SlideShare a Scribd company logo
Scanning Basics Telling Atrium Discovery What and When
The Basics of Scanning Outline Basic Discovery Essentials: What to scan IP ranges Credentials  Exclude ranges When to scan Setting up discovery runs View Results Discovery Run details Node details Provenance details
The Basics of Scanning Scanning is a process of probing your network to see what information can be gathered about the endpoints found You need to tell Atrium Discovery What to scan (and perhaps what not to scan) IP ranges (one, or a range, or a list) How to access a host (end-point) Credentials available (for logging in) Where the Windows Slave is installed This is covered is depth later in the course
The Discovery Process Scan of an IP range via the discovery run: The discovery engine tries each IP address in the range looking for endpoints Checks for matches in the exclusion list. Determines the host and OS type (platform) If the host has had a previous successful login, the same credentials will be attempted first If not, login credentials will be attempted in the UI display order, UNIX first then Windows and finally SNMP Run a platform-specific script, and potentially other commands, to learn about the device  Writes this information into the datastore
Choosing IP Ranges Accessed Via “Add new run” List individual machines to scan e.g. 231.234.11.32 Choose subranges e.g. 10.1.1.1-56 Choose subnet Mask e.g. 192.168.1/24
Scheduling Runs Can add an ad-hoc (snapshot) or scheduled discovery runs
Choose the Scanning Level Sweep scan Is there anybody there? Note: Host nodes will  NOT  be created at this level Host Identification - basic host information Host Information - run discovery commands but not patterns Full discovery - the works
What Scanning Level to Use For general use: Full Discovery to ensure the most amount of information is recovered During initial deployment: Sweep Scans to get a rough understanding of the environment before configuring credentials
Discovery Protocols Without logging in Telnet banner scraping Port scanning HTTP HEAD Logging in SSH, rlogin, telnet WMI, remcom, rcmd SNMP Port scanning, telnet banner, HTTP HEAD ssh, telnet, rlogin, SNMP, rcmd
Scanning Credentials You can add credentials for single devices and ranges Can use regex wildcards Will be tried in display order Login credentials SNMP credentials Database credentials
Login Credentials Can create credentials for a singe device ip or range Can use regex  (.* or 10.10.10.(23|25))  or a range specification ( 10.10.10.* or 10.10.1-5.* or 10.10.10.0/24)  Will try each credentials in the order displayed By default, will store the last successful credentials for each host to use in future runs
Setting SNMP Credentials SNMP credentials are called community strings Use or request a readonly (RO) string for tideway discovery
Add Exclude Ranges Add IP ranges of hosts that should NOT be included in discovery Useful for excluding sensitive or fragile hosts
Discovery Results
View Discovery Results Can look at the types of data recovered DDD (Directly Discovered Data) View discovery access reports Reporting on discovery as a whole
View Discovery Runs   View statistics of an individual discovery run Can drill down to view the host details page or details from DiscoveryAccess Skipped or error results Some no access details No Response (dark space) Errors
Further Information Online Documentation: http://www.tideway.com/confluence/display/81/Using+BMC+Atrium+Discovery Tideway Foundation Version 7.2 Documentation Title
Basic Scan Exercises

More Related Content

PDF
Footprinting tools for security auditors
PDF
Ch 5: Port Scanning
PPT
Module 3 Scanning
PDF
2010 za con_jameel_haffejee
PPTX
Recon with Nmap
PDF
Network Mapper (NMAP)
PPTX
NBTC#2 - Why instrumentation is cooler then ice
PPTX
Practical rsa padding oracle attacks
Footprinting tools for security auditors
Ch 5: Port Scanning
Module 3 Scanning
2010 za con_jameel_haffejee
Recon with Nmap
Network Mapper (NMAP)
NBTC#2 - Why instrumentation is cooler then ice
Practical rsa padding oracle attacks

What's hot (20)

