Scanning Tools
Scanning Tools
Key Terms
fingerprinting The systematic survey of a targeted organization’s Internet addresses
collected during the footprinting phase to identify the network services offered by the hosts
in that range.
footprinting The organized research and investigation of Internet addresses owned or
© Cengage Learning, Inc. This content is not final and may not match the published product.
In the previous section, wireless network controls were covered. Now, we return to the
technology and tools that are useful in all compound (wired and wireless) networks.
Although they are not always perceived as defensive tools, scanners, sniffers, and
other analysis tools enable security administrators to see what an attacker sees.
Scanner and analysis tools can find vulnerabilities in systems, holes in security
components, and other unsecured points in the network. Unfortunately, they cannot
detect the unpredictable behavior of people.
Some of these devices are extremely complex; others are very simple. Some
are expensive commercial products; others are available for free from their creators.
Conscientious administrators will have several hacking Web sites bookmarked and
should frequently browse for discussions about new vulnerabilities, recent conquests,
and favorite assault techniques. There is nothing wrong with security administrators
using the tools used by hackers to examine their own defenses and search out areas
of vulnerability. A word of caution: Many of these tools have distinct signatures, and
© Cengage Learning, Inc. This content is not final and may not match the published product.
most popular Web browsers allows users to see the source code behind the graphics on a
Web page. A number of clues can provide additional insight into the configuration of an
internal network: the locations and directories for Common Gateway Interface (CGI) script
bins, and the names and possibly addresses of computers and servers.
The next phase of the pre-attack data gathering process is fingerprinting, which
yields a detailed network analysis that provides useful information about the targets
of the planned attack. The tool discussions here are necessarily brief; to attain true
expertise in the use and configuration of these tools, you will need more specific
education and training.
Port Scanners
Port scanners are a group of utility software applications that can identify (or fingerprint)
active computers on a network, as well as the active ports and the services associated
with them on those computers, the functions and roles fulfilled by the machines, and
other useful information. These tools can scan for specific types of computers, protocols,
or resources, or they can conduct generic scans. It is helpful to understand your network
environment so that you can select the best tool for the job. The more specific the
scanner is, the more detailed and useful the information it provides. However, you
should keep a generic, broad-based scanner in your toolbox as well, to help locate and
identify rogue nodes on the network that administrators may not be aware of.
The first step in securing a system is to secure open ports. Why? Simply put, an
open port can be used to send commands to a computer, gain access to a server, and
exert control over a networking device. As a general rule, you should secure all ports
and remove from service any ports not required for essential functions. For instance, if
an organization does not host Web services, there is no need for port 80 to be available
in its network or on its servers.
Vulnerability Scanners
Vulnerability scanners, which are variants of port scanners, are capable of scanning
networks for very detailed information. As a class, they identify exposed user names
and groups, show open network shares, and expose configuration problems and other
server vulnerabilities. One vulnerability scanner is Nmap, a professional freeware
utility available from www.insecure.org/nmap. Nmap identifies the systems available
on a network, the services (ports) each system is offering, the operating system and
Packet Sniffers
A packet sniffer can provide a network administrator with valuable information to
help diagnose and resolve networking issues. In the wrong hands, it can be used to
eavesdrop on network traffic. The commercially available and open-source sniffers
include Sniffer (a commercial product), Snort (open-source software), and Wireshark
© Cengage Learning, Inc. This content is not final and may not match the published product.
“(3) the term “pen register” means a device or process which records or decodes
dialing, routing, addressing, or signaling information transmitted by an instrument
or facility from which a wire or electronic communication is transmitted,
provided, however, that such information shall not include the contents of any
communication, but such term does not include any device or process used by
a provider or customer of a wire or electronic communication service for billing,
or recording as an incident to billing, for communications services provided by
© Cengage Learning, Inc. This content is not final and may not match the published product.
such provider or any device or process used by a provider or customer of a wire
communication service for cost accounting or other like purposes in the ordinary
course of its business;
(4) the term “trap and trace device” means a device or process which captures the
incoming electronic or other impulses which identify the originating number or
other dialing, routing, addressing, and signaling information reasonably likely to
identify the source of a wire or electronic communication, provided, however, that
such information shall not include the contents of any communication;”8
Note that these definitions explicitly exclude the content of communications and
only focus on the header information to trace the origins of communications. Unlike
packet sniffers, trap and trace devices are mainly used by law enforcement to identify
the origin of communications for legal and prosecution purposes.
are also situations in which an entire class of content has been proscribed and
mere possession of that content is a criminal act—for example, child pornography.
• Tool usage and configuration must comply with an explicitly articulated policy
as well as the law, and the policy must provide for valid exceptions. This
mandate prevents administrators from becoming arbiters of morality as they
create a filter rule set.9