Hacking Module 03
Hacking Module 03
2008 Batch-I
Module III
Scanning
Scenario
Jack and Dave were colleagues. It was Jack’s
idea to come up with an e-business company.
However, conflicts in ideas saw them split
apart. Now, Dave heads a Venture-Capital
funded e-business start-up company. Jack felt
cheated and wanted to strike back at Dave’s
company.
He knew that due to intense pressure to get
to market quickly, these start-ups often build
their infrastructures too fast to give security the
thought it deserves.
• Do you think that Jack is correct in his
assumption?
• What information does Jack need to launch
an attack on Dave’s company?
• Can Jack map the entire network of the
company without being traced back?
Module Objectives
Definition of scanning
Objectives of scanning
Scanning techniques
Scanning tools
OS fingerprinting
Countermeasures
Module Flow
Fingerprint OS
Surf anonymously
Scanning – Various Classifications
FIN
FTP Bounce Scan
List Scan
• This type of scan simply generates and prints a list of
IPs/Names without actually pinging or port scanning
them.
• A DNS name resolution will also be carried out.
Idle Scan
• This advanced scan method will allow for a truly
blind TCP port scan of the target.
• It is extraordinarily stealthy in nature.
RPC Scan
http://www.securityconfig.com/
Retina network security scanner is a network
vulnerability assessment scanner.
It can scan every machine on the target network
including a variety of operating system
platforms, networking devices, databases and
third party or custom applications.
It has the most comprehensive and up-to-date
vulnerability database and scanning technology.
Retina: Screenshot
Features
Ease of use
Non-intrusive scanning
Frequent updates of new vulnerabilities
Rogue wireless access detection
Ability to uncover unknown vulnerabilities
High speed scanning capability
Superior OS detection
SAINT
http://www.saintcorporation.com/
It is also
known as Security
Administrator's Integrated
Network Tool.
Detects network
vulnerabilities on any remote
target in a non-intrusive
manner.
Gathers information
regarding what type of OS is
running and what all ports
are open.
Features
Data management
Scan configuration
Scan scheduling
Data analysis
Interface engines to discover vulnerabilities
Reports are presented in plain text format.
HPING2
Firewall testing
Advanced port scanning
Network testing, using different protocols, TOS,
fragmentation
Advanced Traceroute, under all the supported
protocols
Remote OS fingerprinting
Remote uptime guessing
TCP/IP stacks auditing
Tool: Firewalk
internet
Hop n
www.microsoft.com
IPSecScan is a tool that can scan either a single IP address or a range
of IP addresses looking for systems that are IPSec enabled.
NetScan Tools Pro 2003
www.netscantools.com/
NetScan determines ownership of IP addresses, translation of IP addresses to
hostnames, network scanning, port probe target computers for services, validate e-mail
addresses, determine ownership of domains, list the computers in a domain, etc.
SuperScan
http://www.globalshareware.com/Utilities/System-Utilities/SuperScan.htm
SuperScan is a TCP port scanner, pinger and hostname resolver. It can
perform ping scans, port scans using any IP range, and scan any port range
from a built-in list or specified range.
War Dialer
•http://www.kilievich.com/fpinger/download.htm
It is a powerful and user-friendly application for network administration, monitoring
and inventory. It can be used for pinging of all devices in parallel, at once, and in
assignment of external commands (like telnet, tracert, net.exe) to devices.
Cheops
cheops-ng.sourceforge.net/download.php
It is a network management tool that can be used for OS detection, mapping, to find
out the list of services running on a network, generalized port scanning, etc.
SATAN(Security Administrator’s Tool
for Analyzing Networks)
Security Administrator’s Tool for Analyzing Networks.
Security-auditing tool developed by Dan Farmer and
Weitse Venema.
Examines UNIX-based systems and reports the
vulnerabilities.
Provides information about the software, hardware, and
network topologies.
User-friendly program with an X Window interface.
Written using C and Perl languages. Thus, to run
SATAN, the attacker needs Perl 5 and a C compiler
installed on the system.
In addition, the attacker needs a UNIX-based operating
system and at least 20MB of disk space.
SAFEsuite Internet Scanner,
IdentTCPScan
SAFEsuite Internet Scanner
• Developed by Internet Security Systems (ISS) to examine the
vulnerabilities in Windows NT networks.
• Requirements are Windows NT 3.51, or 4.0 and a product
license key.
• Reports all possible security gaps on the target system.
• Suggests possible corrective actions.
• Uses three scanners: Intranet, Firewall and Web Scanner.
IdentTCPScan
• Examines open ports on the target host and reports the services
running on those ports.
• A special feature that reports the UIDs of the services.
PortScan Plus, Strobe
PortScan Plus
• Windows-based scanner developed by Peter
Harrison
• The user can specify a range of IP addresses and
ports to be scanned
• When scanning a host, or a range of hosts, it displays
the open ports on those hosts
Strobe
• A TCP port scanner developed by Julian Assange
• Written in C for UNIX-based operating systems
• Scans all open ports on the target host
• Provides only limited information about the host
Blaster Scan
Activefingerprinting
Passive fingerprinting
Active Stack Fingerprinting
XPROBE2
A remote OS detection tool which determines the OS
running on the target system with minimal target
disturbance.
RING V2
http://www.sys-security.com/
Designed with a different approach to OS detection, this
tool identifies the OS of the target system with a matrix
based fingerprinting approach.
Most of the port scanning tools like Nmap are used for
active stack fingerprinting
Passive Fingerprinting
(1)
DIRECT ATTACK/ NO PROXIES
Logged proxy
VICTIM
PROXY
CHAIN OF PROXIES
ATTACKER
(3)
P1 P2 P3 P4
P7 P8 P8 P9
SocksChain
http://www.sharewaresoft.com/SocksChain-download-14819.htm
Bypasses the3.
security line
www.proxify.com
http://www.htthost.com/
It allows the bypassing of an HTTP proxy, which blocks
access to the Internet. With HTTPort the following
software maybe used (from behind an HTTP proxy):
e-mail, IRC, ICQ, news, FTP, AIM, any SOCKS capable
software, etc.
Countermeasures