SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Network Scanning Phases and Supporting Tools
Joseph Bugeja
Information Security Manager/Architect
November 24, 2013
Scanning Phase Goals
• Overall: Learn more about targets and find
openings by interacting with the target environment
–

Determine network addresses of live hosts,
firewalls, routers, etc. in the network

–

Determine network topology of target environment

–

Determine operating system types of discovered
hosts

–

Determine open ports and network sevices in target
environment

–

Determine list of potential vulnerabilities

–

Do these in a manner that minimizes risk of
impairing host or service
Scan Types
• Network Sweeping
–

Send a series of probe packets to identify live hosts
at IP addresses in the target network

• Network Tracing
–

Determine network topology and draw a map

• Port Scanning
–

Determine listening TCP and UDP ports on target
systems

• OS Fingerprinting
–

Determine the target operating system type based
on network behaviour
Scan Types
• Version Scanning
–

Determine the version of services and protocols
spoken by open TCP and UDP ports

• Vulnerability Scanning
–

Determine a list of potential vulnerabilities
(misconfigurations, unpatched services, etc.) in the
target environment
Scanning Tip: While Scanning Run a
Sniffer
• Whenever you run a scan, run a sniffer so that you
can monitor network activity
–

You do not have to capture all packets in the file
system
•

–

That would likely require huge storage space

Instead, display them on the screen so you can
visualize what is happening in the scan

• Which sniffer to use?
–
–

Any sniffer that shows packet headers will do, but
you want something small, flexible and fast
tcpdump is ideal for this purpose
Scanning Tip: Use TCPDump
• Free, open source sniffer
–
–

www.tcpdump.org
Ported to Windows as WinDump at
www.winpcap.org/windump/default.htm

• Supports various filtering rules
• While testing, you will likely have it display all
packets leaving from and coming to your scanning
machine
• But, for specific issues, you may need to focus on
specific packets
• Often, just running tcpdump with no special options
while scanning provides the information you need
$ sudo tcpdump
Network Sweep Tools
• Angry IP
–
–

www.angryip.org
GUI-based tool for Windows
•
•
•
•

Ping sweep (via ICMP Echo Request)
TCP port scan
Gets MAC address for systems on same subnet
NetBIOS name and workgroup gathering

• ICMPQuery
–
–

www.angio.net/security/icmpquery.c
Command-line tool for Linux/UNIX
•

•

Sends ICMP Timestamp (Type 13) and Address
Mask Request (Type 17) messages to identify
live hosts
Useful for identifying hosts in a network that has
firewalls which block ICMP Echo Request
Network Sweep Tools
• HPing
–

Inspired by ping, but goes much further
•
•

–
–
–

Free at www.hping.org, runs on Linux, *BSD,
Windows and MacOS X
The latest version, Hping3, supports TCL scripting
By default, sends TCP packets with no control bits
set to target port 0 continuously, once per second
•

–

Originally Hping, then Hping2...latest is Hping3
From man page: “Send (almost) arbirary TCP/IP
packets to networks hosts”

Possibly getting RESETs back

Example: # hping3 10.10.10.20
Network Tracing Tools
• Traceroute
–
–
–
–

Discovers the route that packets take between two
systems
Helps a tester construct network architecture
diagrams
Included in most operating systems
Sends packets to target with varying TTLs in the IP
Header

• Layer Four Traceroute (LFT)
–
Free at http://pwhois.org/lft
–
Runs on Linux and Unix
–
Supports a variety of Layer Four options for
tracerouting
Network Tracing Tools
• 3D Traceroute
–
–

Runs on Widows, free at www.d3tr.de
Graphical traceroute using ICMP Echo Request,
updated/animated in real-time

• Web-Based Traceroute Services
–
Instead of tracerouting from your address to the
target, various websites allow you to traceroute
from them to the target
–
Very useful in seeing if you are being shunned
during a test!
Port Scanning Tools
• Nmap
–

Written and maintained by Fyodor
•

–

–

Very popular, located at www.insecure.org

Has been extended into a general-purpose
vulnerability
scanner
via
Nmap
Scripting
Engine(NSE)
Run with --packet-trace to display summary of each
packet before it is sent, with output that includes:
•
•
•
•
•
•
•

