SlideShare a Scribd company logo
Types of NETWORK RECONNAISSANCE with its Cases.ppt
What is?
• Military reconnaissance
Military reconnaissance
– a mission conducted to confirm or deny prior
a mission conducted to confirm or deny prior
intelligence (if any) about enemy threat and or the
intelligence (if any) about enemy threat and or the
terrain of a given area.
terrain of a given area.
• Network reconnaissance
Network reconnaissance
– process of acquiring information about a
process of acquiring information about a
network
network, Network reconnaissance is a term for
, Network reconnaissance is a term for
testing for potential vulnerabilities in a computer
testing for potential vulnerabilities in a computer
network.
network.
Why?
• Hackers use reconnaissance as the first step in an
Hackers use reconnaissance as the first step in an
effective attack
effective attack
• Seeing what is on the "other side of the hill" is crucial
Seeing what is on the "other side of the hill" is crucial
to decide what type of attack to launch
to decide what type of attack to launch
• Generally, goals of reconnaissance on a target
Generally, goals of reconnaissance on a target
network are to discover:
network are to discover:
– IP addresses of hosts
IP addresses of hosts
– Accessible UDP and TCP ports
Accessible UDP and TCP ports
– OS type
OS type
Footprinting/Fingerprinting steps
• Information Gathering
– accumulating data regarding a specific network environment, usually for the purpose of
finding ways to intrude into the environment
• Locate the network
– What addresses can be targeted and are available for additional scanning and analysis
• Identify active machines
– Which machine is actively connected to the network and reachable (WireShark)
• Open ports and underlying applications
– Which ports and applications are accessible (NMAP)
• OS Fingerprinting
– Identifying targeted Oss as well as systems response
• Network mapping
– Create blueprint of organization
Information Gathering
• Get data regarding network environment such as
– Organization web site, Location, contact person, Phone
number
• Common Tools
– Registrar query : whois IP Address (whois 172.31.1.6)
– Domain name and resource lookup
– Search Tools
Locate the network range
• What range of IP addresses are available for
scanning and further enumeration
• Common Tools : whois
Tool: WHOIS Search
Tool: WHOIS Search
Types of NETWORK RECONNAISSANCE with its Cases.ppt
Tool:
Tool: - Google
• Google, Yahoo, Live.com, etc.
– Gather information about a targeted
organization
– Evaluate web sites for known security issues
– Identify files that are accidentally exposed to
the public
Tool:
Tool: - Google search
• Helpful Google Queries
– Related sites:
• related:www.someaddr.com
– Search a specific site:
• site:www.someaddr.com search_terms
– Use Google to search group or blog postings
Tool:
Tool: – Google operators
Google Advanced Operators
AND: “+”
OR: “|”
Synonym: “~”
site:www.jeffersonwells.com
inurl:robots.txt
link:www.jeffersonwells.com
intitle:“jefferson wells”
filetype:xls
Tool:
Tool: NSLOOKUP
• Queries Domain Name Server information
– IP and Domain Name Mapping
– Zone Transfer – Dumps entire table
– Check mail server
Tool:
Tool: NSLOOKUP
• Zone Transfer – Dumps entire table
$ nslookup
> server = A.B.C.D
> ls somedomain.com
Tool:
Tool: NSLOOKUP
• MX record
$ nslookup
> set type = MX
> somedomain.com
Types of NETWORK RECONNAISSANCE with its Cases.ppt
Types of NETWORK RECONNAISSANCE with its Cases.ppt
Types of NETWORK RECONNAISSANCE with its Cases.ppt
Tool:
Tool: How Traceroute work
1. Launch a probe packet towards DST, with a TTL of 1
2. Every router hop decrements the IP TTL of the packet by 1
3. When the TTL hits 0, packet is dropped, router sends ICMP TTL Exceed
packet to SRC with the original probe packet as payload
4. SRC receives this ICMP message, displays a traceroute “hop”
5. Repeat from step 1, with TTL incremented by 1 each time, until..
6. DST host receives probe, returns ICMP Dest Unreachable
Tool:
Tool: Traceroute Report Hop
• Traceroute packet with TTL of 1 enters router via the ingress interface.
