footprinting scanning and enumeration
play

Footprinting, Scanning, and Enumeration Philip Robbins September - PowerPoint PPT Presentation

ISA 330 Introduction to Proactive System Security Week #3 Footprinting, Scanning, and Enumeration Philip Robbins September 28, 2013 Information Security & Assurance Program University of Hawai'i West Oahu 1 Footprinting, Scanning, and


  1. Scanning • nmap –A –v 192.168.56.101 (against MS2) 71

  2. Scanning • nmap 192.168.56.102 (against BT5R3) 72

  3. Scanning • nmap –sS ‐v 192.168.56.101 (against MS2) 73

  4. Scanning • nmap –sS ‐v 192.168.56.100‐200 (range) 74

  5. Reconnaissance • Unicornscan Conduct tests on large networks and consolidate tools for large‐scale endeavors. ‐ Ideal for large networks. ‐ Scans 65,535 ports in 3‐7 seconds. ‐ Port scanning using TCP, ICMP, and IP. ‐ Optimizes UDP scanning. 75

  6. Reconnaissance • fping A command‐line tool that allows you to ping multiple IP addresses simultaneously (determining which computers are “live”). 76

  7. Reconnaissance • fping ‐h ping vs fping: specify a range 77

  8. Reconnaissance • hping Allows you to ping sweep multiple IP addresses simultaneously while bypassing filtering devices (using modified IP packets). 78

  9. Reconnaissance • hping3 –h | less 79

  10. Reconnaissance • hping3 –h | less 80

  11. Reconnaissance • hping3 –h | less set flags just like nmap… 81

  12. Enumeration ‐ Next step after port scanning. ‐ Actually connecting to the system and obtaining information about users, passwords, and shared resources. ‐ Active / intrusive v.s. Passive 82

  13. REVIEW: OS Vulnerabilities • Network Basic Input / Output System (NetBIOS) ‐ OSI Session Layer 5. ‐ Software that allows us to interact with a shared network resources or devices. ‐ NetBIOS frees an application from understanding the details of a network. ‐ Still used today for ensuring backward capability. ‐ Uses ports open to the internet: UDP/137 UDP/138 TCP/139 83

  14. REVIEW: OS Vulnerabilities • Network Basic Input / Output System (NetBIOS) Why is NetBIOs over TCP/IP considered a security risk again? 84

  15. REVIEW: OS Vulnerabilities • Network Basic Input / Output System (NetBIOS) Why is NetBIOs over TCP/IP considered a security risk again? 85

  16. Enumeration • Network Basic Input / Output System (NetBIOS) ‐ Names have 16 char limit; 15 useable char limit. ‐ Last char reserved for service identification (00 to FF). ‐ Hackers attack Domain Controllers because of the type of info. ‐ Null Sessions (NS) is a serious vulnerability for NetBIOS systems. ‐ NS still present on Windows XP ‐ NS disabled by default in Windows Server 2003 ‐ NS not available in Windows Vista and Server 2008 ‐ NBTstat command used. 86

  17. Enumeration 87

  18. Enumeration 88

  19. Enumeration • NBTscan NetBIOS over TCP/IP scan finds computers running NETBIOS. 89

  20. Enumeration • NBTscan 90

  21. Enumeration • nbtstat 91

  22. Enumeration • nbtstat ‐a 92

  23. Enumeration • net view Displays a list of domains, computers, or resources that are being shared by the specified computer. Used without parameters, net view displays a list of computers in your current domain. 93

  24. Enumeration • net view 94

  25. Enumeration • net view 95

  26. Enumeration • net use Connects a computer to or disconnects a computer from a shared resource, or displays information about computer connections. Used without parameters, net use retrieves a list of network connections. 96

  27. Enumeration • net use 97

  28. Enumeration • DumpSec Enumeration tool for Windows systems allowing users to connect to a server and “dump” permissions for shares. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares. 98

  29. Enumeration • DumpSec 99

  30. Enumeration • smb4K Used to enumerate Windows computers on a network. 100

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend