SlideShare a Scribd company logo
4
Most read
8
Most read
11
Most read
Network Basics
• A netowk consist of 3 parts
1. IP Address
2. Services
3. Port
• IP Addresses
– An address is comprised of two parts- a network address
and a host address and determined by the subnet mask.
– A simple example is 192.168.1.1 with a subnet mask of
255.255.255.0.
• 192.168.1 is the network address (the 192.168.1.0 network) and
.1 is a host address on that network.
Oceanofwebs.com 1
• Services
– The network protocol that listens for incoming
connection requests and links the server application
with the client
– Typically each service runs on a set of specific ports
– In actuality, any service can run on any port
• Therefore, you should put only limited trust in port/service
mappings.
– Use an application scanner (service detection) to
ensure find out what application is really running on
that port.
– Nmap has service detection
2Oceanofwebs.com
• Ports
• A port is where a service listens for connections
• Common services use common well-known ports
• Could use any port as long as both the server and
the client know which port to connect to
• Ports allow different services to be available from
one location or IP Address
3Oceanofwebs.com
Scanning
• Types of scanning
– Host (Ping) Scanning
– Port Scanning
– Vulnerability Scanning
4Oceanofwebs.com
Host Scanning
• Hackers perform host scanning to locate
and identify hosts on the network.
• Usually by “pinging” a range of IP
addresses.
• Host which respond to pings may be
targeted for attack.
5Oceanofwebs.com
Port Scanning
• Hackers perform Port Scans to determine what
services a host may be running.
• By knowing the services the hacker can attempt
attacks against known vulnerabilities in the
service.
• Port scans attempt to make initial connection to
service running on a particular port number.
• Port scans are invasive and are easily detected by
Intrusion Detection and/or firewalls.
6Oceanofwebs.com
Vulnerability Scanning
• What is vulnerability scanning?
– Used to find known flaws within an application
or network.
– These scanning tools are typically signature
based and can only find vulnerabilities that the
tools know about.
– Many good commercial and freeware tools are
available.
7Oceanofwebs.com
Scanning Tools
• Host & Port Scanning
– Nmap
• Vulnerability Scanning
– GFI and Nessus
8Oceanofwebs.com
9Oceanofwebs.com
Scanning Tool - Nmap
• The only port scanner you’ll need
• Pros
– FREE
– Continually Updated
– OS Detection and Service Detection
– Support for both Windows and Unix
• Cons
– No standard Graphical User Interface
LINK: (www.insecure.org)
10Oceanofwebs.com
Scanning Tool- SuperScan
Pro’s
– FREE download from Foundstone
– Very stable, Fairly fast
– Graphical User Interface
Con’s
– Windows version only
– No stealth options, no Firewall Evasion
– Service Detection/Application Mapping
• LINK: (www.foundstone.com)
11Oceanofwebs.com
12Oceanofwebs.com
Scanning Tool – Nessus
• Pros
– Nessus is free
– Large plugin or signature base
– You can customize and create new plugins
• Cons
– Tenable took Nessus private (closed source)
– Purchasing plans for new plugins
– Shareware plug-ins are seven days behind
LINK: (www.nessus.org)
13Oceanofwebs.com
Scanning Tool –
GFI LANguard Network Security Scanner
• Pros
– Port Scanner, Enumeration, and Vulnerability Scanner
– Many features such as SNMP and SQL brute force
– Great for Windows networks
• Cons
– Lacks extensive signatures for other operating systems
– Look to Nessus for scanning heterogeneous networks
14Oceanofwebs.com

More Related Content

PPT
Ethical Hacking and Penetration Testing
PPT
Ch04 Network Vulnerabilities and Attacks
PPTX
Footprinting and reconnaissance
PPTX
Ethical Hacking - sniffing
PPTX
Password Cracking
PDF
Ceh v5 module 03 scanning
PPTX
Brute force-attack presentation
PDF
Ceh v5 module 01 introduction to ethical hacking
Ethical Hacking and Penetration Testing
Ch04 Network Vulnerabilities and Attacks
Footprinting and reconnaissance
Ethical Hacking - sniffing
Password Cracking
Ceh v5 module 03 scanning
Brute force-attack presentation
Ceh v5 module 01 introduction to ethical hacking

