Types of NETWORK RECONNAISSANCE with its Cases.ppt
2. What is?
• Military reconnaissance
Military reconnaissance
– a mission conducted to confirm or deny prior
a mission conducted to confirm or deny prior
intelligence (if any) about enemy threat and or the
intelligence (if any) about enemy threat and or the
terrain of a given area.
terrain of a given area.
• Network reconnaissance
Network reconnaissance
– process of acquiring information about a
process of acquiring information about a
network
network, Network reconnaissance is a term for
, Network reconnaissance is a term for
testing for potential vulnerabilities in a computer
testing for potential vulnerabilities in a computer
network.
network.
3. Why?
• Hackers use reconnaissance as the first step in an
Hackers use reconnaissance as the first step in an
effective attack
effective attack
• Seeing what is on the "other side of the hill" is crucial
Seeing what is on the "other side of the hill" is crucial
to decide what type of attack to launch
to decide what type of attack to launch
• Generally, goals of reconnaissance on a target
Generally, goals of reconnaissance on a target
network are to discover:
network are to discover:
– IP addresses of hosts
IP addresses of hosts
– Accessible UDP and TCP ports
Accessible UDP and TCP ports
– OS type
OS type
4. Footprinting/Fingerprinting steps
• Information Gathering
– accumulating data regarding a specific network environment, usually for the purpose of
finding ways to intrude into the environment
• Locate the network
– What addresses can be targeted and are available for additional scanning and analysis
• Identify active machines
– Which machine is actively connected to the network and reachable (WireShark)
• Open ports and underlying applications
– Which ports and applications are accessible (NMAP)
• OS Fingerprinting
– Identifying targeted Oss as well as systems response
• Network mapping
– Create blueprint of organization
5. Information Gathering
• Get data regarding network environment such as
– Organization web site, Location, contact person, Phone
number
• Common Tools
– Registrar query : whois IP Address (whois 172.31.1.6)
– Domain name and resource lookup
– Search Tools
6. Locate the network range
• What range of IP addresses are available for
scanning and further enumeration
• Common Tools : whois
9. Tool:
Tool: - Google
• Google, Yahoo, Live.com, etc.
– Gather information about a targeted
organization
– Evaluate web sites for known security issues
– Identify files that are accidentally exposed to
the public
10. Tool:
Tool: - Google search
• Helpful Google Queries
– Related sites:
• related:www.someaddr.com
– Search a specific site:
• site:www.someaddr.com search_terms
– Use Google to search group or blog postings
12. Tool:
Tool: NSLOOKUP
• Queries Domain Name Server information
– IP and Domain Name Mapping
– Zone Transfer – Dumps entire table
– Check mail server
18. Tool:
Tool: How Traceroute work
1. Launch a probe packet towards DST, with a TTL of 1
2. Every router hop decrements the IP TTL of the packet by 1
3. When the TTL hits 0, packet is dropped, router sends ICMP TTL Exceed
packet to SRC with the original probe packet as payload
4. SRC receives this ICMP message, displays a traceroute “hop”
5. Repeat from step 1, with TTL incremented by 1 each time, until..
6. DST host receives probe, returns ICMP Dest Unreachable
19. Tool:
Tool: Traceroute Report Hop
• Traceroute packet with TTL of 1 enters router via the ingress interface.
• Router decrements TTL to 0, drops packet, generates ICMP TTL Exceed
– ICMP packet dst address is set to the original traceroute probe source (SRC)
– ICMP packet src address is set to the IP of the ingress router interface
– Traceroute shows a result based on the src address of the ICMP packet
– The above traceroute will read:172.16.2.1 10.3.2.2
– You have NO visibility into the return path or the egress interface used
20. Tool:
Tool: Traceroute Latency Calculation
• How is traceroute latency calculated?
– Timestamp when the probe packet is launched
– Timestamp when the ICMP response is received
– Calculate the difference to determine round-trip time
– Routers along the path donot do anytime “processing”
• They simply reflect the original packet’s data back to the SRC
• Many implementations encode the original launch timestamp into the probe
packet, to increase accuracy and reduce state
– Most Importantly: only the ROUNDTRIP is measured
• Traceroute is showing you the hops on the forward path
• But showing you latency based on the forward PLUS reverse path. Any delays on
the reverse path will affect your results!
21. Tool:
Tool: Interprete Traceroute DNS
• Interpreting DNS is one of the most important
aspects of correctly using traceroute
• Information you can uncover includes:
– Physical Router Locations
– Interface Types and Capacities
– Router Type and Roles
– Network Boundaries and Relationships
22. Tool:
Tool: Traceroute Reading Tips
• Router’s name may include Exchange Point
– MAE, NAP, PAIX
• Router names may be the IATA 3-letter code of the nearest
airport or CLLI code in their node name
• Other abbreviation
– http://www.sarangworld.com/TRACEROUTE/showdb-2.php3
• Interface name
23. Tool:
Tool: Router Type/Role
• Knowing the role of a router can be useful
• But every network is different, and uses different naming
conventions
• May not always follow naming rules
• Generally speaking, May need guessing the context and get a
basic understanding of the roles
– Core routers–CR, Core, GBR, BB
– Peering routers–BR, Border, Edge, IGR, Peer
– Customer routers–AR, Aggr, Cust, CAR, GW
24. Tool:
Tool: DNS Interface type
• Most networks will try to put interface info into DNS
• Though this many not always be up to date
• Many large networks use automatically generated DNS
• As well as capacity, and maybe even the make/model of
router
• Examples:
– xe-11-1-0.edge1.Washington1.Level2.net
• XE-#/#/# is Juniper 10GE port. The device has at least 12 slots
• It’s at least a 40G/slot router since it has a 10GE PIC in slot 1
• It must be Juniper MX960, no other device could fit this profile
26. Identifying Active Machines
• Attackers will want to know if machines are alive
before they attempt to attack. One of the most basic
methods of identifying active machines is to perform
a sweep
• Common Tools
– ping, traceroute
– Network scanning tools
• nmap, superscan
27. Finding Open Ports
• Open services
• Common tools
– Port scanning tools
• nmap, superscan
28. OS Fingerprinting
• Passive fingerprint
– Sniffing technique
– Examine packets for certain characteristics such as
• The IP TTL value
• The TCP Window Size
• The IP DF Option
• The IP Type of Service (TOS) Option
• Active Fingerprint
– Injects the packets into the network
– Examines the subtle differences that exist between different vendor implementations of
the TCP/IP stack
– Common tools : nmap
29. Mapping the Network
• Gained enough information to build network map
• Network mapping provides the hacker with a
blueprint of the organization.
• May use manual or automated ways to compile this
information
30. Summary
Method Technique Common Tools
Information gathering Passive Whois, nslookup
Determining network range Passive RIPE, LACNIC, APNIC, ARIN
Identify active machines Active ping, hping, traceroute, nmap,
SuperScan
Finding open ports/applications Active nmap, Amap, SuperScan
OS fingerprinting Active/passive nmap, Winfigerprint, P0f,
Xprobe2, ettercap
Mapping the network Active CartoReso, traceroute, NeoTrace