CEH Ethical Hacking Scanning
CEH Ethical Hacking Scanning
And look at the responses Rather than send packets to the host
Does the OS set the Don't Fragment bit? Mainly four areas
DF
If ICMP is blocked
To determine live hosts
Next step after ICMP discovery fails
Discovers services
Most popular
Potential targets run many services reconnaissance technique
Finds potential vulnerabilities
All have the SYN flag omitted Group of scans considered stealth
Subscribe via RSS
All use Inverse mapping
SYN+ACK
Operation ARIN
RST Information can be obtained from
After gathering information, next step is to IANA Providers APNIC
Closed Ports reply with an RST find the network range of the target
SYN+ACK is sent to all ports SYN/ACK Scan RIPE
Open ports do not reply
ACK
Operation 4 - Discover open ports / access
RST Information Gathering points Scanning
Takes Advantage of IP routing function Methodology
5 - Detect operating systems
Filtered ports are open
Deduces port from TTL value ACK Scan 6 - Uncover services on ports
Any TTL value less than 64 is filtered
7 - Map the
Works on most UNIX machines network
Filtered by an inline device Shows filtered state
Does not show open or closed state Understanding Port Scanning
To Determine the Perimeter of the network
Packet sent with NO flags To Facilitate network mapping
Why?
Does not cover how to respond Operation On target network
RFC 793 Stealth scan Accessible systems
To build an inventory
Port Scanning Techniques
If the port is open Scans
Respond with RST Scanning classifications Tool used to scan a large pool of
Most UNIX machines
telephone numbers
Works on UNIX Hacker Different from port scanning ICMP has no ports
Sends RST Closed port Module 3 - Scanning Ping Sweeps Sees if the TCP/IP Stack is loaded
Does NOT work against Windows Does not guarantee that the machine is operable
Discovering Services on
Splits TCP header into small fragments Ping Sweeps are the basic step in
Target Systems network mapping
Due to reassembly May cause abnormal results
TCP Fragmenting Normally the precursor to an attacks
Linux Some Firewalls block fragments Can be detected with tools
Snort is an IDS System that can detect ping sweeps Can detect sweeps on the network segment
Snort
ICMP Ping Sweeps
Sweeps Delphi application
Detect the host based upon ICMP Echo
and Echo replies Genius Contains a Port Scan Detection Routine
Detecting Ping Sweeps
Also performs scanning
One of the first stealth scans
Detection Tools Personal Firewall
By the absence of a response Indicated if the machine is alive Detecting Live Systems
Personal IDS
Uses customised flags
Inverse Mapping Scan on Target Network BlackICE
Types of Tools Can report against ping sweeps Only on the host it is installed on
Not really to port scan Used to map out networks
Detects port scans
UNIX only Scanlogd
Writes to syslog
Port 113 Ident Scanning
IDENT Fast ICMP sweep scanner
Queries the running services
Ping Utilities Pinger Identifies live hosts between given IP Addresses
With read/write access Can resolve hostnames
Uses FTP servers
Often scripted and attacks padded
Great Tool
Try to initiate outbound connections Connect to an FTP server Windows
32 bit graphical Ping client
FTP Bounce Misc
Port is open 150 Tracert
Pinger
Connect Based TCP port scanner SuperScan
Hostname Resolver
Windows Only
Spoof source IP
Spoofing
-S