Professional Documents
Culture Documents
Scanning Networks
Module 03
Lab Scenario
ICON
KEY
Valuable
information
s
Test your
knowledge
Web exercise
W orkbook review
Lab Objectives
The objective o f diis lab is to help students in conducting network scanning,
analyzing die network vulnerabilities, and maintaining a secure network.
You need to perform a network scan to:
ZZ7 Tools
dem on strated in
this lab are
a va ila b le in
D:\CEHTools\CEHv8
M odule 03
S canning
N etw orks
Lab Environment
111
Lab Duration
Time: 50 Minutes
C E H L ab M an u al P ag e S5
Note that not all vulnerabilities will result in a system compromise. When searching
for known vulnerabilities you will find more issues that disclose sensitive
information or cause a denial o f service condition than vulnerabilities that lead to
remote code execution. These may still turn out to be very interesting on a
penetration test. 111 fact even a seemingly harmless misconfiguration can be the
nuiiing point in a penetration test that gives up the keys to the kingdom.
For example, consider FTP anonymous read access. This is a fairly normal setting.
Though FTP is an insecure protocol and we should generally steer our clients
towards using more secure options like SFTP, using FTP with anonymous read
access does not by itself lead to a compromise. If you encounter an FTP server that
allows anonymous read access, but read access is restricted to an FTP directory that
does not contain any files that would be interesting to an attacker, then die risk
associated with the anonymous read option is minimal. O n die other hand, if you
are able to read the entire file system using die anonymous FTP account, or possibly
even worse, someone lias mistakenly left die customer's trade secrets in die FTP
directory that is readable to die anonymous user; this configuration is a critical issue.
Vulnerability scanners do have their uses in a penetration test, and it is certainly
useful to know your way around a few o f diem. As we will see in diis module, using
a vulnerability scanner can help a penetration tester quickly gain a good deal o f
potentially interesting information about an environment.
111 diis module we will look at several forms o f vulnerability assessment. We will
study some commonly used scanning tools.
Lab Tasks
T AS K 1
O verview
Pick an organization diat you feel is worthy o f your attention. This could be an
educational institution, a commercial company, or perhaps a nonprofit charity.
Recommended labs to assist you in scanning networks:
C E H L ab M an u al P ag e S6
Lab A nalysis
Analyze and document die results related to die lab exercise. Give your opinion on
your targets security posture and exposure duough public and free information.
P L E A S E TA LK T O Y O U R I N S T R U C T O R IF Y OU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
C E H L ab M an u al P ag e 87
KEY
/ = Valuable
information
Test your
knowledge
S Web exercise
CQ W orkbook review
Lab S cenario
this day and age, where attackers are able to wait for a single chance to attack an
organization to disable it, it becomes very important to perform vulnerability
scanning to find the flaws and vulnerabilities in a network and patch them before an
attacker intrudes into the network. The goal o f running a vulnerability scanner is to
identify devices on your network that are open to known vulnerabilities.
111
Lab O bjectives
lJ Tools
dem on strated in
this lab are
a va ila b le in
D:\CEHTools\CEHv8
M odule 03
S canning
N etw orks
The objective o f this lab is to help students perform a local network scan and
discover all the resources 011 die network.
You need to:
111
C E H L ab M an u al P ag e 88
/ 7 Advanced IP Scanner
works on Windows Server
2003/ Server 2008 and on
Windows 7 (32 bit, 64 bit).
Lab D uration
Time: 20 Minutes
O verview o f N e tw o rk Scanning
Network scanning is performed to c o lle c t inform ation about live sy s te m s , open
ports, and n etw ork vulnerabilities. Gathered information is helpful in determining
th reats and vulnerabilities 111 a network and to know whether there are any
suspicious or unauthorized IP connections, which may enable data theft and cause
damage to resources.
Lab Tasks
S TASK 1
Launching
A d van ced IP
S can n er
2. Click A d van ced IP S can n er from die S tart menu in die attacker machine
(Windows 8).
C E H L ab M an u al P ag e 89
Start
A dm in
WinRAR
Mozilla
Firefox
Command
Prompt
it t
Nc m
Computer
m With Advanced IP
Scanner, you can scan
hundreds of IP addresses
simultaneously.
tS
Sports
iiilili
finance
Microsoft
Clip
Organizer
Control
Panel
Fngago
Packet
builder
2*
Advanced
IP Scanner
m
Microsoft
Office 2010
Upload...
C E H L ab M an u al P ag e 90
iik
jf f lc k
10:09 FM J
7. A d van ced IP S can n er scans all die IP addresses within die range and
displays the s c a n resu lts after completion.
C E H L ab M an u al P ag e 91
Lists of computers
saving and loading enable
you to perform operations
with a specific list of
computers. Just save a list
of machines you need and
Advanced IP Scanner loads
it at startup automatically.
Advanced IP Scanner
File Actions Settings View Heip
r=k=3 r f t o
d id 3 ? f i l :
Like us on
1 F a ce b o o k
10.0.0.1- 10.0.0.10
R esits
Favorites |
Status
0
>*
15
Manufacturer
10.0.0.1
&
m Group Operations:
Any feature of Advanced
IP Scanner can be used
with any number of
selected computers. For
example, you can remotely
shut down a complete
computer class with a few
dicks.
IP c
J S c a r' J l
5*iv*, 0
dJ0,
Nlctgear, Inc.
10.0.a1
. .a2
M A C ad d ress
00:09:5B:AE:24CC
W IN -M SSE LC K 4 K 4 1
10 0
D ell Inc
D0:67:ES:1A:16:36
W INDO W S#
10.0.03
M ic r o s o ft C o rp o ra tio n
W IN * L X Q N 3 W R 3 R 9 M
10.0.05
M ic r o s o ft C o rp o ra tio n
00:15:5D:A8:&E:03
W IN -D 39M R 5H 19E 4
10.0.07
Dell Inc
D 1:3E:D9:C3:CE:2D
S unknown
8. You can see in die above figure diat Advanced IP Scanner lias detected
die victim machines IP address and displays die status as alive
T A S K
Extract Victims
IP Address Info
5
F ie
Advanced IP Scanner
A ctions
Scan
Settings
View
Helo
II
*sS :
10.0.011
ip c u u
Like us on
Wi F a ce b o o k
10 .0 .0 . 1- 10 .0 .0.10
Resuts
Favorites |
Status
N am e
10.0 .0.1
IHLMItHMM,
W IN D O W S 8
h i
W IN -L X Q N 3 W R 3
t* p o re
Copy
W IN D39MR5HL<
Add to Favorites'
MAC address
to ru fa c tu re r
Netgear. Inc
0G:09:5B:AE:24CC
M icrosoft Corporation
00:15:U:A8:ofc:Ot>
M ic r o s o ft C o rp o ra tio n
00:15:SD:A8:6E:03
Dell Inc
CW:BE:D9:C3:CE:2D
D0t67:E5j1A:1636
Rescan selected
S ive selected...
W d keO n L A N
S h u t dcw n...
A b o rt s h u t d c w n
Wake-on-LAN: You
can wake any machine
remotely with Advanced IP
Scanner, if Wake-on-LAN
feature is supported by
your network card.
R a d rn ir
5 alive. 0 dead , 5 u n k n o w n
FIGURE 1.7: The Advanced IP Scanner main window with Alive Host list
C E H L ab M an u al P ag e 92
&
m s i *
Shutdown options
Winfingerprint Input
Options:
IP Range (Netmask and
Inverted Netmask
supported) IP ListSmgle
Host Neighborhood
J ! ] . ]
w\ F a ce b o o k
Jse r narre:
Dcss*rord:
110.0.0.1-100.0.10
rn e o c t (sec): [60
Results |
Favorites |
Message:
Status
$
a
jre r
Name
100.0.1
MAC address
00;C9;5B:AE:24;CC
D0:67:E5:1A:16:36
WIN-MSSELCK4K41
WIND0WS8
WIN-LXQN3WR3R9M
WIN-D39MR5HL9E4
It ion
00:15:3C:A0:6C:06
It ion
00:I5:5D:A8:6E:03
D4:BE D$:C3:CE:2D
I Forced shjtdown
f " Reooot
Lab A nalysis
Document all die IP addresses, open ports and dieii running applications, and
protocols discovered during die lab.
T o o l/U tility
A dvanced IP
S canner
C E H L ab M an u al P ag e 93
IP address
System name
MAC address
NetBIOS information
Manufacturer
System status
PL E A S E TALK T O Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
Q uestions
1. Examine and evaluate the IP addresses and range o f IP addresses.
In te rn e t C o n n ectio n R eq u ired
Y es
0 No
P latform S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 94
0 iLabs
KEY
Valuable
information
y*
Test your
knowledge
Web exercise
W orkbook review
Lab Scenario
111 die previous lab, you learned to use Advanced IP Scanner. This tool can also be
used by an attacker to detect vulnerabilities such as buffer overflow, integer flow,
SQL injection, and web application 011 a network. If these vulnerabilities are not
fixed immediately, attackers can easily exploit them and crack into die network and
cause server damage.
Therefore, it is extremely important for penetration testers to be familiar widi
banner grabbing techniques to monitor servers to ensure compliance and
appropriate security updates. Using this technique you can also locate rogue servers
or determine die role o f servers within a network. 111 diis lab, you will learn die
banner grabbing technique to determine a remote target system using ID Serve.
Lab Objectives
The objective o f diis lab is to help students learn to banner grabbing die website and
discover applications running 011 diis website.
111
O Tools
dem on strated in
this lab are
a va ila b le in
D:\CEHTools\CEHv8
M odule 03
S canning
N etw orks
C E H L ab M an u al P ag e 95
Lab Environment
To perform die lab you need:
You can also download the latest version o f ID S e r v e from the link
http: / / w ww.grc.com /id/idserve.htm
Double-click id s e r v e to run ID S e r v e
Lab Duration
Time: 5 Minutes
Overview of ID Serve
ID Serve can connect to any server port on any dom ain or IP address, then pull
and display die server's greeting message, if any, often identifying die server's make,
model, and version, whether it's for FTP, SMTP, POP, NEWS, or anything else.
Lab Tasks
TASK 1
Identify w e b site
se rve r information
2. 111 die main window o f ID S erve show in die following figure, select die
S e v e r Q uery tab
0
ID Serve
ID Serve
Background
Server Query
'-ro
Q & A /H elp
Enter 01 copy / paste an Internet server URL 0* IP address here (example www rmcrosoft com)
ri
r!
Server
If an IP address is
entered instead of a URL,
ID Serve will attempt to
determine the domain
name associated with the
IP
^4
Copy
E*it
C E H L ab M an u al P ag e 96
ID Serve
ID Serve
Background
Server Query
Q & A /tje lp
Enter or copy I paste an Internet serve* URL or IP address here (example www rmcrosoft com)
^
(%
Copy
Ejjit
ID Serve
ID Serve
Background
Server Query
|w w w . c e r t if ie d h a c k e r . c o m |
r2
Q & A /H elp
<T
www
mcrosott com)
Copy
Exit
Lab A nalysis
Document all the IP addresses, their running applications, and die protocols you
discovered during die lab.
C E H L ab M an u al P ag e 97
T o o l/U tility
ID Serve
H T T P /1.1 200
Server: M icrosoft-IIS/6.0
X -Pow ered-B y: PH P/4.4.8
T ran sfer-E n co d in g : chunked
C o n ten t-T y p e: tex t/h tm l
P L E A S E TALK T O Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D TO T H I S LAB.
Q uestions
1. Examine what protocols ID Serve apprehends.
2. Check if ID Serve supports https (SSL) connections.
In te rn e t C o n n ectio n R eq u ired
Yes
0 No
Platform S upported
0 C lassroom
C E H L ab M an u al P ag e 98
0 iLabs
Web exercise
W orkbook review
Lab Scenario
Computers communicate with each other by knowing die IP address in use and
ports check which program to use when data is received. A complete data transfer
always contains the IP address plus the port number required. 111 the previous lab
we found out that die server connection is using a Standard HTTP port 80. If an
attacker finds diis information, he or she will be able to use die open ports for
attacking die machine.
111 this lab, you will learn to use the Amap tool to perform port scanning and know
exacdy what ap plication s are running on each port found open.
Lab Objectives
C 5 Tools
dem on strated in
this lab are
a va ila b le in
D:\CEHTools\CEHv8
M odule 03
S canning
N etw orks
The objective o f diis lab is to help students learn to fingerprint open ports and
discover applications 11 inning on diese open ports.
h i diis lab, you will learn to:
Lab Environment
To perform die lab you need:
You can also download the latest version o f AMAP from the link
http: / / www.thc.org dic-amap.
C E H L ab M an u al P ag e 99
Lab Duration
Time: 5 Minutes
Overview of Fingerprinting
Fingerprinting is used to discover die applications running on each open port found
0 x1 die network. Fingerprinting is achieved by sending trigger p a c k e ts and looking
up die responses in a list o f response strings.
a t TASK
Identify
Application
P rotocols Running
on Port 80
Lab Tasks
1. Open die command prompt and navigate to die Amap directory. 111 diis lab
die Amap directory is located at D:\CEH-Tools\CEHv8 Module 03 Scanning
N etw orks\Banner Grabbing Tools\AMAP
33
[ D : \ C E H ~ T o o l s \ C E H u 8 M o d u l e 0 3 S c a n n i n g N e t w o r k \ B a n n e r G r a b b i n g T o o l s \ A M A P > a n a p uw
[ w . c o r t i f io d h a c h e r .c o m 80
Anap v 5 . 2 <w w w . t b c . o r g / t h c - a m a p > s t a r t e d a t 2 0 1 2 - 0 8 - 2 8 1 2 : 2 0 : 4 2 - MAPPING n o d e
J n id en tifie d
*map v 5 . 2
p orts:
fin ish ed
2 0 2 .? 5 .5 4 .1 0 1 :8 0 /tc p
at
2012-08-28
< to ta l 1>.
12:20:53
3. You can see die specific application protocols running 011 die entered host
name and die port 80.
4. Use die IP a d d ress to check die applications running on a particular port.
5. 111 die command prompt, type die IP address o f your local Windows Server
2008(virtual machine) am ap 10.0.0.4 75-81 (local W indows S erver 2008)
and press Enter (die IP address will be different in your network).
For Amap options,
type amap -help.
C E H L ab M an u al P ag e 100
6. Try scanning different websites using different ranges o f switches like amap
www.certifiedhacker.com 1-200
D : \ C E H - T o o l s \ C E H u 8 M o d u le 0 3 S c a n n i n g N e t w o r k \ B a n n e r G r a b b i n g T oo ls \A M A P > a m a p I f
. 0 . 0 . 4 75-81
laroap 0 5 . 2 <w w w . t h c . o r g / t h c - a n a p ) s t a r t e d a t 2 0 1 2 - 0 8 - 2 8 1 2 : 2 7 : 5 1 - MAPPING mode
P r o t o c o l on 1 0 . 0 _ 0 . 4 : 8 0 / t c p n a t c h e s h t t p
P r o t o c o l on 1 0 . 0 _ 0 . 4 : 8 0 / t c p n a t c h e s h t t p - a p a c h e - 2
W arning: C ould n o t c o n n e c t < u n rea c h a b le > t o 1 0 . 0 . 0 . 4 : 7 6 / t c p ,
KN>
W arn in g:
KN>
W arning:
KN>
W arn in g:
KN>
W arn in g:
KN>
W arning:
KN>
d isa b lin g
port
<EUN
port
<EUN
Could n o t c o n n e c t
1 0 .0 .0 .4 :7 7 /tc p ,
d isa b lin g
port
<EUN
Could n o t c o n n e c t
(u n r ea ch a b le)
1 0 .0 .0 .4 :7 8 /tc p ,
d isa b lin g
port
<EUN
to
1 0 .0 .0 .4 :7 5 /tc p ,
d isa b lin g
C ould n o t c o n n e c t
C ould n o t c o n n e c t
1 0 .0 .0 .4 :7 9 /tc p ,
d isa b lin g
port
<EUN
C ould n o t c o n n e c t
1 0 .0 .0 .4 :8 1 /tc p ,
d isa b lin g
port
<EUN
P r o t o c o l on 1 0 . 0 _ 0 . 4 : 8 0 / t c p
P r o t o c o l on 1 0 . 0 _ 0 . 4 : 8 0 / t c p
U n id e n tified p o rts:
kcp 1 0 .0 .0 .4 : 7 9 / t c p
Linap 0 5 . 2 f i n i s h e d
natches h t t p - i i s
n a t c h e s webmin
1 0 .0 .0 .4 :7 5 /tc p
1 0 .0 .0 .4 :8 1 /tc p
at 2012-08-28
1 0 .0 .0 .4 :7 6 /tc p
< to ta l 6>.
1 0 .0 .0 .4 :7 7 /tc p 1 0 .0 .0 .4 : 7 8 /
12:27:54
b : \ C E H - T o o l s \ C E H v 8 M o d u le 0 3 S c a n n i n g N e t w o r k N B a n n e r G r a b b i n g T o o ls \A M A P >
FIGURE 3.2: Amap with IP address and with range of switches 73-81
Lab A nalysis
Document all die IP addresses, open ports and their running applications, and die
protocols you discovered during die lab.
T o o l/U tility
A m ap
U n id en tified ports:
C E H L ab M an u al P ag e 101
10.0.0.4:75/tcp
10.0.0.4:76/tcp
10.0.0.4:77/tcp
10.0.0.4:78/tcp
10.0.0.4:79/tcp
10.0.0.4:81/tc p
PL E A S E TALK T O Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
Q uestions
1. Execute the Amap command for a host name with a port number other
than 80.
2. Analyze how die Amap utility gets die applications running on different
machines.
3. Use various Amap options and analyze die results.
In te rn e t C o n n ectio n R eq u ired
0 Y es
No
P latform S upported
0 C lassroom
C E H L ab M an u al P ag e 102
iLabs
Web exercise
Workbook review
Lab S cenario
111 the previous lab you learned how to check for open ports using the Amap
tool. As an e th ic a l h a c k e r and p en e tra tio n te s te r , you m ust be able to block
such attacks by using appropriate firewalls or disable unnecessary services
running 011 the computer.
You already know that the Internet uses a software protocol named TCP/ IP to
format and transfer data. A 11 attacker can m onitor ongoing TCP connections
and can have all the information in the IP and TCP headers and to the packet
payloads with which he or she can hijack the connection. As the attacker has all
die inform ation 011 the network, he or she can create false packets in the TCP
connection.
As a n e tw o rk adm inistrator., your daily task is to check the TCP/IP
c o n n e c tio n s o f each server you manage. You have to m onitor all TCP and
U D P ports and list all the e s ta b lis h e d IP a d d r e s s e s o f the server using the
C urrP orts tool.
H U Tools
dem on strated in
this lab are
ava ila b le in
D:\CEHTools\CEHv8
M odule 03
Scanning
N etw orks
C E H L ab M an u al P ag e 103
Lab O bjectives
The objective o f diis lab is to help students determine and list all the T C P /IP
and U D P ports o f a local computer.
111
Scan the system for currently opened TCP/IP and UDP ports
Close unwanted TCP connections and kill the process that opened the
ports
011
Lab Environment
To perform the lab, you need:
You can also download the latest version o f C urrP orts from the link
http: / / www.nirsoft.11e t /u tils/cports.html
Lab Duration
Time: 10 Minutes
Lab Tasks
The CurrPorts utility is a standalone executable and doesnt require any installation
process or additional DLLs (Dynamic Link Library). Extract CurrPorts to die
desired location and double click c p o rts .e x e to launch.
T AS K 1
D iscover TCP/IP
Connection
CurrPorts
File Edit
View Option*
Help
x S D v ^ ! t a e r 4* a - *
Process Na..
(T enroare.ere
f ct1 rome.ere
chrome.e5re
f ehrome.ere
CT chrome.e
^ f ir t fc x ere
firfcxx
(firfcx (
fircfcx.cxc
Proces...
2 m
2988
2988
2 m
2 m
1368
1368
1368
1368
1368
1368
f 1rcfcxc.cc
firef cx c.<c
\s , httpd.exe
1000
\thttpd.exe
Qlsass.occ
3 l 5 5 a e
1800
564
564
____ _____
<1
>1
Protocol
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP
TCP
Local...
4119
4120
4121
4123
414S
3981
3982
4013
4163
4166
4168
1070
1070
1028
1028
C E H L ab M an u al P ag e 104
Loc..
Local Address
10.0.0.7
10.0.0.7
10.0.0.7
10.0.0.7
10.0.0.7
127.0.0.1
127.0.0.1
10.007
1000.7
100.0.7
100.0.7
00.0.0
Rem...
80
80
80
80
443
3982
3981
443
443
443
443
Rem...
http
http
http
http
https
https
httpj
httpj
http;
0.0.0.0
0.0.0.0
=
>
N irS o ft F re e w a re . ht1p;/A nrA v.rirsoft.net
FIGURE 4.1: Tlie CuaPoits main window with all processes, ports, and IP addresses
2. CiirrPorts lists all die processes and their ID s, protocols used, local
and remote IP address, local and remote ports, and remote host
names.
/ / CurrPorts utility is a
standalone executable,
which doesn't require any
installation process or
additional DLLs.
3. To view all die reports as an HTM L page, click View >HTML Reports
All Items.
M - x
CurrPorts
F ile
Ed it I V iew | O p tio n s
X B 1
Process KJa 1 ^ I
Show Tooltips
o.ao.o
Remote Address
173.1943526
173.194.3526
173.194.3526
23.5720420
173.194.3526
127.0.0.1
127.0.0.1
173.1943622
173.19436.15
173.19436.0
741252*4.15
0.0.0.0
aaao
0 .0 .0.0
c h ro m e .
C * c h ro m e l
^
H elp
c h ro m e .
C * c h ro m e .
^
Choose Columns
ch ro m c .
( fir c fc x .c
g f-e fc x e
Rf r # { h
1l i
(Bfaefcxue
JftfM co ta e
1368
I368
1368
1800
1800
564
561
TCP
TCP
TCP
TCP
TCP
TCP
TCP
fre fc x e te
\h tto d .e x e
Vhttpd.exe
Qlsassete
F5
( p f ir c f o x . e 1(c
Address
).7
).7
).7
).7
).7
443
.0.1
.0.1
3962
3981
--- TV.V,0 .7
10.0.0.7
10.0.0.7
100.0.7
4163
4156
4108
1070
1070
1028
1028
443
443
443
443
Rem..
http
http
http
http
https
https
https
https
https
bem04s01-in-f22.1
bom04i01in*f15.1
bom04s0l*in-f0.1<
gruC3s05-1nfl5.1e
j j f j_
' *
T C P /U D P P orts L ist
=
E3 To check the
countries of the remote IP
addresses, you have to
download the latest IP to
Country file. You have to
put the IpToCountry.csv
file in the same folder as
cports.exe.
P m j .Nam
P rotiti
Protocol
ID
I.oral
Port
I Aral Port
N a*e
Local Addivit
Remote
Port
RcmoU
Port
Name.
Rtmvl Addrtit
chxame rx c
2988
TCP
4052
10 0 0 7
443
https
173 194 36 4
chiome.exc
2988
TCP
4059
10.0.0.7
80
http
173.194.36.17
bo
ch101 nc.exe
2988
TCP
4070
10.0.0.7
80
http
173.194.36.31
bo
daome.exe
2988
TCP
4071
10.0.0.7
80
hltp
173.194.36.31
bo!
daome.exe
2988
TCP
4073
100.0.7
80
hltp
173.194.36.15
boi
daome.exe
2988
TCP
4083
10.0.0.7
80
http
173.194.36.31
bo!
cfcrorae.exe
2988
TCP
4090
100.0.7
80
hnp
173.194.36.4
bo!
chfomc.cxc
2988
TCP
4103
100.0.7
80
hltp
173.194.36.25
bo
chrome exe
2988
TCP
4104
10 0 0 7
80
hnp
173 194 36 25
bo
bo
>
FIGURE 4.3: Hie Web browser displaying CunPorts Report - All Items
5. To save the generated CiirrPorts report from die web browser, click
File >Save Page As...Ctrl+S.
C E H L ab M an u al P ag e 105
3 5
1ry>
H ito r y
fJ c w l i b
B o o k m a ik t
Took
H rlp
C W *T
Window/
Ctr1*N
C p e n F ie . .
Errt.
tl*
!, r o t i f j j
>111
r ro to c o l
!.o ral
P o rt
TCP
4052
I o r a l P o rt
Name
L ocal A d d r v u
Rem ote
P o ri
Kemotc
P o rt
Nam e
443
https
ID
2988
chiom e.cxc
! 1 Google
C crU O
10.0.0.7
Keu1ul A d d n i t
173.194.36.4
boj
cfc1 0 me.exe
2988
TCP
4059
10.0.0.7
80
http
173.194.36.17
bo:
chrome.exe
2988
TCP
4070
10.0.0.7
80
hnp
173.194.36.31
bo:
chrome.exe
2988
TCP
4071
10.0.0.7
80
http
173.194.36.31
boi
chrome exe
2988
TCP
4073
100 0 7
80
http
173 194 36 15
boi
chrome exe
2988
TCP
408;
100 0 7
80
http
173 194 36 31
boi
chrome exe
2988
TCP
4090
100 0 7
80
http
173 194 36 4
boi
chiome.cxe
2988
TCP
4103
10.0.0.7
80
http
173.194.36.25
boi
daome.exe
2988
TCP
4104
10.0.0.7
80
http
173.194.36.25
b03
FIGURE 4.4: The Web browser to Save CurrPorts Report - All Items
6. To view only die selected report as HTM L page, select reports and click
V ie w >HTML R ep o rts S e le c te d Item s.
1- 1 x -
CurrPorts
File Edit | View | Option)
X S
(3
Help
Show Grid L
chrome.
c h ro m e f
Address
).7
).7
AAAA
AAAA
F
0.7
H T M L Report Selected te rn s
O ' c h ro m e
,firefcxe
(g fir c f c x e :
fircfcx e<v
fircfox.exe
fircfcx.cxc
^fircfcx.ccc
httpd.exe
^ httpd.exe
Qlsassexe
Q ls a w a c
---------a . -------
Choose Columns
Auto Size Columns
P7
.0.1
.0.1
F5
J>.7
1000.7
1000.7
100.0.7
0.0.0.0
CtrlPlus
Refresh
1368
1368
1368
1000
1000
564
564
TCP
TCP
TCP
TCP
TCP
TCP
TCP
4163
4166
416S
1070
1070
1028
1028
14nn
T rn
00.0.0
__
Rem...
80
80
80
80
443
3982
3981
443
443
443
443
Rem...
http
http
http
http
http:
https
http;
http:
https
7.
The selected rep ort automatically opens using the d e fa u lt b row ser.
C E H L ab M an u al P ag e 106
1 n J~x
| +
(? GoogleP |,f t I
T C P / V D P Ports L is t
Process
Name
Process
Local
Protocol
ID
Port
I>ocal
Local
Port
Address
.Name
Reuiotv
Port
Remote
Port
Name
Kvuiotc
Address
State
c:
dbiome.cxc 2988
TCP
4148
10.0.0.7
443
https
firefox exe
1368
TCP
4163
10 0 0 7
443
https
hUpd cx c
1800
TCP
1070
Listening
C:
FIGURE 4.6: The Web browser displaying CuaPorts with HTML Report - Selected Items
/ / The Syntax for Filter
String: [include | exclude]:
[local | remote | both |
process]: [tcp | udp |
tcpudp] : [IP Range | Ports
Range].
8. To save the generated CurrPorts report from the web browser, click
File >S a v e P a g e A s...C trl+ S
TCP/UDP Ports List Mozilla Firefox
r= > r*
Clrl-T
|+ |
an*N
Open Fie...
Ctrl0
S*. PageA;.
Ctrl-S
fi *
r/Deslctop/cpots x6A<repwthtml
Sir'd l in k -
Page :er.p.
Pnnt Preview
PrmL.
ficit Offline
Name
Command-line option:
/stext <F11ename> means
save the list of all opened
TCP/UDP ports into a
regular text file.
C E H L ab M an u al P ag e 107
Local
Pori
ID
Local
Kcmole
Toral Remote
Port
Port
Address
Port
Name
Name
Remote
Address
chtoxne.exe 2988
TCP
4148
1000.7
443
https
fiiefox-cxc
1368
TCP
4163
100.0.7
443
https
httpdexe
1800
TCP
100
Established C
FIGURE 4.7: The Web brcnvser to Saw QirrPorts with HTML Report - Selected Items
9. To view the p ro p e rtie s o f a port, select die port and click File >
P ro p erties.
