SlideShare a Scribd company logo
About Me
>Piyush Upadhyay (d3cR3pt3r).
>Admin of Techtown Technology.
>Starter youtuber and blogger.
>An Ethical Hacker (Found 15 bug’s including
google and tubebuddy.)
Techspon.blogspot.com
1
Network Basics
• A netowk consist of 3 parts
1. IP Address
2. Services
3. Port
• IP Addresses
– An address is comprised of two parts- a network address
and a host address and determined by the subnet mask.
– A simple example is 192.168.1.1 with a subnet mask of
255.255.255.0.
• 192.168.1 is the network address (the 192.168.1.0 network) and
.1 is a host address on that network.
Techspon.blogspot.com 2
• Services
– The network protocol that listens for incoming
connection requests and links the server application
with the client
– Typically each service runs on a set of specific ports
– In actuality, any service can run on any port
• Therefore, you should put only limited trust in
port/service mappings.
– Use an application scanner (service detection) to
ensure find out what application is really running on
that port.
– Nmap has service detection
3Techspon.blogspot.com
• Ports
• A port is where a service listens for connections
• Common services use common well-known ports
• Could use any port as long as both the server and
the client know which port to connect to
• Ports allow different services to be available from
one location or IP Address
4Techspon.blogspot.com
Scanning
• Types of scanning
– Host (Ping) Scanning
– Port Scanning
– Vulnerability Scanning
5
Techspon.blogspot.com
Host Scanning
• Hackers perform host scanning to locate
and identify hosts on the network.
• Usually by “pinging” a range of IP
addresses.
• Host which respond to pings may be
targeted for attack.
6
Techspon.blogspot.com
Port Scanning
• Hackers perform Port Scans to determine what
services a host may be running.
• By knowing the services the hacker can attempt
attacks against known vulnerabilities in the
service.
• Port scans attempt to make initial connection to
service running on a particular port number.
• Port scans are invasive and are easily detected by
Intrusion Detection and/or firewalls.
7
Techspon.blogspot.com
Vulnerability Scanning
• What is vulnerability scanning?
– Used to find known flaws within an application
or network.
– These scanning tools are typically signature
based and can only find vulnerabilities that the
tools know about.
– Many good commercial and freeware tools are
available.
8Oceanofwebs.com
Scanning Tools
• Host & Port Scanning
– Nmap
• Vulnerability Scanning
– GFI and Nessus
9
Techspon.blogspot.com
10
Techspon.blogspot.com
Scanning Tool - Nmap
• The only port scanner you’ll need
• Pros
– FREE
– Continually Updated
– OS Detection and Service Detection
– Support for both Windows and Unix
• Cons
– No standard Graphical User Interface
11
Techspon.blogspot.com
Scanning Tool- SuperScan
Pro’s
– FREE download from Foundstone
– Very stable, Fairly fast
– Graphical User Interface
Con’s
– Windows version only
– No stealth options, no Firewall Evasion
– Service Detection/Application Mapping
12
Techspon.blogspot.com
13
Techspon.blogspot.com
Scanning Tool – Nessus
• Pros
– Nessus is free
– Large plugin or signature base
– You can customize and create new plugins
• Cons
– Tenable took Nessus private (closed source)
– Purchasing plans for new plugins
– Shareware plug-ins are seven days behind
LINK: (www.nessus.org)
14
Techspon.blogspot.com
Scanning Tool –
GFI LANguard Network Security Scanner
• Pros
– Port Scanner, Enumeration, and Vulnerability Scanner
– Many features such as SNMP and SQL brute force
– Great for Windows networks
• Cons
– Lacks extensive signatures for other operating systems
– Look to Nessus for scanning heterogeneous networks
15
Techspon.blogspot.com
..The End ..
Techspon.blogspot.com 16

More Related Content

PPTX
Network scanning
PPT
Port scanning
PPTX
Network scanner
ODP
Wireless security beyond password cracking by Mohit Ranjan
PDF
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
PDF
NMAP by Shrikant Antre & Shobhit Gautam
Network scanning
Port scanning
Network scanner
Wireless security beyond password cracking by Mohit Ranjan
BSides Rochester 2018: Esteban Rodriguez: Ducky In The Middle: Injecting keys...
NMAP by Shrikant Antre & Shobhit Gautam

What's hot (19)

PPTX
PDF
Network security
PPTX
N map presentation
PPTX
PPTX
Recon with Nmap
PDF
Nmap commands
PPTX
Fundamental of Webserver Hacking, Web Applications and Database Attacks
PPT
VPN vs. PROXY
PPTX
Nmap and metasploitable
PPTX
NMAP - The Network Scanner
PPTX
PPTX
Nmap(network mapping)
PDF
Nmap Basics
PPTX
Free OpManager training_Part 1- Discovery & classification
PPTX
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
PPTX
C0C0N 2013 - OWASP Skanda
PDF
SplunkLive! Milan 2015 - Fastweb
Network security
N map presentation
Recon with Nmap
Nmap commands
Fundamental of Webserver Hacking, Web Applications and Database Attacks
VPN vs. PROXY
Nmap and metasploitable
NMAP - The Network Scanner
Nmap(network mapping)
Nmap Basics
Free OpManager training_Part 1- Discovery & classification
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
C0C0N 2013 - OWASP Skanda
SplunkLive! Milan 2015 - Fastweb
Ad