Nmap calls to the OS
SENT/RCVD
Protocol (TCP/UDP)
Source IP:Port and Dest IP:Port
Control Bits
TTL
Other header information
OS Fingerprinting Tools
• Nmap
–

–

Attempts to determine the operating system of
target by sending various packet types and
measures the response
Different systems have different protocol behaviour
that we can trigger and measure remotely

• Xprobe2
–
ofirarkin.wordpress.com/xprobe
–
Based on Ofir Arkin ICMP fingerprinting research
–
Applies fuzzy logic to calculate the probabilities of
its operating system type
• P0f2
–
–

Supports passive OS fingerprinting
Free
Version Scanning Tools
• Nmap
–

Version scan invoked with -sV
- Or use -A to for OS fingerprinting and version
scan (i.e, -A = -sV + -O)

• THC Amap
–
Free from http://freeworld.thc.org/thc-amap
–
Amap can do a port scan itself or it can be provided
with the output file from Nmap
–
It sends triggers to each open port
–
It looks for defined responses
–
A useful second opinion to the Nmap version scan
Vulnerability Scanning Tools
• Nmap Scripting Engine (NSE)
–
–

Scripts are written in the Lua programming
language
May some day rival Nessus and NASL as a general
purpose, free, open source vulnerability scanner

• Nessus Vulnerability Scanner
–

Maintained and distributed by Tenable Network
Security
•

–
–
–

www.nessus.org

Free download
Plugins measure flaws in target environment
As new vulnerabilities are discovered, Tenable
personnel release plugins
Vulnerability Scanning Tools
• Commercial Solutions
– SAINT
– Retina Network Security Scanner
– Lumension PatchLink Scanner
– BiDiBLAH
– CORE Impact
• Scanning Services/Appliances
– Foundscan
– Qualys
• Free Solutions
– SARA
– SuperScan
Thank You!

Thanks for Listening!
Joseph Bugeja
bugejajoseph@yahoo.com

More Related Content

PDF
Hacking With Nmap - Scanning Techniques
PPTX
NMAP - The Network Scanner
PPTX
Network scanning
PPTX
Nmap and metasploitable
PPTX
Network scanning
PDF
Nmap Hacking Guide
PPTX
Hacking With Nmap - Scanning Techniques
NMAP - The Network Scanner
Network scanning
Nmap and metasploitable
Network scanning
Nmap Hacking Guide

What's hot (20)

ODP
Scanning with nmap
PDF
Network Mapper (NMAP)
PDF
Nmap tutorial
PPTX
Introduction to Snort
PPT
Networking and penetration testing
PPT
Port Scanning
PPT
Module 3 Scanning
PDF
Nmap basics
PDF
Nmap Basics
PPTX
Nmap(network mapping)
PPTX
Understanding NMAP
PPTX
Introduction to Malware Analysis
PDF
Threat Hunting with Splunk
PPT
Malware forensics
PDF
Ch 5: Port Scanning
PPTX
PPTX
Recon with Nmap
PDF
Windows Threat Hunting
Scanning with nmap
Network Mapper (NMAP)
Nmap tutorial
Introduction to Snort
Networking and penetration testing
Port Scanning
Module 3 Scanning
Nmap basics
Nmap Basics
Nmap(network mapping)
Understanding NMAP
Introduction to Malware Analysis
Threat Hunting with Splunk
Malware forensics
Ch 5: Port Scanning
Recon with Nmap
Windows Threat Hunting
Ad

Viewers also liked (18)

PPT
Wi fi in arabic
PDF
Ce hv7 module 03 scanning networks
PDF
Scan tool basics
PDF
تعليم محادثة اللغة الانجليزية
PPT
Policy Round table 2: Climate Change and Food Security
 
PPSX
Scanning Techniques
PPTX
Introduction to security
PDF
Elebda3.net 4395
PPTX
Faculty of Engineering - Tanta University- Programmong world
PDF
Cisco network security Chapter7
PPTX
Introduction to security
PPSX
Cloud Computing الحوسبة السحابية
PPTX
PSConfEU - Offensive Active Directory (With PowerShell!)
PPT
Port scanning
PPT
Scanner presentation
PPT
Skimming & Scanning
Wi fi in arabic
Ce hv7 module 03 scanning networks
Scan tool basics
تعليم محادثة اللغة الانجليزية
Policy Round table 2: Climate Change and Food Security
 
Scanning Techniques
Introduction to security
Elebda3.net 4395
Faculty of Engineering - Tanta University- Programmong world
Cisco network security Chapter7
Introduction to security
Cloud Computing الحوسبة السحابية
PSConfEU - Offensive Active Directory (With PowerShell!)
Port scanning
Scanner presentation
Skimming & Scanning
Ad

Similar to Network Scanning Phases and Supporting Tools (20)

DOCX
For your final step, you will synthesize the previous steps and la
PPTX
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
DOCX
Security tools
PPT
01204427-scanner.ppt
PPTX
SOFTWARE TOOLS(Bhavik).pptx
PPTX
An Toan Thong Tin.pptx
PPTX
Scanning and Enumeration in Cyber Security.pptx
PPT
CYBER FORENSICS-scanning and enumuration.ppt
PPT
Chapter 12
PPT
Modul 2 - Footprinting Scanning Enumeration.ppt
PDF
modul2-footprintingscanningenumeration.pdf
PDF
Chapter 3 footprinting
PPTX
( Ethical hacking tools ) Information grathring
PPTX
Tools.pptx
PPTX
Scanning networks (by piyush upadhyay)
PPTX
4-2.Scanning and Enumeration Presentation Slides (1).pptx
PPT
Hacking Fundamentals - Jen Johnson , Miria Grunick
PPT
Freeware Security Tools You Need
PDF
Chapter 7 security tools i
For your final step, you will synthesize the previous steps and la
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Security tools
01204427-scanner.ppt
SOFTWARE TOOLS(Bhavik).pptx
An Toan Thong Tin.pptx
Scanning and Enumeration in Cyber Security.pptx
CYBER FORENSICS-scanning and enumuration.ppt
Chapter 12
Modul 2 - Footprinting Scanning Enumeration.ppt
modul2-footprintingscanningenumeration.pdf
Chapter 3 footprinting
( Ethical hacking tools ) Information grathring
Tools.pptx
Scanning networks (by piyush upadhyay)
4-2.Scanning and Enumeration Presentation Slides (1).pptx
Hacking Fundamentals - Jen Johnson , Miria Grunick
Freeware Security Tools You Need
Chapter 7 security tools i

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Per capita expenditure prediction using model stacking based on satellite ima...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Network Scanning Phases and Supporting Tools