CurrPorts
r
1 File J Edit
I
View Options
CtrM
PNctlnfo
Close Selected TCP Connections
Ctri+T
Local Address
10.0.0.7
10.0.0.7
10.0.0.7
10.0.0.7
10.00.7
127.0.0.1
127.0.0.1
10.0.0.7
10.0.0.7
10.0.0.7
10.0.0.7
CtiUS
Properties
I - ] '
Help
Alt^Entei
Process Properties
CtiUP
Log Changes
Open Log File
Clear Log File
CtrUO
Advanced Options
Exit
\ j 1ttjd.exe
\httod.exe
lsass.exe
Qlsass-exe
1800
1800
564
$64
TCP
TCP
TCP
TCP
Rem..
http
http
http
http
https
httpt
https
https
https
oaao
1070
1070
1028
1028
::
aao.o
0DSJJJ
r.
Rem...
80
80
80
80
443
3982
3031
443
443
443
443
>
NirSoft Freeware, http:/wvrw.nircoft.net
10. The P ro p e rtie s window appears and displays all the properties for the
selected port.
11. Click OK to close die P ro p e rtie s window
*
Properties
Process N am e:
fire fo x .e x e
Process ID:
1368
Protocol:
TC P
Local Port:
4166
Local Port N am e:
Local A ddress:
R em ote Port:
Command-line option:
/ shtml <Filename> means
save the list of all opened
TCP/UDP ports into an
HTML file (Horizontal).
1 0.0 .0 .7
4 43
R em ote Port N am e:
|https_________________
R em ote A ddress:
1173.1 9 4 .3 6 .0
R em ote H ost N am e:
State:
E s tab lis h e d
Process Path:
Product N am e:
Flrefox
File D escription:
Firefox
File Version:
14.0.1
Com pany:
M o z illa Corporation
8 /2 5 /2 0 1 2 2 :36 :2 8 PM
U s e r N am e:
W IN -D 3 9 M R 5 H L 9 E 4 \A d m in is tra to r
Process S e rv ice s :
Process Attributes:
Added On:
8 /2 5 /2 0 1 2 3:32 :5 8 PM
M o d u le F ile n a m e :
R em ote IP Country:
W in d o w Title:
OK
FIGURE 4.9: Hie CunPorts Properties window for the selected port
C E H L ab M an u al P ag e 108
S TASK
12. To close a TCP connection you think is suspicious, select the process
and click File >C lo s e S e le c te d T C P C o n n e c tio n s (or Ctrl+T).
2
-_,r
CurrPorts
C lo se TCP
Connection
IPNetlnfo
Clrf
Ctrl-T
Local Address
10.0.0.7
10.0.0.7
10.0.0.7
10.0.0.7
10.0.0.7
127.00.1
127.00.1
10.0.0.7
10.0.0.7
CtH-S
Properties
AH- Enter
CtrlP
Process Properties
Log Changes
Cpen Log File
Clear Log File
Ad/snced Options
Ctrl+0
Exit
^ httpd.exe
httpd.exe
isass^xe
QtoSfcCNe
^
103
1800
564
564
10.0.0.7
0D.0.0
TCP
1070
TCP
TCP
TCP
1070
1028
1Q28
Rem...
60
80
80
80
443
3932
3931
443
443
443
443
Rem...
http
http
http
http
https
http:
https
https
https
Remote Address
173.19436.26
173.19436.26
173.19436.26
23.5730430
173.19436.26
127.0.0.1
127.0.0.1
173.19436.22
173.19436.15
173.19436.0
74.125.234.15
0.0.0.0
r
o.aao
r
om o
I>
III
FIGURE 4.10; ,Hie CunPoits Close Selected TCP Connections option window
13. To kill the p r o c e s s e s o f a port, select die port and click F ile >Kill
P r o c e s s e s o f S e le c te d Ports.
I ~ I* '
CurrPorts
File j Edit
fi
TASK
an!
P N e tln f o
C lo s e Se lected T C P C o n n e c tio n !
Kill P ro ce s s
Clil^T
Loral Addrect
10.0.07
10.0.0.7
10.0.0.7
10.0.0.7
10.0.0.7
127.0.0.1
127.0.0.1
10.0.0.7
10.0.0.7
10.0.0.7
10.0.0.7
O.Q.Q.O
A t -E n t e r
P r o p e r tie c
CtrKP
P r o c e s s P r o p e r t ie s
Log Changes
Open Log File
Clear Log file
Advanced Options
Exit
V htt3d.exe
Vbttpd.exe
lss.ete
katc *1*
1800
1800
564
561
TCP
TCP
TCP
TCP
1070
1070
1028
1028
Rem...
80
80
80
80
443
3962
3981
443
443
443
443
fam..
http
http
http
http
https
https
https
https
https
Remote Addrect
173.14436.26
173.194.3626
173.194.3626
215720420
173.1943636
127.0.0.1
127.0.0.1
173.1943632
173.19436.15
173.19436.0
74125334.15
0.0.0.0
o.aao
___
/)A A A
II
FIGURE 4.11: The CurrPorts Kill Processes of Selected Ports Option Window
14. To e x it from the CurrPorts utility, click File >Exit. The CurrPorts
window c lo s e s .
C E H L ab M an u al P ag e 109
1- 1 -
CurrPons
File
Edit
View Options
Help
PNetlnfo
QH+I
CtrKT
..
h id Command-line option:
/ sveihtml <Filename>
Save the list of all opened
TCP/UDP ports into
HTML file (Vertical).
Ctrfc-S
Properties
At-Eater
Process Properties
CtHP
log Changes
Open Log File
Clear Log File
Advanced Option!
CtH-0
Ext
\thttpd.exe
\thttpd.exe
Qlsas&cxe
H lsais-ae
1
1800
1800
564
564
TCP
TCP
TCP
TCP
rrn
1070
1070
1028
1028
itnt
__
Local Address
10.0.0.7
10D.0.7
10.0.0.7
10.0.0.7
10.0.0.7
127.0.0.1
127.0.0.1
10.0.0.7
10.0.0.7
10.0.0.7
10.0.0.7
0.0.0.0
=
0.0.00
Rem...
80
80
80
80
443
3987
3981
443
443
443
443
Rem
http
http
http
http
https
https
https
https
https
/ a /\ a
Remcte Address
173.194.36.26
173.194.3626
173.194.3626
21572Q420
173.194.3626
127DD.1
127X10.1
173.194.36-22
173.194.36.1S
173.194.36i)
74.125.234.15
0.0.0.0
=
0.0.0.0
=
AAAA
Lab Analysis
Document all die IP addresses, open ports and dieir running applications, and
protocols discovered during die lab.
feUI In command line, the
syntax of / close
command :/close < Local
Address> <Local Port>
< Remote Address >
< Remote Port * .
T o o l/U tility
C urrP orts
C E H L ab M an u al P ag e 110
Process Name
Process ID
Protocol
Local Port
Local Address
Remote Port
Remote Port Name
Remote Address
Remote H ost Name
PL E A S E TA LK T O Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
Q uestions
Q CurrPorts allows you
to easily translate all menus,
dialog boxes, and strings to
other languages.
1. Analyze the results from CurrPorts by creating a filter string that displays
only packets with remote TCP poit 80 and UDP port 53 and running it.
Analyze and evaluate die output results by creating a filter that displays only
die opened ports in die Firefox browser.
.
Determine the use o f each o f die following options diat are available under
die options menu o f CurrPorts:
a.
Display Established
0 No
P latform S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 111
0 !Labs
Lab
Test your
knowledge
Web exercise
W orkbook review
Z U Tools
dem on strated in
this lab are
a va ila b le in
D:\CEHTools\CEHv8
M odule 03
S canning
N etw orks
Lab S cenario
You have learned in die previous lab to monitor TCP IP and UDP ports 011 your
local computer or network using CurrPorts. This tool will automatically mark widi a
pink color suspicious T C P/U D P ports owned by unidentified applications. To
prevent attacks pertaining to TC P/IP; you can select one or more items, and dien
close die selected connections.
Your companys w e b serve r is hosted by a large ISP and is well protected behind a
firewall. Your company needs to audit the defenses used by die ISP. After starting a
scan, a serious vulnerability was identified but not immediately corrected by the ISP.
An evil attacker uses diis vulnerability and places a b ack d oor on th e server. Using
die backdoor, the attacker gets complete access to die server and is able to
manipulate the information 011 the server. The attacker also uses the server to
leapfrog and attack odier servers 011 the ISP network from diis compromised one.
As a se cu rity adm inistrator and penetration te s te r for your company, you need to
conduct penetration testing in order to determine die list o f th re a ts and
vulnerabilities to the network infrastructure you manage. 111 diis lab, you will be
using GFI LanGuard 2 0 12 to scan your network to look for vulnerabilities.
Lab O bjectives
The objective o f diis lab is to help students conduct vulnerability scanning, patch
management, and network auditing.
111
C E H L ab M an u al P ag e 112
You can also download the latest version o f GFI L an gu ard from the
link h ttp ://www.gfi.com/la 1111etsca 11
Q GFI LANguard
compatibly works on
Microsoft Windows Server
2008 Standard/Enterprise,
Windows Server 2003
Standard/ Enterprise,
Windows 7 Ultimate,
Microsoft Small Business
Server 2008 Standard,
Small Business Server 2003
(SP1), and Small Business
Server 2000 (SP2).
Administrator privileges to run die GFI LANguard N etw ork S ecu rity
S can n er
Complete die subscription and get an activation code; the user will receive
an em ail diat contains an activation c o d e
Lab D uration
Time: 10 Minutes
O verview o f Scanning N e tw o rk
As an adminisuator, you often have to deal separately widi problems related to
vulnerability issues, patch m an agem ent, and network auditing. It is your
responsibility to address all die viilnerability management needs and act as a virtual
consultant to give a complete picture o f a network setup, provide risk an alysis, and
maintain a secure and com pliant n etw ork state faster and more effectively.
C -J GFI LANguard
includes default
configuration settings that
allow you to run immediate
scans soon after the
installation is complete.
C E H L ab M an u al P ag e 113
Security scans or audits enable you to identify and assess possible risks within a
network. Auditing operations imply any type o f ch eck in g performed during a
network security audit. These include open port checks, missing Microsoft p a tch e s
and vulnerabilities, service infomiation, and user or p ro c e s s information.
Lab Tasks
Follow die wizard-driven installation steps to install die GFI LANguard network
scanner on die host machine windows 2012 server.
1.
B
T AS K 1
Scanning for
V ulnerabilities
2. Click the GFI LanG uard 2 0 12 app to open the GFI LanG uard 2 0 12
window
WinPcap 4.1.1
Network Interface
Import
Zenmap (GUI frontend)
Neat (Modern Netcat)
Windows
Marager
bm
Ndiff
SI
N nd
FT
2 )G
0
FIGURE 5.2 Windows Server 2012 - Apps
3. The GFI LanGuard 2012 main w in d ow appears and displays die N etw ork
Audit tab contents.
/ / To execute a scan
successfully, GFI
LANguard must remotely
log on to target computers
with administrator
privileges.
C E H L ab M an u al P ag e 114
- |
dashboard
Seen
R em edy
ActMty Monitor
Reports
Configuration
UtSties
D13CIA3 this
L o ca l C o m p u te r V u ln e ra b ility L ev el
JP
V iew Dashboard
Invest!gate netvuor* wjinprawiir, status and a u til results
{'Mow
cafh'e.
Quick scan
Full scan
iihjIJ:
M anage A g e n ts
Enable agents to automate ne*vroric secant? au d i and to tfstribute scanning load
across client macrones
-I
LATES1 NLWS
V#
1(
74 A q 701?
V*,
Patch Mnrvtgnnnnl
I D I -XI } u n j p W t>m ? !1 7 ( ft m la r l w
mr
10(
APS812-1S.
Mobm Acrobat
10.1.4 Pro
mtd
tr.vi n -
St a - 0 - - M j u t
4.
Scan
Remediate
A d M ty Monitor
Reports
Configuration
Ut*ties
D ie 1s thb version
L o ca l C o m p u te r V u ln e ra b ility L ev el
u se van a ;# Agents or Launch a scan options 10 auoa
the entire network.
JP
V iew Dashboard
Investigate network! wjineraMit, status an d auai results
To perform a target
computer scan using a
specific scan profile
9
t -
.&
^ -
iim j M
M anage A g e n ts
Enable agents to automate noteror* secant* aud* and to tfstnbute scanning load
across client machines
Launch a Scan
Manually *<rt-up andtnooer an ag erttest rwtw j. ta in t / audit
L A I L S I NLWS
<j
V*
2 4 A jq -2012
Patch Management
--
24-A ju -2012 - Patch MdHdumuiri - Added s u v o it lor A PS812-16. Adobe Acrobat 10.1.4 Pro and Standcffd - F=ad
^ If intrusion detection
software (IDS) is running
during scans, GFI
LANguard sets off a
multitude of IDS warnings
and intrusion alerts in these
applications.
FIGURE 5.4: The GFI LANguard main window indicating die Launch a Custom Scan option
5.
i.
111 die Scan Target option, select lo ca lh o st from die drop-down list
ii.
111 die Profile option, select Full S ca n from die drop-down list
iii.
111 die Credentials option, select currently logged on u ser from die
drop-down list
6. Click Scan.
C E H L ab M an u al P ag e 115
r x
Dashboard
Scan
Ranrdijle
Activ.tyMonitor
Reports
Conf!guraUon
III41m
CJ,
Uiscuu ttm1
ta u a d ia t n e S a n
pooac:
SCar aro2t:
b a te :
jf- J S ^ n
O t0 e n :fc-
v *
?axrrard:
II
II
Scar Qaccre...
S o n n d t i O vrrvle w
7.
Scanning will start; it will take some time to scan die network. See die
following figure
8. After completing die scan, die s c a n result will show in die left panel
C E H L ab M an u al P ag e 116
&
, I
GFI Lar>Guard2012
y I
Dashboard
Scan
Rcfnrdutr
Actwty Monitor
Reports
Configuration
Lttrfrtm
tauKkalnikin
Scan Target
K a te :
ccaftoct
... | F a lS a r
jc1'arr:
C j-rr& t bcaed on iser
II
Scan R r a k i D etail*
team ta rg e t: lo r.ilho s t
y\
10 0 0 7 | WM-D39MRSIIL9I41 (WiixJwwa .
H jjjjtfiia fl
20<20CtcaiHgr>
1313 Crecol'-.qh)
3
Potential vulnerabilities:
Scanner Ac tM ty Wkxkm
*^
CanptJar
Citar
VJU H > ra W Jt !a
----------- 12- 1
9. To check die Scan Result Overview, click IP a d d ress o f die machinein die
right panel
Scan completed!
SutnmwY 8f *ear resuts 9eneraf0<1 du T >51
V u ln e r a b ility l e v e l:
Types of scans:
Scan a range of
computers: Select this
option to scan a number
of computers defined
through an IP range.
Eaasword:
10. It shows die V ulnerability A s se s s m e n t and N etw ork & S o ftw a re Audit:
click V ulnerability A sse ssm e n t
GFI LanGuard 2012
E-
| ^
Daihboaid
Sean
SCafiTaroiC:
R annU (
A d M y M o r ilo r
Reports
Configuration
Ut44s
W,
Piofe:
ocafost
j . . . | |F IS 1
Q ederufe:
* 1
Userrvaae:
?a0.rd:
II
1 ___ ^
_____1
1Results Details
#
| -
V a n t n r y t : lornlh ost
0 1 0 0 V |WIW-OJ9MtOHL9L4| (W im km s J ] j
<1> w a H 1ty W ^ n r r n t |
Y/fcat dim
iraan?
Possible rea s o n s :
t. Tha can b not Inched yet.
2. OsCectbn o f missing patches and vuiner abif.es 8 3at>d * a n a scannira profle used to perform the scan.
3 The credentfeia used 10 3c8n this compute' < nor :* * w a r t y ecamer 10 refrteve 81! required hformaton tor
eum atro we VutteroBlty Level An account w th s a u n r r a , :rs -e o e i or rne target computer is requred
* Certan securty srttnqs on the remote CDtrputer Dtoct r * access of Ite security scanner. Betam s a fart of msst
Scaruicr A c tM ty Window
flte e tlK M Q L
H1rv *d I (k ill)
U .. M
C E H L ab M an u al P ag e 117
Dashboard
Sun
R&neddte
Activity Men!tot
Reports
Configuration
JUbties
W,
D18CUB8 as vaon._
la a o d i a Merc Scan
Bar Target;
roS:
| j ...
5o r
Password:
V1
3$
MScarJgynang:
c/fomess
Stan R evifttO eU N a
$ u a U r t:lQ u lm l
S IS
System software
information, including
unauthori2ed
applications, incorrect
antivirus settings and
outdated signatures
ItM J ( m R - K M M U H U M ](W M to m .
uhefeblty Astastrocnt
*3
_* Hec*alt&S0ftAareA1rft
System hardware
information, including
connected modems and
USB devices
B ras
12. Click N etw ork & S o ftw a re Audit in die right panel, and dien click System
Patching S tatu s, which shows all die system patching statuses
LinOuard
1- r 1
<U) '
Rrpoiti
to > 1
C ri
4 -
Dmhboard
Sran
Re*Aate
2012
Activity Monitor
Configuration
JM airt
lliir in it n v n w m
ta u a d ts New Scan
Scar o e -
Ho ft*.
* | &
- 1 1'
h -
O a fa tta b:
Sari
1 R em its Detais
Scan ta r v e t iocalhost
- 3 1 8
5
S ystem P a tc h in g S tatus
I M A / [W 0 3 9 N R S W 4 ] ( I M l t K -
M iia eb itv t o n T e i l
A
Pais/.ord:
J s e n re ;
|0 rren# o g c or u er
X
X taw Security V\J*ablt11s (4)
X cornal vunrrahltif# ()
AlsmyeutaaiYilyiethrrnaingap'verpttlMnfarmaw
Mk
m
S % Ports
U A
*)-
fi
J%
rtor&Atrc
Software
system inlbnnaaon
J%
: 1 .v 'r y
S c it r a a : I( d * :
*\m ~ .! t . 3
:rrgr*
13. Click Ports, and under diis, click Open TCP Ports
C E H L ab M an u al P ag e 118
m A custom scan is a
network audit based on
parameters, which you
configure on the fly before
launching the scanning
process.
&
Scan
jbcahoK
R arm fcale
* = _____
U i s c u u tins 1
ft)
^ 9
*.
1__
II
- viAwjBMy**owtwfnt
CJ,
Corrfigura
SasGword:
U envaae:
|0xtrtK ocKcC on us
1- 1
Reports
V I .. . I |M S w 1
Q c0 en .dfe.
*!1v t y M onitor
^
X
B
s ^
10J7 piMotooon: !r#t1fo, 1( tM&*ervce h not t1Urt(d :*>* caJO & Croj^r: eiandwtjne, Oaufipy *rd others / Sevc
t-.H |Deunpecn: LSASS, If tha m is not ratafc* be-*ae catfc ;< trsjan: Ctotafipy Network x, Oath am3 etners / Ser
: : - 2 |Csobacn: Me Protect. MSrtQ, t " t e 1 v. M >)elc - - a)c ro( r -U wJ D*mr* COuU ttt uojan: BLA trojan . S e 4
1433 (O sac & cn : Microsoft SQL Server database r a a j r w : srts c n Ser .er j S a -kx ; Ofcnown]
]333
Scan targets
w Coen LC Ports ) 5(
A Hardware 1
Logon credentials
i f Software .
System [nfbmodon
11
error
14. Click S y ste m Information in die light side panel; it shows all die details of
die system information
15. Click P assw ord Policy
r n n
GH LanGuard 2012
E
> 1 4 - 1
Dathboatd
Scan
Ravrwifcalr
ActHity Monitor
Reports
Configuration
UaUwt
W.
1)1*1 lew m u i i
P0. t :
a ih x :
| . . . I (SjIScan
&ederate:
L&c iaBL
? aaiw d :
1 U1J
1__
S a r Co'janu...
Scan R e ta k t O vn vm n
tad/.e
* I 50frgne___
Systsn Infotmabotj
* * !unoaa'wordsgeiodays
J ! Peace p f f r e iw force
a 9ki\. W
,|l HW
.\fxC.!>>>1
% Computet
t j | 610Lpt (28)
& Users (4)
Logged Cn Users ( 11)
^
Sesscre (2)
% J<rvce5 (148)
U Processes (76)
,
t- I
V 1n thrv*d I (k llr)
A )
I '"
16. Click Groups: it shows all die groups present in die system
C E H L ab M an u al P ag e 119
-T o -
G FI L a n G u a r d 2 0 1 2
m
A high vulnerability
level is the result o f
vulnerabilities or missing
patches w hose average
severity is categorized as
high.
>
D ashboard
Sun
ftftn c a & e
vl W
R eports
Configuration
**S c a n
CrM e r e s t
-igemane:
Password:
S c * RevuJU D e U ik
Control A u cU at* Cws abx 1
* ft
ft* P n t t a w i
ft0*Ji.s Ouvrctgrv
ftcmfcw aw# dccmwcm
* ftO (V'tey jM >- t w i t s ' !
ftCfctrtutedCCMUser*
ft& *n t Log Straefcrs
ftGuests
% C0 nUOPPwts( 5)
Menfciore
. 1 Softo'(
^ Symrmtnknranon
S h ( 6)
4 Pdwo1 ) Pd iy
# lUotetry
f t NetflCCS Narres (3)
* ft
ft
% Computer
l*i groups(2a)I
I W 4}
%
~a users
P M v lS e r s
ft
a
ente t o o O f 0 y)
- .
E5JUSRS
r^tv>: < Ccnfig.rstcn Cprators
a
a **?Operators
Sssns (2)
% Servfcee (l*)
H i rocrase* (76)
W w rt*
K>pe V Adrritstrators
* ft
ft
ft
? . -OXfC 0 users ( 1 )
A scheduled scan is a
network audit scheduled to
run automatically on a
specific date/tim e and at a
specific frequency.
Scheduled scans can be set
to execute once or
periodically.
Actmrty M onitor
Soan *read S * fe ) | 8 0|
17. Click die D ashboard tab: it shows all the scanned network information
1 n ^
> 45 I q
Crap
I Dashbcurdl
it 6mel1n*ork
Sun
Remedy!*
!t
Activity Monitor
f#
V'
Ce m ctm
w v
Reports
Configuration
to
UUkbe;
4t
/.
ViAirrnhlfces
O u c u M ln a varam ..
fei
*J
PeA*
SdNiare
f j UKJ-ct: ttlh-03Ma.5rt.4-
Security S1tors
w n w a rn i w u w
^' ucj1!)<w>:y10j<1iR<x1>
I t is recommended to
use scheduled scans:
m
rS \
___ H TW 9M IM ^g
1
0 cc<rpute5
T o perform
periodical/regular
network vulnerability
scans automatically and
using the same scanning
profiles and parameters
T o tngger scans
automatically after office
hours and to generate
alerts and autodistribution o f scan
results via email
Occrrputers
364
Vulnerabilities
1 COp0tr9
Io
0 cancuters
Malware Protection ...
C co puc r j
computers
A u l t Sure*
: _
0 !
Maraqe saerts
HLsr-..K
rxfl*n...
S
c-=radrsfrar.tfggnaMnp.ra
Z star can...
j
T o automatically trigger
auto-remediation
options, (e.g., Auto
download and deploy
missing updates)
C S ^ lK I
Sec :w dg-.as.
C^pm:-jr_
1*aer*Stofcg|\>3tStafcg|
: o f u t M By G peratng Syftem
1v,vo>5Se
Lab A nalysis
Dociunent all die results, dueats, and vulnerabilities discovered during die scanning
and auditing process.
C E H L ab M an u al P ag e 120
T o o l/U tility
G F I L an G u ard
2012
PLEASE TALK TO
Y O U R I N S T R U C T O R IF YO U
R E L A T E D TO T H IS LAB.
HAVE
QUESTIONS
Q uestions
1. Analyze how GFI LANgtiard products provide protection against a worm.
2. Evaluate under what circumstances GFI LAXguard displays a dialog during
patch deployment.
3. Can you change die message displayed when G FI LANguard is performing
administrative tasks? If ves, how?
0 No
P latfo rm S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 121
0 iLabs
W eb exercise
W orkbook review
Lab S cenario
111 die previous lab you learned to use GFI LanGuard 2012 to scan a network to
find out die vulnerability level, system patching status, details for open and closed
ports, vulnerable computers, etc. A 11 administrator and an attacker can use die same
tools to fix or exploit a system. If an attacker gets to know all die information about
vulnerable computers, diey will immediately act to compromise diose systems using
reconnaissance techniques.
Therefore, as an administrator it is very important for you to patch diose systems
after you have determined all die vulnerabilities in a network, before the attacker
audits die network to gain vulnerable information.
Also, as an ethical hacker and network adm inistrator for your company, your job
is to carry out daily security tasks, such as network inventory, service upgrade
schedules, and the monitoring o f host or service uptime. So, you will be guided in
diis lab to use Nmap to explore and audit a network.
Lab O bjectives
H ie objective o f diis lab is to help students learn and understand how to perform a
network inventory, manage services and upgrades, schedule network tasks, and
monitor host or service uptime and downtime.
h i diis lab, you need to:
C E H L ab M an u al P ag e 122
Tools
demonstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Networks
/ j
You can also download the latest version o f Nmap from the link
http: / / nmap.org. /
. Q Zenmap works on
Windows after including
Windows 7, and Server
2003/2008.
Lab D uration
Time: 20 Minutes
O verview o f N e tw o rk Scanning
Netw ork addresses are scanned to determine:
W hat services application nam es and versions diose hosts offer
W hat operating systems (and OS versions) diey run
T AS K 1
Intense Scan
The type o f pack et filters/firew alls that are in use and dozens o f odier
characteristics
Lab Tasks
Follow the wizard-driven installation steps and install N m ap (Zenmap) scanner
in die host machine (Window Server 2012).
1. Launch the Start menu by hovering die mouse cursor in the lower-left
corner o f the desktop
C E H L ab M an u al P ag e 123
Administrator
Server
Manager
Windows
PowrShell
Sfe
m
Control
Panel
Nmap Path
WinPcap 4.1.1
N etw ork Interface
Im port
Manager
H y p *V
Virtual
Machine..
Command
Prompt
F rtfo *
Me^sPing
HTTPort
iS W M
Ndiff
Nmap Zenmap
w
*
th e v ir tu a l I11acllil1e.
5.
111 this lab, die IP address would be 10.0.0.4; it will be different from
your lab environment
6. 111 the Profile: text field, select, from the drop-down list, the type of
profile you want to scan. 111 diis lab, select Intense Scan.
C E H L ab M an u al P ag e 124
Zenmap
Scan
Iools
Profile
Help
Target: 110.0.0.4|
C om m and:
Intense scan
nm a p -T4 -A - v 10.0.0.4
Host!
Profile:
Services
icc>
OS < Host
FIGURE 6.4: The Zenmap main window with Target and Profile entered
! S " The six port states
recognized by Nmap:
Open
Filtered
Unfiltered
Zenmap
Closed
Scan
Target:
I o o ls
E rofile
H elp
10.0.0.4
C om m and:
Profile:
Intense scan
Scan:
nm a p -T4 -A - v 10.C.0.4
Open | Filtered
Nn ap Output [ports / Hosts | Topolog) | Host Details | Scans
Closed | Unfiltered
OS < Host
nmap-T4 A -v 10.00.4
S to r tin g
Nmap accepts
multiple host specifications
on the command line, and
they don't need to be of the
same type.
| Details
10.0.0.4
Nmap C . O l
h ttp ://n m s p .o r g
at
2012 0 8
NSE: Loaded 9 3 s c r i p t s f o r s c a n n in g .
MSE: S c r i p t P r e - s c a n n in g .
I n i t i a t i n g ARP P in g Scan a t 1 5 :3 5
S c a n n in g 1 0 . 0 . 0 . 4 [ 1 p o r t ]
C o m p le te d ARP P in e S can a t 1 5 : 3 5 , 0 . 1 7 s e la p s e d
h o s ts )
I n i t i a t i n g P a r a l l e l DNS r e s o l u t i o n o f 1 h o s t , a
C o m p le te d P a r a l l e l DNS r e s o l u t i o n o f 1 h o s t , a t
0 .5 0 s e la p s e d
I n i t i a t i n g SYN S t e a l t h S can a t 1 5 :3 5
S c a n n in g 1 0 . 0 . 0 . 4 [1 0 0 0 p o r t s ]
D is c o v e r e d o pe n p o r t 135! t c p on
D is c o v e r e d o pe n p o r t 1 3 9 / t c p on
D is c o v e r e d o pe n p o r t 4451 t c p on
I n c r e a s in g se n d d e la y f o r 1 6 . 0 . 0 . 4 f r o 0 t o
o u t o f 179 d ro p p e d p ro b e s s in c e l a s t in c r e a s e .
D is c o v e r e d o pe n p o r t 4 9 1 5 2 / t c p o n 1 0 . 0 . 6 . 4
D is c o v e r e d o p e n p o r t 4 9 1 5 4 / t c p o n 1 0 . 0 . 6 . 4
D is c o v e r e d o pe n p o r t 4 9 1 5 3 / t c p o n 1 0 . 0 . 6 . 4
D is c o v e r e d o pe n p o r t 4 9 1 5 6 / t c p o n 1 0 . 0 . 6 . 4
D is c o v e r e d o pe n p o r t 4 9 1 5 5 / t c p o n 1 0 . 0 . 0 . 4
D is c o v e r e d o pe n p o r t 5 3 5 7 / t c p on 1 0 . 6 . 0 . 4
24
(1 t o t a l
t 1 5 :3 5
1 5 :3 5 ,
1 6 .0 .0 .4
1 0 .0 .0 .4
1 6 .0 .0 .4
d ee t o 72
Filter Hosts
FIGURE 6.5: The Zenmap main window with the Nmap Output tab for Intense Scan
C E H L ab M an u al P ag e 125
T=I
Zenmap
Scan
Iools
rofile
Help
Target:
Command:
Cancel
Details
Scan!
nmap T4 A v 10.0.0.4
< Host
n e tb io s -s s n
1 3 9 /tc p
open
4 4 5 /tc p
open
n c tb io s ssn
h ttp
M ic ro s o ft HTTPAPI h ttp d 2.0
5 3 5 7 /tc p
open
(SSOP/UPnP)
| _ h t t p m th o d s : No A llo w o r P u b lic h a d r i n OPTIONS
re s p o n s e ( s t a tu s code 5 03 )
10.0.0.4
| _ r r t t p - t it le : S ervice U na va ila b le
M i c r o s o f t W indow s RPC
4 9 1 5 2 / t c p o pe n
m srp c
M i c r o s o f t W indow s RPC
4 9 1 5 3 / t c p open
m srp c
M i c r o s o f t W indow s RPC
4 9 1 5 4 / t c p o pe n
m srp c
M i c r o s o f t W indow s RPC
4 9 1 5 5 / t c p open
m srp c
M i c r o s o f t W indow s RPC
4 9 1 5 6 / t c p open
m srp c
______________
;0 7 :1 0 ( M ic r o s o f t )
MAC A d d r e s s : 0( 1 5 : 5D:
D e v ic e t y p e : g e n e r a l p u rp o s e
R u n n in g : M i c r o s o f t WindONS 7 | 2008
OS CPE: c p : / o : n ic r o s o f t : w in d o w s _ 7 c p e : /
o : ic r o s o f t : w i n d o w s _ s e r v e r _ 2 0 0 8 : : s p l
(? d e t a i l s : M i c r o s o f t W indow s 7 o r W indow s S e r v e r 2 00 8 SP1
U p tim e g u e s s : 0 .2 5 6 d a y s ( s i n c e F r i Aug ?4 0 9 : 2 7 : 4 0 2 0 1 2 )
-excludefile
<exclude file>
TCP S eq u en ce P r e d i c t i o n : D i f f i c u l t y - 2 6 3 (O o od l u c k ! )
I P I P S e q u e n ce G e n e r a tio n : I n c r e m e n t a l
S e r v ic e I n f o : OS: W in d o w s; CPE: c p e : / o : n ic r o s c f t : w in d o w s
Q The following
options control host
discovery:
Filter Hosts
FIGURE 6.6: The Zenmap main window with the Nmap Output tab for Intense Scan
10. Click the Ports/H osts tab to display more information on the scan
results.
11. N m ap also displays die Port, Protocol, S tate. Service, and Version o f
the scan.
TT
Zenmap
Scan
Target:
Iools
Profile
10.0.0.4
Command:
Scan
Cancel
OS
Help
Nmgp Out p
Tu[.ul u1jy
Hu^t Details Sk m :.
< Host
10.0.0.4
13S
tcp
open
rmtpc
139
tcp
open
netbios-ssn
445
tcp
open
netbios-ssn
5337
tcp
open
http
49152 tcp
open
msrpc
49153 tcp
open
m srpc
49154 tcp
open
msrpc
49155 tcp
open
msrpc
49156 tcp
open
msrpc
-system-dns (Use
system DNS resolver)
-dns-servers
< server 1 > [,<server2 > [,.
..]] (Servers to use for
reverse DNS queries)
FIGURE 6.7: The Zenmap main window with the Ports/Hosts tab for Intense Scan
C E H L ab M an u al P ag e 126
12. Click the Topology tab to view N m aps topology for the provided IP
address in the Intense scan Profile.
7 ^ t By default, Nmap
performs a host discovery
and then a port scan
against each host it
determines to be on line.
FIGURE 6.8: The Zenmap main window with Topology tab fot Intense Scan
13. Click the Host Details tab to see die details o f all hosts discovered
during the intense scan profile.
r^rrx 1
Zenmap
Scan
lools
Target:
Profile
10.0.0.4
Command:
Hosts
7^ By default, Nmap
determines your DNS
servers (for rDNS
resolution) from your
resolv.conf file (UNIX) or
the Registry (Win32).
Scan
Conccl
Services
OS < Host
-
Help
10.0.0.4
H Host Status
S ta t e :
up
O p e n p o rtc
Filtered poits:
Closed ports:
991
22151
Last boot:
B Addresses
IPv4:
10.0.0.4
IPv6:
Not available
MAC: 00:15:50:00:07:10
- O perating System
Name:
Accuracy:
P o rts used
Filter Hosts
FIGURE 6.9: The Zenmap main window with Host Details tab for Intense Scan
C E H L ab M an u al P ag e 127
14. Click the S cans tab to scan details for provided IP addresses.
1- 1 x
Zenmap
Scan
Tools
Profile
Help
10.0.0.4
Target:
Command:
Hosts
Profile:
Cancel
nmap T4 A -v 100.0.4
|[
Services
OS < Host
Comrard
100.04
if Append Scan
In Nmap, option -p
<port ranges> means scan
only specified ports.
Intense scan
Remove Scan
Cancel Scan
FIGURE 6.10: The Zenmap main window with Scan tab for Intense Scan
15. Now, click the Services tab located in the right pane o f the window.
This tab displays the list o f services.
16. Click the http service to list all the H TTP H ostnam es/lP a d d resses.
Ports, and their s ta te s (Open/Closed).
*
Zenmap
Scan
Tools
Target:
Help
10.0.0.4
Comman d:
Hosts
Profile
v]
Profile:
Intense scan
v|
Scan |
nmap T4 -A -v 10.0.0.4
|
Services
Cancel
Service
10.0.04
5357
tcp
open
msrpc
n e t b i o s 5 5 n
Q In Nmap, option -F
means fast (limited port)
scan.
<L
FIGURE 6.11: The Zenmap main window with Services option for Intense Scan
C E H L ab M an u al P ag e 128
17. Click the m srpc service to list all the Microsoft Windows RPC.
1 x
Zenmap
Scan
Iools
Target:
In Nmap, Option
port-ratio <ratio><dedmal
number between 0 and 1>
means Scans all ports in
nmap-services file with a
ratio greater than the one
given. <ratio> must be
between 0.0 and 1.1
Profile
Help
10.0.0.4
Command:
Profile:
Intense scan
Scan]
Service
http
netbios-ssn
100.0.4
49156 Up
open
100.0.4
49155 tcp
open
100.0.4
49154 tcp
open
100.04
49153 tcp
open
100.04
49152 tcp
open
100.0.4
135
tcp
open
FIGURE 6.12 The Zenmap main window with msrpc Service for Intense Scan
TTT
Zenmap
Scan
Icols
Target:
Hosts
Help
10.0.0.4
Command:
h id In Nmap, Option -r
means don't randomi2e
ports.
Erofile
Scan
Cancel
Services
Service
http
msrpc
100.0.4
445
tcp
open
100.0.4
139
tcp
open
FIGURE 6.13: The Zenmap main window with netbios-ssn Service for Intense Scan
T AS K 2
Xmas Scan
C E H L ab M an u al P ag e 129
19. Xmas scan sends a TCP frame to a remote device with URG, ACK, RST,
SYN, and FIN flags set. FIN scans only with OS T C P /IP developed
21. O n the Profile tab, enter Xmas Scan in the Profile nam e text field.
Profile Editor
!map -T4 -A -v 10.0.0.4
Help
Description
Profile name
XmasScanj
D * c e r ip t io n
Caned
Save C h ang e s
FIGURE 6.15: The Zenmap Profile Editor window with the Profile tab
C E H L ab M an u al P ag e 130
22. Click the Scan tab, and select Xmas Tree scan (sX) from the TCP
scan s: drop-down list.
UDP scan is activated
with the -sU option. It can
be combined with a TCP
scan type such as SYN scan
(sS) to check both
protocols during the same
run.
1_T ' x
Profile Editor
!map -T4 -A -v 10.0.0.4
Help
Sun optk>m
Target? (optional):
10.00.4
TCP scam
None
Non-TCP scans:
None
Timing template:
FI
Cancel
0Save Changes
FIGURE 6.16: The Zenmap Profile Editor window with the Scan tab
23. Select None in die Non-TCP scan s: drop-down list and A ggressive (
T4) in the Timing tem plate: list and click Save Changes
1 ^ |
Profile Friitor
nmap sX T4 -A v 10.0.0.4
Help
Scan o p tio n *
Target? (optional):
1D.0D.4
TCP scan:
|v |
Non-TCP scans:
None
[v]
Timing template:
Aggressive (-T4)
[v |
E n a b le a ll a d v a n c e d / a g g r e s s v e o p t i o n s ( - A )
Cancel
0 Save Changes
FIGURE 6.17: The Zenmap Profile Editor window with the Scan tab
24. Enter the IP address in die T arget: field, select the Xmas scan opdon
from the Profile: held and click Scan.
C E H L ab M an u al P ag e 131
Zenmap
Scan
Tools
Target:
( Hosts
05
Help
10.0.0.4
Command:
Profile
|v |
|v |
|Scan|
Cancel |
Services
< Host
| Details]
Filter Hosts
FIGURE 6.18: The Zenmap main window with Target and Profile entered
25. N m ap scans the target IP address provided and displays results on the
Nmap Output tab.
Q! When scanning
systems, compliant with
this RFC text, any packet
not containing SYN, RST,
or ACK bits results in a
returned RST, if the port is
closed, and no response at
all, if the port is open.
Tools
Target
Command:
Hosts
Profile
Help
vl
10.0.0.4
OS Host
Profile.
Services
|Scani|
10.0.0.4
S t a r t i n g Nmap 6 .0 1
Xmas Scan
N < F lo a d e d
iz c
Zenmap
Scan
93
( h ttp ://n m a o .o r g
s c r ip ts
fo r
) a t 2 0 1 2 - 0 8 -2 4
s c a n n in g .
NSE: S c r i p t P r e - s c a n n in g .
I n i t i a t i n g ARP P in g S can a t 1 6 :2 9
S c a n n in g 1 0 . 0 . 0 . 4 [ 1 p o r t ]
C o m p le te d ARP P in g Scan a t 1 6 : 2 9 , 0 .1 5 s e la p s e d ( 1 t o t a l
h o s ts )
I n i t i a t i n g P a r a l l e l DMS r e s o l u t i o n o f 1 h o s t , a t 1 6 :2 9
c o m p le te d P a r a l l e l d n s r e s o l u t i o n o f l n o s t . a t 1 6 : 2 9 ,
0 .0 0 s e la p s e d
I n i t i a t i n g XMAS S can a t 1 6 :2 9
S c a n r in g 1 0 . 0 . 6 . 4 [1 0 9 0 p o r t s ]
I n c r e a s in g se nd d e la y f o r 1 0 . 0 . 0 . 4 f r o m 0 t o 5 due t o 34
o u t o f 84 d ro p p e d p ro & e s s in c e l a s t in c r e a s e .
C o m p le te d XMAS S can a t 1 6 : 3 0 , 8 .3 6 s e la p s e d :1 0 0 0 t o t a l
p o r ts )
I n i t i a t i n g S c r v i c e scon o t 1 6 :3 0
I n i t i a t i n g OS d e t e c t i o n ( t r y # 1 ) a g a i r s t 1 0 . 0 . 0 . 4
NSE: S c r i p t s c a n n in g 1 0 . 0 . 0 . 4 .
I n i t i a t i n g MSE a t 1 6 :3 0
C o m p le te d NSE a t 1 6 : 3 0 , 0 .0 0 s e la p s e d
Nnap s c o n r e p o r t f o r 1 0 . 0 . 0 . 4
H o s t i s u p ( 0 .e 0 0 2 0 s l a t e n c y ) .
FIGURE 6.19: The Zenmap main windowwith the Nmap Output tab
26. Click the S ervices tab located at the right side o f die pane. It displays
all die services o f that host.
C E H L ab M an u al P ag e 132
Zenmap
Scan
Iools
Target:
Profile
10.0.0.4
Command:
Hosts
Help
^
Profile
Xmas Scan
| | 'Scan |
Services
Details
( h ttp ://n m a p .o rg
) a t 2 0 1 2 * 0 8 -2 4
: Loaded 03 s c r i p t s f o r s c a n n in g .
NSE: S c r i p t P r e - s c a n n in g .
I n i t i a t i n g ARP P i r g S can a t 1 6 :2 9
S c a n r in g 1 0 . 0 . 0 . 4 [ 1 p o r t ]
C o m p le te d ARP P in g S can a t 1 6 : 2 9 , 8 .1 5 s e la p s e d ( 1 t o t a l
h o s ts )
I n i t i a t i n g 3a r a l l e l DNS r e s o l u t i o n o f 1 h o s t , a t 1 6 :2 9
C o m p le te d P a r a l l e l DNS r e s o l u t i o n 0-f 1 n e s t , a t 1 6 : 2 9 ,
0 .0 0 s e la p s e d
I n i t i a t i n g XMAS S can a t 1 6 :2 9
S c a n r in g 1 0 . 0 . 0 . 4 [1 0 0 0 p o r t s ]
I n c r e a s in g se nd d e la y f o r 1 0 . 0 . 0 . 4 f r o m e t o 5 due t o 34
o u t o f 84 d o p p e d p ro o e s s in c e l a s t in c r e a s e .
C o m p le te d XHAS S can a t 1 6 : 3 0 . 8 .3 6 s e la p s e d (1 0 0 0 t o t a l
p o r ts )
I n i t i o t i n g S e r v i c e sca n at 1 6 :3 0
I n i t i a t i n g OS d e t e c t i o n ( t r y # 1 ) a g a in s t 1 0 . 0 . 0 . 4
NSE: S c r i p t s c a n n in g 1 0 . 0 . 0 . 4 .
I n i t i a t i n g USE a t 1 6 :3 0
C o m p le te d NSE a t 1 6 : 3 0 , 0 .0 e s e la p s e d
N nap
scan
H ost is
re p o rt
fo r
1 0 .0 .0 .4
u p ( 0 .0 0 0 2 0 s l a t e n c y ) .
T A S K
Null Scan
27. Null scan works only if the operating systems T C P /IP implementation
is developed according to RFC 793.111 a 111111 scan, attackers send a TCP
frame to a remote host with N O Flags.
28. To perform a 111111 scan for a target IP address, create a new profile.
Click Profile >New Profile or Command Ctrl+P
Zenmap
[ New ProfJe or Command
9 d it Selected Prof<e
Hosts
||
Scrvncct
Scan
| Cancel |
Qrl+E
OS Host
w
10.0.0.4
FIGURE 6.21: The Zenmap main window with the New Profile or Command option
C E H L ab M an u al P ag e 133
29. O n die Profile tab, input a profile name Null Scan in the Profile nam e
text field.
L ^ I
Profile Editor
n m a p - s X - T 4 - X - v 1 0 .0 .0 .4
Help
Profile name
Profile Information
This is how the profile v/ill be
identf ied in the drop-down combo
box in the scan tab.
FIGURE 622: The Zenmap Profile Editor with the Profile tab
m T he option, -b
< F T P relay h o st> (FT P
bounce scan) allows a
user to connect to one
F T P server, and then
ask that files be sent to a
third-party server. Such
a feature is ripe for
abuse o n m any levels, so
m ost servers have
ceased supporting it.
30. Click die Scan tab in the Profile Editor window. N ow select the Null
Scan (sN) option from the TCP scan : drop-down list.
Profile Editor
nmap -eX -T4 -A -v 10.0.0.4
H e lp
Prof le name
Scan options
Targets (optional):
1C.0.04
TCP scan:
Non-TCP scans:
None
Timing template:
ACKscen ( sA)
|v
C E H L ab M an u al P ag e 134
Cancel
Save Changes
FIGURE 6.23: The Zenmap Profile Editor with the Scan tab
31. Select None from the Non-TCP scan s: drop-down field and select
A ggressive (-T4) from the Timing tem plate: drop-down field.
32. Click Save C hanges to save the newly created profile.
'-IT - '
Profile Editor
nmap -sN -sX -74 -A -v 10.0.0.4
In Nmap, option
version-all (Try every single
probe) is an alias for -version-intensity 9,
ensuring that every single
probe is attempted against
each port.
P r o f ile
S can
|Scan[
Help
P i n g | S c r i p t in g | T a r g e t | S o i r e e [ C t h c i | T im in g
Scan options
Targets (opbonal):
1 0 .0 .0 .4
TCP scan:
Non-TCP scans:
None
Timing template:
Aggressive (-T4)
[Z
I d le S c a n ( Z o m b ie ) ( -s i)
! D i s a b l e r e v e r s e D N S r e s o lu t io n ( - n )
oncel
E rj Save Change*
FIGURE 6.24: The Zenmap Profile Editor with the Scan tab
Iools
Erofile
Help
Target | 10.0.0.4
Command:
Hosts
OS
Services
Null Scan
< H ost
*U
Prof1:
< Prctoccl
< State
<
10.00.4
Filter Hosts
FIGURE 6.25: The Zenmap main window with Target and Profile entered
34. N m ap scans the target IP address provided and displays results in Nmap
Output tab.
C E H L ab M an u al P ag e 135
B Q
Zenmap
Scan
Tools
Target
Profile
10.0.0.4
Com m and:
Profile:
Null Scan
Scan!
Services
OS < Host
10.0.0.4
S ta r t in g
Mmap 6 .0 1
( h t t p : / / n 1r a p . o r g
) at
2012 0 8 24
N S t: Loaded 93 s c r i p t s f o r s c a n n in g .
NSE: S c r i p t P r e - s c a n n in g .
I n i t i a t i n g ARP P in g Scan a t 1 6 :4 7
S c a n n in g 1 0 . 6 . 0 . 4 [1 p o r t ]
C o n p le te d ARP P in g S can a t 1 6 : 4 7 , 0 . 1 4 s e la p s e c ( 1 t o t a l
h o s ts )
I n i t i a t i n g P a r a l l e l DNS r e s o l u t i o n o f 1 h o s t , a t 1 5 :4 7
C o n p le t e d P a r a l l e l DNS r e s o l u t i o n o-F 1 h o s t , a t 1 6 : 4 7 ,
0 .2 8 s e la p s e ti
i n i t i a t i n g n u l l sca n a t 1 6 :4 7
S c a n n in g 1 0 . 0 . 0 . 4 [1 0 0 0 p o r t s ]
I n c r e a s in g se n d d e la y f o r 1 0 . 0 . 0 . 4 -fro m 0 t o 5 d u e t o 68
o u t o f 169 d ro p p e d p ro b e s s in c e l a s t i n c r e a s e .
C o n p le t e d NULL S can a t 1 6 : 4 7 , 7 .7 B s e la p s e d (1 0 0 0 t o t a l
p o r ts )
I n i t i a t i n g S e r v ic e s c a n a t 1 6 :4 7
I n i t i a t i n g OS d e t e c t i o n ( t r y * l ) a g a in s t 1 0 . 0 . 0 . 4
NSE: S c r i p t s c a n n in g 1 0 . 0 . 0 . 4 .
I n i t i a t i n g NSE a t 1 6 :4 7
C o n p le te d NSE a t 1 6 : 4 7 , 0 .0 0 s e la p s e c
Nmap s c a n r e p o r t f o r 1 0 . 0 . 0 . 4
H o s t i s up ( 0 . 0 0 0 0 6 8 s l a t e n c y ) .
Cancel
n m a p - s N - T 4 - A - v 1 0 .C .0 .4
Hosts
IM
Help
Details
Filter Hosts
FIGURE 6.26: The Zenmap main window with the Nmap Output tab
35. Click the Host Details tab to view the details o f hosts, such as Host
S tatu s, A ddresses. Open Ports, and Closed Ports
-[nrx '
Zenmap
Scan
Tools
rofle
Com m and:
Profile:
Null Scan
Cancel
n m a p - s N - T 4 A - v 1 0 .0 .0 .4
Hosts
Sen/ices
OS Host
*
Help
10.0.0.4
Target
10.0.0.4
B Host Status
State:
Open ports:
ports:
Closed ports:
up
0
0
ie
1000
Not available
Last boot:
Not available
S Addresses
IPv4: 10.0.0.4
IP v 6:
N o t a v a ila b le
MAC: 00:15:5D:00:07:10
C o m m e n ts
Filter Hosts
FIGURE 627: Hie Zenmap main window with the Host Details tab
T A S K
C E H L ab M an u al P ag e 136
36. Attackers send an ACK probe packet w ith a random sequence number.
N o response means the port is filtered and an RST response means die
port is not filtered.
E th ica l H a c k in g an d C o u n term easu res Copyright by EC-Coundl
All Rights Reserved. Reproduction is Strictly Prohibited
37. To perform an ACK Flag Scan for a target IP address, create a new
profile. Click Profile >New Profile or Command Ctrl+P.
!^T
Zenmap
Command:
Hoete
Services ]
OS < Host
IM
Ctrl+E
10.0.0.4
Filter Hosts
FIGURE 6.28: The Zenmap main window with the New Profile or Command option
38. O n the Profile tab, input ACK Flag Scan in the Profile nam e text field.
r a n
Profile Editor
nmap -sN -T4 -A -v 10.0.0.4
Profile [scan | Ping | Scripting | Target | Soiree[ Cthei | Timing
Help
Description
Profile Information
Description
ancel
Save Changes
FIGURE 6.29: The Zenmap Profile Editor Window with the Profile tab
39. To select the parameters for an A CK scan, click the Scan tab in die
Profile Editor window, select ACK sc a n (sA) from the Non-TCP
scan s: drop-dow n list, and select None for all die other fields but leave
the T argets: field empty.
C E H L ab M an u al P ag e 137
!-!
Profile Editor
[ScanJ
n m a p - s A -s W - T 4 - A - v 1 0 .0 .0 .4
Help
E n a b le a ll a d v a n c e d , a g g r e s s iv e
Scan options
o p tio n s
Targets (optional):
10004
TCP scan:
Non-TCP scans:
None
Timing template:
|v |
ancel
Q Save Changes
FIGURE 6.30: The Zenmap Profile Editor window with the Scan tab
40. N ow click the Ping tab and check IPProto probes (-PO) to probe the IP
address, and then click Save Changes.
Profile Editor
[Scan]
n m a p - s A -sNJ - T 4 - A - v - P O 1 0 0 .0 .4
Help
I C M P ta m ta m p r# q u * :t
Ping options
Don't ping before scanning (Pn)
Cancel
Save Changes
FIGURE 6.31: The Zenmap Profile Editor window with the Pmg tab
41. 111 the Zenm ap main window, input die IP address o f the target
machine (in diis Lab: 10.0.0.3), select ACK Flag Scan from Profile:
drop-down list, and then click Scan.
C E H L ab M an u al P ag e 138
Zenmap
Scan
Tools
Target:
Profile
Help
10.0.0.4
Command:
Profile:
Scan
Cancel
Hosts
Services
Details
Filter Hosts
FIGURE 6.32: The Zenmap main window with the Target and Profile entered
Sc$n
Tools
rofle
Command:
<
Profile:
Cancel
Hosts
OS
Help
10.0.0.4
Target:
Zenmap
Sen/ices
Host
Details
10.0.0.4
S t a r t in g ^map 6 .0 1 ( h tt p : / / n m a p .o r g ) a t 2 0 12 -0 8-2 4 17 :03
I n d ia S ta n d a rd T i n e
Nmap s c a n r e p o r t f o r 1 0 .0 . 0 .4
H ost i s
u9 (0 .0 0 0 0 0 3 0 1
la t e n c y ).
1 IP
a d d re s s
(1 h o s t u p ) s c a n n e c i n
7 .5 7 se co n d s
Filter Hosts
FIGURE 6.33: The Zenmap main window with the Nmap Output tab
43. To view more details regarding the hosts, click die Host Details tab
C E H L ab M an u al P ag e 139
Zenmap
Scan
Tools
Target:
Profile
[~v~| Profile:
10.0.0.4
Command:
Hosts
Scan
Cancel
Services
Scans
; 10.0.04
OS Host
*
Help
10.0.0.4
5 Host Status
btate
IS
Open portc:
Filtered ports:
Closed ports:
Scanned ports: 1000
Uptime:
Not available
Last boot
Not available
B A ddresses
IPv4:
1a0.0.4
IPv6:
Not available
MAC:
0Q15:50:00:07:10
Com m ents
Filter Hosts
FIGURE 6.34: The Zenmap main window with the Host Details tab
Lab A nalysis
Document all die IP addresses, open and closed ports, sendees, and protocols you
discovered during die lab.
T o o l/U tility
Intense scan
Xmas scan
Null scan
ACK Flag scan
In ten se Scan N m a p O u tp u t
N m ap
C E H L ab M an u al P ag e 140
YOUR INSTRUCTOR
IF YOU HAVE Q U E S T IO N S
T H IS LAB.
RELATED
TO
Q uestions
1. Analyze and evaluate the results by scanning a target network using;
a.
b. nmap - P
2. Perform Inverse TCP Flag Scanning and analyze hosts and services for a
target machine in die network.
In te rn e t C o n n ectio n R eq u ired
Yes
0 No
P latform S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 141
0 iLabs
KEY
2 3 Valuable
inform ation
T est your
knowledge
W eb exercise
W orkbook review
Lab S cenario
You have already noticed in die previous lab how you can gadier information such
as ARP ping scan, MAC address, operating system details, IP ID sequence
generation, service info, etc. duough Intense Scan. Xmas Scan. Null Scan and
ACK Flag Scan 111 Nmap. An attacker can simply scan a target without sending a
single packet to the target from their own IP address; instead, they use a zombie
host to perform the scan remotely and if an intrusion detection report is
generated, it will display die IP o f die zombie host as an attacker. Attackers can
easily know how many packets have been sent since die last probe by checking die
IP packet fragment identification number (IP ID).
As an expert penetration tester, you should be able to determine whether a TCP
port is open to send a SYN (session establishment) packet to the port. The target
machine will respond widi a SYN ACK (session request acknowledgement) packet if
die port is open and RST (reset) if die port is closed and be prepared to block any
such attacks 011 the network
111 this lab you will learn to scan a network using NetScan Tools Pro. You also need
to discover network, gadier information about Internet or local LAN network
devices, IP addresses, domains, device ports, and many other network specifics.
Lab O bjectives
The objective o f diis lab is assist to troubleshoot, diagnose, monitor, and discover
devices 011 network.
111
C E H L ab M an u al P ag e 142
S 7Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Networks
You can also download the latest version o f N etScan Tools Pro from
the link http:/ / www.11etscantools.com /nstprom ai 11.html
I f you decide to download die latest version, dien screenshots shown in die
lab might differ
A computer running Windows Server 2012
Administrative privileges to run die NetScan Tools Pro tool
Lab D uration
Time: 10 Minutes
O verview o f N e tw o rk Scanning
Network scanning is die process o f examining die activity on a network, which can
include monitoring data flow as well as monitoring die functioning of network
devices. Network scanning serves to promote bodi die security and performance
o f a network. Network scanning may also be employed from outside a network in
order to identify potential network vulnerabilities.
