Itworks on the UNIX platform only sneer ante er St “ea pereal ey of deumcargFe Sg ep ees cysts] “6 Atacar send TP probe pacts wth ACK flag st aemate deve anthem anaes the header Information (T.and WINDOW eld) ofrecved RST pacts ond out the port Bopen or loved ‘unset ACKtagpibe sennog ‘WoDoW base AO ag ede vetmig fac fa the vila pct on spat pat ist the WIDOT packt on sae ‘Pontietountay alate then tatpais epee pathos non soovaun, hehe por open © Ack tg oberg an tn bets check the ering tem eget 6 anscrserdan Ack poe pat wth sfancom ceuence nue ro respares npr that pated {sat reals ese sn AS expore meh he pa at eee ‘ACK Flag Probe Scanning [Attackers send TCP probe packets withthe ACK flag set toa remote device and then analyze the header information (TTL and WINDOW fel ofthe received RST packets to find out f the port is. ‘open or dosed. The ACK flag probe scanning exploits the vulnerabilities within BSD derived TCP/IP stack, Thus, this scanning is effective only on those operating systems and platforms on which ‘the BSD derives TCP/IP stacks. odes ree 230 {stagaand cam mms ar © me “esa paral cy of deumaargCategories of ACK Flag Probe Scanning include: = TrLsbased ACK fag probe scanning In this scanning technique, you wil first need to send ACK probe packets (thousands in number) to different TCP ports, and then analyze the TTL field value of the RST packets received. Ifthe TTL value of RST packet on a particular port i less than the boundary value of 64, then that port is open. Here is an example displaying a lg of the first four RST packets received In the above example, port 22 has returned 2 TTL value of 50, whichis less than 64; all other ports returned a TTL value of 80, which is greater than 64, Therefore, port 221s open. = WINDOW based ACK fag probe scanning. In this scanning technique, you wil fist need to send ACK probe packets (thousands in ‘rumber) to different TCP ports, and then analyze the Window field value ofthe received RST packets. The user can use this scanning technique when all the ports return the same ‘TTL value. I the WINDOW value of RST packet on a particular port has a non-zero value, then that Portis open. Here isan example displaying alg ofthe fst four RST packets received: _peranal apy of eran. ‘The above figure shows thatthe TTL value returned for each packet isthe same, so vou cannot perform TTL based ACK flag probe scanring to find the open ports. Therefore, when you observe the window value, the third packet has a non-zero window value, ‘which means thatthe port is open ‘Advantages: ‘= This type of scan can evade IDS in most cases. Disadvantages: ‘= This scan is very low and can exploit only older operating systems with vulnerable BSD Aerived TCP/IP stacks. eaieos gest) tomesa cingand Castner ‘em 2 59 cone aad Sonieewons (Checking the Filtering Systems of Target Networks The ACK flag probe scanning technique also assists in checking the fitering systems of target networks. The attacker sends an ACK probe packet to check the filtering mechanism (Firewall) ‘of packets employed by the target network Sending an ACK probe packet with # random sequence number and getting No Response from the target means thatthe port i filtered (stateful firewalls present); an RST response from the target means thatthe port isnot filtered (No Firewal is Present). Starting amap §.49087A4 (nttpe Naap acan report for 10.10.0.25 Host is up (0-00076= Latency) ALI 1000 seanned porte on 10-10.0.25 are unsittared, /Insap org) at 2017-07-210 2 EDT snap done: 1 P address (1 host up) scanned in 1,72 seconds, Meaie 03 get? fhatadingad oto ns ph Oy Kame ‘taht vows Rowen Pohne ici teil cy of devsIDLE/IPID Header Scan 2 spon scone pete mneanenentnteteone, > Arama momen Ane ‘et re cong wee See ‘ciapactoneetamoemenne sina ne + Sretarkce tomentose * Snotandnesine Beaman * Leta see enteba 6 haute 0a PO ned ti “noemsonnes ieee IDLE/IPID Header Sean ‘The IDLE/IPIO Header scan is a TCP port scan method that you can use to send a spoofed source address to a computer to find out what services are available. it offers complete blind scanning of a remote host. Mast network servers listen on TCP ports, such as web servers on port 80 and mail servers on port 25. Portis considered “open” if an application is listening on the port. One \way to determine whether a port is open is to send a "SYN" (session establishment) packet tothe port The target machine will send back a "SYN|ACK" (session request acknowledgment) packet ifthe port is open, and an "RST" (Reset) packet ifthe port is closed. A machine that receives an unsolicited SYN|ACK packet wil respond with an RST. An unsolicited RST will be ignored. Every |W packet on the Internet has a Nragment identification" number (PID). OS increases the PID for leach packet sent, thus probing an IPID gives an attacker the number of packets sent since the last probe. GUE DLE/P IO Heder san ng ewap ‘The attacker performs this scan by impersonating another computer through spoofing, The attacker does not send a packet from her/his own IP address; instead, they use another host, often called a "zombie," to scan the remote host and identify any open ports. In this attack, the ‘ee aparanal py of devinattacker expects the sequence numbers ofthe zombie host, and ifthe remote host checks the IP of the scanning party, the IP of the zombie machine wal display. IDLE Sean Every P packeton the internet hasa fragment Intemet protocol identification (PID) number that Uniquely identifies fragments of an original IP datagram. As many operating systems simply Increase this number for each packet they send, probing for the IID can tell an attacker how ‘many packets the user sent since the last probe. + steps ‘The firs