deel chapter 3
parent
d5287c4f1b
commit
a8e8bfa879
|
@ -1 +1,99 @@
|
|||
# Scanning
|
||||
|
||||
* learn more about targets
|
||||
* find potential attack openings
|
||||
* addresses of live hosts
|
||||
* network topologies
|
||||
* OSs of hosts
|
||||
* open ports
|
||||
* services running on hosts
|
||||
|
||||
## Network tracing
|
||||
|
||||
### IPv4 and IPv6
|
||||
|
||||
* important IPv4 headers
|
||||
* **TTL**: time to live
|
||||
* tells us how many hops a package needed to make
|
||||
* source and destination IP
|
||||
* IPv6 properties
|
||||
* 128 bit addresses
|
||||
* simpler than IPv4
|
||||
|
||||
|
||||

|
||||

|
||||
|
||||
### tracing
|
||||
|
||||
* discover routes that packets take between systems
|
||||
* allows constructing network diagrams
|
||||
* sends ICMP/UDP/TCP packets with varying TTL
|
||||
* requires routers to properly report dropped packets
|
||||
* often disabled for performance/security reasons
|
||||
* `traceroute` useful tool
|
||||
* web-based [tools](https://tools.keycdn.com/traceroute) also available
|
||||
|
||||
## Scanning
|
||||
|
||||
* Nmap does it all
|
||||
|
||||
### TCP
|
||||
|
||||
* 16-bit ports
|
||||
* sequence and ack number for reliable in-order delivery
|
||||
* control bots track state
|
||||
* **URG**: urgent flag
|
||||
* **ACK**: acknowledge earlier packets
|
||||
* **PSH** (push): data should not be buffered
|
||||
* **RST**: reset connection
|
||||
* **SYN**: synchronisation, sends initial sequence number
|
||||
* **FIN**: indicate session can be closed
|
||||
* half-open port scanning
|
||||
* only send SYN part of handshake
|
||||
* listen for response
|
||||
* SYN + ACK: port open
|
||||
* RST + ACK: port closed or blocked
|
||||
* ICMP port unreachable: likely blocked
|
||||
* no response: likely blocked
|
||||
* can take a while if no responses are sent
|
||||
* large scans are bad
|
||||
* limit scope of scan
|
||||
* select subset of targets
|
||||
* only scan well-known ports initially
|
||||
* limit scan based on firewall information
|
||||
* temporarily tweak firewall to speed up scans
|
||||
* use parallel machines (be careful not to DoS)
|
||||
* scanrand & zmap tools
|
||||
|
||||

|
||||
|
||||
### UDP
|
||||
|
||||
* send empty UDP datagram and listen
|
||||
* UDP packet response: something is listening on target port
|
||||
* ICMP port unreachable: likely blocked
|
||||
* no response: multiple options
|
||||
* port is blocked by firewall
|
||||
* port only responds to specific format
|
||||
|
||||
### ARP
|
||||
|
||||
* Address Resolution Protocol
|
||||
* data link layer
|
||||
* translates IPv4 addresses to MAC addresses
|
||||
* scan local subnet for hosts
|
||||
* lots of traffic
|
||||
* can be detected by network intrusion detection systems (NIDS)
|
||||
|
||||
### ICMP
|
||||
|
||||
* Internet Control Message Protocol
|
||||
* used for diagnostic purposes
|
||||
* error reporting
|
||||
* router discovery
|
||||
* redirect messages
|
||||
* ping sweeps
|
||||
* traceroute
|
||||
* redirect messages expose network topology
|
||||
* ICMP address mask requests: determine subnet used by target host
|
||||
|
|
Binary file not shown.
After Width: | Height: | Size: 75 KiB |
Binary file not shown.
After Width: | Height: | Size: 16 KiB |
Binary file not shown.
After Width: | Height: | Size: 67 KiB |
Loading…
Reference in New Issue