NetScan Tool Pro perform s the following to network scanning:
S TASK 1
Lab Tasks
Scanning the
Network
C E H L ab M an u al P ag e 143
* ta ataierm X ni faemeCvcidilcOetoceitc
EMtuaian copy, luld M>:
2. Click the N etScan Tool Pro app to open the N etScan Tool Pro window
Administrator A
Start
Server
Manager
Windows
PowwShel
Google
Chrome
H jp erV
kWvwcr
NetScanT...
Pro Demo
f*
Control
Pan*l
Mjrpw-V
Mdchir*.
V
( onviund
I't. n.".
e
' **1***
w rr
*I
20 2
x-x-ac
9
FIGURE 7.2 Windows Server 2012 - Apps
3. I f you are using the D em o version o f NetScan Tools Pro, then click
S tart th e DEMO
L) Database Name be
created in the Results
Database Directory and it
will have NstProDataprefixed and it will have the
file extension .db3
C :^Msers\Administrator documents
Name
Telephone Number
Fitie
Mobile Number
Organization
Email Address
Continue
Exit Program
FIGURE 7.3: setting a new database name for XetScan Tools Pro
6. The N etScan Tools Pro main window will appears as show in die
following figure
C E H L ab M an u al P ag e 144
_ - n |
test NetScanTools* Pro Demo Version Build 8-17-12 based on version 11.19
file
IP version 6 addresses
have a different format
from IPv4 addresses and
they can be much longer or
far shorter. IPv6 addresses
always contain 2 or more
colon characters and never
contain periods. Example:
2 0 0 1 :4 8 6 0 :b 0 0 6 :6 9
( i p v 6 . g o o g l e . com)
o r : : 1 (in te rn a l
lo o p b a c k a d d r e s s
Eflit
Aes51b!11ty
View
IP6
Help
Automated tools
M3nu3l tool: 13III
fw o rn e tools
*LCrre Dttcover/tools
Pass re 0 scow 1y ro ols
Otis 0015
P 3et le v * tools
tx t m u l tools
pro otam into
7. Select Manual Tools (all) on the left panel and click ARP Ping. A
window will appears few inform ation about die ARP Ping Tool.
8. Click OK
test
File
fd it
A<<f\11bil1ly
V irw
IPv6
MHp
Klrt'iianTooltS P io 'J
Automata!! Tool
A b o u t th e A R P P in g T o o l
Manual Tool( Ml
im
ARP Scan (MAC
Ua
D em o I im ita tio n s
None.
ij
Cah F m n it d
orisroots
P3c1Leveltool:
bcemai toots
Pro 0r3m Into
9. Select the Send B roadcast ARP, then U nicast ARP radio button, enter
the IP address in T arget IPv4 A ddress, and click Send Arp
C E H L ab M an u al P ag e 145
test
File
Fdit
Accessibility
View
,- ! s i
IPv6
Help
Automated Tools
subnet.
(f:00.00
Ol^FAa*
iendArc
index
ip
1 0.0.0.1
10.0.0.1
10.0.0.1
10.0.0.1
10.0.0.1
10.0.0.1
Stop
1
2
N j r b n to Send
A flP ?c
ann |M
|MA
A C i< n)
4
5
Cache Forensic!
I00 EJ
Co nton M onitor |v |
WnPcap ITcrfe<T P
Fawonte Tooli
Aa!re DHtovery Tool!
Pj1 1 !x< Oiiovcry Tooli
trte m ji looit
mac
A ddress
*
< *
- +
R esponse T ine (a se c i
10.0.0.1
* * <
1 0 .0 .0 .1
1 0 .0 .0 .1
'
-
10
1 0 . 0 .0 . 1
11
10.0.0.1
10.0.0.1
10.0.0.1
10.0.0.1
1 0 . 0 .0 . 1
13
14
15
P a level rools
A ddress
12
O t Tools
Report?
Q Add to Psvorftac
ARP Ping
* To Aa tom* ted |
a. * <
cc 0.0 0 2 6 4 9
cc :.o :: to
ce 0.0 0 3 3 1 8
Type
B road cast
U n ic a st
OnI c a a t
cc
cc
cc
cc
cc
0.002318
U n ic a st
0 .0 :6 9 * 3
ur.ic a a t
0.0 0 7 6 1 5
Cr.l e a s t
O.OC25IC
Cr.I c a a t
0.00198C
(In ic a a t
cc
cc
cc
cc
cc
o.ooiess
0.0:2318
Onicaat
Ur.ica a t
0 .0 :2 6 * 9
U r.icaat
0 .0 :2 6 4 9
tin ic a a t
(Tnic a a t
cc
cc
0.0 0 2 3 1 8
U n iea a t
:.0 : 2 6 4 9
V n ica a t
0.002318
1 0 . 0 .0 . 1
Cr. ic a a t
f*coram Into
10. Click ARP Scan (MAC Scan) in the left panel. A window will appear
with inform ation about the ARP scan tool. Click OK
test - NetScanTools Pro Demo Version Build 8-17-12 based on version 11.19
File
Fdit
Accessibility
View
IPv6
Help
Automated Toot
Use U ib tool lo send an ARP RoqiM&t to evury IPv4 addrtsA on your LAN. IPv4 connected
devices cswtrt Arts from ARP . K u n and mut rupond with thf IP nd MAC *d fir* .
Uncheck we ResoKre f>5 box for fssrti scan corp i o n ome.
Don't Cornet to 1io : d tk n the 1e>ute for a menu with moio options.
mo L im ita tio n s .
Hone.
oadcaat
ic a a t
le a st
le a st
lea se
Ca<n ForcnsKs
ic a st
ic a a t
le a st
le a st
ica at
e a st!
A ttn * Uncovery 10
ea st!
relive l>K0vryl
le a s t
ic a a t
Tool
11. Enter the range o f IPv4 address in Starting IPv4 A ddress and Ending
IPv4 A ddress text boxes
12. Click Do Arp Scan
C E H L ab M an u al P ag e 146
test
File
Edil
Accembility
View
IPv6
Help
Adsnocc
Staroic F v 4 Acerea
| :0 . 0
&v4ngIPv4Adjress
[ J j p 0 A 1 2 r a a l
I ]Addts^avaKat
ip v i M . . .
ARP Ping
ar The Connection
Detection tool listens for
incoming connections on
TCP or UDP ports. It can
also listen for ICMP
packets. The sources of the
incoming connections are
shown in the results list and
are logged to a SQLite
database.
w e Adflreofl
1 0 .0 .0 .1
0(
1 0 .0 .0 .2
EC .
- ...
r / r M 4 n u r * c f3 r e r
E ntry Type
l>5c!
d yr.arie
10 . 0.0
vm -M SS C L .
dynaxac
1 0 .0 .0
B c tta M C
n e t;ca r, la c .
&11 la c
iVnPcwInterfaxS'
AP*can(M
can (MAC
AC5<an)
I 10.0.0.7
Cache forensic(
(IZZ
0 Resolve P s
Connection Monitor
FawxKe Tools
Active Discovery Tool!
P^iiixe Discovery Too 11
o tis roois
PSCttt LCV(I Tools
exttmai toon
0gram into
13. Click DHCP Server Discovery in the left panel, a window will appear
with inform ation about D H C P Server Discovery Tool. Click OK
f*:
test - NetScanTools Pro Demo Version Build 8-17-12 based on version 11.19
f4 e
Ed*
Accessibility
View
IPv6
n '
H e#
Cat ha Forrniict
Connection Monitc
LJ DHCP is a method of
dynamically assigning IP
addresses and other
network parameter
information to network
clients from DHCP serv.
Dano limitations.
N one.
c r y T ype
lo c a l
n a x le
1 0 .0 .0
n a x ic
1 0 .0 .0
O K P S f w r O ucorc
DNS>Tools-core
T00IS -
J
P n tn r Ditcaveiy Tc
P l r l level Tool
External Too 11
14. Select all the Discover Options check box and click Discover DHCP
Servers
C E H L ab M an u al P ag e 147
test - NetScanTools* Pro Demo Version Build 8-1 7-12 based o r version 11.19
I
V
Q NetScanner, this is a
Ping Scan or Sweep tool. It
can optionally attempt to
use NetBIOS to gather
MAC addresses and
Remote Machine Name
Tables from Windows
targets, translate the
responding IP addresses to
hostnames, query the target
for a subnet mask using
ICMP, and use ARP
packets to resolve IP
address/MAC address
associations
Add Itoie
IM A
*rtonoted
Cache F o renjio
Ode or mtrrfacc bdow then crcos Discover
Discover ( X P Server*
.:n n c c to n Monitor
TM
A d d re ss
KIC A ddreas
1 0 .0 .0 .7
Stop
L. A
I I
QAddtoPflnre5
I n t r f r D e s c r ip tio n
iD
H y p e r-V V i r t a ! E t h e r n e t A d a p te r #2
W a t Time (sec)
DHCP S1 1 Discovery
DiscouB0 ?H3n t
DIIS T o o k - Coie
!
H05tn 3r 1e
V Subnet M5*r
V D o n o r ftairc
DMSloo's Advanced
S e r v e r Hd3 L n oM
O ffe re d I ?
O f f e r e d S u b n e t Mask
IP A d d re ss I
1 0 .0 .0 .1
1 0 .0 .0 .1
10. 0. 0. 2
3 days, 0 :0 (
d n s p
Router P
fa* KTP Servers
FiwoiiU Tools
A<tfc Dii coveiy Tools
Paislv* Discovery Tools
DNS Too 11
C rrtl Tooli
W * *Tools
Pioqrtm Inro
15. Click Ping sc a n n e r in the left panel. A window will appear with
inform ation about Ping Scanner tool. Click OK
test NetScanTools Pro Demo Version Build 8-17-12 based on version 11.19
F8e
EdK
Atcesiiblfity
j . j A I C
V ltw
IPv6
Htp
WtKOIM
AUtOIMtJ To Oh
A b o u t th e P in g S c a n n e r (a k a N e tS c a n n e r) lo o l
M jn g jl T00K (411
Rngm
ErvurKcJ
m
fir,
a
g - Graphi cal
D em o Im ita tio n s .
Port Scanner
.J
P o a m u o in M od f *><
ravontc toon
Dticovery!0
Discovery10
DNS 10011
Mint
P x te t L trti tooii
Tools
rooram inro
16. Select the Use Default System DNS radio button, and enter the range
o f IP address in S tart IP and End IP boxes
17. Click S tart
C E H L ab M an u al P ag e 148
----e
test - NetScanTools * Pro Demo Version Build 8-17-12 based o r version 11.19
6dK
Accessibility
View
IPv6
EndJP
10.0.0.:
10.0.0.S0
IH
F a Hdp, press F1
AKANrtSeannw
H ostnam e
1 0.5.0.2
10.0.0.5
tnKKS3ELOUK41
my:-UQM3MRiRM
0
0
1 0 .0 .0 .7
WIN-D39HRSHL9E4
10.0.0.1 ?
0 ResolveTPs
Time ( M |
*5<J r0f0n?r3
T a r g e t IP
S tA to a
0:0 t e a : s c p i v
MSttp.0/.255W l
Port Scanner
1 103 I oca
P r o u c u o u 5 M o d e S<onr ^
ARP Seen
FaroiK Tools
Do Sulnel M a i: Sea!
P a is ** Discovery Tools
DNS Too 11
| irw:vu:
S* J I L*vtl Tool I
M * 1nal Tools
Pfogr!* Info
Oeof Imported tm
18. Click Port sc a n n e r in the left panel. A window will appear with
inform ation about die port scanner tool. Click OK
F
-_lnl
test NetScanTool $ Pro Demo Version Build 8-17-12 based on version 11.19
F ie
Ed 11
Accembilrty
View
IPv6
Help
ri i h 3>I^
WeKom*
Automated T0011
u n n ti/N e tS u n n ei 9
A b o u t th e P o r t S c a n n e r 1 ool
MnuITouU Iall
NEVER SCAN A COMPUTER YOU DO NOT OWN OR HAVE THE OWNER S PERMISSION TO SCAN.
PW0 tnnanced
P nq Scanner
P 0 1 K U 0 u t M ode
sc a n , c om b ined TCP ful c o r r e c t and UOP scan, TCP SYN o n ly scan and t c p OT^er s o n .
D o n 't m is s t h is s p e c ia l l e d t u r e in t h ' s t o o l: After a target h as b een sca n n ed , an a alf s s .v in e o w
w ill o p e n in > o u r O eh J t w e b brow ser.
D o n 't f o r g e t n g h t c*<k n w e r e sjits for 3 m enu w ith m ore o p tio n s.
Port Scanner
Com e::ton Timeout use 200 c* less on a fa st network correction yjdhneaiby corp . t e i . _ * 3
more on a d a u : conneoo
W ot After Connect - J i s c-
0 long each port test w aits before deoting thot ih ; port is ,o r a o e .
setfln<cA>ebv settee* ccmccxns. Try 0, (hen (ry lire. Notice the dfferexe.
SfetU1
M G m e c jir *
) 3003 seconds) or
Domo KmlUtlons.
Hone.
19. Enter the IP Address in the T arget H ostnam e or IP A ddress field and
select the TCP Ports only radio button
20. Click Scan Range of Ports
C E H L ab M an u al P ag e 149
1-1
test - NetScanTools Pro Demo Version Build 8-17-12 based on version 11.19
fte
Ed*
Accessibility
View
6\)
Help
I10.0-01
I
Start
I 'T C P P o rtsI
LDP P3te C ny
O TCP4UJP Ports
O tcpsyn
B'd f a
OlCPaMM
Scan C i r p lr tr .
A rip T O *utOHMted |
^to^ont
Sea R.anoc of ! v s
St * Comnon Path
| & d tco n w > Parts Let
P o rt
P o rt D vac
P ro to c o l
80
h te p
TCP
R e s u lt
O a t R .v d
P o r t A c t iv e
Port Stunner
P roncuou5 M ode 1
f3vor1t* Tools
/<t* Discoreiy Tools
MrPasp:-ir-^acr :
10.D.0.
Connect T rco u t
( 100D = !second]
w a t Aftc co>co
( I COD - 1 **to n tf
t x ttm ji Tools
Program inro
:
FIGURE 7.14: Result of Port scanner
Lab A nalysis
Document all die IP addresses, open and closed ports, services, and protocols you
discovered during die lab.
T o o l/U tility
C E H L ab M an u al P ag e 150
IPv4 Address
MAC Address
I / F Manufacturer
Hostname
Entry Type
Local Address
YOUR INSTRUCTOR
IF YOU HAVE Q U E S T IO N S
T H IS LAB.
RELATED
TO
Q uestions
1. Does NetScaii Tools Pro support proxy servers or firewalls?
In tern e t C o n n ectio n R eq u ired
Y es
0 No
P latform S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 151
0 iLabs
KEY
Valuable
inform ation
T est your
knowledge
W eb exercise
W orkbook review
Lab S cenario
Ail attacker can gather information fiom ARP Scan, D HCP Servers, etc. using
NetScan Tools Pro, as you have learned in die previous lab. Using diis information
an attacker can compromise a DHCP server 011 the network; they might disrupt
network services, preventing DHCP clients from connecting to network resources.
By gaining control o f a DHCP server, attackers can configure DHCP clients with
fraudulent T C P /IP configuration information, including an invalid default gateway
or DNS server configuration.
diis lab, you will learn to draw network diagrams using LANSurveyor. To be an
expert network adm inistrator and penetration te s te r you need to discover
network topology and produce comprehensive network diagrams for discovered
networks.
111
Lab O bjectives
The objective o f diis lab is to help students discover and diagram network topology
and map a discovered network.
111
C E H L ab M an u al P ag e 152
Draw a map showing die logical connectivity o f your network and navigate
around die map
Create a report diat includes all you! managed switches and hubs
ZZy Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Networks
I f you decide to download die latest version, dien screenshots shown in die
lab might differ
Lab D uration
Time: 10 Minutes
O verview o f LA N Surveyor
SolarWinds LANsurveyor automatically discovers your network and produces a
comprehensive network diagram that can be easily exported to Microsoft Office
Visio. LANsurveyor automatically detects new devices and changes to network
topology. It simplifies inventory management for hardware and software assets,
addresses reporting needs for PCI compliance and other regulatory requirements.
TASK 1
Draw Network
Diagram
Lab Tasks
Install LANSurveyor on your Windows Server 2012
Follow die wizard-driven installation steps and install LANSurvyor.
1. Launch the S tart menu by hovering die mouse cursor in the lower-left
corner o f the desktop
C E H L ab M an u al P ag e 153
LANsurveyor's
Responder client Manage
remote Windows, Linus,
and Mac OS nodes from
the LANsurveyor map,
including starting and
stopping applications and
distributing files
Start
A d m in is tr a to r
S e rw
M o rale r
Windows
PowetShd
Goo*
Chrwne
HpV
1- 'X vj j.
lANswv..
Pamrt
e
rwnt hptom
2 ?
w : a
Megafing
N eeanL.
Pto Demo
l i
[fie
- *
^ LANsurveyor uses an
almost immeasurable
amount of network
bandwidth. For each type
of discovery method
(ICMP Ping, NetBIOS,
SIP, etc.)
C E H L ab M an u al P ag e 154
s o la rw in d s 7'
What you can do with LANsurveyor.
Scan and map Layer 1. 2. 3 network topology
f i LANsurveyor uses a
number of techniques to
map managed switch/hub
ports to their
corresponding IP address
nodes. It's important to
remember switches and
hubs are Layer 2 (Ethernet
address) devices that don't
have Layer 3 (IP address)
information.
&]
"2
be u o td
m S e la rV /n d a n o t/.o k and o p p lc a to r
Qnfcne Manual
For additional h e p on using the LAIJsuve yo r read the LANSurveyor Administrator G ude
Evaluation Guide
T h a L A M a u r v a y o r E v aiu ab o n G u id a p r c v d a a a n ir tr d 1cton to L A M a u r v a y o r fa a tu ra a a r d r a t n ic b c n a fe r n t t a lin j . c o n f g u r n j , an d
j s m g L A H s u rv e y o r.
Support
T h e S o h r w in d s S u p o o rl W e b * i o f fe r * a s e n p r e h e r s v e se t o f to o l* to h e lp y o u n a n a o e a uJ n a r t a m y o r S o h rW in d * a p p le a tio n s
v b t tne < ii^ y d a 1 .e a 2 s ,
fic ^ t y
Q v y t9 . o r J p o a ic
S tart S c a n r ir g fJet.. o k
] [
C E H L ab M an u al P ag e 155
H ops
==&
[ p t fe fc p riv ate
LANsurveyor's network
discovery discovers aU
network nodes, regardless
of whether they are end
nodes, routers, switches or
any other node with an IP
address
QSNNPv3 Devices
I SNMPv3 Options..
1j P
MSPCSer*
Mapping Speed
Faster
Slower
Configuration Ma^aperon*
Save 0 ixovery Confgwaiion.
I Discovery Donf^uiaiijn..
Cored
HopO: 10 .0 .0 . 1 - 10 .0 .0.254
SNMP Sends
SNMP R ecess:
03 L A N surveyor rs
capable o f discovering
and m appm g m ultiple
V L A N s o n Layer 2. F or
exam ple, to m ap a
switch connecting
m ultiple, nonconsecutive V LA N s
ICMP Receipts
Subnets Mapped
Nodes Mapped
WIN-D 39 MR5HL9 E4
Routers Mapped
Switches Mapped
Cancel
7.
C E H L ab M an u al P ag e 156
|^ =
Q LANsurveyor
Responder Clients greatly
enhance the functionality
of LANsurveyor by
providing device inventory
and direct access to
networked computers.
Me
Edit
& h
KH> e
M anage
00
M onitor
1*
Report
Tools
Avdow
- 1-1
|
solarwinds
151 v s 3 a 0 a s r&
id *T |100*;
&m o
ff
Help
111
P Addresses (4)
D omain Names (4)
-4
fP
M
ffc-
W ti '.'S ilL C M W I
Wf.-WSC'tlXMK-O
R e u te r
veisor
W1N-DWlllRlLSt4
WIN D3JI H5HJ *
Overview
f*~|
SNM P Svntches H u b s
hC
as
*
ft
. . 0 .0 - (.0.0.255
V*4UCONJWRSfWW
M
N-LXQN3W
RJNSN
non'
100 9 1
10006
12-
Lab A nalysis
Document all die IP addresses, domain names, node names, IP routers, and SNMP
nodes you discovered during die lab.
T o o l/U tility
LA N Surveyor
SNMP Send - 62
ICMP Ping Send 31
ICMP Receipts 4
Nodes Mapped 4
C E H L ab M an u al P ag e 157
IP Address - 4
Domain Names - 4
N ode Names - 4
YOUR INSTRUCTOR
IF YOU H A VE Q U E S T IO N S
T H IS LAB.
RELATED
TO
Q uestions
1. Does LANSurveyor map every IP address to its corresponding switch or
hub port?
2. Can examine nodes connected via wireless access points be detected and
mapped?
In te rn e t C o n n ectio n R eq u ired
Yes
0 No
P latform S upported
0 C lassroom
C E H L ab M an u al P ag e 15S
0 iLabs
KEY
Valuable
inform ation
T est your
knowledge
W eb exercise
W orkbook review
Lab S cenario
111 die previous lab, you found die SNAIP, ICMP Ping, Nodes Mapped, etc. details
using die tool LANSurveyor. If an attacker is able to get ahold o f this information,
he or she can shut down your network using SNMP. They can also get a list o f
interfaces 011 a router using die default name public and disable diem using die readwrite community. SNMP MIBs include information about the identity o f the agent's
host and attacker can take advantage o f diis information to initiate an attack. Using
die ICMP reconnaissance technique an attacker can also determine die topology o f
die target network. Attackers could use either die ICMP ,Time exceeded" or
"Destination unreachable" messages. Bodi o f diese ICMP messages can cause a
host to immediately drop a connection.
As an expert Network Administrator and Penetration T e ste r you need to discover
network topology and produce comprehensive network diagrams for discovered
networks and block attacks by deploying firewalls 011 a network to filter un-wanted
traffic. You should be able to block outgoing SNMP traffic at border routers or
firewalls. 111 diis lab, you will leani to map a network using die tool Friendly Pinger.
Lab O bjectives
The objective o f diis lab is to help students discover and diagram network topology
and map a discovered network.
hi
C E H L ab M an u al P ag e 159
You can also download the latest version o f Friendly Pinger from the
link h ttp :// www.kilievich.com/fpinge17do\vnload.htm
If you decide to download the latest version, dien screenshots shown in die
lab might differ
Lab D uration
Time: 10 Minutes
O verview o f N e tw o rk M apping
Network mapping is die study o f die physical connectivity of networks. Network
mapping is often carried out to discover servers and operating systems ruining on
networks. This tecluiique detects new devices and modifications made in network
topology You can perform inventory management for hardware and software
assets.
Friendly Pinger performs the following to map the network:
Monitoring network devices availability
Notifies if any server wakes or goes down
Ping o f all devices in parallel at once
Audits hardw are and softw are components installed on the computers
over the network
Lab Tasks
1. Install Friendly Pinger 0 x1 your Windows Server 2012
2. Follow die wizard-driven installation steps and install Friendly Pinger.
task
Draw Network
Map
C E H L ab M an u al P ag e 160
3. Launch the S tart menu by hovering die mouse cursor in die lower-left
corner of the desktop
4. Click the Friendly Pinger app to open the Friendly Pinger window
Administrator
S ta rt
^ You are alerted when
nodes become
unresponsive (or become
responsive again) via a
variety of notification
methods.
Sen*r
Manager
Windows
PowerSMI
r_
C o m p ile r
Control
Panol
Uninaall
&
H y p -V
Machine..
Eaplewr
Command
Prompt
M 02111a
Firefbx
Path
Ana/zer
Pro 2.7
GOOQte
Chrome
>
i l
Km
O rte f
Sm nfcO L.
Fnendty
PW^ff
fl*
IG
5. The Friendly Pinger window appears, and Friendly Pinger prom pts you
to watch an online demonstration.
6. Click No
V ie w
P in q
N o t ific a tio n
S can
F W a tc h c r
In v e n to r y
1& - y a fit
V
E d it
H e lp
*
D o to
Demons tration
map
In la n d
M .ui
S h u ll cut S m v t i
WoikStation
W ndc S ta tio n
(*mall)
21/24/37
&
OG00:35
C E H L ab M an u al P ag e 161
7. Select File from the menu bar and select die Wizard option
L-!j x
Friendly Pinger [Demo.map]
F ile | E d it
V ie w
P in g
N o t if ic a t io n
S ca n
F /fa tc ler
In v e n to r y
H e lp
* C *%! ft x
CtrUN
W eA
Gtfr Open...
Ctil+O
Uadate
Ctr!U
Save.
CtrUS
Reopen
|
U
S v A t...
Clow
P rin t...
Lo ck ...
C reate
Options...
f c V S a ve A s Im a ge...
^
t b Close A ll
C trl'-B
Setup...
5T
fr!
In la n d
S c iy c i
F9
X L F rit
Alt*)(
JJ
Workstation
a
Internet Hail
Shoitcul Server
--------Mnriem
Hob
W inkStatiun
I1,11|
r'r;m
Cicdt
O d ll in itia l llldL
Wizard
10.0.0.7
Local IP address:
10.0.0.1 2d
| I Timeout
1000
Help
4 * gack
=Mext
Cancel
111
C E H L ab M an u al P ag e 162
Wizard
IP address
Name
0 10. 0. 0.2
W1N-MSSELCK4K41
10.0.0.3
Windows8
10.0.0.5
W1N-LXQN3WR3R9M
10.0.0.7
W1N-D39MR5HL9E4
Help
4 * Back
3 Next
Cancel
11. Set the default options in the Wizard selection windows and click Next
Wizard
0 Ping verifies a
connection to a remote
host by sending an ICMP
(Internet Control Message
Protocol) ECHO packet to
the host and listening for
an ECHO REPLY packet.
A message is always sent to
an IP address. If you do
not specify an address but a
hostname, this hostname is
resolved to an IP address
using your default DNS
server. In this case you're
vulnerable to a possible
invalid entry on your DNS
(Domain Name Server)
server.
Qevices type:
W orkstation
Address
O Use IP-address
| Use DNS-name |
Name
Remove DNS suffix
A dd* ion
Help
! Next
Cancel
12. T hen the client area will displays the Network map in the FPinger
window
C E H L ab M an u al P ag e 163
V
F ile
E d it
View/
P in g
N o t ific a T io n
S can
F W a tc h e r
in v e n t o ry
H e lp
H >
ft J* & g
13. To scan the selected computer in the network, select die com puter and
select the Scan tab from the menu bar and click Scan
Friendly P ing er [Default.map]
file
Lb
-y a *
e? M
Scan..
C E H L ab M an u al P ag e 164
F61
50* m
233:1
3 / i/ 4
00:00:47
Scanning
Service
Compute
Command f a
& ] HTTP
W1N-MSSELCK...
h ttp://W IN -M S S ELC X 4M 1
] HTTP
W1N-D39MR5H...
S c a n n in g co m p le te
^JBescan
Progress
? Help
ok
Caned
15. Click the Inventory tab from menu bar to view die configuration details
o f the selected computer
T ^ rr
Friendly P h g e r fD efault.m apl
V
P k
E d it
V 1 w
P in g
1 C a : * BS J
m
N o t if ic a t io n
S<*n
F W a tc h c r
I r v c n t o ry \ N d p ___________________
\&\^ *
E l Inventory Option!.
Ctil-F#
16. The General tab o f the Inventory wizard shows die com puter name
and installed operating system
C E H L ab M an u al P ag e 165
W
File
Inventory
Edit
View
Report
Options
Help
la e:
0 S ? 1 1 E
W IN-D39MR5HL9E4
|g
General[
M isc| M 'j
H ardware]
Software{ _v)
History| ^
>
Computer/User
CQ Assignment of external
commands (like telnet,
tracert, net.exe) to devices
Hos* name
|W IN-D39MR5HL9E4
User name
!Administrator
W indows
Name
Service pack
C otecton tme
Colecbon time
18/22 /2 0 12 11 :2 2:3 4 AM
17. The Misc tab shows the Network IP ad d resses. MAC a d d re sse s. File
System , and Size o f the disks
5 Search of
HTTP, FTP, e-mail
and other network
services
x '
Inventory
File
Edit
e i g?