stepin performing an idle scans to find an appropriate zombie. The zombie that assigns IID packets incrementally on a global basis is an appropriate or idle zombie to perform the idle sean. The lower the time interval for request/response between the attacker-2omble and the zomble-target, the faster the scan, (Choose a “Zombie” and Probe for Its Current IP Identification (IPID) Number In the first step, you will send the SYNSACK packet to the zombie machine to probe its IPID number, Here, the reason for sending the SYN*ACK packet Is to probe the IPID number but not establish a TCP connection (3-way handshake). {As the zombie does not expect a SYN#ACK packet, It will deny the connection by sending back an RST packet. Analyze the RST packet sent by the zombie machine to extract the IPiD. In the diagram shown in the slide above, assume the zombie responds with 1Pi0=31337. Assume this PIDs x. + step2 ‘The attacker sends an SYN packet tothe target machine on port 80 spoofing the IPaddress of the Zombie. Idle Scan: Stop 2.1 (Open Port) Ifthe port is open, the target will send the SYNACK packet to the zombie (as the IP address was spoofed) to proceed with the 3-way handshake. Since the zombie did not ‘expecta SYN¢ACK packot from the target machine, it wil respond with a RST packet. sie os rgeatt inaliningand orem prt Oy Kame ‘lint rconas Rowena) Pohntet ii ance ey of cre,Since every IP packet has a “fragment kertification” number, which Increases by one for every packet transmission, this time the zombie will use itsnext available PID, ie, 31338 (ca), Idle Sean: Step 2.2 (Closed Port) ‘Assume that the port on the target is closed. Subsequently, on receiving the SYN packet {rom the attacker (you), the target wil respond with a RST, and the zombie will remain Idle without taking any further action. HOURE 6 Por cess + Stops Now, follow step 1 again to probe the IP 1D number. salen Zombie Send a SYN+ACKpacket to the zombie, and it wll respond with a RST packet containing ‘the IPID. Assuming thatthe port on the target was open, and the zombie has already sent ‘RST packet tothe target; then the IPID number has increased by . Thistime the zombie responds with a RST packet to the attacker by using its next IPID, Le, 31339 (K + 2) Consequently, the IPID has increased by 2, which implies that the port on the target machine was open. Thus, using an Idle scan, an attacker can find out the open ports and services on the target machines by spoofing hs /her IP address witha zombie's IP address. eenet commence tet “tea parcanal copy of uring,UDP Scanning UDP Raw ICMP Port Unreachable Scanning UDP por scanners use the UDP protocol instead of the TCP. There ls nothree-way handshake for UDP scan. The UDP protocol can be more challenging to use than the TCP scanning because you can send a packet, but you cannot determine whether the host fs alive, dead, or fiered However, you can use one ICMP that check for open or closed ports. I you send 3 UDP packet toa port without an application bound to, the IP stack wl return an ICMP port unreachable packet. f ary por returns an ICMP erro, it wl close up thereby, leaving the ports that id not answer if they ae open or filtered through the firewall This happens because open ports do not have to send an acknowledgement In response to a probe, and closes ports are nat even required to send an error packet. UDP Packets Source: htps//amap.org When you send a packet oa closed UDP pot, most ofthe hosts send an ICMP_PORT_UNREACH error. Thus, ouan determine whether aportis NOT openif UDP packet o IMP erors re not fuaranteed to arrive, Thus, UDP seanners ofthis sort must implement retransmission of packets that appear lost. UDP scanners interpret lost traffic 3s open ports, In addition, this scanning technique is slow because it imits the ICMP error message rate as compensation to machines that apply RFC 1812 section 4.3.2.8, Aremote host will require access tothe raw ICMP socket to distinguish closed from unreachable ports. UDP RECVFROM () and WRITE () Scanning Mees Pe sit it eign rarer a Py Em rr pre copy of eure.Although non-root users cannot read unreachable port errors directly, Linux Informs you Indiectly when they receive messages. = Example: For example, a second write ()callto a closed port will usually fal, Various scanners, such {5 Netcat and Pluvial pscan.c do recvfrom () on non-blocking UDP sockets, and usually return EAGAIN ("Try Again," errno 13) if the ICMP error has not been received, and ECONNREFUSED ("Connection refused," ermo 111), it has. This isthe technique used ‘or determining open ports when non-root users use -u (UDP). The root users can alsouse the 4 (lamer UDP scan) options to force this process. ‘Advantage: The UDP scan is less informal regarding an open port because there is no overhead of a TCP handshake. However, ifICMPis responding to each unavailable port, the number of total frames can exceed thase from a TCP scan. Microsoft-based operating systems do not usually implement any ICMP rate limiting, so this scan operates very efficiently on Windows-based devices Disadvantage: The UDP scan provides port information only. f the additional version of information is needed, the scan must be supplemented with a version detection scan (-sV) of the operating system fingerprinting option (0). The UDP scan requires privileged access; hence, this scan options onlyavallable on systems with the appropriate user permissions. ‘Most networks have huge amounts of TCP traffic; as result, the efficiency of the UDP scan is lost. The UDP scan will locate these open ports and provide the security manager with valuable Information for identifying successful attacker invasions on open UDP ports caused by spyware applications, Trojan horses, and other malicious software, Mein Fae 22? thea eingand ortemeions cpr © Eee rit rae ric,Soest, Feats seit ay any nen (oestriol List Scanning Ina list scan, the discovery ofthe active network hast Is indirect. list scan simply generates and prints alist of Ps/Names without actually pinging or scanning the hosts. Asa result, thelist scan shows all IP addresses as “not scanned” (O hosts up). By default, a reverse DNS resolution is stil carried out on each host by Nmap for learning their names, Advantages: *Allist scan can perform a good sanity check The ist scan detects incorrectly defined IP addresses on the commana line orn an option filo. t primary repairs the detected errors to run any “active” sean, SSDP Scanning ‘SSDP (Simple Service Discovery Protocol) isa network protocol that generally communicates with ‘machines when querying them with routable IPvd or IPv6 multicast addresses. The SSOP service ‘controls communication forthe Universal Plug and Play (UPnP) feature. It generally works when. the machine is not firewalled; however, it can sometimes work through a firewall. The SSOP service will respond to the query sent over IPv4 or 1Pv6 broadcast addresses. This response Includes information about the Universal Plug and Play (UPnP) feature associated with It. The attacker uses SSDP scanning to detect UPnP vulnerabilities that may allow him/her to launch buffer overflow or DoS attacks. ‘The attacker may use the UPnP SSOP M SEARCH information discovery tool tocheck whether the machine is wlnerable to the UPnP exploits. The UPnP SSDP M-SEARCH information discovery tool «leans Information from UPnP-enabled systems as shown Inthe above slide. Moasees regent hol ecard outereaes Cpe by Kame “gia haces tepsacton say ota ne persnal apy aturebea geceiurniteRereiterrn etary ram rr at ig om aornmeyaae it ‘Seepage Beemer moet ote 05 dtr Lnarthte msoring fee gotng init tarccmneroe “meen Port Scanning Countermeasures ‘Asdiscussed previously, port scanning provides alot of useful information, such as P addresses, host names, open ports, and services running on ports to the attacker. Open ports specifically offer an easy means for the attacker to break into the network. But there is nothing to worry about, provided that you secure your system or network against port scanning by applying the following countermeasures: Configure firewall and IDS rules to detect and block probes The firewall should be capable enough to detect probes sent by the attackers using port scanning tools. it should not allow traffic to pass through it after simply inspecting the TCP header. The firewall should be able to examine the data contained in each packet before allowing the traffic to pas through it Run the port scanning tools against hosts on the network to determine whether the firewall accurately detects the port scanning activity = Some firewalls doa better job than others at detecting stealth scans. For example, many firewalls have specific options to detect SYN scans, while others completely ignore the FIN scans, = Ensure that the router, IDS, and firewall firmware are updated to their latest releases/version. Configure commercial firewalls to protect your network against fast port scans and SYN floods. You can run tools such as ports entry to detect and stop port scan attempts on inux/UNDX systems. Mose) Pee s18 hal ual outermeas cont 0 Fame “he a porseral copy af buena.Hackers use tools such as Nmap and perform OS-detection methods to sniff the details of 2 remote operating system. Thus, its important to employ intrusion detection systems in such cases. Snort (http://www-snortorg) is an intrusion detection and prevention technology that can be very useful, mainly because signatures are frequently available ‘rom the public authors. Keep as few ports open as necessary and fiter the ret, as the Intruder wil tryto enter ‘through any open port. Use @ custom rule set to lock down the network, block unwanted ports at the firewall, and liter the following ports: 135-159, 256-258, 389, 445, 1080, 1745, and 3268, Block inbound ICMP message types and all outbound ICMP type-3 unreachable messages {a border routers arranged infront ofa campany/s main firewall [Attackers try to perform source routing and send packets to the targets (which may not be reachable via the Internet) by making use of an intermediate host that can interact with the target. Such mechanisms can be adapted for hacking purposes to ensure that ‘your firewall and router can block such source-routing techniques. Ensure that the mechanism used for routing and fitering at the routers and firewalls respectively cannot be bypassed using a particular source port or source-routing methods. Test your IP address space using TCP and UDP port scans as well as ICMP Probes to determine network configuration and accessible ports. Ensure thatthe antiscanning and anté-spoofing rules are configured, Ifa commercial firewalls in use, then ensure that: © Itis patched with the latest updates © Ithas correctly defined antispoofing rules fo Its Fastmode services are unusable in Check Point Fiewall-1 environments Modine teen tho cial arte cpr Oy omeScanning Beyond IDS and Firewall ‘An Intrusion Detection System (IDS) and firewall ae the security mechanism intended to prevent ‘an attacker from accessing a network. But even IDSs and firewalls have some security limitations. ‘Attackers try to launch attacks withthe aim of exploiting these imitations. This section highlights various IDS/frewall evasion techniques such as packet fragmentation, source routing, IPaddress. spoofing et. on Paes thal tiga orto: cop ya ‘tins foes eonctnssiay Poeose ee oC Bere heey — ic : sncetane craven nen nanene amis a