PDF
Nmap Hacking Guide
PPTX
Information gathering using windows command line utility
PDF
Ethical hacking with Python tools
PPT
Networking session-4-final by aravind.R
PDF
Ios i pv4_access_lists
PPT
Addmi 15-discovery scripts
PPT
Socket programming in C
PDF
Python build your security tools.pdf
PDF
127 Ch 2: Stack overflows on Linux
PPTX
รายงาน Tcp
PPTX
Socket programming in c
PPTX
Pet Pen Testing Tools: Zenmap & Nmap
PDF
CNIT 127 Ch 3: Shellcode
PPTX
Buffer overflow attacks
PPTX
Buffer Overflow Demo by Saurabh Sharma
PDF
CNIT 127 Ch 4: Introduction to format string bugs
PDF
CNIT 127 Ch 3: Shellcode
PDF
SELinux Kernel Internals and Architecture - FOSS.IN/2005
PDF
Socket programming
PDF
CNIT 127: Ch 2: Stack Overflows in Linux
Nmap Hacking Guide
Information gathering using windows command line utility
Ethical hacking with Python tools
Networking session-4-final by aravind.R
Ios i pv4_access_lists
Addmi 15-discovery scripts
Socket programming in C
Python build your security tools.pdf
127 Ch 2: Stack overflows on Linux
รายงาน Tcp
Socket programming in c
Pet Pen Testing Tools: Zenmap & Nmap
CNIT 127 Ch 3: Shellcode
Buffer overflow attacks
Buffer Overflow Demo by Saurabh Sharma
CNIT 127 Ch 4: Introduction to format string bugs
CNIT 127 Ch 3: Shellcode
SELinux Kernel Internals and Architecture - FOSS.IN/2005
Socket programming
CNIT 127: Ch 2: Stack Overflows in Linux
Ad

Viewers also liked (20)

PPT
58466507 event-management-best-practices-1-488
PPTX
Knowledge Management in BMC Remedy 9.1
PPTX
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
PDF
Power of the Platform: Andy Walker, BMC Software
PPT
Addmi 04-va installation
PDF
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
PPT
Addmi 09.5-analysis ui-host-grouping
PPT
Addmi 02-addm overview
PPT
Addmi 06-security mgmt
PPT
Addmi 07-taxonomy
PPT
Addmi 16.5-discovery troubleshooting
PPT
Addmi 11-intro to-patterns
PPT
Addmi 14-discovery credentials
PPT
Addmi 09-analysis ui-reporting
PPT
Addmi 17-snapshot
PDF
BMC Engage 2015 Breakout Session #420 - #ITSM_SUCCESS-Final_3.5 (1)
PPT
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
PPT
Addmi 10-query builder
PPT
Addmi 08-dashboards
PPT
Addmi 16-discovery monitoring
58466507 event-management-best-practices-1-488
Knowledge Management in BMC Remedy 9.1
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Power of the Platform: Andy Walker, BMC Software
Addmi 04-va installation
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Addmi 09.5-analysis ui-host-grouping
Addmi 02-addm overview
Addmi 06-security mgmt
Addmi 07-taxonomy
Addmi 16.5-discovery troubleshooting
Addmi 11-intro to-patterns
Addmi 14-discovery credentials
Addmi 09-analysis ui-reporting
Addmi 17-snapshot
BMC Engage 2015 Breakout Session #420 - #ITSM_SUCCESS-Final_3.5 (1)
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
Addmi 10-query builder
Addmi 08-dashboards
Addmi 16-discovery monitoring
Ad

Similar to Addmi 12-basic scan (20)

PPT
Addmi 03-addm prerequisites
PPT
Addmi 13-discovery overview
PPTX
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
KEY
FITB: Network graphing done right
PPT
01204427-scanner.ppt
PPTX
Network scanning
DOCX
Snmp vulnerability assessment
PPTX
06- 1 Active Information Gathering part 1.pptx
PDF
Nmap tutorial
PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
PPTX
Scanning networks (by piyush upadhyay)
PDF
eLea4555555555555555555555555555555rnSecurity .pdf
PPTX
Nmap and metasploitable
PDF
O PODER DO NMAP ATRAVÉS DE SEUS COMANDOS.pdf
PDF
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
PDF
BMC Discovery (ADDM) Cheat Sheet by Traversys Limited
Addmi 03-addm prerequisites
Addmi 13-discovery overview
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
FITB: Network graphing done right
01204427-scanner.ppt
Network scanning
Snmp vulnerability assessment
06- 1 Active Information Gathering part 1.pptx
Nmap tutorial
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Scanning networks (by piyush upadhyay)
eLea4555555555555555555555555555555rnSecurity .pdf
Nmap and metasploitable
O PODER DO NMAP ATRAVÉS DE SEUS COMANDOS.pdf
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
BMC Discovery (ADDM) Cheat Sheet by Traversys Limited