View
Report
Options
Help
0 *a a
G*?
fieneraj
Misc
hardware |
Software |
History |
Network
IP addresses
110.0.0.7
MAC addresses
D4-BE-D9-C3-CE-2D
J o ta l space
465.42 Gb
Free space
382.12 Gb
Display $ettng$
display settings
Function "Create
Setup" allows to create a
lite freeware version with
your maps and settings
Disk
Type
Free, Gb
Size, Gb
3 C
Fixed
15.73
97.31
84
NTFS
S D
Fixed
96.10
97.66
NTFS
File System
18. The H ardw are tab shows the hardware com ponent details o f your
networked computers
C E H L ab M an u al P ag e 166
T T
File
E dit
V ie w
R e p o rt
O p tio n s
H e lp
0 ^ 1 3 1 0
H
1N-D39MFS5HL9E4||
General
Miscl
Mi
H a rd w a re [^ ]
Software
History |
>1
<
Mem ory
<2
4096 Mb
- Q j BIOS
Q|
- ) Monitors
E O
D is k drives
q
N e tw o rk a dapters
| j | @ netrt630x64.inf,% rtl8168e.devicedesc% ^ealtekPQeG BE Family Controller
-^
S CS I a nd R A ID controllers
@spaceport.inf,%spaceport_devicedesc%;Micro$oft Storage Spaces Controller
J
FIGURE 9.14: FPinger Inventory wizard Hardware tab
19. The Softw are tab shows die installed software on die computers
Inventory
File
Edit
View
Report
Options
[) Q5r
WIN-D39MR5HL9E4
------------------ H
Help
0 1 3 1 0
G*
general |
M sc \
Hfdware| S
Software
Q Visualization of
your com puter
network as a
beautiful
anim ated screen
>
Name
Version
Developer
Homepage
|f t
Go
Lab A nalysis
Document all die IP addresses, open and closed ports, services, and protocols you
discovered during die lab.
C E H L ab M an u al P ag e 167
T o o l/U tility
10.0.0.2
10.0.0.3
10.0.0.5
10.0.0.7
YOUR INSTRUCTOR
Computer name
Operating system
IP Address
MAC address
File system
Size o f disk
Hardware information
Software information
IF YOU H A VE Q U E S T IO N S
T H IS LAB.
RELATED
TO
Q uestions
1. Does FPinger support proxy servers firewalls?
2. Examine the programming o f language used in FPinger .
In te rn e t C o n n ectio n R eq u ired
Yes
0 No
P latform S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 168
0 iLabs
Lab
T est your
knowledge
W eb exercise
W orkbook review*
Lab S cenario
111 the previous lab, you learned to use Friendly Pinger to m onitor network
devices, receive server notification, ping information, track user access via the
network, view grapliical traceroutes, etc. Once attackers have the information
related to network devices, they can use it as an entry point to a network for a
comprehensive attack and perform many types o f attacks ranging from DoS
attacks to unauthorized administrative access. I f attackers are able to get
traceroute information, they might use a methodology such as firewalking to
determine the services that are allowed through a firewall.
I f an attacker gains physical access to a switch 01 other network device, he or
she will be able to successfiUly install a rogue network device; therefore, as an
administrator, you should disable unused ports in the configuration o f the
device. Also, it is very im portant that you use some methodologies to detect
such rogue devices 011 the network.
As an expert ethical h ack er and penetration te ste r, you m ust understand how
vulnerabilities, com pliance specifications, and co n ten t policy violations are
scanned using the N essus rool.
Lab O bjectives
This lab will give you experience 011 scanning the network for vulnerabilities,
and show you how to use Nessus. It will teach you how to:
C E H L ab M an u al P ag e 169
You can also download the latest version o f Nessus from the link
http: / / \vw\v. tenable.c om / products/nessus/nessus-dow nloadagreement
Lab D uration
Time: 20 Minutes
Lab Tasks
8
TA sK
Nessus
Installation
fJ a n e
P u d s h t :
Type
From;
C ;\lb c m A d m in i3 tato1\Doklop\Ne11u1-5.02-*66 $ 4 -.
Run
CencH
V A lw a y s e sk c e fc r e o p e n in g t h e file
C E H L ab M an u al P ag e 170
< Back
Next >
Cancel
5. Before you begin installation, you must agree to the license agreem ent
as shown in the following figure.
6. Select the radio button to accept the license agreement and click Next.
!;
Q Nessus has the ability to
test SSLized services such as
http, smtps, imaps and more.
L ic e n s e A g r e e m e n t
P lease read the following k e n s e a greem en t carefully.
P rin t
Next >
Cancel
C E H L ab M an u al P ag e 171
Click Next to instal to this folder, or ckk Change to instal to a different folder.
>
Change...
InstalSh ield
< Back
Next >
Cancel
8. The wizard prom pts for Setup Type. W ith die Com plete option, all
program features will be installed. Check Complete and click Next.
Tenable Nessus (x64) InstallShield Wizard
Se tu p T ype
FIGURE 10.5: The Nessus Install Shield Wizard for Setup Type
9. Tlie Nessus wizard will prom pt you to confirm the installation. Click
Install
C E H L ab M an u al P ag e 172
InstalShield
< Back
Instal
Cancel
Cancel
C E H L ab M an u al P ag e 173
N essus H om e D ire c to ry
P urpose
\conf
Configuration files
\data
Stylesheet templates
\nessus\plugins
Nessus plugins
\nassus\usrs\<username>\lcbs
User knowledgebase
saved on disk
1 W in d o w s
\Program
Files\Tenable\Nessus
\ no33us\ logs
>----------------------- - 1
w e lc o m e to N essus!
P Im m
c o n n e c t v ia S S L b y c lic k in c J h r .
More Info
14. Click the Continue to this w eb site (not recom m ended) link to
continue
C E H L ab M an u al P ag e 174
&* ^
X
Snagit
g j
II
The security certificate presented by this website was not issued by a trusted certificate authority.
The security certificate presented by this websrte was issued for a different website's address.
Sccunty certificate problems may indicate an attempt to fool you or intercept any data you send to the
server.
W c recommend th a t you close this webpage and do not continue to this website.
Security Alert
1C. i ) ^ou are a^out t0 view pages over a secure connection
Any information you exchange with this site cannot be
viewed by anyone else on the web.
HI In the future, do not show this warning
OK
More Info
16. Tlie Thank you for installing N essus screen appears. Click the Get
S tarted > button.
R ff
W e lc o m e t o N e s s u s
T W 1k you loi I11ldlll1 j
m warning, a custom
certificate to your
organization must be used
tin w uM 1
>>< h * i 1i
Nwmu*
dllim i vu to pwloiin
1I *ah 3ped vulnerability discovery, to <Je?er re *Ivcn hcets are njmlna nhich se1v1r.es
1 AijnnlUiai Auditing, la 1 m U w t no Im l
)
ia
aacurlty |W I >!!
> L-umplianca chocks, to verify and prove that eve , host on your network adheres to tho security potcy you 1
Scan scliHliJing, to automatically iu i *cant at the
you
And morel
17. 111 Initial A ccount Setup enter the credentials given at the time o f
registration and click Next >
C E H L ab M an u al P ag e 175
o (**<*.>. e c
Wefconeu Neaus
In it ia l A cco u n t S etu p
First, we need to create an admin user for the scanner. This user will have administrative control on the scanner; the admin has the ability to create/deiete
users, stop ongoing scans, and change the scanner configuration.
loo*n: admin
Confirm P.ivwvoiri.
< Prev
| Next > |
Because fAe admin user can change the scanner configuration, the admin has (he ability to execute commands on the remote host. Therefore, It should be
i that the admin user has the same privileges as the *root( or administrator) user on the remote ho
18. 111 Plugin Feed R egistration, you need to enter die activation code. To
obtain activation code, click the http://w w w .nessus.org/register/ link.
19. Click the Using N essus a t Home icon in Obtain an Activation Code
>
el
mi (A*CAftCMin
Resources
Support
IriM h lr Product*.
PiotfuU Oi'eniB*
Nksui AudHai
.1ndi
N w m Plug**
.Sjirplr Repom
NMUi FAQ
Vkle Ostlrtt FAQ
in
Dtptovmam 1>:001u
Mewos Evukoiion
Training
20. 111 N essus for Home accept the agreement by clicking the Agree button
as shown in the following figure.
C E H L ab M an u al P ag e 176
ecem -. nr.
U s u ilv U tn ir n N t
Wokerne 10 NaMi
Bw* m s i
1*vtl ProtoiaioaaJFetid
to
of 1K0v>yov to perform <
dedR 0( *S* Tw Nes*u llrtual apCliMK*
Product Overview
Features
N w m PlufllM
SU8VCWII0M ACM I Ml NI
Sarnia Rapatto
N m a i fAQ
VWtlu 0#>lM4 I AQ
Deployment Options
on
Ayee^aeann rftj
(of ana pay an! <?AcaM teeassociated - r t!
Subscriptia You awv not u&e tw H>r *f sad SutricripUo $1anted to You lot
[ puipoMS to aacuia Yu>01 any third partys, itatrvoifcs or to any efea
**e 'ltt dM M oai !raning h a r*xvp10A 1clon nvonn*rr T m U a an y
k t a a u h it o a Sutrp#on undat this Soctnn 2 1311 to!
C i s t * Massus Ftegm L.<lopmcnt
I
apmant and Dtsoibullan
Tenable I
& JM 1a<(1 at fta Subscriptions 10 mfle and d a v f 1
{c
I*raaI
S l f you do not
register your copy
of Nessus, you
will not receive
any new plugins
and will be unable
to start the
N essus server.
Note: The
Activation Code is
not case
sensitive.
GO!
TE N A B LE N e tw o rk S e c u rity
Partner*
Ira in in g
ft
(V rttflratto n
R eso u rces
.Support
print |
Iriu ih lr I'rorfiirtr
Pioduct O v m v Iow
Register a HomeFeed
IM
#tl4vjfed
>1 1 U nil! not t
N5 sus FAQ
Motde Devices FAQ
Deployment Options
**
con^
Nes3u3 Evaluation
Training
I npqi<;tpr I
FIGURE 10.15: Nessus Registering HomeFeed
22. The Thank You for R egistering window appeals for T enable N essus
HomeFeed.
C E H L ab M an u al P ag e 177
. V j .
*> Y.to
EN TER SEARCH I E (
TE N A B LE N e tw o rk S e c u rity 1
solutions
Products
Services
Partners
Resources
Support
About tenable
Store
>print | sltare Q
Ten a b le P ro d u c ts
nessus
Product Overview
Nessus Auditor
Bundles
Nessus Plugins
Documentation
Sample Reports
Nessus FAQ
Mobile Devices FAQ
Deployment Options
S m u t Evaluation
I raining
23. N ow log in to your email for the activation code provided at the time o f
registration as shown in the following figure.
r
I
>
Sm>Cu1
Oft >
Y A H O O ! MAIL
MIMDtlalt
10 1 -OnHOOOOl*
Th* )0ulw rejnlem j row N n w i k * x
a tll> scanting
k Mr
a s*:fess1crulFc 2ut>cagttc1 :
cu itm*
w ,!te.^ffiwr.flgm.'iti'HMiitltinMSua^jaiiifrtiiwft* ***
c n m te la poem
24. N ow enter the activation code received to your email I D and click Next.
C E H L ab M an u al P ag e 178
"
- ,[ Wekcm* 10 Meuvt 9
commetGd Prgfcaatonalfccd
x |
O p tio n al P ro xy Settin g s
< Prev
N ext >
fx
P 0 Cc**uttemH S C
*-h o *
B s ~ **
J wefc<* <to
ft *
o
1
R e g is te rin g ...
R egistering th e scan n er w ith T e n a b le ...
P O Ce*rt<*eo &
C|
Wetcone to Nessus
[ x
-ft * *
o
R e g is te rin g ...
S u ccessfu lly re g istere d th e sc an n e r w ith T e n a b le.
Su c ce ss fu lly c rea te d th e user.
|
N e x t: D o w n lo ad plugin a >
27. Nessus will start fetching the plugins and it will install them, it will take
time to install plugins and initialization
N ess u s is fe tc h in g th e n e w e s t p lu g in set
P le a a e w a it...
28. H ie N essus Log In page appears. Enter the U sernam e and Passw ord
given at the time o f registration and click Log In.
C E H L ab M an u al P ag e 179
/>. 0
T A S K
tc
Network Scan
Vulnerabilities
nessus
I
TENALg
, 1
nessus
OK I
30. After you successfully log in, the N essus Daemon window appears as
shown in the following screenshot.
m To add a new policy,
chck Policies ^Add Policy.
31. I f you have an A dm inistrator Role, you can see die U sers tab, which
lists all U sers, their Roles, and their Last Logins.
C E H L ab M an u al P ag e 180
32. To add a new policy, click Policies >Add Policy. Fill in the General
policy sections, namely, Basic, Scan, Network C ongestion, Port
S canners, Port Scan Options, and Perform ance.
^W ARNING: Any
changes to the
N essus scanner
configuration will
affect ALL N essus
users. Edit these
options carefully
33. To configure die credentials o f new policy, click die C redentials tab
shown in the left pane o f Add Policy.
C E H L ab M an u al P ag e 181
34. To select the required plugins, click the Plugins tab in the left pane o f
Add Policy.
P
W OWBlc/Otr!c
U rir
r
u !j Suit# 1 o !v .b
Oan ottKdfenwct,
O
o
(a) 0neral
Vj GenlTOUKBlS*aj*yChK*
y mp-ux L0Ca Seaifty c k i
Jurat UjcU Sacunty ChKM
***nee wmpars
35. To configure preferences, click the P references tab in the left pane o f
Add Policy.
36. In the Plugin field, select D atabase se ttin g s from the drop-down list.
If the policy is
successfully added, then the
Nessus server displays the
massage
38.
C E H L ab M an u al P ag e 182
CD Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
C E H L ab M an u al P ag e 183
S ' Tools
dem onstrated in
this lab are
available in
D:\CEH
Tools\CEHv8
Module 03
Scanning
Netw orks
47. Double-click Local N etw ork to view the detailed scan report.
^
fc
..-*
d
Bn B
Cvwii
'
So-Mity
gMtyi
H m n t w 11 1 I K INWI
*
M m
m tn
Me
M Ul-a* *-. * Qi
CuMUrm tlmbn rf
UTMMB1W . i 1
M M
<< *
lv>
HM
KTT* I n T! M VIWMH
Wt
N M < N ilr a W U II M tW M l
W M W lK M l
HM
m jm
M .-~ > rm *m
H9W
x fn
1-01
Into
Iftte
W i ll- '
WiMom
M m x M tC o tn m k U u iu im
w m m uv fro^jMren
G&a1fcsKr<
CwMot
f o r r J . i H a r 1r m
UB
MO.
y%ttn 1hm lU n C M * *
riC n ilto U D
0. 0. *=
In*)
C E H L ab M an u al P ag e 184
Q
If you are manually
creating"nessusrc" files,
there are several parameters
that can be configured to
specify SSH authentications.
49. Click the Dow nload Report button in the left pane.
50. You can download available reports with a .n e s s u s extension from the
drop-down list.
X
D o w n lo a d R ep o rt
D o w n lo a d F o rm a t 1
C h a p te rs
S u b m it
B
>M
*6
69
FIG U R E 10.37: Log o ut Nessus
Lab Analysis
Document all die results and reports gadiered during die lab.
C E H L ab M an u al P ag e 185
T o o l/U tility
N e ssu s
T arg e t IP A ddress: 10.0.0.2
R esult: Local H ost vulnerabilities
PL E A S E TALK T O Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
Questions
1. Evaluate the OS platforms that Nessus has builds for. Evaluate whether
Nessus works w ith the security center.
2. Determine how the Nessus license works in a V M (Virtual Machine)
environment.
In te rn e t C o n n ectio n R eq u ired
0 \ es
No
P latform S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 186
iLabs
ICON
KEY
a - Valuable
information
s
Test your
knowledge
Web exercise
W orkbook review
Lab Scenario
W ith the development o f network technologies and applications, network
attacks are greatly increasing both in number and severity. Attackers always look
for s e r v ic e vulnerabilities and ap p lication vulnerabilities on a network 01
servers. If an attacker finds a flaw or loophole in a service run over the Internet,
the attacker will immediately use that to compromise the entire system and
other data found, thus he or she can compromise other systems 011 the
network. Similarly, if the attacker finds a workstation with ad m in istrative
p riv ileg es with faults in that workstations applications, they can execute an
arbitrary code 01 implant viruses to intensify the damage to the network.
As a key technique in network security domain, intrusion detection systems
(IDSes) play a vital role o f detecting various kinds o f attacks and secure the
networks. So, as an administrator you shoiild make sure that services do not run
as the root u ser, and should be cautious o f patches and updates for applications
from vendors 01 security organizations such as CERT and CVE. Safeguards can
be implemented so that email client software does not automatically open or
execute attachments. 111 this lab, you will learn how networks are scanned using
the Global Netw ork Inventory tool.
Lab Objectives
This lab will show you how networks can be scanned and how to use Global
N etw ork Inventory. It will teach you how to:
Use the Global N etw ork Inventory tool
C E H L ab M an u al P ag e 187
Lab Environment
ZZ Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
You can also download the latest version o f Global N etw ork Inventory
from this link
http://w w w .m agnetosoft.com /products/global network inventory/gn
i features.htm /
Lab Duration
Time: 20 Minutes
Lab Tasks
t a s k
Scanning th e
network
1. Launch the Start menu by hovering die mouse cursor in the lower-left
corner o f die desktop.
2. Click die Global Network Inventory app to open die Global Network
Inventory window.
C E H L ab M an u al P ag e 188
5 t 9 |
Server
M a n age r
fL
Administrator
Win dows
PcrwerShell
m
C o n trol
Panel
Scan computers by IP
range, by domain, single
com puters, or computers,
defined by the Global
N etw ork Inventory host
file
*J
Mw w &plcm
H y p r-V
Virtual
M a ch in e .
SQ L S ervs
C o m m an d
Prom pt
M ozfla
Firefo*
B
S-
PutBap
Hn>er.V
M anager
G oogle
C hrom e
Bui
Search 01..
Global
N e c o rt
H
FIGURE 112: Windows Server 2012 - Apps
& S c a n only
item s that you
need by
custom izing sca n
elem en ts
5. Turn 011 W indows Server 2008 virtual machine from Hyper-V Manager.
C E H L ab M an u al P ag e 189
Reliable IP
d etectio n and
identification of
network
ap p lian ces such
a s network
printers,
docum ent
cen ters, hubs,
and other d e v ic e s
V I E WS S C A N
RESUL TS,
/
NCL UD/ NC
HI STORI C
RESUL TS
FOR ALL
SCANS,
I N D I V I DU A L
MACHINES,
OK
c Back
Next >
Cancel
7. Select IP range scan and dien click Next in die Audit Scan Mode wizard.
SELECTED
NUMB E R OF
ADDRESSES
C E H L ab M an u al P ag e 190
N ew Audit Wizard
A u d it S c a n M ode
To start a new audfc scan you must choose the scenario that best fits how you w i
be using this scan.
Is (^ M
Q Fully customizable
layouts and color schemes
on all views and reports
() IP range scan
Choose this mode i you want to audit a group of computers wttwn a sr>gle IP range
O Domain scan
Choose this mode i you want to audit computers that are part of the same doma1(s)
0 Host file scan
Choose this mode to audt computers specified in the host file The most common
scenario is to audt a group of computers without auditing an IP range or a domain
O Export audit agent
Choose this mode i you want to audit computers using a domain login script.
An audit agent vwi be exported to a shared directory. It can later be used in the
domain loain scriot.
To continue, c ic k Next.
< Back
Nexi >
Cancel
______
8. Set ail IP range scanand then click N ext in die IP Range S can wizard.
E xport data to HTML,
XML, M icrosoft Excel, and
text formats
C E H L ab M an u al P ag e 191
9. 111 die Authentication S ettin gs wizard, select C onnect a s and fill the
respected credentials o f your W indows Server 2 008 Virtual M achine, and
click Next.
N ew A u d it W izard
The program
c o m e s with
d ozen s of
cu stom izable
reports. N ew
reports can be
ea sily added
through th e user
interface
ad^iriS'3(-
Password
...............'
To continue, d c k Next
< Back
Nert >
Caned
10. Live die settings as default and click Finish to complete die wizard.
N ew A u d it W izard
Completing the New Audit Wizard
( 7 Ability to generate
reports on schedule after
every scan, daily, weekly, or
monthly
( T o configure reports
choose R ep o rts |
C onfigure rep o rts from
the main m enu and select a
report from a tree control
on a left. Each report can
be configured
independently
< Back
Frwh
Caned
C E H L ab M an u al P ag e 192
iJ
Scan progress
Address
1 0 .0 .0 . 2
10.0.0.3
10.0.0.4
0.0.0.5
0.0 0 6
A O M INPC
10.0.0.7
W IN-039M R5HL9E4
1 0 .0 .0 8
1 0 .0 0 9
100010
Tmestamp
Percent
Name
E*
E
W1N-ULY858KHQIP
! z
^
08/2 2 /1 2 1 5 :3 6 :2 3
8 52
08/2 2 /1 2 1 5 :3 6 :2 5
!*
08/2 2 /1 2 1 5 :3 6 :2 3
92*
0 8/2 2 /1 2 1 5 :3 6 :2 3
92*
08/2 2 /1 2 1 5 :3 6 :2 2
0 8 /2 2 /1 2 1 5 :3 6 24
0 8 /2 2 /1 2 1 5 :3 6 24
E*
E*
E*
E*
100011
10
1 0 .0 .0 . 1 2
10.0.0.13
10.0.014
08/2 2 /1 2 1 5 :3 6 :2 3
z
z
1A
0 8 /2 2 /1 2 1 5 3 8 :3
E !%
'
I
'
0 8 /2 2/1 21 5:3 6 :2 4
08/2 2 /1 2 1 5 :3 6 :2 4
08/2 2 /1 2 1 5 :3 6 :2 4
0 8 /2 2/1 21 5:3 6 :2 4
m ic . v . ^ 1
rtn
Sl0p
Cl
Pi'v fie
V ie w
S ta n
T o o ls
R ep o rts
H elp
]E r BlBWtalri~EI] u *?
U te r r
C a r r i e s> en
Nirrt
- MpIaaddresses
Syttern *tat
|A )
i w r a r r r . :-
$ W ORKGROUP
S car M W
rjqr
N etB IO S
| A
P rr* M r*
HM ftte r c m n a o n
^ rrtm
A.
JW ! .W
Memory
pin
Memory
]*
Networt
^p#rat:r.r
Shanes
M a n beard
|Q
m e rit
:I 1 0.0JX7 (W IN -D 3 9 ...
m 1 a 0 J X ( W 1N -U LV 8 ...
| Tircitamp
D o ra r
H o a tN ... J Status
M A C A..
V e r r fa
0 3 M am s
R o c e s s a ...
*. Com ment
W O R K G R O U P [C O U N T -2 )
I P A d d e : 1 0.0 0 .4 (C O U N T -1 1
T r r e s t a r o : G 2 /2 0 1 2 3 36:4B PM (C O U N T -1 )
C o r o j . . |v/N ULV85(| S u c c c ii
IP A d d c m . T 0 .0 0 .7 (C0UNT-=11
I T r r e jt a r .3 . & 36. 30 3 2012
22 >PM ( C 0 U N T -1 ]
C k >j ..[ v / N 3 S M F ||S u c c o m
Tow ?nwr(t)
iD ^ -O E -D O -C ^ n o a lc .
Oisplaye^roijp^l^roups
13. N ow select W indows Server 2008 machine from view results to view
individual results.
C E H L ab M an u al P ag e 193
l - l W *
v ie w
in
& S9 3
sca n
T o o l(
R ep o rt <
H ?p
%-u110 | s ^ P i g
B |Q |^ |a |D |B - B
|^
' -
Port a r r e d o R
N e rrc
B ^AH addresses
B - <* WORKGROUP
O rvces
System dots
Shores
L ^ cvp s
Po;c3:cn>
Scan u n ra ry
| ^
NetBIOS
Computer 3y3tcn
| 3
''ci b o s d
0 ctn3 C,ctcn
Startup
^
Desktoo
Lbcre
M orer)
(ji)
| J
Logged c r
B8
*|^r)0.a7(WN-D3T~1
C J 4 iv>N-ULV3.r.
Type
HikIM
Sfdlin
MAC A
V btkIh
CJS
* PlOCHZM (
* C0I1HIMf
Duiein *o ^ e n a j p COUNT-11
JIP A d d rew 10.Cl07(C O U N T1)
TncU aro: G/22/2012 3 GG: 38 PM (CO UN T-1)
C5t o j . |V/NC39MR Succc
|D4 BE D9-C|Realck
01011 ia(j)
^jgl^c^roug^l^r
^esufc^jto^jegt^oj^ca^o^oc^cdfcj^
Redr
14. The Scan Summary section gives you a brief summary o f die machines diat
have been scanned
1 - ^r
View
Scan
Tools
Reports
Melo
]e
*5 '
n 1* a * a
Nam
- !A1addrestM
^
WORKGROUP
Sn
tin>lcr5
yw don
( j
D ovcoi
J
l# |
1 ^ -sa
t1
a x
[# j
- .r% xi*rty rt r
Scan a n r m y
V crito o
a w-
| jjjjj
Logical d sk a
S^eton d o t
NoifcKJS
j^
Sharoe
:^:;ore
]
Hoi tacoe
CX>k & ts z i
Q
Jt
mo
"Sntcn
S o c u ty ccrto
0 $orgroupt
M a n te s :
| j*
Networx oocp to o
Startup
U*ra
*5
fa
B*S
|H
Dcckiop
LoggoCon ^
M enoiy cevicee
Q |
ijperatmg
:mtOiXOi^N-ULYC"
To configure
results history
level c h o o s e Scan
| R esults history
level from th e
main menu and
s e t th e desired
history level
Hcs4 H.. -
Status
MAC A .. barrio-
~ OSKsrw
Prco3350r.. Corrmert
Tolall 4em(s)
rU-BF-DC:| R ^ r r i
^c^U^iiitorydepthj
FIGURE 11.13: Global Inventory Scan Summary tab
C E H L ab M an u al P ag e 194
Looc a d!s\s
Z: -
v ie w
1^
5ta n
T o o ls
89 J5
k.
Narrc
Derive*
Hct fixes
MdBIOS
P
|1a616T(w1^039.7'''
System dots
. rr-
.s r jx x p s
3"
Mar ?pad
Opcra.i-10 Cvs.or
.7 :
Scaabr e a te r
Shares
Poeewots
J^
Ssa^aumanr
5 W ORKGROUP
jij
Por. -annccfcrc
H * P A ll a d d r e s s e s
B
1 ' '
H e lp
S J 1 ' E T? | 5 |
icwresufts
R e p o rt(
1555
Merer?
>
fid . .
Startup
>*
fc l
| ^
Desktop
Lccocd o r
Memory donees
cut
{ 10.0.1>*VIN-IJI Y8...
1 01* 1
Ud/
Q 't p lt / d g r o u p : All g r o u p t
16. The Memory tab summarizes die memory in your scanned machine.
E-mail
ad d ress S p ecifies th e email ad d ress that
p eop le should u se
w hen sending email to you at this
a ccou n t. The email ad d ress m ust
be in th e format
name(ftcompany
for exam ple,
som eone@ m ycom
pany.com
V ie w
S ca n
T o o ls
R e p o rts
H e V iB lB & lm lH F i- iii
v ie w retuR*
a x
** s a
\M 0 coofirokn
y -.
D*Ye*t
4 # WOWCROUP
;h
Mentors
iff)
*w
L.
>#H
N am *
H %
h e lp
|g j
Logical daks
ct encct f
[#]
NmBIOS
t M
- !:-
Oak n
Shw*1
fff
11
Uttramu
t5
%-
>
10*
Operating ,d-
Network a d ^ c n !
Startup
| 'j
tk # n
ber/ r*c
|K
or
Memory f l w f
I0.C.0.4 (WIN-ULY8...
Tc<alPh3^cdven>0f/.M 3
d[D
S a la b le H -yrea...
lo t a . . . - -
&valabl&..