IIS server and Windows platform. Given below are the four areas that typically determine the operating system: (© TIL{time to live) ofthe packets: What does the operating system sets as the Time To Live on the outbound packet? Window Size: What isthe Window size cet by the operating system? ‘Whether the OF (Don't Fragment bit is set: Does the operating system set the Don't Fragment bit? ©. TOS (Type of Service}: Does the oparating system set the Type of Service, and if so, what setting ist? Passive fingerprinting has to be neither fully accurate nor be limited to these four signatures. However, one can improve accuracy by looking at several signatures, and combining the information. The folowing isan analysis ofa sniffed packet dissected by Lance Spitzner in his-—spaper on passive ‘fingerprinting (hteps://uwu. symantec com/connect/artices/passve-fingerprinting): (04/20-21:41:48.129662 129.142.224.3:659 —> 172.16.1.107:404 ‘rep 71:45 1OS:0x0 20:56257 seeptear seq: 0190090553 Ack: OXEIC6SD7 Win: 0x7078 ‘According to the four criteria, the following are identified: © Tas. (© Window Size: 0x7078 (or 32120 in decimal) (©. DF: The Don't Fragment bits set © TOS:0x0 Compare this information to a database of signatures ‘TTL: The TLL from the analysis is 45, The original packet went through 19 hops to get to the target, ot sets the original TL to 64. Based on this TL, it appears that the user sent the packet from a Linux or FreeBSD box (however, more system signatures need to be ‘added to the database). This TL confirms itby implementing traceroute to the remote hhost If th trace needs to be done stealthily the traceroute TTL (default 30 hops) can be set to one of two hops less than the remote host (-m option). Setting the traceroute in this manner reveals path information (including the upstream provider) without actually touching the remote host. Window size: In his step, window sizes are compared. Window siz is another effective tool for determining precisely what window size Is used and how often It's changed. In ode o3 gens ating ad acme igh 8the previous signature, the window sizes set at 0x7078, a default window size commonly used by Linux. In addition, FreeBSD and Solaris tend to maintain the same window size throughout a session. However, Cisco routers and Microsoft Windows NT window sizes constantly change. Window size is more accurate when measured after the intial three ‘way handshake (due to TCP slow stat). DF bit: Most systems use the DF bit set, s0 this is of limited value. However, this does make it easier to identity few systems that do not use the DF flag (such as $CO or ‘Open8s0} ‘TOS: 0Sisalso of limited value, asit seems to be more session-based than OS-based. In ‘other words, itis not so much the OS that determines the TOS, but the protocol used determines i to a large extent. From the information obtained from the packet, specifically the TTL and the window size, ‘one can compare the results to the database of signatures, and with some degree of Confidence, determine the OS (in this case, Linux kernel 2.2.) Passive fingerprinting, like active fingerprinting, has some limitations. First, applications that build their own packets (eg., Nmap, Hunt, Nemesis, etc) will not use the same signatures asthe OS. Second, itis relatively simple for a remote host to adjust the TTL, window size, DF, or TOS setting on packets Passive fingerprinting has several other uses. For example, Crackers can use stealthy fingerprinting to determine the operating system of a potential target such as a Web server. A user only needs to request a Web page from the server and then analyze the sniffer traces. This bypasses the need for using an active tool that various IDS systems can detect. Passive fingerprinting also helps in identifying remote proxy firewalls. tt may be possible to ID proxy firewalls from the signatures as discussed above, simply because proxy firewalls rebulld connections for clients, Simlary, passive fingerprinting can be Used to identity rogue systems. Why Banner Grabbing? [An attacker uses banner grabbing to identify the OS used on the target host and thus determine system vulnerabilities and the exploits that might work on that system to further carry out additional atacks. ‘hat inane aucamsaas pg yO mtE “figs hea ematon tay Peaig tan a 359i hater ‘How to Identify Target System OS Finding out the target operating system is one of the important tasks for an attacker to compromise the target network/machine. In @ network, various standards are implemented in order to allow different operating systems to communicate with each other. These standards ‘govern the functioning of various protocols ike IP, TCP, UDP, etc. By analyzing certain parameters/felds In these protocols, one can reveal the detals of the operating system. Parameters lke Time to Live (TTL) and TCP window size in the IP header ofthe first packet in a ‘TCP session are helpful in identifying the operating system running on the target machine. The ‘TTL field determines the maximum time a packet can remain in a network, and the TCP window size determines the length of the packet reported. These values differ for different operating systems as presonted in the following table: Operating System Time Totive | TCP Window Size Linux (Kern! 2.4 and 2.6) 6 840 Google Linux 6 sno Freebso 4 65535 Opents0 4 16364 ‘Windows95 32 e192 ‘Windows 2000 28 16364 Windows xP 28 65535 ‘Windows 98, Vista and 7 (Server 2008) 28 192 th ing punters Cori by HOES nifgh sence Nepamsconaseiay Pebeee105124 (cisco Routers) 25 4128 solaris 7 255 8760 Kaa o* 16384 Inorder to identify the target 05, sriff/capture the response generated from the target machine to the request-originated