• Router decrements TTL to 0, drops packet, generates ICMP TTL Exceed
– ICMP packet dst address is set to the original traceroute probe source (SRC)
– ICMP packet src address is set to the IP of the ingress router interface
– Traceroute shows a result based on the src address of the ICMP packet
– The above traceroute will read:172.16.2.1 10.3.2.2
– You have NO visibility into the return path or the egress interface used
Tool:
Tool: Traceroute Latency Calculation
• How is traceroute latency calculated?
– Timestamp when the probe packet is launched
– Timestamp when the ICMP response is received
– Calculate the difference to determine round-trip time
– Routers along the path donot do anytime “processing”
• They simply reflect the original packet’s data back to the SRC
• Many implementations encode the original launch timestamp into the probe
packet, to increase accuracy and reduce state
– Most Importantly: only the ROUNDTRIP is measured
• Traceroute is showing you the hops on the forward path
• But showing you latency based on the forward PLUS reverse path. Any delays on
the reverse path will affect your results!
Tool:
Tool: Interprete Traceroute DNS
• Interpreting DNS is one of the most important
aspects of correctly using traceroute
• Information you can uncover includes:
– Physical Router Locations
– Interface Types and Capacities
– Router Type and Roles
– Network Boundaries and Relationships
Tool:
Tool: Traceroute Reading Tips
• Router’s name may include Exchange Point
– MAE, NAP, PAIX
• Router names may be the IATA 3-letter code of the nearest
airport or CLLI code in their node name
• Other abbreviation
– http://www.sarangworld.com/TRACEROUTE/showdb-2.php3
• Interface name
Tool:
Tool: Router Type/Role
• Knowing the role of a router can be useful
• But every network is different, and uses different naming
conventions
• May not always follow naming rules
• Generally speaking, May need guessing the context and get a
basic understanding of the roles
– Core routers–CR, Core, GBR, BB
– Peering routers–BR, Border, Edge, IGR, Peer
– Customer routers–AR, Aggr, Cust, CAR, GW
Tool:
Tool: DNS Interface type
• Most networks will try to put interface info into DNS
• Though this many not always be up to date
• Many large networks use automatically generated DNS
• As well as capacity, and maybe even the make/model of
router
• Examples:
– xe-11-1-0.edge1.Washington1.Level2.net
• XE-#/#/# is Juniper 10GE port. The device has at least 12 slots
• It’s at least a 40G/slot router since it has a 10GE PIC in slot 1
• It must be Juniper MX960, no other device could fit this profile
Tool:
Tool: Sample Traceroute
$ traceroute www.hellers.com
$ traceroute www.mit.edu
Identifying Active Machines
• Attackers will want to know if machines are alive
before they attempt to attack. One of the most basic
methods of identifying active machines is to perform
a sweep
• Common Tools
– ping, traceroute
– Network scanning tools
• nmap, superscan
Finding Open Ports
• Open services
• Common tools
– Port scanning tools
• nmap, superscan
OS Fingerprinting
• Passive fingerprint
– Sniffing technique
– Examine packets for certain characteristics such as
• The IP TTL value
• The TCP Window Size
• The IP DF Option
• The IP Type of Service (TOS) Option
• Active Fingerprint
– Injects the packets into the network
– Examines the subtle differences that exist between different vendor implementations of
the TCP/IP stack
– Common tools : nmap
Mapping the Network
• Gained enough information to build network map
• Network mapping provides the hacker with a
blueprint of the organization.
• May use manual or automated ways to compile this
information
Summary
Method Technique Common Tools
Information gathering Passive Whois, nslookup
Determining network range Passive RIPE, LACNIC, APNIC, ARIN
Identify active machines Active ping, hping, traceroute, nmap,
SuperScan
Finding open ports/applications Active nmap, Amap, SuperScan
OS fingerprinting Active/passive nmap, Winfigerprint, P0f,
Xprobe2, ettercap
Mapping the network Active CartoReso, traceroute, NeoTrace