V .C R t5F 0U P [C rM JN '= ]J
Hcsr Marre 3 9 ^ ^ MF5HL9E4 (C0U!\iT=1)
J
hrescnp
V22J20123:36-38 PM (COUNT| )
3317
7 o b i 1 it s u ;1
O ii p la / e d g r o u p : A ll g r o u p s
C E H L ab M an u al P ag e 195
;- !o r
v ie w
Son
T o o ls
R ep o rts
H elp
Memcry
N a 1r
Scan 3 jm a r y
&I addresses
Port c o n r w c t r c
h it d t e d y t * sre
S)
C l
C l
S * d r t / M t r
Qf
Memory d e v ic e c
n vm m g rt
| ."3
|;&
Startup
H - f i W ORKGROUP
Services
D esktop
lo g g e d on
1C.0.C. (WIN-D39...
19 1 0 ^ f^ U L Y ::
* [ W K - 0 3 9 M R o - LSE4<C>tt>>
L m q j?
W o ik s ta t c r Service
W K C SM R^rLSE4<0x2O5
L nque
F ie Server Service
W ORKGROUP
Group
Domain N am e
<0x00>
T o id 3 i . e n ld
R ea fly
t<pt/ed g ro u p : A ll g r o u p s
18. The U ser Groups tab shows user account details with die work group.
I 1
Nam e S p ecifies
th e friendly nam e
a sso c ia te d with
your e-mail
ad dress. When
you sen d
m e s sa g e s , this
nam e appears in
th e From box of
your outgoing
m essa g es
View
Scan
Tools
Reports
Help
1 c V | B p |g |m |
2
C o n j u t a s r r f
S3 5) *3 $
N jit
* i* A ll a d d r e s s :
- i f
WORKGROUP
ccc
I :
m
7
^
a
Q
P^ cc350ra
Vent
#>
CIO
jj]
Opcralinq Cyslcrr
It#]
M a r board
Net Cl DC
S hares
I^J)
D 9sdr>c*
M em ?y
P r r t c o
>
ij0
Q
D e v ic c :
|^
Locicoldbks
El
| J?
cr
!nvronmcrrt
A-
-b w g rx x
Memory c fc v c c s
N e t t e d .
Startup
_bera
I,
Deaktoo
Lojj=d o r
? S iiilL
i a i J i w N S :
H o s t N c n e / / * -D 3 9 -4 R 5 H L 9 E 4 (C O U N T -5 1
z i ' r r e s c a n p : E /2 2 '2 0 1 2 3:36:38 F M ( C OU N 5- ]
G io u j
!S 0 C E N R 5HL3E4'>Adrim $tratoi
U 5 cr o c c c u r t
z i C r^ JD : C K t t K it e d CO M Usets (C O U N I - 1 1
v / ls C 2 S N R 5 H _ 3 E 4 \ A d f 1 i istj<)(01
U ;e t a c c o u rt
_ J G r ^ o : Guc:; C O U N T -1 )
Jk u A N 0 3 E M R 5 H L 9 E 4 \ G u t s l
d C 1 0 *.IIS J U S fiS
z i G r a if
U :* f ccou rt
CO UN T !)
p M t a v u r e * 1 r g U t t r t ( C Q I J N T 1)
T U 0 I 5 i c n | i|
R sa d /
D sp la y c C g r o u p ; All q io u p a
19. The Logged on tab shows detailed logged on details o f die machine.
C E H L ab M an u al P ag e 196
1 - 1
v ie w
5<ar
T o o ls
R e p o rts
3 - Is ? H c 1 e /
V w re<uKs
*2
%
S
_
A l l a d d re s s e s
f
a i d s y ie fi
-1a &
Q
Processors
N errc
H e lp
S c a n s u r a n a iy
BCS
Port c o m e d o s
W O RKGRO UP
| . )
'* { 3 0 S
M ain beard
O o e fa tr o System
System slots
Cr ^ r .
L>j1d j s v j
|
l )
H o tfix e s
2'
S h a e&
N e n o iy
Di:-. J .
t o t a le d software
>
Memory d e / c e s
|(|
S e a i t ) e e r ie r
Net ..
Environment
%
U s e tu .
S ervices
3 .< n : u ,_ _ H L _ 2 s 5 tlS B _ J
Users
| j>
Logg ed o r
;1abix7"(wiN-D3g...
; '1 6 0 . 0 4 (W IN -U LY 8 ...
H oaN ok
W H -033N R 5H L34 (C O U N T S
1 N T S E R V .C E >M s D is S e rv e rl 10
f
H S E R V C E 'M S S Q L F D L o u n c h a
N R V lC E VM S S Q L S E R V E R
N S E R V C E 'M S S Q L S e r / e iO L A P S e iv ie e
* , N S E R V C E 'R e p o r t S c r v a
25.
5 \ A H D 3 9 M R E H L 9 E 4 \A < in h a tr*or
3 8 /2 2/1 2 09:01:20
R e su lts f r i t pry d e p th la s t ;c a n lo r t e c h a d d r c n
R ea dy
Oowove^rou^lUroups
20. Tlie Port con n ectors section shows ports connected in die network.
G lob a ' N e tw ork Inventory - U nregistered
ST
F ile
Scan
T o o lt
R ep o rt(
H elp
1S
v ie w re s u t;
O u tg o in g m ail
(SM T P) Specifies your
Simple Mail Transfer
Protocol (SMTP) server for
outgoing messages
w a x
Name
H-
NetBIOS
a b #
L.
AH a d d re s s e s
f r * W O R K G R O U P
r10bn7^N-big".'.
;can currrjr,
P t c on n ecto rs
JO
91ares
F io c e s s o is
l- b n t c r j
WOS
| S)
Ji>
LSe
L o g c a l d isk s
0p1fcrg Syren
Users
m ay
: -tKC1:
D:
fcrvron m en t
a
hrr
Logg ed o n
Memory devotes
Startup
S m :
D esktop
0^10 .(WfWNULY8""
D o r ia n . V / D ^ K O R O U ? (C0U N T = 2 5I
J
he* H a r e : t*T . D 3 9 M R 5 H L J 3 E 4 (C O U N T -2 5 )
J
alal 25
S e r a i P o r 1S55CA C o n p a r t le
D 6 9 .M ale
K e l o i d P011
FS /2
M ou cc Po ri
F S /2
703H
USB
t7
USB
00h
7 3
UCD
A c c 0 H .b u 4
, 703H
USB
A c o e s t.b u t
Atris
Fes j t s nistory deptn: Last scan foi eatfi address
21. Tlie Service section give die details o f die services installed in die machine.
C E H L ab M an u al P ag e 197
S To cr ea te a
n ew cu stom
report that
includes more
than on e sca n
elem en t, click
c h o o s e Reports |
Configure reports
from th e main
menu, click
th e Add button on
th e reports dialog,
cu stom ize
se ttin g s a s
desired, and click
th e OK button
v ie w
5<ar
T o o ls
R e p o rts
- $ * ] H e p H B ] e |
V ie w re<ufts
*1 *9 2
pf
%
S
Devices
Qf
Port cornedas
*i
Shares
Q
D
A l l a d d re s s e s
W O RKGRO UP
= r
-Eg &
NetBOS
et30S
N e ir c
H e lp
Ci
System slots
'
User croups
Main board
Hotfixes
Memory
ig )
Msrrcryde/ces
Startup
0 . c t i U S vtte
Loaaedor
Secut) center
jjjj
Jsers
Desktoo
S c r r is c a
"
13
iii'iu n ic il
1 y ' a a 7 i w i N -D 3 8 "
; '1 6 0 . 0 4 (W IN -U LY 8 ...
rr^ a n p
41loma1c
RufM rg
Manual
R u m rg
Automatic
R j'i'ir g
C V.Klowt\^1stern32\fivch0ftexe k apph(
^A p p fc a n o n Idenfctji
Manual
Stepped
C\*fcmdow1\svstem32\svc*10ft.exe k Local
Manual
R im r g
C V.m<tem(t\systern32\svcf10fr.exe k net?/
Manual
Stepped
C ,V,mdowt\S3i5tem32Ulg ew>
Manual
Stepped
C \v!n<kw?\system32\svcf10tt exe k ne lw
tpflr9r0nlnf1rml1on
. Apftlcanon Layer 5 rewau Service
Apffcarion Manafjenenr
I0 la l1 < 7 toart :J
Ready
Oowoye^KOu^lUroups
22. The Network Adapters section shows die Adapter IP and Adapter type.
1
view
Stan
Tools
Reports
I*
V cw rcsu R ;
r-l
& A security
accou n t
passw ord is
created to m ake
sure that no other
u ser can log on to
Global Network
Inventory. By
default, Global
Network
Inventory u s e s a
blank passw ord
^ E $
Narre
B
1^
Help
D c*cca
j|
C o n p u te r >*
All addr*<#<
y~ * W O RKGRO UP
- m o M
Q 'l l
[# J
Pc t c o r r c c t o o
S ca n s jr r r c r v
h v00
N e tBIO S
Q
Q
&
| ^
<
SK3X3
Prooeaaora
System alota
80S
|jgj]
|^
U3cr<rouF3
Mom boane
H o t fx c a
O p o r s trg Syrtom
fjj
JL
Ccc^ rfy e e r ie r
h w U to d t c ftv m o
1-
Uaera
M em ory
j*
B
B?1
Startup
Envtronmoat
Looocdon
Memory d e v ic e s
|^
| j ,
Deoksop
S o rv cm
|v
l2 S 2 S .2 g |1 D C .0 1
[vicreolt
|E therrct QIC|N 0
Iotall 1enlj
^esujt^jjto^jepth^as^a^o^scj^ddrts^
Rea^
^jjjte^e^roup^lU^oup^
Lab Analysis
Document all die IP addresses, open ports and miming applications, and protocols
you discovered during die lab.
C E H L ab M an u al P ag e 198
T o o l/U tility
G lobal N etw o rk
Inventory
Scan summary
Bios
Memory
NetBIOS
UserGroup
Logged O n
Port connector
Services
N etw ork Adapter
PL E A S E TALK T O Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
Questions
1. Can Global N etw ork Inventory audit remote computers and network
appliances, and if yes, how?
2.
How can you export the Global N etw ork agent to a shared network
directory?
0 No
P latfo rm S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 199
0 iLabs
KEY
p =7 Valuable
information
Test your
knowledge
w
Web exercise
Workbook review
Lab Scenario
111 the previous lab, you gathered inform ation like scan summary, NetBIOS
details, services running on a computer, etc. using Global Netw ork Inventory.
N etBIOS provides programs with a uniform set o f commands for requesting
the lower-level services that the programs must have to manage names, conduct
sessions, and send datagrams between nodes on a network. Vulnerability lias
been identified in Microsoft Windows, which involves one o f the NetBIOS
over T C P /IP (NetBT) services, the NetBIOS N am e Server (NBNS). W ith this
service, the attacker can find a com puters IP address by using its N etBIOS
name, and vice versa. The response to a N etBT name service query may contain
random data from the destination com puters memory; an attacker could seek
to exploit this vulnerability by sending the destination com puter a N etBT name
service query and then looking carefully at the response to determine whether
any random data from that computer's memory is included.
As an expert penetration tester, you should follow typical security practices, to
block such Internet-based attacks block the port 137 User Datagram Protocol
(UDP) at the firewall. You m ust also understand how networks are scanned
using Proxy Switcher.
Lab Objectives
This lab will show you how networks can be scanned and how to use Proxy
Switcher. It will teach you how to:
C E H L ab M an u al P ag e 200
Lab Environment
To cany out the lab, you need:
2 " Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
You can also download the latest version o f Proxy W orkbench from
this link http:/ / www.proxyswitcher.com/
Lab Duration
Time: 15 Minutes
Lab Tasks
Cl Autom atic
ch a n g e of proxy
configurations (or
any other action)
b ased on network
information
C E H L ab M an u al P ag e 201
Open the Firefox browser in your W indows Server 2012, go to Tools, and
click Options in die menu bar.
G o o g le
M o iillo Firefox
colt | HtJp
Qownloatfs
CW -I
moderns
cm * v *A
C3Often different
S e a r ch
Im ages
fi
e !1 -cc9u
S<* UpS^K.
You
D ocu m en ts
Web Developer
C alendar
M ote
Page Info
internet
co n n ectio n s
require
com pletely
different proxy
server settin g s
and it's a real pain
to ch a n g e them
manually
Sign n
01+ Sh1ft*IW
Google
Gocgle Search
A6 .t>11ng P io g a m m e i
P ir a c y t Te
Aboul Google
Google com
6.
&
G e n e ra l
G e n e ra l | M e tw o rV
Tabs
C o n te n t
A p p l ic a t io n s
j U p d a t e | E n c r y p t io n
p
P r iv a c y
*k
S e c u r it y
3
S> nc
A dvanced
C o n n e c tio n
C o n f ig u r e h o w h r e f o i c o n n e c t s t o t h e I n te r n e t
S g t n g i.
C a c h e d W e b C o n te n t
C le a r N o w
Y o u r v r e b c o n t e n t c a c h e 5 c u r r e n t ly u s in g 8 .7 M B o f d i s k s p a c e
I
I O v e r r id e a u t o m a t e c a c h e m a n a g e m e n t
1 a p p lic a t io n
T e ll m e w h e n a w e fc c ite a c lr t t o s t o r e H a t* f o r o f f l in e u c e
C le a r N o v /
c a c h e i s c j i r e n t l / u s in g 0 b y t e s 01 d is k s p a c e
Exceptions..
T h e f o llo v / in g t v e b s it e s a r e a lo w e d t o s to r e d a ta f o r o f f lin e u s e
B a r eve..
OK
Cancel
H e lp
7. Select die U se S ystem proxy se ttin g s radio button, and click OK.
C E H L ab M an u al P ag e 202
C onnection Settings
N o prox^
f i proxy switcher
supports following
command line
options:
HTTP 5rojjy:
127.0.0.1
@ U je this prcxy server for all protocols
SSLVoxy:
127.0.0.1
P firt
FTP *roxy.
127.0.0.1
P o rt
SOCKS H o s t
127.0.0.1
O
SOCKS v4
P o rt
SOCKS v5
N o Pro>y f o r
localhcst, 127.0.0.1
OK
Cancel
Help
Proxy Servers
Downloading
10. Click die Proxy Sw itcher Standard app to open die Proxy Sw itcher
window.
OR
Click Proxy S w itch er from die Tray Icon list.
C E H L ab M an u al P ag e 203
Administrator ^
S tart
S e rv er
M anager
Proxy Sw itcher
is free to u se
without lim itations
for personal and
com m ercial u se
W indow s
Pow ershell
Fs b
G oogle
C h ro m e
Hyper-V
M a n ag e r
91
SI
H yper-V
C o m p u te r
C ontrol
Panel
C o m m an d
P ro m p t
M021I*
Fre f o x
PKKVSw*
M achine...
p-
vrr
Global
N etw ork
Inventory
<0
C entof...
**
Proxy
C hecker
CM*u p
.
FIGURE 125: Windows Server 2012 - Apps
a t*
i f the server becomes
inaccessible Proxy Switcher
will try to find working
proxy server a reddish
background will be
displayed till a working
proxy server is found.
s Server.
A /Q
Customize...
t 1 l A r - r / 1!
jate Datacenter
^ D p ^ u ild 8400
11. The Proxy List Wizard will appear as shown in die following figure; click
Next
C E H L ab M an u al P ag e 204
3 Proxy Sw itcher
ssu pp orts for
LAN, dialup, VPN
and other RAS
co n n ectio n s
<Back
Next >
Caned
12. Select die Find N ew Server, R escan Server, R ech eck Dead radio button
fiom Common Task, and click Finish.
Proxy List Wizard
Uang this wizard you can qc*ckly complete common proxy
lot managment tasks
Cick finish to continue.
& Proxy
sw itchin g from
com m and line
(can be u sed at
logon to
autom atically s e t
con n ection
settin gs).
Common Tasks
() find New Servers. Rescan Servers. Recheck Dead
O Find 100 New Proxy Servers
O find New Proxy Severs Located in a Specific Country
O Rescan Working and Anonymous Proxy Servers
< Back
Finish
Caned
13. A list o f dow nloaded proxy servers will show in die left panel.
C E H L ab M an u al P ag e 205
E d it
A c t io n s
V ie w
H e lp
Roxy Scanner
* N e w (683)
B &high Aronymsus (0)
SSL (0)
: Brte(O)
i Dead (2871)
2 Permanently (656?)
1
B o ok . Anonymity (301)
-5 Pnva!e (15)
V t t Dangerous (597)
f~ &My P V Server (0)
:
PnwcySwitchcr (0)
Serve*
, ? 93.151.160.1971080
93.151.180.195:1080
93.150.9.381C80
tu1rd-113-68 vprtage.com
, f 93 126.111213:80
95.170.181 121 8080
<? 95.159 368 C
95.159.31.31:80
95.159 3 M 4 8 0
, f 94.59.260 71:8118
*
- ..............
State
Testira
Teetirg
Testing
Lhtested
Lhtested
Lht*ct*d
Lhtested
Lhtested
Lhtested
Lhtoetod
__ L>!tested___
ResDDnte
17082ns
17035n
15631ns
Countiy
H
RJSSIAN FEDERATION
m a RJSSIAN FEDERATION
RJSSIAN FEDERATION
*
UNITED STATES
m a RJSSIAN FEDERATION
Caned
S
State
tefre
Core PrcxyNet
Progress
MZ3
Conpbte
28 kb
Fbud
1500
Conpfcte
w!w nrtime.com<
DL
&
FIGURE 129: List of downloadeed Prosy Server
Edit
Actions
View
L=Jg' x 1
Help
filer F o x / Servers
Proxy Scanner
N#w (?195)
\y
Serve*
A ic n y m o u o (0)
I SSL (0)
fc?Bte(0)
B ~ # Dead (1857)
={2' P e rm a n e n tly 16844]
Basic Anonymity (162)
| ^ Private (1)
j--& Dangerous \696)
h &My Proxy Servers (0J
- 5 }ProocySwtcher (0)
Slate
001 147 48 1* tw nt
1:<*54-1591095 , 1
218152.121 184:8080
95.211.152.218:3128
95.110.159.54:3080
9156129 24 8)80
u>4 gpj 1133aneunc co
pjf dsdcr/2'20Jcvonfcrc com:
91.144.44.86:3128
91.144.44.88:8080
92.62.225.13080:
(Aliv-SSL)
(Alive-SSL)
(Alive-SSL)
(Alive-SSL)
(Alive-SSL)
(Alive-SSL)
(Alive-SSL)
(.*Jive-SSL)
(Alive-SSL)
(.Alive-SSL)
(Alive-SSL)
Resroroe
13810nt
106Nh*
12259ns
11185ns
13401ns
11&D2ns
11610m
15331ns
11271ns
11259ns
11977ns
Couriry
J HONG KONG
| ITALY
: REPUBLIC OF KOREA
NETHERLANDS
!IT A L Y
UNITED ARAB EMIRATES
: REPUBLICOF KOREA
5 SWEDEN
SYRIAN ARAB REPUBLIC
SYRIAN ARAB REPUBLIC
CZECH REPUBLIC
Cancel
DsajleJ
Keep Ali/e
Auto Swtcf
15. Click B asic Anonymity in die right panel; it shows a list o f downloaded
proxy servers.
C E H L ab M an u al P ag e 206
| _ ; o ^
z When running
in Auto Switch
m ode Proxy
S w itch er will
sw itch active
proxy servers
regularly.
Sw itching period
can be s e t with a
slider from 5
m inutes to 10
secon d s
Edit
Actions
View
Help
& s x I a a a
g ? Proxy Scanner
j~ # New (853)
B &
Aronyrroue (0)
h & SSL(0)
Bte(0)
1513
\
j~ &
1&
-
Server
91 14444 65 3128
119252.170.34:80..
114110*4.353128
41 164.142.154:3123
21 49101 10? 3128
2D3 66 4* 28C
203 254 223 54 8080
200253146.5 8080
199231 211 1078080
1376315.61:3128
136233.112.23128
<1
,f
<f
,f
f
,f
,f
,f
<f
<f
,f
if
'.. . "<<1"
Pnvale (16)
Dancerous (696)
My Proxy Sorvoro (0)
PraxySwltcher (0)
L i 0 0
A 1!l) 2 )
RespxKe
10160ns
99/2rre
10705ns
12035ns
11206ns
10635n
11037ns
10790ns
10974m
10892m
11115ns
State
(Alve-SSU
(Aive-SSU
(Alve-SSL)
(Alve-SSU
Alve
Alvo
(Alve-SSL)
Alve
(Alve-SSU
(Alve-SSU
(Alve-SSU
=* *,
Countiy
Sv R A fi ARAB REPUBI
INDONESIA
^
INDONESIA
)E SOUTH AFRICA
m
BRAZIL
H iT A IV /A M
REPUBLIC OF KOREA
p g BRAZIL
P 3 BRAZIL
1 BRAZIL
1
Caned
Dsabled
K e e p A liv e
A u to S w t d
ISilli&SSitSiSk
16. Select one Proxy server IP ad dress from right panel to swich die selected
fTJ icon.
F ile
E d it
,A c t io n s
V ie w
n [a
a . a
,.
S S L )0 <
f ,2 1 8 .152.121.184:3030
Dead )2381(
B Y
95.110159.545080
.... P e m a n e n tly 7 $ )6 9 2 5 (
P n a t e 116(
j \
f ,9 1 .1 4 4 4 4 .65:3123
f 0 0 1 .147.48.1 U . c t a b c r c t
r t g h A n o rry m o u * )0 (
&
;B1te 01)0(
In addition to standard
add/rem ove/edit functions
proxy manager contains
functions useful for
anonymous surfing and
proxy availability testing
^
a if
Server
P x y S ca n n e r 5
J *New )766(
P ro x y S e r/e re )0 (
P ro x y S v tttch e r )0 (
C ta e b lc d
[[
K o e p A liv e
1 ~ l~a !
H e lp
3i.S6.2S.2-i.S)SD..
if
9 5 .2 1 1 1 5 2 .2 1 8 :3 1 2 3
u 5 4 jp j1 1 3 5 a T T S jn o coJcr:
,f
9 1 .8 2 .6 5 .1 7 3 :8 0 8 0
< f 8 6 . 1 1 1 1 A 4 .T 9 4 .3 1 2 3
4 .89.130.23128
,f
9 1 4 4 4 4 86 3123
][ A u to S w t c h
2 \y
State
(Alve-SSU
(Alve-SSL
(Alve-SSU
Alh/e
(Alve-SSU
(Alve-SSL:
(Alve-SSU
(Alve-SSU
(Alve-SSU
(Alve-SSL)
(Alve-SSU
(AlveSSU
(Alve-SSU
Lis |
Hesponte
10159ms
131 5m
10154*
10436ns
13556ns
n123me
10741ns
10233ns
10955ns
11251m
10931ns
15810ns
10154ns
/ |
Proxy Srvera
|X j
Lointiy
HUNGARY
^ ^ IR A fl
S35 KENYA
( A lv e - S S L ) ]
0 3 1 .1 4 7 .4 8 .1 1 6 .w a tb .n e t/ ig 3 to r.c o m :3 1 2 3 te a ts d 0 5 [(ASve S S L ) )
17. The selected proxy server will connect, and it will show die following
connection icon.
C E H L ab M an u al P ag e 207
E d it
A c t io n s
V ie w
Proxy Scanner
H * New !766)
Ugh Anonymous (0)
g t SSL(O)
- e ? Bte(O)
B - R Dead (2381)
Pm*n#ntly (G975)
003. Anonymity(4G7)
Pnvate lib)
| 0 Dangerous (696)
l & My Proxy Servere (0)
:ProxySviitcha 2 5 ) 0(
Serve!
$5
9 T.144 4^.65:3123
2 1 8 .152.121.194:3030
,f
d e d se rr2i 2 3 Jevonlm e
to n
95 110159 54 8080
>I
Dseblcd
11 Keep Alive
I~ l f
H e lp
State
(Alve-SSU
(Alve-SSU
(Alve-SSU
Alive
(Alve-SSU
(Alve-SSU
(Alve-SSU
(Alve-SSU
(Alve-SSU
(AlveSSU
(Alve-SSU
(Alve-SSU
(Alve-SSU
Response
10159ms
13115n*
10154ns
10436n s
13556n s
1123n.
107^0rn
10233n s
10955n s
1l251ra
10931ns
158101s
10194ns
Comtiy
SVRAM ARAB REPUBLIC
HONG KONG
| |IT MY
> : REPJBLIC OF KOREA
SWEDEN
I ITAtr
UNI ILL) ARAD CMIRATCS
NETHERLANDS
REP JBLIC OF KOREA
HUNGARY
IRAG
g g K E N rA
S ^ A N ARAB REPUBLIC
[ J
2l8.152.121.1&4:8030tested as [fAlve-SSL!
218.152.121.184:8030tested as (Alive]
h o s t5 4 - 1 5 9 -1 1 0 -9 5 9 rv e rd e d ic a ti a rn b a 8 C 8 0 te s te d a s R A Iv e -S S L )]
0 3 1 .1 4 7 .4 8 .1 1 6 .a to tc .n c tv ig a to r.c o n > :3 1 2 3 te s te d 0 9 [(M rvc S S L ))
ML
E a u c A n o n y m it y
Starting from
version 3.0 Proxy
Sw itcher
incorporates
internal proxy
server. It is useful
w hen you w ant to
u se other
applications
(b esid es Internet
Explorer) that
support HTTP
proxy via Proxy
Sw itcher. By
default it w a its for
co n n ectio n s on
localh ost:3128
ri!t
"' 'History
Bookm orH
Iool*
M 07 illa Firefox
r 1 0 Cx 1
Jjdp
0*r<ring your kx io v
4 -.IUU-..J.UU,I
*I Go,I.
fi
f!
2 0 2 .5 3 .1 1 .1 3 0 , 1 9 2 .1 6 8 .1 .1
Unknown
Proxy In fo rm a tio n
Proxy Server:
DFTFCTFD
Proxy IP:
95.110.159.67
Proxy C ountry:
U n kn o w n
19. Open anodier tab in die w eb browser, and surf anonymosly using diis
proxy.
C E H L ab M an u al P ag e 208
p ro x y
r lc
Edit y ie *
History
Bookmark:
Tools
Ottecbngyour location..
| p r a y i c . - C e r a c o n G oogle
^
*Tu
R ic e r c a
Google
0 3 After the anonymous
proxy servers have become
available for switching you
can activate any one to
become invisible for die sites
you visit.
fcWp
I m m a g in i
M aps
P la y
Y ouT ube
M ew s
G m a il
D o cu m e n t!
C a le n d a r
G ccgfc
U ttio
proxy server
Ricerca
P ro xy
Immagini
Maps
Wikipodia
it w k jp e d ia .o tg A v ik n 'P ro x y
In in fo rm atica e te le c o m u n ic a ^ o w u n p r o x y 6 un prog ram m a c h e s i ml e i pone tra un
c lie nt ed un s e r v e r fa re n d o d a tr a m r e o n e e rfa c c ia tra 1 d u e h ost ow ero ...
A ltri u si d e l term rne P r o x y
P io x y H T T P
Note
V o a correlate
V id e o
M oaze
S h o pp in g
T ia C u a q u e s ta pagina
Ptu contanuti
ItaHa
w v w p r o x y s e r v e r c o m 'T ra d u c i q u e s ta pagm a
Cemtm locnKtA
Thn boet fi!!* P io x y S e r v e r out thar' S lo p s e a rc h in g a proxy list (or p roxies that are
never taut or do n o i even get anl* 1e P r o x y S e r v e r c o m h as you covered from ...
Lab Analysis
Document all die IP a d d r esses of live (SSL) proxy servers and the connectivity
you discovered during die lab.
T o o l/U tility
Proxy Sw itcher
S elected Proxy C o u n try N am e: ITALY
R esulted Proxy server IP A ddress: 95.110.159.67
PL E A S E TA LK T O Y O U R I N S T R U C T O R IF Y OU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
Questions
1. Examine which technologies are used for Proxy Switcher.
2. Evaluate why Proxy Switcher is not open source.
C E H L ab M an u al P ag e 209
In te rn e t C o n n ectio n R eq u ired
0 Y es
No
P latform S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 210
iLabs
Lab
w
KEY
2 3 Valuable
information
Test your
knowledge
Web exercise
W orkbook review
Lab Scenario
You have learned in the previous lab how to h id e your a ctu a l IP using a Proxy
Switcher and browse anonymously. Similarly an attacker with malicious intent
can pose as someone else using a proxy server and gather inform ation like
account or bank details o f an individual by performing so c ia l en gin eerin g.