machine using packet sniffing tools ike Wireshark, etc. and observe the TTLand TCP window size fields in the captured first TCP packet. Comparing these values to that ofthe above table, you can determine the target operating system that has generated the response. lol eng ancarterenres Cnr © ‘Aifgrencencs Rewessconesy Petesee Be kee oa keene) Disabling or Changing Banner ‘Hiding Pile Extensions rome Pages ‘terete one tel tans tomate wi cao se srs hi gots car) ‘ccbtcaintierchrgetamer ntemaicn nse spleen maps such a pth tna fon eo agatha ‘remvenndanga sonics argeeseret ‘ominon esters server New ere ome” vosceuezen teed seston cbs treo rate Sarvarsiguatszelie suas see ies agen mao ‘sttestgantace ortivnttya sone te feces Banner Grabbing Countermeasur Disabling or Changing Whenever a ports open, it implies that a service banner is running on it. When attackers connectto the open port using banner grabbing techniques, the system presents abanner containing sensitive information such as 0S, server type, and version. With the help of the information gathered, the attacker Identifies specific vulnerabilities to exploit and thereafter launches attacks. The countermeasures to defend against banner grabbing attacks areas follows: (© Display false banners to mislead or deceive attackers © Turn off unnecessary services on the network host to limit information disclosure, © Use ServerMask (https://www.port80software.com) tools to disable or change banner information. © SorverMask removes unnecessary HTTP header and response data and camouflages the server by providing false signatures. It also provides you with the option of climinating file extensions such as asp or aspx, andit clearly indicates that a site is running on a Microsoft server. © Apache 2.x with mod_headers module: use a directive In httpd.conf file to change banner information Header set Server "New Server Name”. © Altematively, change the Sexversignature line to Serversignatureoft in the inetpa. cone Mle Seal come nec tetHiding File Extensions from Web Pages File extensions reveal information about the underiying server technology that an attacker can utilze to launch attacks. The countermeasures to defend against banner [grabbing attacks are as follows: (© Hide file extensions to mask the web technology. (© Change application mappings such as .asp with .htm or foo, etc. to disguise the Identity ofthe servers (© Apache users can use mod_negotiation directives (© iSusers use tools such as Pagexchanger to manage the fle extensions. Note: It is better ifthe file extensions are not used at al adie gost fhatadingal orto phy EOE ‘ans oesndepoactonsiey SeesScien Draw Network Diagrams ‘A network diagram helps in analyzing complete network topology. This section highlights the Importance of the network diagram, how to draw one, how an attacker uses one to launch an attack, and the tools that help in drawing network maps. Mot ae 386 the adngand Carteret ty KE ‘ig ened cpsactontoney PenttesDrawing Network Diagrams Drawing @ network diagram helps an attacker identify the topology or architecture of a target network. The network diagram also helps to trace out the path to the target host in the network ‘and enables the attacker to understand the postion of firewalls, IDSs, routers, and other access control devices. Once the attacker has ths information, he/she can try to find the vulnerabilities ‘of weak points of those security mechanisms. Then, the attacker can exploit those security ‘weaknesses to find his/her way into the victims network. ‘The network diagram also helps the network administrators to manage thelr networks. ‘Attackers use network discovery or mapping tools to draw network diagrams of target networks,rs Sate ee Cause iooed ee... ‘Network Discovery and Mapping Tools Network discovery and mapping tools allow you to view the map of your network. They help you detect rogue hardware and software violations and notify you whenever a particular host becomes active or goes down. Thus, you can also determine server outages or problems related to performance. An attacker can use the same tools to draw a diagram of the target network, analyze the topology, find the vulnerabilities or weak points, and launch an attack by exploiting them, ‘+ Network Topology Maps Source:hitp://www solarwinds com Network Topology Mapper tool allows one to automatically discover and create 2 network map of the target network. [tis also able to display in-depth connections such as (OSI Layer 2 and Layer 3 topology data (eg, displaying switch-to-switch, switch-to-node, ‘and switeh-to-router connections). It can keep track of network changes and allow the user to perform inventory management of hardware and software assets Features: © Network topology discovery and mapping, ‘Automatically discovers the entire network and creates comprehensive and detailed network maps © Exportnetwork diagrams to Visio Exports network diagrams to Microsoft Offce® Visio®, Orion Network Atlas, PDF, and PNG formats Meine fae 362 tha erga otemanons copy Came ‘itaan cowed Repent Pele© Network mapping for regulatory compliance Allows one to directly addess PCI compliance and other regulations that require ‘maintenance ofan up-to-date network diagram, © Multi-level network discovery Performs multilevel network discovery to produce an integrated OSI Layer 2 and Layer 3 network map that includes detailed device information (© Auto-detection of changes to network topology ‘Automatically detects new devices and changes to network topology with scheduled network scanning, Some of the network discovery and mapping toolsan attacker uses to create a network map are discussed below: OpManager (httzs://www.mnanageengine.com) ‘The