Similar to Scanning networks (by piyush upadhyay) (20)

PPTX
Sccccccccccccccccccccccannig Network.pptx
PPTX
PPTX
[old] Network Performance Monitoring for DevOps and IT
PPTX
Network Penetration Testing
DOCX
What can an attacker can determine which network services are enabled.docx
PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
PPTX
Network scan
PDF
Penetration Testing Services Technical Description Cyber51
PDF
a framework for fingerprinting ICS honeypots
PPT
Network Scanning Phases and Supporting Tools
PPT
ids.ppt
PPT
Monitor and manage everything Cisco using OpManager
PPT
Introduction to firewalls
PPTX
What is a Port Scan in data visualization
PPTX
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
PPTX
lecture5.pptx
PPTX
DC612 Day - Hands on Penetration Testing 101
PPTX
Cybersecurity and Ethical Hacking: Capstone Project
PPT
Hacking Cisco Networks and Countermeasures
PPT
cyber forensics-enum,sniffing,malware threat.ppt
Sccccccccccccccccccccccannig Network.pptx
[old] Network Performance Monitoring for DevOps and IT
Network Penetration Testing
What can an attacker can determine which network services are enabled.docx
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Network scan
Penetration Testing Services Technical Description Cyber51
a framework for fingerprinting ICS honeypots
Network Scanning Phases and Supporting Tools
ids.ppt
Monitor and manage everything Cisco using OpManager
Introduction to firewalls
What is a Port Scan in data visualization
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptx
DC612 Day - Hands on Penetration Testing 101
Cybersecurity and Ethical Hacking: Capstone Project
Hacking Cisco Networks and Countermeasures
cyber forensics-enum,sniffing,malware threat.ppt
Ad

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
Teaching material agriculture food technology
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25 Week I
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology

Scanning networks (by piyush upadhyay)

  • 1. About Me >Piyush Upadhyay (d3cR3pt3r). >Admin of Techtown Technology. >Starter youtuber and blogger. >An Ethical Hacker (Found 15 bug’s including google and tubebuddy.) Techspon.blogspot.com 1
  • 2. Network Basics • A netowk consist of 3 parts 1. IP Address 2. Services 3. Port • IP Addresses – An address is comprised of two parts- a network address and a host address and determined by the subnet mask. – A simple example is 192.168.1.1 with a subnet mask of 255.255.255.0. • 192.168.1 is the network address (the 192.168.1.0 network) and .1 is a host address on that network. Techspon.blogspot.com 2
  • 3. • Services – The network protocol that listens for incoming connection requests and links the server application with the client – Typically each service runs on a set of specific ports – In actuality, any service can run on any port • Therefore, you should put only limited trust in port/service mappings. – Use an application scanner (service detection) to ensure find out what application is really running on that port. – Nmap has service detection 3Techspon.blogspot.com
  • 4. • Ports • A port is where a service listens for connections • Common services use common well-known ports • Could use any port as long as both the server and the client know which port to connect to • Ports allow different services to be available from one location or IP Address 4Techspon.blogspot.com
  • 5. Scanning • Types of scanning – Host (Ping) Scanning – Port Scanning – Vulnerability Scanning 5 Techspon.blogspot.com
  • 6. Host Scanning • Hackers perform host scanning to locate and identify hosts on the network. • Usually by “pinging” a range of IP addresses. • Host which respond to pings may be targeted for attack. 6 Techspon.blogspot.com
  • 7. Port Scanning • Hackers perform Port Scans to determine what services a host may be running. • By knowing the services the hacker can attempt attacks against known vulnerabilities in the service. • Port scans attempt to make initial connection to service running on a particular port number. • Port scans are invasive and are easily detected by Intrusion Detection and/or firewalls. 7 Techspon.blogspot.com
  • 8. Vulnerability Scanning • What is vulnerability scanning? – Used to find known flaws within an application or network. – These scanning tools are typically signature based and can only find vulnerabilities that the tools know about. – Many good commercial and freeware tools are available. 8Oceanofwebs.com
  • 9. Scanning Tools • Host & Port Scanning – Nmap • Vulnerability Scanning – GFI and Nessus 9 Techspon.blogspot.com
  • 11. Scanning Tool - Nmap • The only port scanner you’ll need • Pros – FREE – Continually Updated – OS Detection and Service Detection – Support for both Windows and Unix • Cons – No standard Graphical User Interface 11 Techspon.blogspot.com
  • 12. Scanning Tool- SuperScan Pro’s – FREE download from Foundstone – Very stable, Fairly fast – Graphical User Interface Con’s – Windows version only – No stealth options, no Firewall Evasion – Service Detection/Application Mapping 12 Techspon.blogspot.com
  • 14. Scanning Tool – Nessus • Pros – Nessus is free – Large plugin or signature base – You can customize and create new plugins • Cons – Tenable took Nessus private (closed source) – Purchasing plans for new plugins – Shareware plug-ins are seven days behind LINK: (www.nessus.org) 14 Techspon.blogspot.com
  • 15. Scanning Tool – GFI LANguard Network Security Scanner • Pros – Port Scanner, Enumeration, and Vulnerability Scanner – Many features such as SNMP and SQL brute force – Great for Windows networks • Cons – Lacks extensive signatures for other operating systems – Look to Nessus for scanning heterogeneous networks 15 Techspon.blogspot.com