port scanners

22
mation Networking Security and Assurance Lab nal Chung Cheng University 1 Port Scanners

Upload: oneida

Post on 12-Jan-2016

48 views

Category:

Documents


0 download

DESCRIPTION

Port Scanners. Introduction. The first step in the process of hacking Discover the services Version label Operation System Send few packets to the host. Pre Study. TCP Packet Header. TCP conversation. Connect. Disconnect. Client. Server. Client. Server. SYN. FIN. SYN/ACK. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University

1

Port Scanners

Page 2: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 2

Introduction

The first step in the process of hackingDiscover the servicesVersion labelOperation System

Send few packets to the host

Page 3: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 3

Pre Study

TCP Packet Header

Page 4: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 4

TCP conversation

Client Server

SYN

SYN/ACK

ACK

Connection Established

Client Server

FIN

ACK/FIN

ACK

Connection Closed

Connect Disconnect

Three-way handshake

Page 5: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 5

TCP Flag Definitions

Flag

SYN The beginning of a connection

ACK Acknowledge receipt of a previous packet or transmission

FIN Close a TCP connection

RST Abort a TCP connection

Page 6: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 6

Scanning for Hosts

Is the host alive ?Method

Pingnmap –sP 192.168.0.1

TCP Pingnmap –sT 192.168.0.1

Page 7: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 7

Scanning for TCP Ports

TCP connectnmap –sT 192.168.0.1

RPC servicenmap –sR 192.168.0.1

Page 8: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 8

SYN Scan

Nmap sends to Host Port

Nmap receives from Host Port

Nmap Assumes

SYN SYN/ACK Port is open

Host is up

SYN RST Port is closed

Host is up

SYN Nothing Port is blocked by firewall

Or Host is down

Nmap –sS <target host>

Page 9: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 9

ACK Scan

Nmap sends to Host Port

Nmap receives from Host Port

Nmap Assumes

ACK RST Port is not firewall-protect

Port may be open or closed

Host is up

ACK Nothing or ICMP unreachable

Port is blocked by firewall if host is up

No firewall~

Protected by firewall~

Nmap –sA <target host>

Page 10: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 10

FIN Scan

Connect

Nmap sends to Host Port

Nmap receives from Host Port

Nmap Assumes

FIN RST Port is closed Host is up

FIN Nothing Port is open if host is up and not firewall-protected

Nmap –sF <target host>

Page 11: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 11

Xmas Scan

Non-normal TCP operationSet the flags FIN,URG,PUSHWith –sX

Nmap –sX <target host>

Page 12: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 12

Null scan

Turn off all flags

With -sN

Nmap –sN <target host>

Page 13: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 13

Scanning for UDP Ports

Nmap sends to Host Port

Nmap receives from Host Port

Nmap Assumes

Empty UDP packet

Nothing Port assumed open if host responds to Ping.

Port may be closed if firewall blocking ICMP

Empty UDP packet

ICMP unreachable Port is closed

Nmap –sU <target host>

Page 14: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 14

Scanning for Protocol

IP HeaderNmap –sO <target host>

Page 15: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 15

DecoysFragmentation

Hiding Your Scan

(-D) (-r)(-f)

Nmap –sS –f <target host>

With –sS –sF –sN -sX

FTP Bounce

Nmap –b anonymous@<ftp server> –p <targer port> <target host>Nmap –D <spoof host> <target host>

Disable Randomizing Ports

Nmap –r <target host>

Page 16: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 16

Timing Your Scan

Time-based algorithmUsing -T option

Nmap –T <name> <target host>

name Probe Response Timeout

Time Spent on One Host

Time between Probes

Use Parallelized Probes

Paranoid 5 min Unlimited 5 min No

Sneaky 15 sec Unlimited 12 sec No

Polite 6 sec Unlimited 0.4 sec No

Normal 6 sec Unlimited None No

Aggressive 1 sec 5 min None Yes

Insane 0.3 sec 75 sec None Yes

Page 17: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 17

TCP Reverse Ident Scanning

Who runs the process (-I)

Nmap –I <target host>

Page 18: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 18

OS Fingerprinting

With –O flag

Sending specially TCP and UDP headers

Analyze the result and compare information

OS information

Page 19: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 19

OS Detection on Linux

Nmap –O 192.168.0.1

Page 20: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 20

Mapping Networks

Scanning a Class C subnet

Page 21: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 21

Mapping Networks

Port scans in IP section

Page 22: Port Scanners

Information Networking Security and Assurance LabNational Chung Cheng University 22

Scanning Tools on windows

NetscantoolsSuperscanIPEYEWUPS