Dude (htips://www.mikrotk.com) NetSurveyor(httpy/nutsaboutnets.com) NetBrain (https//mww.netbraintech.com) ‘Spiceworks Inventory (htps://www.spiceworks.com) Lanstate (nti://uww10-strike.com) Friendly Pinger (http,//ww.klievich.com) ‘WhatsConnected (hetps://wwwu jpswitch.com) Lan-Secure Switch Center (http/www.lan-secure.com) Intermapper (httas://www helpsystems.com) SteelCentral Netauditor(https//www.riverbed.com) sonar (http //www.lumeta.com) ease 03 Fae 362 ol eng anCnamterenires cont © Game ‘ATtgnenaenca Rewessconesay Perecanna m2. conta neater BN Se Se emis mio soa aI Cy Set ere aan ey Sede Ae ‘Network Discovery Tools for Mobile Given below are network discovery tools for mobile devices: Seany ‘Source: http://happymagenta.com ‘Scary, @ network scanner app for iPhone and iPad, scans LAN, Wi networks, websites, ‘open ports, discovers network devices, and digs network info. It supports @ numiber of networking protocols and antéstealth technologies. It is a multifunctional networking instrument for finding connected devices, looking up detailed device information, network troubleshooting, scanning ports, and testing network security and firewalls. Feature © Scan both LAN and the Internet © Scan any IP address or network range © Bonjour hostnames lookup (© Windows hostnames lookup (NetBIOS, Samba) © Device names lookup (UPnP, SSOP, DLNA) © Detects country of origin and the network owner © Network range and AS number lockup © MACaddress and hardware vendor lockup (© Wake on LAN or Wi-Fi (by MAC address) Modine rpc 364 ‘ic ating rte oy Ee he tsencs Reoseion bray Monet(© Wake over the intemet (using proper routers) ing/Trace hosts with integrated tools © WHOIShastnames, IP addresses, ASNS (© Know Wi-Fi, VEN, 36/EDGE, and external IPs (© Checks MP, TCP, and UDP (© Fasterasynchronaus network YO (© Works with WIFI, 36, EDGE, and GPRS Network *Swiss-Army-Knife” Source: htt://foobang.weebly.com "Network "Swiss-Army-Knife" is a network application for iPhone to perform a number of ‘tasks mentioned below: (© Calculate 1Pv4 subnet (Classful and Classless) and all the related valid subnet information (© Find Offline hardware MAC address to organization lookup and vice versa (©. Perform Single/Batch Domain-name lookup: For alist of domain names, equivalent IP address can be found ©. Perform WHOIS lookup directly from the idevice. WHOIS lookup permits one to query the list fF NICes for detailed information. Lookup relays on IP addresses- either IPwa fr IPv6, domain name or AS Number. Results can be stored in a local repository for future reference. ©. Offline IANA Port number lookup: allows JANA assigned port number tothe name and view versa ‘© IANA Top level domain lookup: identifies which countries domain end with cz, .cv, su ete © My device WIFI IP addr: allows identification of your local device WI-Fi IPaddress ‘Some of the network discovery tools for mobile include: PortDroid Network Analysis (https://play. google.com) NetX- Network Discovery Tools (https://play. google.com) Network Mapper (https://play. google.com) Fing - Network Tools (ttps://wurw fng.io) etNetScan (https://play google.com) Moai 03 rae 355 hol aking term Cnty eR ‘i ga ced foposcin rset abateScanning Pen Testing It s advisable to pen-test the target network to Identify Its security posture, Pen-testing In anticipation of a possible problem helps to find and fix any security loopholes present in the target network. Such proactive prevention practices can keep an entire network from being compromised. This section describes the steps involved in pen-testing the target network and the various scanning tools used to accomplish ths task Meaiaes e366 hl nga countemenans Cp © amd ‘ifn ones soonest metedscatman am 2 Scone cach Sass Scanning Pen Testing —————_———————————— 1 Theneteorcnlg pertalontest este dekrnte ener ety oa br erg Ine sts dicvering open ports, stating serves, ary atlng stm banners om 2 emote best smut snenrerkhackig tere “6 The pneucton ttgepar il ape ten amr ‘The network scanning penetration test helps to determine a network's security posture by Identifying live systems, discovering open ports and associated services, and grabbing system banners from a remote location to simulate anetwork hacking attempt. You, a8 an ethical hacker ‘or pen-tester, should scan and test the network in every manner possible to ensure that there is no security loophole in the system,(Once you are done with the penetration testing, document all your findings at every stage of the testing. This documentation will help the system administrators to: * Close unused ports if unnecessary/unknown open ports are found Disable unnecessary services + Hide or customize banners Troubleshoot service configuration errors * Calibrate firewall rules to impose more restriction ‘The more ports that are open on the server, the easier it willbe for an attacker to connect to It. ‘The first thing an attacker does is monitor network traffic for vulnerabilities such as open ports and services running, through which the network could be compromised. Admins may instal, configure some unwanted services, leave services with default settings, and turn them on during (5 and application installations. This can cause unwanted traffic to the server or a way for an attacker to intrude into the systorn. Attackers might also "banner grab” to trace the server name and its version, and then use this information to break into a network. Therefore, close al the ‘unused/unnecessary open ports, unwanted services, and so on, and configure the serverin such ‘away that ithides the cispay of the banner. Also create inbound and outbound firewall rules to block all the unwanted ports from allowing any connections from