deel chapter 3
							parent
							
								
									d5287c4f1b
								
							
						
					
					
						commit
						a8e8bfa879
					
				| 
						 | 
				
			
			@ -1 +1,99 @@
 | 
			
		|||
# Scanning
 | 
			
		||||
 | 
			
		||||
* learn more about targets
 | 
			
		||||
* find potential attack openings
 | 
			
		||||
    * addresses of live hosts
 | 
			
		||||
    * network topologies
 | 
			
		||||
    * OSs of hosts
 | 
			
		||||
    * open ports
 | 
			
		||||
    * services running on hosts
 | 
			
		||||
 | 
			
		||||
## Network tracing
 | 
			
		||||
 | 
			
		||||
### IPv4 and IPv6
 | 
			
		||||
 | 
			
		||||
* important IPv4 headers
 | 
			
		||||
    * **TTL**: time to live
 | 
			
		||||
        * tells us how many hops a package needed to make
 | 
			
		||||
    * source and destination IP
 | 
			
		||||
* IPv6 properties
 | 
			
		||||
    * 128 bit addresses
 | 
			
		||||
    * simpler than IPv4
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||

 | 
			
		||||

 | 
			
		||||
 | 
			
		||||
### tracing
 | 
			
		||||
 | 
			
		||||
* discover routes that packets take between systems
 | 
			
		||||
    * allows constructing network diagrams
 | 
			
		||||
* sends ICMP/UDP/TCP packets with varying TTL
 | 
			
		||||
* requires routers to properly report dropped packets
 | 
			
		||||
    * often disabled for performance/security reasons
 | 
			
		||||
* `traceroute` useful tool
 | 
			
		||||
* web-based [tools](https://tools.keycdn.com/traceroute) also available
 | 
			
		||||
 | 
			
		||||
## Scanning
 | 
			
		||||
 | 
			
		||||
* Nmap does it all
 | 
			
		||||
 | 
			
		||||
### TCP
 | 
			
		||||
 | 
			
		||||
* 16-bit ports
 | 
			
		||||
* sequence and ack number for reliable in-order delivery
 | 
			
		||||
* control bots track state
 | 
			
		||||
    * **URG**: urgent flag
 | 
			
		||||
    * **ACK**: acknowledge earlier packets
 | 
			
		||||
    * **PSH** (push): data should not be buffered
 | 
			
		||||
    * **RST**: reset connection
 | 
			
		||||
    * **SYN**: synchronisation, sends initial sequence number
 | 
			
		||||
    * **FIN**: indicate session can be closed
 | 
			
		||||
* half-open port scanning
 | 
			
		||||
    * only send SYN part of handshake
 | 
			
		||||
    * listen for response
 | 
			
		||||
        * SYN + ACK: port open
 | 
			
		||||
        * RST + ACK: port closed or blocked
 | 
			
		||||
        * ICMP port unreachable: likely blocked
 | 
			
		||||
        * no response: likely blocked
 | 
			
		||||
    * can take a while if no responses are sent
 | 
			
		||||
* large scans are bad
 | 
			
		||||
    * limit scope of scan
 | 
			
		||||
        * select subset of targets
 | 
			
		||||
        * only scan well-known ports initially
 | 
			
		||||
        * limit scan based on firewall information
 | 
			
		||||
    * temporarily tweak firewall to speed up scans
 | 
			
		||||
    * use parallel machines (be careful not to DoS)
 | 
			
		||||
    * scanrand & zmap tools
 | 
			
		||||
 | 
			
		||||

 | 
			
		||||
 | 
			
		||||
### UDP
 | 
			
		||||
 | 
			
		||||
* send empty UDP datagram and listen
 | 
			
		||||
    * UDP packet response: something is listening on target port
 | 
			
		||||
    * ICMP port unreachable: likely blocked
 | 
			
		||||
    * no response: multiple options
 | 
			
		||||
        * port is blocked by firewall
 | 
			
		||||
        * port only responds to specific format
 | 
			
		||||
 | 
			
		||||
### ARP
 | 
			
		||||
 | 
			
		||||
* Address Resolution Protocol
 | 
			
		||||
    * data link layer
 | 
			
		||||
    * translates IPv4 addresses to MAC addresses
 | 
			
		||||
    * scan local subnet for hosts
 | 
			
		||||
    * lots of traffic
 | 
			
		||||
    * can be detected by network intrusion detection systems (NIDS)
 | 
			
		||||
 | 
			
		||||
### ICMP
 | 
			
		||||
 | 
			
		||||
* Internet Control Message Protocol
 | 
			
		||||
* used for diagnostic purposes
 | 
			
		||||
    * error reporting
 | 
			
		||||
    * router discovery
 | 
			
		||||
    * redirect messages
 | 
			
		||||
* ping sweeps
 | 
			
		||||
* traceroute
 | 
			
		||||
* redirect messages expose network topology
 | 
			
		||||
* ICMP address mask requests: determine subnet used by target host
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
										
											Binary file not shown.
										
									
								
							| 
		 After Width: | Height: | Size: 75 KiB  | 
										
											Binary file not shown.
										
									
								
							| 
		 After Width: | Height: | Size: 16 KiB  | 
										
											Binary file not shown.
										
									
								
							| 
		 After Width: | Height: | Size: 67 KiB  | 
		Loading…
	
		Reference in New Issue