What's hot (20)

PPTX
Introduction to Malware Analysis
PPTX
Understanding NMAP
PPTX
Introduction to penetration testing
PPTX
Reconnaissance - For pentesting and user awareness
PPTX
NMAP - The Network Scanner
PPTX
Introduction to Snort
PDF
VULNERABILITY ( CYBER SECURITY )
PPTX
Types of Malware (CEH v11)
PDF
Secure Design: Threat Modeling
PPTX
Malware analysis
PDF
Cyber security and demonstration of security tools
PPTX
What is Penetration Testing?
ODP
Scanning with nmap
PPTX
Packet sniffers
PPTX
Intrusion prevention system(ips)
PPT
Module 3 Scanning
PPTX
Intrusion detection
 
PPTX
User authentication
 
Introduction to Malware Analysis
Understanding NMAP
Introduction to penetration testing
Reconnaissance - For pentesting and user awareness
NMAP - The Network Scanner
Introduction to Snort
VULNERABILITY ( CYBER SECURITY )
Types of Malware (CEH v11)
Secure Design: Threat Modeling
Malware analysis
Cyber security and demonstration of security tools
What is Penetration Testing?
Scanning with nmap
Packet sniffers
Intrusion prevention system(ips)
Module 3 Scanning
Intrusion detection
 
User authentication
 
Ad

Viewers also liked (20)

PPT
Port scanning
PPT
Port Scanning
PDF
Ch 5: Port Scanning
PPT
Nmap(network mapping)
PDF
Ch 3: Network and Computer Attacks
PPTX
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
PDF
Nmap Basics
PPT
Dynamic Port Scanning
PDF
Hacking With Nmap - Scanning Techniques
PDF
Scan tool basics
PDF
ethical-hacking-guide
PPT
Common hacking tactics
PDF
Secure and Simple Sandboxing in SELinux
PPT
Hack In Paris 2011 - Practical Sandboxing
PPTX
Sandboxing in .NET CLR
PPT
Network Scanning Phases and Supporting Tools
PDF
Ceh v5 module 07 sniffers
PPT
File Transfer protocols
PPTX
Content Analysis System and Advanced Threat Protection
Port scanning
Port Scanning
Ch 5: Port Scanning
Nmap(network mapping)
Ch 3: Network and Computer Attacks
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap Basics
Dynamic Port Scanning
Hacking With Nmap - Scanning Techniques
Scan tool basics
ethical-hacking-guide
Common hacking tactics
Secure and Simple Sandboxing in SELinux
Hack In Paris 2011 - Practical Sandboxing
Sandboxing in .NET CLR
Network Scanning Phases and Supporting Tools
Ceh v5 module 07 sniffers
File Transfer protocols
Content Analysis System and Advanced Threat Protection
Ad

Similar to Network scanning (20)

PPTX
Scanning networks (by piyush upadhyay)
PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
PPTX
What is a Port Scan in data visualization
PDF
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
PPTX
ServicesPorts on systems, identifying open ports
PPTX
Hacking - penetration tools
PDF
Vulnerability
PPTX
An Toan Thong Tin.pptx
PPTX
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
PPT
Port Scanning in computer networks with .ppt
PPTX
Scanning and Enumeration in Cyber Security.pptx
PPTX
Web hacking 1.0
PDF
Network Security Tools
PPTX
( Ethical hacking tools ) Information grathring
PPTX
Network scanning
PPT
Hacking Presentation
PPTX
How to dominate a country
PPT
CYBER FORENSICS-scanning and enumuration.ppt
PPTX
Network scan
PPTX
Preso fcul
Scanning networks (by piyush upadhyay)
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
What is a Port Scan in data visualization
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
ServicesPorts on systems, identifying open ports
Hacking - penetration tools
Vulnerability
An Toan Thong Tin.pptx
Analyzing Open Ports on Websites: Functions, Benefits, Threats, and Detailed ...
Port Scanning in computer networks with .ppt
Scanning and Enumeration in Cyber Security.pptx
Web hacking 1.0
Network Security Tools
( Ethical hacking tools ) Information grathring
Network scanning
Hacking Presentation
How to dominate a country
CYBER FORENSICS-scanning and enumuration.ppt
Network scan
Preso fcul

