Week 31 - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Week 31

Description:

Once you have the target host or network IP range next step is find ... Hacking Tool: HTTrack Web Copier. Week 3-10. Week 3: Scanning. Network Management Tools ... – PowerPoint PPT presentation

Number of Views:64
Avg rating:3.0/5.0
Slides: 17
Provided by: dicks1
Learn more at: http://www.ecs.csus.edu
Category:
Tags: copier | week

less

Transcript and Presenter's Notes

Title: Week 31


1
Week 3 Scanning
  • Determine if system is alive
  • Determine which services are running or listening
  • Determine the OS

2
Week 3 Scanning
  • Determining if the system is alive?
  • Once you have the target host or network IP range
    next step is find out if the system is up.

3
Week 3 Scanning
  • Detecting the type of OS involves
  • Active stack fingerprinting
  • Send pkt to target and check response. Type of
    response will tell help guess OS.
  • Passive stack fingerprinting
  • Monitor ntwk traffic to determine OS

4
Week 3 Scanning
  • Hacking Tool Pinger
  • Hacking Tool WS_Ping_Pro
  • Hacking Tool Netscan Tools Pro 2000
  • Hacking Tool Hping2
  • Hacking Tool icmpenum

5
Week 3 Scanning
  • Detecting Ping sweeps
  • ICMP Queries

6
Week 3 Scanning
  • Hacking Tool netcraft.com
  • Port Scanning

7
Week 3 Scanning
  • TCPs 3-way handshake
  • TCP Scan types

8
Week 3 Scanning
  • Hacking Tool IPEye
  • Hacking Tool IPSECSCAN
  • Hacking Tool nmap

9
Week 3 Scanning
  • Port Scan countermeasures
  • Hacking Tool HTTrack Web Copier

10
Week 3 Scanning
  • Network Management Tools
  • SolarWinds Toolset

11
Week 3 Scanning
  • NeoWatch
  • War Dialing

12
Week 3 Scanning
  • Hacking Tool THC-Scan
  • Hacking Tool PhoneSweep War Dialer
  • Hacking Tool Queso
  • Hacking Tool Cheops

13
Week 3 Scanning
  • Proxy Servers
  • Hacking Tool SocksChain
  • Surf the web anonymously
  • TCP/IP through HTTP Tunneling

14
Week 3 Scanning
  • Hacking Tool HTTPort

15
Week 3 Scanning
  • Summary

16
Some Uses of Port Scanning
  • Network Inventory
  • Want to know IP addresses of all your servers?
  • Want to how many machines are running?
  • Ntwk/Svr Optimization
  • Can find which svcs are running on each server
    and delete which services you dont need to
    improve security and performance
  • Finding Spyware, Trojans, and Worms
  • Eg. Many well known trojans use large port s.
    For Back Orifice uses 54321
  • Looking for unauthorized and Illicit services
Write a Comment
User Comments (0)
About PowerShow.com