Once attacker gains relevant information he or she can hack into that
individuals bank account for online shopping. Attackers sometimes use
multiple proxy servers for scanning and attacking, making it very difficult for
administrators to trace die real source o f attacks.
As an administrator you should be able to prevent such attacks by deploying an
intrusion detection system with which you can collect network inform ation for
analysis to determine if an attack or intrusion has occurred. You can also use
Proxy W orkbench to understand how networks are scanned.
Lab Objectives
This lab will show you how networks can be scanned and how to use Proxy
W orkbench. It will teach you how to:
Lab Environment
To carry out the lab, you need:
C E H L ab M an u al P ag e 211
You can also download die latest version o f Proxy W orkbench from
this link h ttp://proxyw orkbench.com
ZZ7 Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
Lab Duration
Time: 20 Minutes
Lab Tasks
C Security: Proxy
servers provide a
level of security
within a
network. They
can help prevent
security a ttack s
a s th e only w ay
into th e network
from th e Internet
is via th e proxy
server
You can also download the latest version o f Proxy W orkbench from
6.
C E H L ab M an u al P ag e 212
This lab will work in the CEFI lab environment - on W indow s S erver
2 0 1 2 , W indow s S erver 2 0 0 8 and W indow s 7
O pen Firefox browser in your W indow s S erver 2012, and go to T ools
and click op tion s
CW-I
a<*SMA
Downloads
moderns
S e a r ch
Im a g es
fi
e !1 -cc9u
St*UpS^K.
You
D ocu m en ts
Web Developer
C alendar
M ote
Page Info
511*)6 9
Cler Recent Ustsr.
Sign n
01+ Sh1ft*W
Google
Google Search
AtfMt1M1g P io g a m m e i
P ir a c y t Te
About Google
Google com
7.
&
G e n e ra l
Tabs
G e n e ra l | M e tw o rV
C o n te n t
%
A p p l ic a t io n s
j U p d a t e | E n c r y p t io n
p
P ii v a c y
S e c u r it y
S> nc
A dvanced
C o n n e c tio n
|
C o n f ig u r e h o w h r e f o i c o n n e c t s t o t h e I n te r n e t
S g t n g i.
C a c h e d W e b C o n te n t
C le a r N o w
Y o u r v r e b c o n t e n t c a c h e >s c u r r e n t ly u s in g 8 .7 M B o f d i s k s p a c e
I
I O v e r r id e a u t o m a t e c a c h e r r a n a g e m e n t
1 a p p lic a t io n
T e ll m e w h e n a * refccit* a c lr t t o s t o r e H a t* f o r o f f l in e u c e
C le a r N o v /
c a c h e i s c j i i e n t l / u s in g 0 b y t e s o f d is k s p a c e
Exceptions..
T h e f o llo v / in g t v e b s it e s a t e a lo w e d t o s to r e d a ta f o r o f f lin e u s e
Bar eve..
OK
Cancel
H e lp
C E H L ab M an u al P ag e 213
Port
127.0.0.1
@ Use this proxy server for all protocols
SSL Proxy:
127.0.0.1
Port
8080
TP Proxy:
127.0.0.1
Port
8080y |
PorJ:
8080v
SOKS Host
127.0.0.1
D SOCKS v4
No Proxy fo r
(S) SOCKS ^5
localhost, 127.0.0.1
Example .mozilla.org, .net.nz, 192.168.1.0/24
OK
Cancel
Help
g. - ?
FIGURE 13.4: Windows Server 2012 - Desktop view
12. Click die Proxy Workbench app to open die Proxy Workbench window
C E H L ab M an u al P ag e 214
S erver
M anager
W in d o w s
Pow erShell
G o o g le
C h ro m e
H y p e r-V
M anager
Fa
C o n tro l
Pa n d
H yper V
V irtu a l
M a c h in e
S O I S e rve r
M O ? 113
Firefox
Searct101_
W
Com m and
Prom pt
O
Prox y
dobaI
N e tw o rk
In v en tory
W oricbenu.
Si
D e tk c
13. The Proxy Workbench main window appears as shown in die following
figure.
Proxy W orkbench
File
View
Tools
H I
Help
To
From
1 Protocol
| Started
173.194.36.24:80 (www.g..
HTTP
18:23:39.3^
127.0.0.1:51201
HTTP
18:23:59.0
J l l 127.0.0.1:51203
HTTP
18:24:50.6(
J d 127.0.0.1:51205
173.194.36.21 :443 (m a ig .
HTTP
18:24:59.8'
J d 127.0.0.1:51207
W 'l!? 7 n n 1 ^
173.194.36.21:443 (maig..
HTTP
18:25:08.9
17 K M
H T T P ____
1 Q .T C .1 Q M
J J 1 2 7 .0 .0.1:51199
KNJHm
TC.
71 A n ( m d
/ I . 1 . . U s e r A g
: M o z i ll a / 5 .0
in d o w s N T 6 .2
OU6 4 ; r v : 1 4 .0
e c k o /2 0 1 0 0 1 0 1
re fo x /1 4 .0 .1 .
o x y - C o n n e c t io
k o o p - a liv o . H
000160
000176
: m a il.g o o g le .c o
m . . . .
<
Memory: 95 KByte Sockets: 1CO
Events: 754
ent
(
; W
) G
F i
. Pr
n :
ost
2f
3a
69
4f
65
?2
6f
6b
3a
6d
31
20
6e
57
63
b5
73
65
20
Od
2e
4d
64
36
6b
66
79
65
6d
0o
31
Od
S i
6
34
6f
6f
7a
77
3b
2f
78
43
2d
69
0a
2d
70
61
Od
SS
0A
69
73
20
32
2f
6f
6c
20
72
30
31
61
6c
6c
2e
60
III
u n ; 1 iciu ic . u n ; 11
7angwrrx?n Luyymy. u n ; 1 .
73
6c
4e
76
31
34
6e
69
67
>
C E H L ab M an u al P ag e 215
Proxy Workbench
File
U-
Save Data...
Configure Ports.
Monitoring: W
All Activity
^ SMTF
Failure Simulation...
|10m
Real Tim e L99in9
mnihm
| T0
| Started
173.194.36.24:80 (ww*.g..
74.125.31.106:80 |pt4ao
HTTP
HTTP
18:23:39.3}
18:23:59.0
3 d 127.0.0.1 51203
173.194 36.21:443 (n a ig .
HTTP
18:24:50.6(
J 127.0.0.1 51205
HTTP
18:24:59.8!
173.194 36 21:443 (n a ig
m 1 *c * n *
HTTP
HTTP
18:25:08.9
m -w ip r
J 127.0.0.1 51199
tJ 127.0.0.1 51201
POPd
Options...
k # HTTP TTWny T T W U (W W )
^ HTTPS Proxy Secure Web |443)
^ FTP File T ransler Protocol (21)
Pass Through For Testing Apps (1000)
I Protocol
>
000112
000128
000144
000160
000176
Events: 754
/ l . 1 . .U s e r-A g e n t
: M o z i l l a / 5 . 0 (W
in d o w s NT 6 . 2 ; U
O U64; r v : 1 4 . 0 ) G
e cko /2 0 1 0 0 1 0 1 F i
r e o x / 1 4 .0 .1 . P r
o x y - C o n n e c t io n :
k e e p - a liv e . . H ost
: m a il. g o o g le . c o
m
....
I eiiim a ic UII
11c1u4c. u u
2
3a
69
4
65
72
6f
6b
3a
6d
u n u u ic u i i
31
20
be
57
b3
65
?8
b5
20
Od
2e
4d
64
36
6b
66
79
65
6d
0a
L ty1c u n
31
6f
6f
34
6
6
2d
70
61
Od
Od
7a
77
3b
0 a 55 73
69 6 c 6 c
? 3 20 4 e
20 72 76
2 3 2 30 31
78 2 f 31 34
43 6 f 6 e 6 e
2d 61 6 c 69
69 6 c 2e 67
0a
1_<.yymy. u n
ju i
15. 111 die Configure Proxy W orkbench wizard, select 8 080 HTTP Proxy - Web
111 die left pane o f Ports to listen on.
16. Check HTTP 111 die right pane o f protocol assigned to port 8080, and click
Configure HTTP for port 8080
CLl People w ho benefit
from Proxy W orkbench
Port [ Description
SMTP Outgoing e-mail
PIlP3 - lnnnmino ft-maiI
18080 HTTP Proxy Web
443
HTTPS Proxy Secure Web
21 FTP File Transfer Protocol
1000 Pass Through Foe Testing Apps
25
un
; >>Don't use
:
Pass Through
HTTPS
POP3
FTP
:- T-1->
Internet Security experts will
benefit from seeing the data
flowing in real-time This wiH
help them see who is doing
what and when
C E H L ab M an u al P ag e 216
&dd-
Qetete
| |
17. The HTTP Properties window appears. N ow check C onnect via another
proxy, enter your W indows Server 2 003 virtual machine IP address 111
Proxy Server, and enter 8080 in Port and dien click OK
HTTP Properties
General
|10.0.0.7|
Port:
Iftfififi
^
Many people
understand sockets much
better then they
think. W hen you surf the
web and go to a web site
called www.altavista.com,
you are actually directing
your web browser to open
a socket connection to the
server called
"www.altaviata.com" with
p ort num ber 80
OK
Cancel
18. Click C lose in die Configure Proxy W orkbench wizard after completing die
configuration settin g s
Configure Proxy Workbench
Proxy Ports
3orts to listen on:
Port | Description
25
SMTP Outgoing e-mail
POP3 Incoming e-mail
110
8080 HTTP Proxy - Web
443
HTTPS Proxy-Secure Web
21
FTP File Transfer Protocol
1000 Pass Through - For Testing Apps
Add
delete
19. Repeat die configuration steps o f Proxy Workbench from S tep 11 to Step
15 in Windows Server 2008 Virtual Machines.
C E H L ab M an u al P ag e 217
20. 111 W indows Server 2008 type die IP address o f Windows 7 Virtual
Machine.
21. Open a Firefox browser in W indows Server 2008 and browse web pages.
& Proxy
Workbench
ch a n g es this. Not
only is it an
a w e so m e proxy
server, but you
can s e e all of th e
data flowing
through it,
visually display a
so c k e t
con n ection
history and s a v e it
to HTML
22. Proxy Workbench Generates die traffic will be generated as shown in die
following figure o f W indows Server 2008
23. Check die To Column; it is forwarding die traffic to 10.0.0.3 (Windows
Server 2008 virtual Machine).
McnfanjMN1r2CtU.2 0010|43|;
| MAOAOy
^ ship 0.*!>> \*<1
^1CQC)
I.(flff J'.f'AIBI'/tllilUII
y HT F W - Sioim W.b (4431
6 FTp.Fteriattfa *<xo:d|71)
V p*m111*h11-frnjAc*no30)
0 7
uv r.-
11
.**
fJ'
U
w
anton
aaa aca!
la
ooitCM
maiaxo
1
1000 )CB)
10011 > rw
ra a a ir a
M00 )CIO
laaaiKm
.41 I
>1.
160527496
605275.*
*0 5 27 59?
(6052702
0527 3
laaa iax a
uaaiaceo
lOOOKW
21
1 ( 0 17 34 <3TT
E x t e r n Sot 26
S .. : : t l 00 52
4 a i r 1 u > - ) u
t f J F r i . 23 0
c 2* 1 .'0 10 4
:dta-C aat
c : . J i- a g e >: 30
1
>
3n
060527*3
Mtaian
.*1
d<?5on
>?2
(C05:?(CT
taaaiacta
M00 )CM
MaaiKHi
144a]QM
1000):w
laaaiaao
11
U .
3C]141
00160
11!r 0IB;v?W
.< * < * 1 1 9 9
100a )m
>1
11:
2
0
0C
)11
:
ce05 25&43
052*100
Mtaiaon
taaa cm
>1
u
11.
:
0(448
00D&4
a [csc
105. 06.K2S.31T
A-= UK
06052?
-*<oe 577
06052C92?
0521102 06274B <V13r>M4ca1facc tWJ
1556
06052*16?
0526217
O r 9 rM 0 (a < rM .
KOI.2t.3K
KKrT
1191
ccosjt*1 utre^riT
(tiiir,
SO
S?:1M
B K05267W
2110
4r,
arezrui
IJK
05 2(. 734
05. 6 *v**<*3ntrrt 3(85
n n ; 1 19,
KT , s z a
IVJ
C605275S7
31 20 10 30
45 78 70 63
4d 1 72 20 32 30 31
39 30 47 u 4; 41 0
66 6 65 64 38 20 >>
74 20 32 30 10 3 ?0
47 Id 14 Od Qo 13 11
t l I c 3a d 20 61 71
Od 0 . 43 ?< bI m Cm
31
4c
?2
32
(3
3d
<3
.*
I3S
1Wi
06052l
PAthtf<kaMcc
06052*173
FV9hn<*co<ra<t
sauszs
t3524:45
06052 3 3
ro
11
W
3d
U
41
74
9* **1120
0
7i
2c
3
K
k(1
Sf <4
2300 II(
450 MtC61$ 7* } MH
FIGURE 13.11: Proxy Workbench Generated Traffic in Windows Server 2012 Host Machine
24. Now log in in to W indows Server 2008 Virtual Machine, and check die To
column; it is forwarding die traffic to 10.0.0.7 (Windows 7 Virtual
Machine).
Fife View Tod*
Hrip
M irilcrrfj y1cbncni<2(.3|10Q0 3|
or, 05 4n !00
K
F
K
1) (h 41 070
CB OG 41 625
HUP
06.(E *3 375
( 0 6 41437
(COS 41 015
HTTP
0506 *3 531
(C 05 41 281
HTTP
HTTP
06.05 4Q 546
0E<E 4a 578
06.05 41.281
05 05 40 B43
F
F
06 05:41.828
(KOS415Q3
F
F
F
1 0 0 0 7 0 1 CO
HTTP
4J10.QO.6SWO
1 a o .a ? ; 8 0
lQ 0 D ;- m m
HUP
HUP
J ' ] . 0 0.69615
J 6 ; 0 : snt
1aoa7.83E0
HTTP
0 0 0 7 :
J 1 0 0 0 6 9819
100 07:83 EO
100.07:8360
1aoa7!m E 0
jU ': a : f c 3 1 i4
7 A nd now, Proxy
W orkbench includes
connection failure
simulation strategies. W hat
this means is that you can
simulate a poor network, a
slow Internet or
unresponsive server. This
is makes it the definitive
TC P application tester
| - : . 0 : . 6 5824
1a0.a7:83EO
HTTP
0 6 0 = 4 :6 5 5
1 1 0 .0 0 69626
0 0 0 7 :
HTTP
06 0 5 *3 906
1100069828
1000.7:8303
HTTP
06<e 41015
1 * 1 0 0 .6 9830
1ClO.a7.83EO
HTTP
06.0C 41 *09
06 05 41 406
06 05 41 718
1 1 0 0 0 &9H32
m o n 7 rm g o
HUP
( K f f i 41 TIB
O, ( h 41 HI
*1
cM s tei Hr TP Ptcay V/H3 |B0B]|
: 064
010080
09*
060112
00012C
060144
060160
060176
080192
S x p iro D
ot
Hnx 2011S 0
a G226
<0 CUT T.m t Hrd
f t 1. 23 0
c t 2009 2 0 10 04
GMT. . Cch0-C011t
ro L
m a x-o g e -3 6 0
0 . C on n e ct io a
k
o e p - o l iv c
76
4d
39
66
74
47
70
69 72
61
72 20
20
47 <d
69
6564
20
32 30
4d
Od
6t 6 c 30 20
Od 0 9
43 61
65 70
2d 61
Proxy Worfctxfyh
Fj
2J
ffe d
J Start |
| 1 .,* 1 .f I
06 1*41 15 6
J *)O O G fflO
QH
wpnm
am m
1QOQ2I0 1QQQ7
&10.00.6!0100.0?
S te M
05 flfl 0^7 3
06.05 40109
( E tft * 6 9
^ ,iMTPIJ1*ytnyvm1l(2&|
65
32
64
30
G
6d
te
6c
73
30
Od
20
39
<3
61
in
69
3c
31
0
1e
20
61
78
15
6
S3
3a
4r
b'3
32
63
2d
63
65
i l 20 74
30
61
2c
30
b0
61
74
Od
30
73
2?
3.
65
6?
69
0o
a
?
20 31
rf?. 4
20 32
31 30
2d (3
65 3d
bl 6
Od 0o
C m ^ ! CK - o g g r g 01( 613A M
6:15AT1
AiLd
FIGURE 13.12 Proxy Workbench Generated Traffic in Windows Serve! 2003 Virtual Machine
C E H L ab M an u al P ag e 218
25. Select O n die web server, connect to port 80 in W indows 7 virtual machine,
and click OK
-TTTP P r o p e r tie s
G e n e ra l |
O n th e * tcb s e rv e r, c o n n e c t to port:
C " Connect v b
0 T0*her p ro x y
[fiflffi
OK
Cr>cd
il
w a
'*w ts c > w
>
<>o
Wd
is o
11 1 ;>
7 &
r*e
Toeli
Help
ClClCl3 to 10 0 0 5
1a a a 3 h> 203.85.231.83 |mj .Brc>
0 00 3 1# 68 71 209 176 |abc goc
1 00031a 50 27 06 207 |edn>m)k|
1a a a 3 la 58.27.86.123 ledue qua
100031a 68 71 220 165 |abc cm
100031a 202 79 210 121 Ibi tav
1QOCl3 b1 205 128 84.126 l to
100031a 50 27 86 105 | f * \ 1ur
100031a 58 27 86 217
100031a 157 166 255 216 |4d1 c
100031a 157 166 255 31 im iiv,
100031a 203 85 231 148 lilt
100031a 203 106 85 51 |b kcmc
100031a 50 27 06 225 |s etrrcd
100031a 157.166.226.26 Iw m c
100031a 199 93 62 126 |i2. * \u
100031a 203.106.85.65 liF c.^r
100031a 207 46 148 32|vi*va(
100031a 66 235 130 59 Ix-ffccm
10.0031a 203.106.85.177 Ib.scc
100031a 0 26 207 126 ledn vrtt
100031a 157 166 226 32 |tve a
100031a 58 27 22 72 |r.*\h4m
100031a 190 70 206 126 |icchk
100031a 157 166 226.46 ledlnr^
100031a 66 235 142 24 |rre41b)<
100031a 203 106 05 176 Idi Mrw
1 0 0 Q3 I1 157.166.255.13 Immma
1000310 68 71 209173 |4bc fl0<
12L
D c U I1 taH T T P IW -W b 180801
m il
From
*010.0 D 32237
) 0 1 0 0 0 32239
:
. .*3
26E0 I1:..h <.
571SS22G.aK:0|adi
)8 100032239
;0 1 0 0 0 3 2 2 4 0
) 0 1 0 0 0 3 2241
) 0 10 0 0 3 2242
* 78206126 0 &*<
i3 8 7 8 2 0 S 1 2 6 0 ( a h t
133 73 336126.tC |ic *U
2027921012140 (t*K 1
50100032243
) 0 10 0 0 3 2244
) 0 1 0 0 0 3 2245
57 if f i 2262(68(U *te
56 ZJ5 14311 l&C0lme*c
201l0&9517&a>fd1e1
1-: 1.
, I..:
) B 1 0 0 0 3 224S
)010 0 0 22 c
)610 0 0 3 2 2 9
) 0 10 0 0 3 224)
',W10 0 0 3 2250
) 0 10 0 0 3 2251
)01O O O 3 2 2 C
M 1 0 0 0 3 2253
)0 1 0 0 0 3 2 2 5 4
) 0 10.0.0 3 2255
)01O O O 322S
) 0 1 0 0 0 3 2257
)010.0.0.32258
Q2 In the
C onnection Tree,
if a protocol or a
client/server pair
is s e le c te d , the
D etails Pane
displays th e
summary
information of all
o f th e s o c k e t
co n n ectio n s that
are in progress for
th e s e le c te d item
on th e C onnection
Tree.
VWwr
Pidocoi
HUP
HTTP
HTTP
HTTP
06:0634.627
0&634643
HTTP
HTTP
HTTP
|U * E - * r l 1 LMlSUto
06.C635.436 FVB ho? dfOcmecC..
CE<62SG 3 fVt'B hai d ; c f r r l
C6(6 3 4 6 6 6
(6:0634.836
060634.336
C&C634963
0 6 (6 3 6 3 9 0
0 6 (6 3 5 6 2 4
060636624
cec& x21e
P*J3 l J i r r l . . .
f* ? t e d t a r r e d .
FVB h n J .ccrreO ...
Km d : r r l
(6(6S6(E3C
CC.Ct.X.X^
0 f e 35 4
(6 (6 3 6 1 8 6
C60& X 3W
C M & X T tS
FWB hat d n c r m l .
hat d i f f r r w l
06:0636483
06C03BW 3
CC.CVXUC
flf.r3570?
( 6 (C! 36 (66
c u r *124
0C.CtX.4V
f f.f f T V
. >
0
0
0
0
4176
2710
1572
11
IA
2 3
0
0
112
' r a 2 0 5 1 2 e w 0 a * u
1 7 8 a * 1 2 M 0 |l h t . .
1 9 1vV..'X .;fflT11^1.
h i TP
HTTP
HI TP
HI IP
HUP
HTTP
17820612S8000<ht
,. : . . . ! . u u ..
57166 2 1 6 0 (wmm....
HUP
h i IP
HTTP
t e a . 56 786
060U 36W 9
c tc e - x c 7 ?
8 2 6 >2 81 :6 a h (u
'38JB20612t<a)|iCT*U
3 8 7 3 2 0 6 1 2 6 t0 1 ic d n ..
3a73201;& C|1 fce
i 7 8 2 0 6 l2 6 0 H ic e h t
157.165Z262C6e0lfc
HTTP
HI TP
(6:0636124
C6:Cfc36.166
0606X 216
CfcC&XSCS
0 6 (6 3 6 7 1 8
C6C63E7*9
8 * hoj 4 1 f f l ..
HTTP
HTTP
HTTP
HTTP
06.0636611
< ffiX fi2 7
F h o ! dtccrrccC..
PV.B h atiic e rrc c t..
3333
2125
2421
112i
06*636396
06C 636606
(6 (6 3 6 8 (6
060637.436
P*v8
FVjB h s d .c crre cl...
1120
1533
f . J n c r r l
rv>V bm d iw r iK l...
V.T1
dtecrreel
P * 8 tu a d K c r re c 1...
06C 6 XU>1 1 8 h o d i m r M l .
t t C f i X f M Km i i t f r r f f l
0
0
0
0
0
0
0
1183
2103
. 5
0
398
0
0
0
0
CS I
3 0 l
5 e l.
2 6 b a r 2011 00
5 2 31 CUT C onn*
c t *oc
. : ! . Co
Btwt-Uimh 20
61
M
4f
55
20
3S
61
72
69
il
4e
32
32
74
60 ?4
75 3 a 20 4 1 6 3 63
60 6 ? Od 0a 6 0 33
20 i d 4 ? 5 6 61 20
4 ? 22
36 20
3a 33
6? 6(
65 6a
Od
4d
31
6
?4
0
61
20
3
2d
44
?2
47
20
4c
61
20
4d
6)
65
65
SO
if
74
32
?4
&c
?0
3a
?5
65
30
011
Cl
60 6 7
74
20
S2
3
31
0a
?3
4
2d
43
20
20
31
4)
65
68
4 61 3 6
5 0 3d 2 2
4 2 5 ? 53
5 3 ( 1 74
2 0 30 3 0
i i 6e ( e
C J 0 43
3* 20 32
.
40
20
2c
3a
65
il
30
_
L*a
Lab Analysis
Document all die IP a d d resses, open ports and running applications, and
protocols you discovered during die lab.
C E H L ab M an u al P ag e 219
T o o l/U tility
Proxy W o rk b en ch
P L E A S E TALK T O YO U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S L AB.
Questions
1. Examine the Connection Failme-Termination and Refusal.
2. Evaluate how real-time logging records everything in Proxy Workbench.
No
P latform S u p p o rted
0
C E H L ab M an u al P ag e 220
C lassroom
iLabs
KEY
Valuable
information
Test your
knowledge
3
Web exercise
W orkbook review
Lab Scenario
Attackers are always in a hunt for clients that can be easily compromised and
they can enter these networks with IP spoofing to damage or steal data. The
attacker can get packets through a firewall by spoofing die IP address. If
attackers are able to capture network traffic, as you have learned to do in the
previous lab, they can perform Trojan attacks, registry attacks, password
hijacking attacks, etc., which can prove to be disastrous for an organizations
network. An attacker may use a network probe to capture raw packet data and
then use this raw packet data to retrieve packet information such as source and
destination IP address, source and destination ports, flags, header length,
checksum, Time to Live (TIL), and protocol type.
Therefore, as a network administrator you should be able to identify attacks by
extracting inform ation from captured traffic such as source and destination IP
addresses, protocol type, header length, source and destination ports, etc. and
compare these details with modeled attack signatures to determine if an attack
has occurred. You can also check the attack logs for the list o f attacks and take
evasive actions.
Also, you should be familiar with the H TTP tunneling technique by which you
can identify additional security risks that may n ot be readily visible by
conducting simple network and vulnerability scanning and determine the extent
to which a network IDS can identify malicious traffic within a communication
channel. 111 this lab you will learn H TTP Tunneling using HTTPort.
Lab Objectives
This lab will show you how networks can be scanned and how to use HTTPort
and HTTHost
Lab Environment
111 die lab, you need die HTTPort tool.
C E H L ab M an u al P ag e 221
You can also download the latest version o f HTTPort from die link
littp :/ Avww. targeted.org/
" Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
Lab Duration
Time: 20 Minutes
Overview of HTTPort
HTTPort creates a transparent tunneling tunnel dirough a proxy server 01 firewall.
HTTPort allows using all sorts o f Internet Software from behind die proxy. It
bypasses HTTP proxies and HTTP, firew alls, and transparent accelerators.
Lab Tasks
Stopping IIS
S erv ices
Before running die tool you need to stop IIS Admin S ervice and World
Wide Web Publishing se r v ic e s on W indows Server 2008 virtual m achine.
2.
Go to Administrative Privileges
click and click the Stop option.
S ervices
01 HTTPort
cr e a te s a
transparent
tunnel through a
proxy server or
firewall. This
allow s you to u se
all sorts of
Internet softw are
from behind th e
proxy.
C E H L ab M an u al P ag e 222
Ka-n- *
I CeKri3bcn
D o cr p to n :
611
1nvj! t ::s
r*ou M10
n *or SK*one FTP
iv' nil 2
* u 16* to amfg. S-
3
or ftp. :, the servce e d s x c d . an,
Enabltc > to *d
: *
H5 X 'J tK C
1*rv io r*
t h u m v t e tta u p rd . :
s e 1 /ee* * v 9 !t p o r v d fp e o ;
fa I to tU t t.
| 5:b_s
N w t a o c e .. ,
S ta te d
P -b e h e s t...
Started
-C^C-rOiP Poicy C e n t
Key a id Cerbftrate Mens9trp-t
The se rv e ...
Started
Pov d e * X ...
E -ajtet os
3 . * v o r v m u txchanoa s w a
P 0 v d 81 a .. .
Started
fv o v d e s a .. .
M o 'ib n th.. .
Started
5 la t*d
Syrxh'Cnj..
5 :* U d
*mI
c o c td n jte . _ 1 u ted
S t J t __________
S t* lid
P .-llv
j n ...
R es - r e
!P h d p f
S la te d
R essrr
,: P s e c Polcy Agent
:J kctR.t1 *cr 3trb uted Tra-sam on C oordnsso
AIT mks
S ta ted
3te ,
----- 0 ...
Started
R^G^1
Sia-ted
P rop rf br%
t ....
8 t..
,
W r a g n ...
Q,M0 J la M anttnaioa S w v c t
Mojll*..
S ta te d
3.
Go to Administrative Privileges
S erv ices
World Wide Web
Publishing S ervices, right-click and click die Stop option.
-Tllx]
& It b y p a sse s
HTTPS and HTTP
proxies,
transparent
accelera to rs, and
firew alls. It h as a
built-in SOCKS4
server.
