footprinting scanning and enumeration
play

Footprinting, Scanning, and Enumeration Philip Robbins September - PowerPoint PPT Presentation

ISA 330 Introduction to Proactive System Security Week #3 Footprinting, Scanning, and Enumeration Philip Robbins September 28, 2013 Information Security & Assurance Program University of Hawai'i West Oahu 1 Footprinting, Scanning, and


  1. Scanning • nmap –A –v 192.168.56.101 (against MS2) 71

  2. Scanning • nmap 192.168.56.102 (against BT5R3) 72

  3. Scanning • nmap –sS ‐v 192.168.56.101 (against MS2) 73

  4. Scanning • nmap –sS ‐v 192.168.56.100‐200 (range) 74

  5. Reconnaissance • Unicornscan Conduct tests on large networks and consolidate tools for large‐scale endeavors. ‐ Ideal for large networks. ‐ Scans 65,535 ports in 3‐7 seconds. ‐ Port scanning using TCP, ICMP, and IP. ‐ Optimizes UDP scanning. 75

  6. Reconnaissance • fping A command‐line tool that allows you to ping multiple IP addresses simultaneously (determining which computers are “live”). 76

  7. Reconnaissance • fping ‐h ping vs fping: specify a range 77

  8. Reconnaissance • hping Allows you to ping sweep multiple IP addresses simultaneously while bypassing filtering devices (using modified IP packets). 78

  9. Reconnaissance • hping3 –h | less 79

  10. Reconnaissance • hping3 –h | less 80

  11. Reconnaissance • hping3 –h | less set flags just like nmap… 81

  12. Enumeration ‐ Next step after port scanning. ‐ Actually connecting to the system and obtaining information about users, passwords, and shared resources. ‐ Active / intrusive v.s. Passive 82

  13. REVIEW: OS Vulnerabilities • Network Basic Input / Output System (NetBIOS) ‐ OSI Session Layer 5. ‐ Software that allows us to interact with a shared network resources or devices. ‐ NetBIOS frees an application from understanding the details of a network. ‐ Still used today for ensuring backward capability. ‐ Uses ports open to the internet: UDP/137 UDP/138 TCP/139 83

  14. REVIEW: OS Vulnerabilities • Network Basic Input / Output System (NetBIOS) Why is NetBIOs over TCP/IP considered a security risk again? 84

  15. REVIEW: OS Vulnerabilities • Network Basic Input / Output System (NetBIOS) Why is NetBIOs over TCP/IP considered a security risk again? 85

  16. Enumeration • Network Basic Input / Output System (NetBIOS) ‐ Names have 16 char limit; 15 useable char limit. ‐ Last char reserved for service identification (00 to FF). ‐ Hackers attack Domain Controllers because of the type of info. ‐ Null Sessions (NS) is a serious vulnerability for NetBIOS systems. ‐ NS still present on Windows XP ‐ NS disabled by default in Windows Server 2003 ‐ NS not available in Windows Vista and Server 2008 ‐ NBTstat command used. 86

  17. Enumeration 87

  18. Enumeration 88

  19. Enumeration • NBTscan NetBIOS over TCP/IP scan finds computers running NETBIOS. 89

  20. Enumeration • NBTscan 90

  21. Enumeration • nbtstat 91

  22. Enumeration • nbtstat ‐a 92

  23. Enumeration • net view Displays a list of domains, computers, or resources that are being shared by the specified computer. Used without parameters, net view displays a list of computers in your current domain. 93

  24. Enumeration • net view 94

  25. Enumeration • net view 95

  26. Enumeration • net use Connects a computer to or disconnects a computer from a shared resource, or displays information about computer connections. Used without parameters, net use retrieves a list of network connections. 96

  27. Enumeration • net use 97

  28. Enumeration • DumpSec Enumeration tool for Windows systems allowing users to connect to a server and “dump” permissions for shares. It dumps the permissions (DACLs) and audit settings (SACLs) for the file system, registry, printers and shares. 98

  29. Enumeration • DumpSec 99

  30. Enumeration • smb4K Used to enumerate Windows computers on a network. 100

Recommend


More recommend