Ch3-Scan Analyse Réseau 1
Ch3-Scan Analyse Réseau 1
Sécurité
Informatique
Informatique
MODULE
MODULE 3
3 :: SCAN
SCAN DES
DES RESEAUX
RESEAUX
HTTPS://MASTER-SSI.JIMDOFREE.COM/
HTTPS://MASTER-SSI.JIMDOFREE.COM/
2
concepts
concepts d'analyse(scan)
d'analyse(scan) réseau
reseau
MODULE 33 :: SCAN
MODULE SCAN DES
DES RÉSEAUX
RESEAUX
Présentation
Presentation de
de l'analyse
l'analyse réseau
réseau 3
URG FIN
(Urgent) = (Finish) = Acknowledgement No
ACK SYN
4 (Acknowledgement) C4 (Synchronize) 4 TCP Checksum Urgent Pointer
Standard TCP communications are controlled by flags in the TCP packet header
La
La communication
communication TCP/IP
TCP/IP
5
TCP Session Establishment TCP Session Termination
(Three-way Handshake)
[ WOuld like
to talk with
you
mination l
Ok, | recen ed your ter o mnt
.. acKaS3, sEQH 170
Client
6
Outils de scan
MODULE 3 : SCAN DES RÉSEAUX
NMAP
7
… Network administrators
lenrray
Startieg Uren 7.78 tte ere.corg |} st 2055-06-27 se wie Tnitieting (3 detection (try 61) egeinat 10.10.00. 59
Tetrying OS detection (try #2) ageinst 19,10, 70.20
Attackers use Nmap to 13:04
mé : Lobiest
Stiewiard
148 © jot
Tice
sor 5 wily NSE, Seriot scoring 00.90.18. 18
services (application
i rae : L ee > ta
Siannieg 10.19.00. 20 LE port]
Completes af Ping Scan ot Lids, ru! STATE Stvict via Don
ees) tocts
name and version), types Indtiating Paralles ONG r :
°
i
INMAP, Dist tvered open go t 490638/Icoe Le. D. 25. 10 "icroeett Mines Lengrern (548
Anarannive 0% mimamta,
D meered ooen po Lt «sen ) on 1e. 00. 00, 19 ls Micresert Mireles 30 2708 (928), Mis port wirstows
Conmgietes SYN Stealth Star 52 [5.298 aise 18 DSL ASIN), PUCES wives Server SOBs 572 (TI
£5955 fetal asorts ilcposals Mtoiout. À LÉ. Miceocott. énous. ii
HPING2/HPING3
HPING2/HPING3
8
Ci Command line network scanning and packet crafting too! for the TCP/IP protocol
It can be used for network security auditing, firewall testing, manual path MTU discovery, advanced traceroute,
remote OS fingerprinting, remote uptime guessing, TCP/IP stacks auditing, etc.
Cotlecting tnitiali Sequence Number intercept all traffic containing HTTP signature
Other Scanning Unicornscan Solar Winds Port Scanner PRTG Network Monitor OmniPeek Network Protocol Analyzer
Tools: hetps://sourceforge.net https -//\wvew. solorwinds com Attps://www. poessicr.com attps://\www. hotspotshicid.com
Outils
Outils de
de scan
scan pour
pour mobile
mobile
11
IP Scanner Network Scanner
metwork router
ee Be (Thin dewew
re) LR! !r
Lang Room Azrport
hoapedotk iMac
168.197
<5 Vevice
Sala
Nest Protect
12
D
J Attackers send ARP request probes to target hosts, J Attackers send UDP packets to target hosts, and
and an ARP response indicates that the host is active a UDP response indicates that the host is active
lens
|
Nenep Outpet Forts
/ Hees Topology Hest Getats Scans Hosts liesp Outpot Ports / Hosts Topology How Detail Scans
sterting Seep 7,70 | Ste veap.ore at SS OeLu»r tartine “eae e nites “en .ore
12120 Stondard 1504 12:29 Stecdard tle
Lan report for 18.28.18. 10 wae ican report far 16.30. 28.18
Host is usil@®.@@s Llatercy). iatefcy).
MAL Address: 60:0C:29- 25:27:29 (Ware 66-00:259:79:22:39 (VWtaare
Mean dene; i IP acoress (1 Mast ug) scanned in @.2 I? addrese (1 Post wp) scammed in 6.75
second”
ICMP
ICMP ECHO
ECHO ping
ping scan
scan
15
ICMP ECHO ping scans involve sending ICMP ECHO requests to a host. If the host is live, it
will return an ICMP ECHO reply
This scan is useful for locating active devices or determining if the ICMP is passing through
a firewall
Jerun »~
Target
|
Hot arte Mémep Atpul Posts Hots Tepetegy Huet Detgde Scan:
ICMP Echo Reply
O5 + He - msg -5n -PE 00 1 ML) Cetmès
Destination
(10.10.10.16) (10.10.10. 10) ” 10,5. 90. 10 Starting las e org et 2019-06-07
7 F { netp nan
oe
Attps mes ar
ICMP
ICMP ECHO
ECHO ping
ping sweep
sweep
16
Ping sweep is used to determine the live hosts from a range of IP addresses by sending ICMP ECHO requests to multiple
hosts. If a host is alive, it will return an ICMP ECHO reply
Attackers calculate subnet masks by using a Subnet Mask Calculator to identify the number of hosts that are present in the
subnet
Attackers subsequently use a ping sweep to create an inventory of live systems in the subnet
Angry IP | J Angry IP Scanner pings each IP address to check if any of these addresses are live. Then, it
Scanner optionally resolves hostnames, determines the MAC address, scans ports, etc.
Oputils (https://www.manageengine.com)
Dvspiey: Alve only Threads 0
Contremesures
Contremesures au
au balayage
balayage ping
ping
18
Use intrusion detection systems and intrusion prevention systems like Snort to detect and prevent ping sweep
attempts
Carefully evaluate the type of ICMP traffic flowing through enterprise networks
Cut off connections with any host that performs more than 10 ICMP ECHO requests
Use DMZs and allow only commands like ICMP ECHO_REPLY, HOST UNREACHABLE, and TIME EXCEEDED within a DMZ
Limit ICMP traffic using Access Control Lists (ACLs) and grant permissions only to specific IP addresses such as ISPs
Autres
Autres techniques
techniques de
de découvertes
decouvertes
d’hôtes
d'hôtes 19
ICMP Timestamp and Address Mask Ping Scan ICMP Timestamp Ping Scan
Découverte
Decouverte des
des ports
ports et
et des
des services
services
MODULE 33 :: SCAN
MODULE SCAN DES
DES RÉSEAUX
RESEAUX
Techniques
Techniques de
de scan
scan de
de ports
ports
21
4 The port scanning techniques are categorized according to the type of protocol used for communication
+ © E” ® se
Open TCP Scanning
: TCP Connect / Full Open Scan
TCP Scanning o> \ Methods
SSDP Scanning :
SCTP INIT Scanning . +8
TCP Connect scan establishes a full connection and then closes trs DST EE EEE
the connection by sending an RST packet CS + Fu pat WRN
tarts . ay 7.28 tps a. ory et 2010-18-72 12
S| ug ms
oe 0 Ping mnt ., ce
Attacker
Stealth
Stealth Scan
Scan (Half-open
(Half-open Scan)
Scan)
23
4 Stealth scanning involves abruptly resetting the TCP connection
between the client and server before the completion of three-
way handshake signals, thus leaving the connection half-open
wart Pets) ee Tepetes, Meet Pete Score
rules as well as logging mechanisms, and hide themselves under ting weap )
tonte «
Ttpes
—
reap : et 19-18-25
a port is open on
ec
apen
open
pert
port
IR 'scce
ST/tces
on 19.18. 25. 10
ot We. O08. 28. 38
Completed SPU Stee = ot Lt cs #lLepied
ts. ert
10.0.0.2 2341 10.0.0.3-80 tee ee . “rort ! =... te
tere L + LP, oe
»;! tu "i #1 lt eee per ts
post STATE SERIE
en 1!
Port is open
Port is closed
Note: inverse TCP flag scanning is known as FIN, URG, PSH scanning based on the flag set in the probe packet. It is known as null scanning if there is
no flag set
XMAS
XMAS Scan
Scan
25
Xmas scan output using Zenmap
Using the Xmas scan, attackers send a TCP frame toa
remote device with FIN, URG, and PUSH flags set © Zenmag
Scan, loom «Profile Isle
FIN scanning works only with OSes that use an RFC 793- large ¥8.90.10,10
based TCP/IP implementation Coteent leunap «ct MR TS
The Xmas scan will not work against any current version of Hosts | Services Nenap Outpt Pom / Hom Tepetnyy Most Detsin Scans
PRE “SA ‘4 Ty u 10 Denis
me ‘ hic<t
Microsoft Windows
10008:23
TCP
TCP Maimon
Maimon Scan
Scan
26
Zenmap
but if an RST packet is sent in response, then Comment nmap <M -y 107000
-
;
the port is closed Hosts Series Nrnep Cutput Ports / Hosts Topeliegy Host Dated Scans
Port is feed
Meee Sone:
Mata thies
i if
froq,
address
C:\Program
(1 host
Flies
up) scammed
(a8) \lerap
in 23.77
closed 34¢ OSs