outside the network. Here is how you can conduct a pen-test ofa target network. Step 1: Perform host discovery ‘The first step of network penetration testing is to detect live hosts onthe target network. You can attempt to detect the ivehosts (accessible hosts in the target network), using ‘network scanning tools such as Nmap, Angry IP Scanner, SolarWinds Engineers toolset, and NetScanTools Pro. Its dificult to detect live hasts behind a firewall step 2: Perform port scanning Perform port scanning using tools such as Nmap, NetScanTools Pro, Hping3, PRTG [Network Moniter, nd SuperScan. These tools help to probe a server or host on the target retwork for open ports. Open ports are the doorways through which an attacker installs malware on a system. Therefore, you should always check for open ports and close them If they are not necessary. ‘Step 3: Scan beyond IDS and firewall Scan beyond IDS and firewall; this helps you to understand the organization's security limitations, Use 1DS/frewall evasion techniques such as packet fragmentation, source routing, IP address spoofing etc, to bypass IDS and firewall rules, Use proxy tools such a5 Proxy Switcher, Proxy Workbench, CyberGhost, Tor, Suite to hide yourself from detection nd Burp Moai 3 tae 6 ‘ct ating Gaerne Co 4 EESci nenrone Step 4: Perform banner grabbing or OS fingerprinting Perform banner grabbing/OS fingerprinting by sending specially crafted packets to the target machine and then comparing the responses with the database. This determines the operating system running on the target host of a network and its version, Once you know the version and the operating system runningon the target system, find and exploit the vuinersbiltes related to that OS, Try to gain control over the system and compromise the whole network. Step 5: Draw network diagrams Draw a network diagram ofthe vulnerable hosts that helps you to understand the logical connection and path to them in the network. You can draw the network diagram with the help of tools such as Network Topology Mapper, OpManeger, The Dude, NetSurveyor, land NetBain. The network diagrams provide valuable information about the network and Itsarchitecture. ‘Step 6: Document all the findings ‘The last but the mostimportant step in penetration testing isto preserve al the outcomes of tests conducted in previous steps in 2 document. This document wil assist in finding potential vulnerabilities in the network which you can use to suggest countermeasures. Thus, penetration testing helps in assessing the security posture of the network and fixing any security loopholes before they can cause trouble and resultin severe organizational loss. Mosse ts roses tha dingo artes cpt by EO ame ‘tah orend epesctonh say estesModule Summary 1 Ata detains he ve os oma age cf aes by setcrg UP ECHO regent mutine 1 Atco sors scanning eras oy owl ues and lusrgmechanin andi © Baw tetnnet ans dag herein sere ast een 1 Aces se prosemeso tide he aul oueof aan al ead cen DSewall ests 1 Actalnefpotercanbecetedto cndes tet the stacer Module Summary ‘This module ends with an overview discussion of network scanning concepts. nthe next module, ‘we will see how attackers, ethical hackers, and pen-testers perform enumeration to collect Information about a target before an attack or audit, sere i
You might also like
Case Study Data Science Business
PDF
100% (1)
Case Study Data Science Business
805 pages
Training MCSA Windows Server 2016, 2019
PDF
100% (1)
Training MCSA Windows Server 2016, 2019
25 pages
CEHv10 Module 01 Introduction To Ethical Hacking
PDF
100% (1)
CEHv10 Module 01 Introduction To Ethical Hacking
157 pages
Network Layer
PDF
No ratings yet
Network Layer
309 pages
CB Installation Guide
PDF
No ratings yet
CB Installation Guide
123 pages
Simulating A DDoS Attack in Your Own Lab
PDF
No ratings yet
Simulating A DDoS Attack in Your Own Lab
9 pages
Opmanager Standard Userguide
PDF
No ratings yet
Opmanager Standard Userguide
717 pages
Admin-UK 21 14 DigiSub
PDF
100% (1)
Admin-UK 21 14 DigiSub
100 pages
Complete Cybersecurity Solution Brochure
PDF
No ratings yet
Complete Cybersecurity Solution Brochure
25 pages
CEHv10 Module 15 SQL Injection PDF
PDF
No ratings yet
CEHv10 Module 15 SQL Injection PDF
131 pages
RH124 PDF
PDF
No ratings yet
RH124 PDF
212 pages
AdminGuide 3.1
PDF
No ratings yet
AdminGuide 3.1
305 pages
30 Oct Live CCTV HAcking
PDF
No ratings yet
30 Oct Live CCTV HAcking
51 pages
Update BD Parte2!19!11
PDF
No ratings yet
Update BD Parte2!19!11
86 pages
GCP Fundamentals: Core Infrastructure: Getting Started With Google Cloud Platform
PDF
No ratings yet
GCP Fundamentals: Core Infrastructure: Getting Started With Google Cloud Platform
48 pages
EC Council Certified Security Analyst V10
PDF
No ratings yet
EC Council Certified Security Analyst V10
5 pages
Docker Containers Versus Virtual Machine-Based Virtualization: Proceedings of IEMIS 2018, Volume 3
PDF
No ratings yet
Docker Containers Versus Virtual Machine-Based Virtualization: Proceedings of IEMIS 2018, Volume 3
11 pages
Master of Business Administration (Mba) : Curriculum
PDF
No ratings yet
Master of Business Administration (Mba) : Curriculum
49 pages
English Material - Charts, Graphs and Diagrams 2008
PDF
No ratings yet
English Material - Charts, Graphs and Diagrams 2008
19 pages
20410D Mt14a Lon DC1
PDF
No ratings yet
20410D Mt14a Lon DC1
1 page
CEHv10 Module 16 Hacking Wireless Networks PDF
PDF
No ratings yet
CEHv10 Module 16 Hacking Wireless Networks PDF
145 pages
Edx Readthedocs Io Open Edx Learner Guide en Latest
PDF
No ratings yet
Edx Readthedocs Io Open Edx Learner Guide en Latest
131 pages
Active Directory Penetration Manual: Scan Network
PDF
100% (1)
Active Directory Penetration Manual: Scan Network