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PDF
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation_ Review paper, used for researhc scholars
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Big Data Technologies - Introduction.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
Spectral efficient network and resource selection model in 5G networks

Addmi 12-basic scan

  • 1. Scanning Basics Telling Atrium Discovery What and When
  • 2. The Basics of Scanning Outline Basic Discovery Essentials: What to scan IP ranges Credentials Exclude ranges When to scan Setting up discovery runs View Results Discovery Run details Node details Provenance details
  • 3. The Basics of Scanning Scanning is a process of probing your network to see what information can be gathered about the endpoints found You need to tell Atrium Discovery What to scan (and perhaps what not to scan) IP ranges (one, or a range, or a list) How to access a host (end-point) Credentials available (for logging in) Where the Windows Slave is installed This is covered is depth later in the course
  • 4. The Discovery Process Scan of an IP range via the discovery run: The discovery engine tries each IP address in the range looking for endpoints Checks for matches in the exclusion list. Determines the host and OS type (platform) If the host has had a previous successful login, the same credentials will be attempted first If not, login credentials will be attempted in the UI display order, UNIX first then Windows and finally SNMP Run a platform-specific script, and potentially other commands, to learn about the device Writes this information into the datastore
  • 5. Choosing IP Ranges Accessed Via “Add new run” List individual machines to scan e.g. 231.234.11.32 Choose subranges e.g. 10.1.1.1-56 Choose subnet Mask e.g. 192.168.1/24
  • 6. Scheduling Runs Can add an ad-hoc (snapshot) or scheduled discovery runs
  • 7. Choose the Scanning Level Sweep scan Is there anybody there? Note: Host nodes will NOT be created at this level Host Identification - basic host information Host Information - run discovery commands but not patterns Full discovery - the works
  • 8. What Scanning Level to Use For general use: Full Discovery to ensure the most amount of information is recovered During initial deployment: Sweep Scans to get a rough understanding of the environment before configuring credentials
  • 9. Discovery Protocols Without logging in Telnet banner scraping Port scanning HTTP HEAD Logging in SSH, rlogin, telnet WMI, remcom, rcmd SNMP Port scanning, telnet banner, HTTP HEAD ssh, telnet, rlogin, SNMP, rcmd
  • 10. Scanning Credentials You can add credentials for single devices and ranges Can use regex wildcards Will be tried in display order Login credentials SNMP credentials Database credentials
  • 11. Login Credentials Can create credentials for a singe device ip or range Can use regex (.* or 10.10.10.(23|25)) or a range specification ( 10.10.10.* or 10.10.1-5.* or 10.10.10.0/24) Will try each credentials in the order displayed By default, will store the last successful credentials for each host to use in future runs
  • 12. Setting SNMP Credentials SNMP credentials are called community strings Use or request a readonly (RO) string for tideway discovery
  • 13. Add Exclude Ranges Add IP ranges of hosts that should NOT be included in discovery Useful for excluding sensitive or fragile hosts
  • 15. View Discovery Results Can look at the types of data recovered DDD (Directly Discovered Data) View discovery access reports Reporting on discovery as a whole
  • 16. View Discovery Runs View statistics of an individual discovery run Can drill down to view the host details page or details from DiscoveryAccess Skipped or error results Some no access details No Response (dark space) Errors
  • 17. Further Information Online Documentation: http://www.tideway.com/confluence/display/81/Using+BMC+Atrium+Discovery Tideway Foundation Version 7.2 Documentation Title

Editor's Notes

  • #5: Additional notes for questions: UNIX is tried first as it fails faster than Windows. This is not configurable. SNMP is tried third, but as SNMP discovery is not configurable and recovers a reduced fixed set of infrastructure information it is left off this slide.
  • #6: Need to list by IP, cannot list by name.
  • #12: Covered in more details in Discovery Credentials module
  • #13: Covered in more details in Discovery Credentials module
  • #14: Networking equipment, Fragile hosts, storage equipment, DNS round robin IP’s, global traffic mngr are a few examples of devices or end points that customers have wanted to exclude
  • #19: Optionally you may wish to complete the labs that have been prepared to accompany this module. Please download the lab zip file that should be available where you accessed this module. Make sure you have access to a running appliance before attempting the labs. It is best to use the training demo VA provided as it is set up to work with the labs. You may need to review tutorial material in order to work out the solutions.