More Related Content

PPT
Hacking Fundamentals - Jen Johnson , Miria Grunick
PPTX
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
DOCX
For your final step, you will synthesize the previous steps and la
PPT
Modul 2 - Footprinting Scanning Enumeration.ppt
PDF
modul2-footprintingscanningenumeration.pdf
PPTX
( Ethical hacking tools ) Information grathring
PPT
ch01.ppt
PPTX
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Hacking Fundamentals - Jen Johnson , Miria Grunick
Dafgjgghhghfhjgghjhgy06-Footprinting.pptx
For your final step, you will synthesize the previous steps and la
Modul 2 - Footprinting Scanning Enumeration.ppt
modul2-footprintingscanningenumeration.pdf
( Ethical hacking tools ) Information grathring
ch01.ppt
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH

Similar to Types of NETWORK RECONNAISSANCE with its Cases.ppt (20)

PPTX
lecture5.pptx
PDF
Penetration Testing Services Technical Description Cyber51
PDF
Foot printing as phase of Hacking in cybersecurity
PPT
Module 2 Foot Printing
PDF
Send me your echolocation
PPT
Day2
PPTX
A Practical Guide to (Correctly) Troubleshooting with Traceroute
PPTX
Network scan
PPTX
Troubleshooting Network and Network Utilities
PPTX
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
PPTX
SOFTWARE TOOLS(Bhavik).pptx
PPT
Network Scanning Phases and Supporting Tools
PPTX
2. Footprinting and scanning and its sequence.pptx
PPTX
Introduction to cyber forensics
PPTX
J_McConnell_LabReconnaissance
PPT
Reconnaissance & Scanning
PDF
T2 7 Chappell Network Forensics
PPTX
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
PPT
NW_Tools.ppt
PPT
01204427-scanner.ppt
lecture5.pptx
Penetration Testing Services Technical Description Cyber51
Foot printing as phase of Hacking in cybersecurity
Module 2 Foot Printing
Send me your echolocation
Day2
A Practical Guide to (Correctly) Troubleshooting with Traceroute
Network scan
Troubleshooting Network and Network Utilities
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
SOFTWARE TOOLS(Bhavik).pptx
Network Scanning Phases and Supporting Tools
2. Footprinting and scanning and its sequence.pptx
Introduction to cyber forensics
J_McConnell_LabReconnaissance
Reconnaissance & Scanning
T2 7 Chappell Network Forensics
The basics of hacking and penetration testing 이제 시작이야 해킹과 침투 테스트 kenneth.s.kwon
NW_Tools.ppt
01204427-scanner.ppt
Ad

More from RohitAhuja58 (10)

PPTX
Industrial Internet of Things and its APPLICATIONS.pptx
PPT
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
PPTX
Cybersecurity and its Application Perspective.pptx
PPTX
Social Network with its ImplicationsPresentation.pptx
PPTX
packet sniffing with Wireshark and its implementation.pptx
PPTX
Diffie Hellman Key Exchange protocol.pptx
PPTX
system hacking and its usages with its Application.pptx
PPT
1.hacking and its types for all types of attackers.ppt
PPTX
Internet -of- things and its applications.pptx
PPTX
Blockchain AND ITS APPLICATIONS FOR FINANCE.pptx
Industrial Internet of Things and its APPLICATIONS.pptx
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
Cybersecurity and its Application Perspective.pptx
Social Network with its ImplicationsPresentation.pptx
packet sniffing with Wireshark and its implementation.pptx
Diffie Hellman Key Exchange protocol.pptx
system hacking and its usages with its Application.pptx
1.hacking and its types for all types of attackers.ppt
Internet -of- things and its applications.pptx
Blockchain AND ITS APPLICATIONS FOR FINANCE.pptx
Ad

Recently uploaded (20)

