Scanning
Scanning
Scanning Steps
Network Sweeping
●
Network Tracing
●
Port Scanning
●
OS Fingerprinting
●
Version Scanning
●
Vulnerability Scanning
●
2
Scanning
TIPS
●
3
Sniffers
●
TCPDUMP
–tcpdump -nn -X -v -i eth0 -s0
–tcpdump -nn {tcp|udp|icmp|arp|ip} {and|or|not} {port} {and|or|not}
{dst|src|host} 8.8.8.8
–tcpdump -nn tcp and port 21 and host 10.0.2.5 -i eth0 -s0 -w ftp.pcapng
4
Network Sweeping
●
NMAP do host discovery through ARP(local),
ICMP(root), TCP SYN port 443, TCP ACK port 80.
–nmap -n -sn 8.8.8.8
5
Network Tracing
6
Port Scanning
7
Port Scanning
TCP Behavior
●
–send=SYN, recieve=SYN-ACK
Port Open
●
–send=SYN, recieve=RST-ACK
Port Close
●
–send=SYN, recieve=ICMP-Port-Unreachable
–send=SYN, recieve=Nothing
UDP Behavior
●
–send=UDP, recieve=UDP
Port Open
●
–send=UDP, recieve=ICMP-Port-Unreachable
–send=UDP, recieve=Nothing
●
Port Close OR Blocked by Firewall OR Port Open but it
is looking for specific data in UDP payload
Nmap result => (Open|Filtered)
●
9
Port Scanning
Special options
●
OS Fingerprinting
●
–nmap -O 8.8.8.8
Version Scanning
●
11
Vulnerability Scanning
–ls /usr/share/nmap/scripts/
Nessus
●
–https://www.tenable.com/downloads/nessus
–dpkg -i Nessus-6.9.4-debian6_amd64.deb
–https://localhost:8834/
13
Enumerating Users
SMB
●
–NULL Session
–enumdomusers
–queryuser 0x3e8
–Enum4Linux
enum4linux 10.0.2.4
●
SMTP
●
–telnet 192.168.1.104 25
VRFY msfadmin
●
–nc -v 127.0.0.1 21
–timeout 1 nc -v 127.0.0.1 21
Chat using nc
●
Bind shell
●
Reverse shell
●
Ncat
●