1 page
Optimizing and Operating v1.2
PDF
No ratings yet
Optimizing and Operating v1.2
101 pages
CEH v10 Module 06 System Hacking
PDF
No ratings yet
CEH v10 Module 06 System Hacking
73 pages
DNS
PDF
No ratings yet
DNS
194 pages
Smit Shah
PDF
No ratings yet
Smit Shah
33 pages
MISP Integration Documentation
PDF
No ratings yet
MISP Integration Documentation
9 pages
Microsoft Official Course: Server Virtualization With Windows Server Hyper-V and System Center
PDF
No ratings yet
Microsoft Official Course: Server Virtualization With Windows Server Hyper-V and System Center
17 pages
VM Slides
PDF
No ratings yet
VM Slides
120 pages
Mini Project Slide - Nazim, Hasif, Iwani, Syakir
PDF
No ratings yet
Mini Project Slide - Nazim, Hasif, Iwani, Syakir
21 pages
Networking Server System: Pulkit Tiwari - 21180118 - Netcamp Summer Training
PDF
No ratings yet
Networking Server System: Pulkit Tiwari - 21180118 - Netcamp Summer Training
42 pages
(T-GCPAZURE-B) Module 2 - Getting Started With Google Cloud Platform
PDF
No ratings yet
(T-GCPAZURE-B) Module 2 - Getting Started With Google Cloud Platform
57 pages
Siemonster v4 High Level Design v10 Public
PDF
100% (1)
Siemonster v4 High Level Design v10 Public
22 pages
QRadar-Nissan - Ver 0.4
PDF
No ratings yet
QRadar-Nissan - Ver 0.4
5 pages
000 104
PDF
No ratings yet
000 104
69 pages
Cybersecurity Strategy
PDF
No ratings yet
Cybersecurity Strategy
15 pages
Mba Student Guide: Uwa Business School and PSB Academy
PDF
No ratings yet
Mba Student Guide: Uwa Business School and PSB Academy
28 pages
CP R80.10 LoggingAndMonitoring AdminGuide
PDF
No ratings yet
CP R80.10 LoggingAndMonitoring AdminGuide
132 pages
Program: B.Tech - Specialization Course Code: CSCN2020 Course Name: Ethical Hacking
PDF
No ratings yet
Program: B.Tech - Specialization Course Code: CSCN2020 Course Name: Ethical Hacking
50 pages
Integration 7 Scope 6 Schedule 6 Cost 4: Quality 3
PDF
100% (1)
Integration 7 Scope 6 Schedule 6 Cost 4: Quality 3
2 pages
Interscan Messaging Security Virtual Appliance: Installation Guide
PDF
No ratings yet
Interscan Messaging Security Virtual Appliance: Installation Guide
152 pages
CEHv10 Module 05 Vulnerability Analysis PDF
PDF
No ratings yet
CEHv10 Module 05 Vulnerability Analysis PDF
55 pages
Aws 1
PDF
No ratings yet
Aws 1
42 pages
Genres and Conflicts in MBA Writing Assignments: Nigel A. Caplan
PDF
No ratings yet
Genres and Conflicts in MBA Writing Assignments: Nigel A. Caplan
21 pages
Microsoft Official Course: Installing and Configuring The Hyper-V Role
PDF
No ratings yet
Microsoft Official Course: Installing and Configuring The Hyper-V Role
43 pages
Zabbix
PDF
No ratings yet
Zabbix
45 pages
303 Big-Ip Asm Specialist: Exam Blueprint
PDF
No ratings yet
303 Big-Ip Asm Specialist: Exam Blueprint
6 pages
GCP Fund Module 7 Developing, Deploying, and Monitoring in The Cloud
PDF
No ratings yet
GCP Fund Module 7 Developing, Deploying, and Monitoring in The Cloud
15 pages
Be 6 - 2003 PDF
PDF
No ratings yet
Be 6 - 2003 PDF
71 pages
Study of Cloud Computing in HealthCare I
PDF
No ratings yet
Study of Cloud Computing in HealthCare I
5 pages
GCP Fund Module 6 Applications in The Cloud
PDF
No ratings yet
GCP Fund Module 6 Applications in The Cloud
26 pages
Exam: 310-015 Title: Solaris 9 System Administration II Ver: 12.28.04
PDF
No ratings yet
Exam: 310-015 Title: Solaris 9 System Administration II Ver: 12.28.04
53 pages
The Leading Open Source Backup Solution: Bacula Console and Operators Guide
PDF
No ratings yet
The Leading Open Source Backup Solution: Bacula Console and Operators Guide
39 pages
Awsgsg S3 Static Website Hosting
PDF
No ratings yet
Awsgsg S3 Static Website Hosting
51 pages
Project Management: Amoako-Gyampah ISM/MBA 654-41 Summer 2011 Syllabus
PDF
No ratings yet
Project Management: Amoako-Gyampah ISM/MBA 654-41 Summer 2011 Syllabus
11 pages
CV Yopin
PDF
No ratings yet
CV Yopin
7 pages
Securenvoy Server Administration Guide
PDF
No ratings yet
Securenvoy Server Administration Guide
112 pages
ITIL Intermediate Capability RCV2 SCENARIO BOOKLET v6.1
PDF
No ratings yet
ITIL Intermediate Capability RCV2 SCENARIO BOOKLET v6.1
9 pages
Engineer Trainee Multicloud JD
PDF
No ratings yet
Engineer Trainee Multicloud JD
5 pages
Los Angeles Broadband Request For Information
PDF
No ratings yet
Los Angeles Broadband Request For Information
34 pages
School of Electrical and Computer Engineering Projected Schedule of Graduate Courses
PDF
No ratings yet
School of Electrical and Computer Engineering Projected Schedule of Graduate Courses
5 pages
TestKing - Lpi.117 102.general - Linux.q.and.a.v2.0 SSG
PDF
No ratings yet
TestKing - Lpi.117 102.general - Linux.q.and.a.v2.0 SSG
71 pages
Big Ip
PDF
No ratings yet
Big Ip
48 pages
Cyops1.1 Chp07-Dts Oa
PDF
No ratings yet
Cyops1.1 Chp07-Dts Oa
49 pages
August 06: Project/Solution: Siem Solution (Qradar)
PDF
No ratings yet
August 06: Project/Solution: Siem Solution (Qradar)
9 pages
Microsoft Certified Azure Database Administrator Associate Skills Measured
PDF
No ratings yet
Microsoft Certified Azure Database Administrator Associate Skills Measured
6 pages
Quran Arabic-Urdu PDF
PDF
No ratings yet
Quran Arabic-Urdu PDF
1,243 pages
Blue Lock Volume 26 - Part 2.
PDF
91% (11)
Blue Lock Volume 26 - Part 2.
73 pages
Notes p3
PDF
No ratings yet
Notes p3
37 pages
45 Flashcards Nourriture A4
PDF
No ratings yet
45 Flashcards Nourriture A4
45 pages
Cartoon Pics
PDF
No ratings yet
Cartoon Pics
12 pages
Hasan Zirak
PDF
100% (1)
Hasan Zirak
53 pages
U.S. v. MOHANAD AL-ZUBAIDI, SHAKER SALEH MOHAMMED HAUTER, and ABDULKADER NOORI HAMZA
PDF
No ratings yet
U.S. v. MOHANAD AL-ZUBAIDI, SHAKER SALEH MOHAMMED HAUTER, and ABDULKADER NOORI HAMZA
9 pages
ACG
PDF
No ratings yet
ACG
24 pages