  • 1. Network Scanning Phases and Supporting Tools Joseph Bugeja Information Security Manager/Architect November 24, 2013
  • 2. Scanning Phase Goals • Overall: Learn more about targets and find openings by interacting with the target environment – Determine network addresses of live hosts, firewalls, routers, etc. in the network – Determine network topology of target environment – Determine operating system types of discovered hosts – Determine open ports and network sevices in target environment – Determine list of potential vulnerabilities – Do these in a manner that minimizes risk of impairing host or service
  • 3. Scan Types • Network Sweeping – Send a series of probe packets to identify live hosts at IP addresses in the target network • Network Tracing – Determine network topology and draw a map • Port Scanning – Determine listening TCP and UDP ports on target systems • OS Fingerprinting – Determine the target operating system type based on network behaviour
  • 4. Scan Types • Version Scanning – Determine the version of services and protocols spoken by open TCP and UDP ports • Vulnerability Scanning – Determine a list of potential vulnerabilities (misconfigurations, unpatched services, etc.) in the target environment
  • 5. Scanning Tip: While Scanning Run a Sniffer • Whenever you run a scan, run a sniffer so that you can monitor network activity – You do not have to capture all packets in the file system • – That would likely require huge storage space Instead, display them on the screen so you can visualize what is happening in the scan • Which sniffer to use? – – Any sniffer that shows packet headers will do, but you want something small, flexible and fast tcpdump is ideal for this purpose
  • 6. Scanning Tip: Use TCPDump • Free, open source sniffer – – www.tcpdump.org Ported to Windows as WinDump at www.winpcap.org/windump/default.htm • Supports various filtering rules • While testing, you will likely have it display all packets leaving from and coming to your scanning machine • But, for specific issues, you may need to focus on specific packets • Often, just running tcpdump with no special options while scanning provides the information you need $ sudo tcpdump
  • 7. Network Sweep Tools • Angry IP – – www.angryip.org GUI-based tool for Windows • • • • Ping sweep (via ICMP Echo Request) TCP port scan Gets MAC address for systems on same subnet NetBIOS name and workgroup gathering • ICMPQuery – – www.angio.net/security/icmpquery.c Command-line tool for Linux/UNIX • • Sends ICMP Timestamp (Type 13) and Address Mask Request (Type 17) messages to identify live hosts Useful for identifying hosts in a network that has firewalls which block ICMP Echo Request
  • 8. Network Sweep Tools • HPing – Inspired by ping, but goes much further • • – – – Free at www.hping.org, runs on Linux, *BSD, Windows and MacOS X The latest version, Hping3, supports TCL scripting By default, sends TCP packets with no control bits set to target port 0 continuously, once per second • – Originally Hping, then Hping2...latest is Hping3 From man page: “Send (almost) arbirary TCP/IP packets to networks hosts” Possibly getting RESETs back Example: # hping3 10.10.10.20
  • 9. Network Tracing Tools • Traceroute – – – – Discovers the route that packets take between two systems Helps a tester construct network architecture diagrams Included in most operating systems Sends packets to target with varying TTLs in the IP Header • Layer Four Traceroute (LFT) – Free at http://pwhois.org/lft – Runs on Linux and Unix – Supports a variety of Layer Four options for tracerouting
  • 10. Network Tracing Tools • 3D Traceroute – – Runs on Widows, free at www.d3tr.de Graphical traceroute using ICMP Echo Request, updated/animated in real-time • Web-Based Traceroute Services – Instead of tracerouting from your address to the target, various websites allow you to traceroute from them to the target – Very useful in seeing if you are being shunned during a test!
  • 11. Port Scanning Tools • Nmap – Written and maintained by Fyodor • – – Very popular, located at www.insecure.org Has been extended into a general-purpose vulnerability scanner via Nmap Scripting Engine(NSE) Run with --packet-trace to display summary of each packet before it is sent, with output that includes: • • • • • • • Nmap calls to the OS SENT/RCVD Protocol (TCP/UDP) Source IP:Port and Dest IP:Port Control Bits TTL Other header information
  • 12. OS Fingerprinting Tools • Nmap – – Attempts to determine the operating system of target by sending various packet types and measures the response Different systems have different protocol behaviour that we can trigger and measure remotely • Xprobe2 – ofirarkin.wordpress.com/xprobe – Based on Ofir Arkin ICMP fingerprinting research – Applies fuzzy logic to calculate the probabilities of its operating system type • P0f2 – – Supports passive OS fingerprinting Free
  • 13. Version Scanning Tools • Nmap – Version scan invoked with -sV - Or use -A to for OS fingerprinting and version scan (i.e, -A = -sV + -O) • THC Amap – Free from http://freeworld.thc.org/thc-amap – Amap can do a port scan itself or it can be provided with the output file from Nmap – It sends triggers to each open port – It looks for defined responses – A useful second opinion to the Nmap version scan
  • 14. Vulnerability Scanning Tools • Nmap Scripting Engine (NSE) – – Scripts are written in the Lua programming language May some day rival Nessus and NASL as a general purpose, free, open source vulnerability scanner • Nessus Vulnerability Scanner – Maintained and distributed by Tenable Network Security • – – – www.nessus.org Free download Plugins measure flaws in target environment As new vulnerabilities are discovered, Tenable personnel release plugins
  • 15. Vulnerability Scanning Tools • Commercial Solutions – SAINT – Retina Network Security Scanner – Lumension PatchLink Scanner – BiDiBLAH – CORE Impact • Scanning Services/Appliances – Foundscan – Qualys • Free Solutions – SARA – SuperScan
  • 16. Thank You! Thanks for Listening! Joseph Bugeja bugejajoseph@yahoo.com