PPTX
Internet of Things (IOT) - A guide to understanding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Construction Project Organization Group 2.pptx
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
PPT on Performance Review to get promotions
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Internet of Things (IOT) - A guide to understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Foundation to blockchain - A guide to Blockchain Tech
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
UNIT 4 Total Quality Management .pptx
Construction Project Organization Group 2.pptx
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CH1 Production IntroductoryConcepts.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPT on Performance Review to get promotions
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Lecture Notes Electrical Wiring System Components
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Model Code of Practice - Construction Work - 21102022 .pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

Types of NETWORK RECONNAISSANCE with its Cases.ppt

  • 2. What is? • Military reconnaissance Military reconnaissance – a mission conducted to confirm or deny prior a mission conducted to confirm or deny prior intelligence (if any) about enemy threat and or the intelligence (if any) about enemy threat and or the terrain of a given area. terrain of a given area. • Network reconnaissance Network reconnaissance – process of acquiring information about a process of acquiring information about a network network, Network reconnaissance is a term for , Network reconnaissance is a term for testing for potential vulnerabilities in a computer testing for potential vulnerabilities in a computer network. network.
  • 3. Why? • Hackers use reconnaissance as the first step in an Hackers use reconnaissance as the first step in an effective attack effective attack • Seeing what is on the "other side of the hill" is crucial Seeing what is on the "other side of the hill" is crucial to decide what type of attack to launch to decide what type of attack to launch • Generally, goals of reconnaissance on a target Generally, goals of reconnaissance on a target network are to discover: network are to discover: – IP addresses of hosts IP addresses of hosts – Accessible UDP and TCP ports Accessible UDP and TCP ports – OS type OS type
  • 4. Footprinting/Fingerprinting steps • Information Gathering – accumulating data regarding a specific network environment, usually for the purpose of finding ways to intrude into the environment • Locate the network – What addresses can be targeted and are available for additional scanning and analysis • Identify active machines – Which machine is actively connected to the network and reachable (WireShark) • Open ports and underlying applications – Which ports and applications are accessible (NMAP) • OS Fingerprinting – Identifying targeted Oss as well as systems response • Network mapping – Create blueprint of organization
  • 5. Information Gathering • Get data regarding network environment such as – Organization web site, Location, contact person, Phone number • Common Tools – Registrar query : whois IP Address (whois 172.31.1.6) – Domain name and resource lookup – Search Tools
  • 6. Locate the network range • What range of IP addresses are available for scanning and further enumeration • Common Tools : whois
  • 9. Tool: Tool: - Google • Google, Yahoo, Live.com, etc. – Gather information about a targeted organization – Evaluate web sites for known security issues – Identify files that are accidentally exposed to the public
  • 10. Tool: Tool: - Google search • Helpful Google Queries – Related sites: • related:www.someaddr.com – Search a specific site: • site:www.someaddr.com search_terms – Use Google to search group or blog postings
  • 11. Tool: Tool: – Google operators Google Advanced Operators AND: “+” OR: “|” Synonym: “~” site:www.jeffersonwells.com inurl:robots.txt link:www.jeffersonwells.com intitle:“jefferson wells” filetype:xls
  • 12. Tool: Tool: NSLOOKUP • Queries Domain Name Server information – IP and Domain Name Mapping – Zone Transfer – Dumps entire table – Check mail server
  • 13. Tool: Tool: NSLOOKUP • Zone Transfer – Dumps entire table $ nslookup > server = A.B.C.D > ls somedomain.com
  • 14. Tool: Tool: NSLOOKUP • MX record $ nslookup > set type = MX > somedomain.com