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Network scanning

  • 1. Network Basics • A netowk consist of 3 parts 1. IP Address 2. Services 3. Port • IP Addresses – An address is comprised of two parts- a network address and a host address and determined by the subnet mask. – A simple example is 192.168.1.1 with a subnet mask of 255.255.255.0. • 192.168.1 is the network address (the 192.168.1.0 network) and .1 is a host address on that network. Oceanofwebs.com 1
  • 2. • Services – The network protocol that listens for incoming connection requests and links the server application with the client – Typically each service runs on a set of specific ports – In actuality, any service can run on any port • Therefore, you should put only limited trust in port/service mappings. – Use an application scanner (service detection) to ensure find out what application is really running on that port. – Nmap has service detection 2Oceanofwebs.com
  • 3. • Ports • A port is where a service listens for connections • Common services use common well-known ports • Could use any port as long as both the server and the client know which port to connect to • Ports allow different services to be available from one location or IP Address 3Oceanofwebs.com
  • 4. Scanning • Types of scanning – Host (Ping) Scanning – Port Scanning – Vulnerability Scanning 4Oceanofwebs.com
  • 5. Host Scanning • Hackers perform host scanning to locate and identify hosts on the network. • Usually by “pinging” a range of IP addresses. • Host which respond to pings may be targeted for attack. 5Oceanofwebs.com
  • 6. Port Scanning • Hackers perform Port Scans to determine what services a host may be running. • By knowing the services the hacker can attempt attacks against known vulnerabilities in the service. • Port scans attempt to make initial connection to service running on a particular port number. • Port scans are invasive and are easily detected by Intrusion Detection and/or firewalls. 6Oceanofwebs.com
  • 7. Vulnerability Scanning • What is vulnerability scanning? – Used to find known flaws within an application or network. – These scanning tools are typically signature based and can only find vulnerabilities that the tools know about. – Many good commercial and freeware tools are available. 7Oceanofwebs.com
  • 8. Scanning Tools • Host & Port Scanning – Nmap • Vulnerability Scanning – GFI and Nessus 8Oceanofwebs.com
  • 10. Scanning Tool - Nmap • The only port scanner you’ll need • Pros – FREE – Continually Updated – OS Detection and Service Detection – Support for both Windows and Unix • Cons – No standard Graphical User Interface LINK: (www.insecure.org) 10Oceanofwebs.com
  • 11. Scanning Tool- SuperScan Pro’s – FREE download from Foundstone – Very stable, Fairly fast – Graphical User Interface Con’s – Windows version only – No stealth options, no Firewall Evasion – Service Detection/Application Mapping • LINK: (www.foundstone.com) 11Oceanofwebs.com
  • 13. Scanning Tool – Nessus • Pros – Nessus is free – Large plugin or signature base – You can customize and create new plugins • Cons – Tenable took Nessus private (closed source) – Purchasing plans for new plugins – Shareware plug-ins are seven days behind LINK: (www.nessus.org) 13Oceanofwebs.com
  • 14. Scanning Tool – GFI LANguard Network Security Scanner • Pros – Port Scanner, Enumeration, and Vulnerability Scanner – Many features such as SNMP and SQL brute force – Great for Windows networks • Cons – Lacks extensive signatures for other operating systems – Look to Nessus for scanning heterogeneous networks 14Oceanofwebs.com