  • 18. Tool: Tool: How Traceroute work 1. Launch a probe packet towards DST, with a TTL of 1 2. Every router hop decrements the IP TTL of the packet by 1 3. When the TTL hits 0, packet is dropped, router sends ICMP TTL Exceed packet to SRC with the original probe packet as payload 4. SRC receives this ICMP message, displays a traceroute “hop” 5. Repeat from step 1, with TTL incremented by 1 each time, until.. 6. DST host receives probe, returns ICMP Dest Unreachable
  • 19. Tool: Tool: Traceroute Report Hop • Traceroute packet with TTL of 1 enters router via the ingress interface. • Router decrements TTL to 0, drops packet, generates ICMP TTL Exceed – ICMP packet dst address is set to the original traceroute probe source (SRC) – ICMP packet src address is set to the IP of the ingress router interface – Traceroute shows a result based on the src address of the ICMP packet – The above traceroute will read:172.16.2.1 10.3.2.2 – You have NO visibility into the return path or the egress interface used
  • 20. Tool: Tool: Traceroute Latency Calculation • How is traceroute latency calculated? – Timestamp when the probe packet is launched – Timestamp when the ICMP response is received – Calculate the difference to determine round-trip time – Routers along the path donot do anytime “processing” • They simply reflect the original packet’s data back to the SRC • Many implementations encode the original launch timestamp into the probe packet, to increase accuracy and reduce state – Most Importantly: only the ROUNDTRIP is measured • Traceroute is showing you the hops on the forward path • But showing you latency based on the forward PLUS reverse path. Any delays on the reverse path will affect your results!
  • 21. Tool: Tool: Interprete Traceroute DNS • Interpreting DNS is one of the most important aspects of correctly using traceroute • Information you can uncover includes: – Physical Router Locations – Interface Types and Capacities – Router Type and Roles – Network Boundaries and Relationships
  • 22. Tool: Tool: Traceroute Reading Tips • Router’s name may include Exchange Point – MAE, NAP, PAIX • Router names may be the IATA 3-letter code of the nearest airport or CLLI code in their node name • Other abbreviation – http://www.sarangworld.com/TRACEROUTE/showdb-2.php3 • Interface name
  • 23. Tool: Tool: Router Type/Role • Knowing the role of a router can be useful • But every network is different, and uses different naming conventions • May not always follow naming rules • Generally speaking, May need guessing the context and get a basic understanding of the roles – Core routers–CR, Core, GBR, BB – Peering routers–BR, Border, Edge, IGR, Peer – Customer routers–AR, Aggr, Cust, CAR, GW
  • 24. Tool: Tool: DNS Interface type • Most networks will try to put interface info into DNS • Though this many not always be up to date • Many large networks use automatically generated DNS • As well as capacity, and maybe even the make/model of router • Examples: – xe-11-1-0.edge1.Washington1.Level2.net • XE-#/#/# is Juniper 10GE port. The device has at least 12 slots • It’s at least a 40G/slot router since it has a 10GE PIC in slot 1 • It must be Juniper MX960, no other device could fit this profile
  • 25. Tool: Tool: Sample Traceroute $ traceroute www.hellers.com $ traceroute www.mit.edu
  • 26. Identifying Active Machines • Attackers will want to know if machines are alive before they attempt to attack. One of the most basic methods of identifying active machines is to perform a sweep • Common Tools – ping, traceroute – Network scanning tools • nmap, superscan
  • 27. Finding Open Ports • Open services • Common tools – Port scanning tools • nmap, superscan
  • 28. OS Fingerprinting • Passive fingerprint – Sniffing technique – Examine packets for certain characteristics such as • The IP TTL value • The TCP Window Size • The IP DF Option • The IP Type of Service (TOS) Option • Active Fingerprint – Injects the packets into the network – Examines the subtle differences that exist between different vendor implementations of the TCP/IP stack – Common tools : nmap
  • 29. Mapping the Network • Gained enough information to build network map • Network mapping provides the hacker with a blueprint of the organization. • May use manual or automated ways to compile this information
  • 30. Summary Method Technique Common Tools Information gathering Passive Whois, nslookup Determining network range Passive RIPE, LACNIC, APNIC, ARIN Identify active machines Active ping, hping, traceroute, nmap, SuperScan Finding open ports/applications Active nmap, Amap, SuperScan OS fingerprinting Active/passive nmap, Winfigerprint, P0f, Xprobe2, ettercap Mapping the network Active CartoReso, traceroute, NeoTrace