*te
Action
jjen
tela
E
N + l t w l A
Servwj ClomJ)
l -'
S f n M ( lo c a l)
12 r!ttt.ct
Cso1aion:
(V1df 1Web a n w r< rr end
ari'iprsron rry.yfc :r r
Infonrnston SerMoes Hjrage ne servce
!< v
(^<r1tu4
^ vau''* S*to/. Cooy
C^iVeo Mir^wwnt Se<ce
fetYrd/.e Audo
^ \'<to/.s Aucto ErekJrtit S
^ Y<to/.S Cotor SySteri
(Mfld M DectoymeotSevcesSesa
. %Yftto/.9 Driver Fourdsoon - Lee cce Drver * xr
Yd /.s & Repo Ser\ ce
flj%Yrd/.9 Ee t Cotecto
e i: uw
^>Yrd /,s Fe.\dl
(^Yd
tnsteller
I aat
CJtYrtto/.9 ^1?gene1t 15
vd
Modiies Injuler
CiYxto/. Biocen Activation Setv'd I ^ r
C( Y'-do/.* 5mote
M Re*t
^.\'rt>/. try
AlTMka
^ iV'tte/.fl updat#
^*vrH np web pw v Auto-ceeovJ
^ . v <- Autocar*c
H n y rB fi
Perfcrwsrce Aflao*f
1CwJOCor
1
Jan
1
0
5
3 0 8 1
1
%\V'tkr/.$
0
0/.9
0/,9
\'08>'t3ecr
\ x a r d e ; A
',.e: -vte-n ; s r .- g
.:r: cot x : r
IS !aw
Ptcr>*0M...
MWU0K*...
TUtWtbM..
Mo'eOcS a...
Ha'sOeid...
he WaPl..
Ha'cOes r...
Ma-aoe; u...
Ab .-sero...
Thssevfc...
Thssevfc...
ViWowsF.. .
Adds, mod.
ftovd a ...
&abns...
wndo...
VJo B...
Mints *.
...
KrHTTPl...
S..
Sated
Stated
Stated
Stated
Stated
Stated
Stated
stand
statid
Pre0 6*0^ ..
bet)
Stared
JE 3 S JB
FIGURE 142: Stopping World Wide Web Services in Windows Server 2008
It supports
strong traffic
encryption, w hich
m ak es proxy
logging u s e le ss,
and supports
NTLM and other
authentication
sc h e m e s.
C E H L ab M an u al P ag e 223
4.
5.
O n die Options tab, set all die settings to default except Personal
Passw ord field, which should be filled in widi any other password. 111 diis
lab, die personal password is km agic.'?
8. Check die Revalidate DNS n am es and Log C onnections options and click
Apply
H TTH ost 1.8.5
N e tw o rk
B in d lis t e n in g t o :
P ort:
B in d e x t e r n a l to :
|0 . 0 .0 .0
[80
1 0 .0 .0 .0
A llo w a c c e s s f r o m :
P e rs o n a l p a s s w o rd :
10.0.0.0
[
& To s e t up
HTTPort need to
point your
brow ser to
127.0.0.1
P a s s t h r o u g h u n r e c o g n iz e d r e q u e s ts to :
H o s t n a m e o r IP :
P o rt:
O r ig in a l I P h e a d e r f ie ld :
112 7 .0 .0 .1
|8 1
| x O r ig in a l IP
M a x . lo c a l b u f f e r :
T im e o u ts :
| 0 =1 2
R e v a lid a t e D N S n a m e s
A p p ly
Log c o n n e c tio n s
3 p t io n s jj" S e c u r'ty
| S e n d a G ift)
9. N ow leave HTTHost intact, and dont turn off W indows Server 2008
Virtual Machine.
10. Now switch to Windows Server 2 012 H ost Machine, and install HTTPort
fiom D:\CEH-Tools\CEHv8 Module 03 Scanning Networks\Tunneling
Tools\HTTPort and double-click httport3snfm .exe
& HTTPort g o e s
with the
predefined
mapping
"External HTTP
proxy of local
port
13. Click die HTTPort 3.SNFM app to open die HTTPort 3.SNFM window.
C E H L ab M an u al P ag e 224
5 t3 ft
Server
Manager
T ools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Networks
i.
Con>puter
Administrator
W indow s
Power Shell
G oogle
Chrome
Hyper-V
M anager
HTTPort
3.SNPM
91
C ontrol
Panel
Hyper-V
Virtual
Machine...
SOI 5 f w r
in c a k n o r
Ccntof.~
M021IU
Firefox
N ctwodc
V
C om m and
Prompt
if
Proxy
W orkbea.
M egaP n g
*8
- T
14. The HTTPort 3.SNFM window appears as shown in die figure diat follows.
HTTPort 3.SNFM
'r
S y s te m j Proxy :j por^ m a p p in g | A b o u t | R e g is te r |
H T T P p ro x y to b y p a s s ( b la n k = d ire c t o r fire w a ll)
H o s t n a m e o r IP a d d re s s :
Port:
Passw o rd !
Misc. o p tio n s
U s e r-A g e n t:
Bypass m o d e :
IE 6 .0
U s e p e rs o n a l r e m o te h o s t a t ( b la n k = u s e p ub lic)
H o s t n a m e o r IP a d d re s s :
I-------------------------------- P
P o rt:
Passw o rd :
I--------------
? \ 4 T h is b u tto n h elp s
S ta rt
15. Select die Proxy tab and enter die h ost nam e or IP ad d ress o f targeted
machine.
16. Here as an example: enter W indows Server 2008 virtual machine IP
ad dress, and enter Port number 80
17. You cannot set die U sernam e and Passw ord fields.
18. 111 die User personal rem ote h ost at section, click start and dien sto p and
dien enter die targeted H ost m achine IP ad d ress and port, which should
be 80.
C E H L ab M an u al P ag e 225
19. Here any password could be used. Here as an example: Enter die password
as *magic
In real world
environm ent,
p eop le so m etim es
u se passw ord
protected proxy
to m ake com pany
em p lo y ees to
a c c e s s the
Internet.
r|a
HTTPort3.SNFM | 3
S y s te m
'
P ro x y | p 0 rt m a p p in g | A b o u t | R e g is te r |
Port:
| 1 0 . 0 . 0 .4
|8 0
P a ssw ord:
M isc. o p tio n s
U s e r -A g e n t:
B ypass m o d e :
| IE 6 .0
| R e m o te h o s t
U s e p e rs o n a l r e m o te h o s t a t ( b la n k * u s e p u b lic)
H o st n a m e o r IP a d d re s s :
* o r t:
P a s s v rd :
| 1 0 . 0 .0 .4
I80
|............ 1
? | < T h is b u tto n h e lp s
S ta rt
20. Select die Port Mapping tab and click Add to create N ew Mapping
*
HTTPort 3.SNFM 1 - 1
S y s te m | P ro x y
Po rt m a p p in g
A b o u t | R e g is te r
New m a p p in g
Q
Local p o rt
1
1
1-0
(3 R e m o te ho s t
r e m o te , h o s t, n a m e
R e m o te port
1_0
S e le c t a m a p p in g to s e e statistics:
No s ta ts - s e le c t a m a p p in g
n /a x
n / a B /s e c
n /a K
LEDs:
O Proxy
B u ilt-in S O C K S 4 s e rv e r
W
R u n SO CK S s e rv e r (p o r t 1 0 8 0 )
Full S O C K S 4 s u p p o rt (B IN D )
? | 4 T h is b u tto n h elp s
21. Select N ew Mapping Node, and right-click N ew Mapping, and click Edit
C E H L ab M an u al P ag e 226
HTTPort 3.SNFM
S y s te m | P ro x y
T3 3
Po rt m a p p in g | A b o u t | R e g is te r |
New m a o
Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
Add
Local p
R e m o te ho s t
r e m o te , h o s t, n a m e
Edit
Rem ove
(=J R e m o te p o rt
L_o
S e le c t a m a p p in g to s e e statistics:
LEDs:
No s ta ts - s e le c t a m a p p in g
n /a x
n / a B /s e c
n /a K
O Proxy
B u ilt-in S O C K S 4 s e rv e r
W
R u n SO CK S s e rv e r (p o r t 1 0 8 0 )
Full S O C K S 4 s u p p o rt (B IN D )
? | 4 T h is b u tto n h elp s
22. Rename this to ftp certified hacker, and select Local port node; then lightclick Edit and enter Port value to 21
23. N ow right click on R em ote h ost node to Edit and rename it as
ftp.certifiedhacker.com
24. Now right click on R em ote port node to Edit and enter die port value to 21
HTTPort 3.SNFM
I
r *
1
S y s te m | P ro x y
r
Po rt m a p p in g | A b o u t | R e g is te r |
.=.
0 Local p o rt
/s
5 -2 1
E5 R e m o te port
I 2 1
S In this kind of
Add
Rem ove
R e m o te ho s t
ftp .c e rtifie d h a c k e r.c o m
S e le c t a m a p p in g to s e e statistics:
No s ta ts in active
n /a x
n / a B /s e c
d u
lit in
n /a K
LEDs:
O Proxy
se rve r
R u n S O C K S s e rv e r (p o r t 1 0 8 0 )
Full S O C K S 4 s u p p o rt (B IN D )
? |
T h is b u tto n h elp s
25. Click Start on die Proxy tab o f HTTPort to run die HTTP tunneling.
C E H L ab M an u al P ag e 227
HTTPort 3.SNFM r a :
S y s te m
^ o x y | P o rt m a p p in g | A b o u t | R e g is te r |
P ort:
|1 0 .0 .0 .4
[8 0
P a ssw ord:
M isc. o p tio n s
B y pass m o d e :
U s e r-A g e n t:
IE 6 .0
[ R e m o te h o s t
U s e p e rs o n a l r e m o t e h o s t a t ( b la n k = u s e p u b lic)
H o s t n a m e o r IP a d d re s s :
Port:
Passw ord:
|1 0 .0 .0 .4
[So
* * * *
? | ^ T h is b u tto n h e lp s
26. N ow switch to die W indows Server 2 0 0 8 virtual machine and click die
Applications log tab.
27. Check die last line if L isten er listening at 0.0.0.0:80, and then it is running
properly.
HTTHost 1.8.5
Application log:
z]
Statistics ( A p p lic a t io n lo g
Options
28. Now7switch to die W indows Server 2 0 1 2 host machine and turn ON die
W indows Firewall
C E H L ab M an u al P ag e 228
30. Select Outbound rules from die left pane o f die window, and dien click
N ew Rule in die right pane o f die window.
Windows Firewall v/ith Advanced Security
F ie
A ction
V iew
Inb ou nd R u in
O u tb o u n d Rules |
C o n n e c tio n Security Ru
-:
H elp
M o n ito rin g
Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
O u tb o u n d R u i n
N am e
G roup
Profile
B a n c h C a ( h e C 0n t n :R at 1ival (H TT P-0...
A l
Inab ied A
No
Al
No
B r a n c h C e ih e K n W J C c h S*rvw(HTTP.
Al
No
B r a n c h ( a r h r - PeerOtseove...
Al
No
C ore N e tw orkin g
Al
Yes
Al
Yes
C o r e Ne tw orkin g D y n a m ic H o s t Config...
C ore N e tw orkin g
Al
Yes
Deane!
Ves
Dom ain
Yes
Deane!
Yes
Al
Yes
Al
Yes
Al
Ves
Al
Ves
Al
Yes
Al
Ves
Al
res
Al
Ves
Al
Yes
C o r e N etw orking
N eigh b or D isc o v er y S .-
Al
Vo
Al
Ves
C o r e N etw orking
Al
Vet
Al
Yes
Al
Vet
Outbound Rule*
N ew Rule...
V
Filter by Profile
Filter by State
Filter by G ro up
View
O Refresh
Export List...
Q
Help
v '
"i
r " ...........
FIGURE 14.13: W 1ndcra*s Firewall with Advanced Secunty window in Window's Server 2008
31. 111 die N ew Outbound Rule Wizard, select die Port option in die Rule Type
section and click Next
N e w O u t b o u n d R u le W iz a rd
p
R u le T y p e
Select the type cf firewall rule to create
Steps.
*
Rule Type
Action
S Tools
dem onstrated in
this lab are
available in Z:\
Mapped Network
Drive in Virtual
M achines
Profle
flame
O Program
Rde Bidt controls connections for a program.
>Port |
R Je tw l controls connexions for a TCP or UDP W .
O Predefined:
|BranrhCacne - Content Retrieval (Ueee HTTP)
<Beck
Next >
11
Cancel
C E H L ab M an u al P ag e 229
32. Now select All rem ote ports in die Protocol and Ports section, and click
Next
New Outbound Rule Wizard
P ro to co l and Porta
Specify the protocols and ports to which ths rJe apofes
Steps
+
R u 'y p
<!> TCP
4 Acao r
4
O UD P
Profile
4 Nam e
Q H T T P ort doesn't really
care for the proxy as such,
it works perfectly with
firewalls, transparent
accelerators, N ATs and
basically anything that lets
H T T P protocol through.
O Specific remoteports:
Example 80.443.5000-5010
< Eacx
Ned >
Cancel
33. 111 die Action section, select die Block th e con n ection ' option and click
Next
New Outbound Rule Wizard
A c t io n
Spccify the a c to n to b e tak e n w hen con ncctio n nacchea the c o n d ticn a specified in the n i e .
Steps
4
H U e Type
W h a t a c b o n o h o J d b t a k e n w h o n a c o n n e x io n m a t c h 08 th o o p o c / io d c o n c it ic n Q 7
P r o t o c o l a n d Porta
A c io n
O Alowttv connection
P rofile
Nam e
T T w n c l x J e s c o r n c c t io n a th a t a ie p io t e c to d w t h I P a o c 0 9 w e l c s t w 3 e a t e n ot.
' ) H o c k t h e c o n n e c t i o n
C E H L ab M an u al P ag e 230
34. 111 die Profile section, select all three options. The rule will apply to:
Domain, Public. Private and then click N ext
Q NAT/firewall
issu es: You need
to en ab le an
incom ing port. For
HTThost it will
typically be
80(http) or
443(https), but
any port can be
u sed - IF the
HTTP proxy at
work supports it
so m e proxys are
configured to
allow only 80 and
443.
Skin
* Ru*Typ#
*cbor
171 D a m a n
Vpfces * I en a computer is connected to Is corporate doman.
3rcfile
0
P r iv a te
Public
V p * c3
c Eacx
Next >
Cancel
ZZy Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
35. Type Port 21 Blocked in die Nam e field, and click Finish
New Outbound Rule Wizard
Nam e
Specify the name and desorption of this l i e .
N one
|?or.
2' BbdceJ
Desaiption (optional):
<Back
Finish
C ancel
36. The new rule Port 21 Blocked is created as shown in die following figure.
1- 1 1 * :
A c tio n
V iew
H dp
nfcound Rules
Outbound Rules
[O ^Port 21 Blockcd
C o n n e c b o n Security Rul
t
A tio r o
Na
O u tb o u n d Rules
M o n ito rin g
N e w Rule...
B r a n c h C a c h e C on ten t R c t r c v t l ( H T T P -0 ..
Al
B i. n c h ( m h r H o tte d C a c h
:1
Al
F liter by State
A l
Filter by G io u p
C o r e N e tw o rk in g O N S (U O P-O u tJ
C o re N e tw orkin g
Al
C o i e N e tw o r k in g - D y n am ic H o d C o n fig ..
C o re N e tw orkin g
Al
C o r e N e tw o rk in g - D y n a m ic H o s t Config...
C o re N e tw orkin g
A l
Refresh
C o r e N e tw o rk in g - G ro u p Pcfccy CLSAS S --
C o re N e tw orkin g
D o m a in
[a
Export List...
Li
H elp
B r a n c h ( * ! h e H o tte d C a c h e C lie n t ( H IT .
Filter by Profit
V iew
@ P C o re N e tw o rk in g - G ro up P c E c y (fJP -O u t)
D o m a in
C o r e N e tw o rk in g - G ro up P o ic y (T C P -O -.
C o re N e tw orkin g
D o m ain
C o r e N e tw o rk in g - internet G ro up M ana...
C o re N e tw orkin g
A l
C o r e N e tw o r k in g - lP H T T P 5 (T C P -O u tJ
C o te N e tw orkin g
Al
D isable Rule
C o t e N e tw o rk in g - Pv 6 (Pw 6 -0 ut)
C o te N e tw orkin g
A l
cut
C o re N e tw orkin g
Al
C o re N e tw orkin g
Al
C o re N e tw orkin g
Al
C o r N e tw orkin g
Al
Al
C o r e N e tw o rk in g
V u h cast Listener Do
C o r e N e tw o rk in g
M u h <yt* liste n e r O j .
C o r e N e tw o rk in g
C o re N e tw orkin g
Al
A l
C o r . 1N e tw o rk m g N e ig h b o r D iscovery 5 ,
C o re N e tw orkin g
A l
Al
Al
Port 21 Blocked
G fe C o p y
( |
P ro p e itie *
H elp
File
A c t io n
V iew
H dp
!
I Actions
O u tb o u n d Rulea
Co n n e c tio n S e c u rity Rul
X/
H T T Port then
intercepts that connection
and runs it through a
tunnel through the proxy.
M o n ito rin g
Nam e
G ro up
O .P 0 rt 2 1 B lo c k c d
P ro fie
Enal
Outbound Rules
N e w Rule...
D isable Rule
Cut
F ilter b y Profile
B r a n c h C a c h e H osted C a ch e S aver(H T T P _
Bran ch C ach e H o:
Copy
Filter b y State
B r a n c h C a c h e P ee t D is c c v a y (WSOOulJ
Delete
Core N e tw o rk in g
L o re N e tw orkin g
D >n anvc H c it C c n f ig ..
F liter b y G ro up
Properties
V iew
Hdp
Refresh
Most C onfig...
Core N e tw o rk in g
Core N e tw o rk in g
Dom *n
Vet
Core N e tw orkin g
Don*n
Ves
C o r e N e tw o r b n g D >nrn
Export List...
H elp
Core N e tw orkin g
D o m ain
Ye*
Core N e tw o rk in g
Al
Vet
Port 21 Blocked
D isable Rule
c t
Core N e tw orkin g
Al
Yes
C o r e N e tw o r b n g - IPv6 (1P$<XjtJ
Core N e tw orkin g
Al
Yes
Core N e tw orkin g
Al
Yes
C o r e N e tw o r b n g - M J c c a s t Listener Qu...
Core N e tw orkin g
Al
Yes
41 C o p y
Al
Yes
Delete
Al
Yes
C o r e N e tw o r b n g - N eig h b o r D iscovery A .
Core N e tw orkin g
Al
Yes
C o r e N e tw o r b n g
Core N e tw orkin g
Al
Yes
H elp
IPHTTPSfTCP-Out)
Core N e tw orkin g
Al
Yb
Core N e tw o rk in g
Al
Yes
C o r e N e tw o r b n g
R euter A d v c n sc m c n t...
Core N e tw orkin g
Al
YCS
C o r e N e tw o r b n g * R cu le t Solicitation (IC~
Core N e tw o rk in g
r . . . *------- 11
Al
Yes
Properties
C E H L ab M an u al P ag e 232
38. Select die Protocols and Ports tab. Change die R em ote Port option to
Specific Ports and enter die Port number as 21
39. Leave die other settings as dieir defaults and click Apply dien click OK.
E th ica l H a c k in g an d C o u n term easu res Copyright O by E C Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
Sco pe
Ad vance c
Remote Conpjtefs
j
Local P rin cp ab
Loco port
All Potto
S pecifc Pats
[21
Example. 80. 443.5003-5010
htene t Gortnd M essage Protocol
( C M P ) tin g * :
I Custonizo.
41. N ow open die command prompt 011 die W indows Server 2012 host
machine and type ftp 127.0.0.1 and press Enter
7 ^ H T TPort makes it
possible to open a client
side o f a T C P /IP
connection and provide it
to any software. The
keywords here are: "client"
and "any software".
C E H L ab M an u al P ag e 233
Lab Analysis
Document all die IP addresses, open ports and running applications, and protocols
you discovered during die lab.
Tool/Utility
P o rt scan n ed : 80
R esult: ftp 127.0.0.1 connected to 127.0.0.1
P L E A S E TALK T O YO U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S L AB.
Questions
1. How do you set up an HTTPort to use an email client (Oudook,
Messenger, etc.)?
2. Examine if software does not allow editing die address to connect to.
Internet Connection Required
0 Y es
No
P latform S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 234
iLabs
Lab Scenario
/ Valuable
information
Test your
knowledge
You have learned in the previous lab that H TTP tunneling is a technique where
communications within network protocols are captured using the H TTP
protocol. For any companies to exist 011 the Internet, they require a web server.
These web servers prove to be a high data value target for attackers. Tlie
attacker usually exploits die WWW server running IIS and gains command line
access to the system. O nce a connection has been established, the attacker
uploads a precompiled version o f the H TTP tunnel server (lits). W ith the lits
server set up the attacker then starts a client 011 his 01 her system and directs its
traffic to the SRC port o f the system running the lits server. This lits process
listens 011 port 80 o f the host WW W and redirects traffic. Tlie lits process
captures the traffic in H TTP headers and forwards it to the WWW server port
80, after which the attacker tries to log in to the system; once access is gained he
or she sets up additional tools to further exploit the network.
Web exercise
m
W orkbook review
MegaPing security scanner checks your network for potential vulnerabilities that
might be used to attack your network, and saves inform ation in security reports.
111 diis lab you will learn to use MegaPing to check for vulnerabilities and
troubleshoot issues.
Lab Objectives
This lab gives an insight into pinging to a destination address list. It teaches
how to:
C E H L ab M an u al P ag e 235
Traceroute
Lab Environment
To cany out die lab, you need:
MegaPing is located at D:\CEH-Tools\CEHv8 M odule 03 S can nin g
CD Tools
dem onstrated in
this lab are
available in
D:\CEH
Tools\CEHv8
Module 03
Scanning
Netw orks
P IN G stands for
Packet Internet Groper.
You can also download the latest version o f M egaping from the link
http: / / www.magnetosoft.com/
I f you decide to download the la te s t version , then screenshots shown
in the lab might differ
Administrative privileges to run tools
TCP/IP settings correcdy configured and an accessible DNS server
Lab Duration
Time: 10 Minutes
Overview of Ping
Tlie ping command sends Internet Control M essa g e Protocol (ICMP) echo request
packets to die target host and waits for an ICMP respon se. During diis requestresponse process, ping measures die time from transmission to reception, known as
die round-trip tim e, and records any loss packets.
Lab Tasks
T A S K
IP Scanning
1.
Launch the Start menu by hovering die mouse cursor on the lower-left
corner o f the desktop.
C E H L ab M an u al P ag e 236
3. TQi^Meg a P in g ma!1^ n n d o w ^ ^ h o ^ M 1^ h ^ b l l o \ n n ^ 1g u 1^ ^ ^
55
MegaPing (Unregistered)
F ile
V ie w
T o o ls
'
H dp
DN S Lookup N am e
Fng cr
1S
N e t w o r k T im e
&
D N S L id rto s fe
g g P in g
gg
T r a c e ro u te
W ho 11
^
N e t w o r k R # to u fc # t
<<> P r o c e s s I n fo
S y s ta m In fo
IP S c a n n e r
N e tB I O S S c a n n e r
'4? S h a re S c a n n e r
^
S e c u r it y S c a n n e r
- J ? P o rt S ca n n e r
J i t H o s t M o n it o r
*S L b t H o > ts
4. Select any one o f die o p tio n s from the left pane o f the window.
Security scanner
provides the following
information:
NetB IO S names,
Configuration info, open
TC P and U D P ports,
Transports, Shares, Users,
G roups, Services, Drivers,
Local D hves, Sessions,
Remote Time o f Date,
Printers
C E H L ab M an u al P ag e 237
5. Select IP sca n n er, and type in the IP range in die From and To field; in
this lab the IP range is from 10.0.0.1 to 1 0 .0 .0 .2 5 4 . Click Start
6. You can select the IP range depending on your network.
fs r
MegaPing (Unregistered)
F ile
V */
Took
H e lp
ft ft
3<_ .
DNS L s t H o sts
* %v
^
r
a* 3
r a
P -1 'S W W
* t DNS Lookup N am e
F in g e r
I3 Scanner
N e tw o r k T im e
8 a8 P in g
IP S ca n n e r S s t n g j
S elect
ir a c c r o u t c
W hoK
N e tw o r k R e s o u rc e s
S c a m
10
10
254
| 1
S M
<> P ro c e s s In fo
^
S y s te m Info
*iiaui.111
N e tB I O S S ca n n e r
Y * S h a re S c a n n e r
j&
S e c u r ity S c a n n e r
P o rt S ca n n e r
H o s t M o n it o r
It will list down all the IP a d d r e s s e s under that range with their TTL
(Time to Live), S ta tu s (dead or alive), and die s t a t is t ic s o f the dead
and alive hosts.
MegaPing (Unregistered)
P ie
CD N etw o rk utilities:
D N S list host, D N S lookup
name, N etw ork Time
Synchroni2er, Ping,
Traceroute, Wliois, and
Finger.
V ie w
1 1
i ,
g
d
T o o ls
ft
H e lp
A <>
r j L .st 1 l o s t i
I P 5 i n n w
,p , D N S L o o k u p N a m e
Q
F in g e r
N e t w o r k T im e
t l P in g
IP S a n n a r
IP S ca n n e r S a tn g e
Setect-
T r a c e rc u t e
H V hols
|R a rg e
10
1 5 N e t w o r k R e so u rc e s
F S ca re
ro c e s s Info
Status:
S y s t e m Info
N e tB I O S S c a n n e r
y * Share Scanner
$
S e c u r ity S c o n n e r
l . J j ? P o rt Scanner
J S i H o s t M o n it o r
10
251
Start
TTL
. = 1 10.0.0.1
&4
A fiv e
1 a 0 .0 4
128
Abve
* ddrest
Nam e
S ta tj*
10.0.0.6
128
A S ve
1 a o .o .7
128
Afcve
1 a 0 .0 .1 0
O a t..
JQ
10.0.0.100
D e s t..
1010.0.101
D e s t ._
1 a0 .0 .1 0 2
D est
10.0.0.105
D e t._
10.0.0.104
D est
10.0.0.105
Dest
Show MAC
Addresses
Hosts Stats
T o ld .
254
A ctiv e
Paled : 2 5 0
Report
T A S K
NetBIOS
Scanning
C E H L ab M an u al P ag e 238
8. Select the NetBIOS S ca n n er from the left pane and type in the IP range
in the From and To fields. 111 this lab, the IP ran ge is from 10.0.0.1 to
1 0 .0 .0 .2 5 4 Click Start
T IP I
f/egaPing (Unregistered)
F ile
V ie w
T o o ls
H dp
rP- A
J* | D N S L is t H o s t s
N c G C S S so n rc r
,5,D N S L o o k u p N a m e
MegaPing can
sca n your entire
network and
provide
information such
a s open shared
reso u rces, open
ports,
services/drivers
a ctiv e on the
com puter, key
registry entries,
u sers and groups,
trusted dom ains,
printers, and
more.
F in g e r
Network Time
tS
P1n9
T r a c e ro u t e
&
W h o ls
N e tw o r k R e s o u r c e
<$> P r o c e s s Info
4
^
S y s te m I n fo
IP S c a n n c r
i!\
S h a re S c a n n e r
^
S e c u r ity S c a n n e r
P o rt S ca n n e r
H o s t M o n it o r
N etB IO S S c a nn er
9. The NetBIOS scan will list all the hosts with their NetBIOS n am es and
ad ap ter a d d r e s s e s
MegaPing (Unregistered)
M e
V tfA
T o r i?
H e lp
JL JL 4S & *8 8a &
J J , D N S L is t H o s t s
j! L DNS Lookup N am
Q
KBIT$ Sc^rrer
Net 9 0 $ S c a n r e r
F in g e r
N e t w o r k T im e 3 1 !
Men BIO S S c a r r r a
t i p,n9
g*3 T r a c e ro u t e
] | 10 . 0 . 0 . 1 |
|R e rg 5
W h o le ^
O
N e t w o r k R e s o u rc e s -
aJatLS
P r o c e s s Info %
.2 5 4
Stop
E x p a rd
1Names
Nam e
IP S c a n n e r ^
m g g n n 1$
/y
Z o r o e e c Q u e m g Net B O S Nam es on
J ^ S y s t e m In fo
:S h a re S c a n n e r ?
10
N stE JO S S can n er
1 0 0 .0 .4
W IN -U L Y 8 3 3 K H Q .. A I v
2 ) N e tB I O S N a m e s
Wgf A d o p t e r A d d r e s s
0 0 1 5 -5 D 0 0 -0 7 . .
S e c u r it y S c a n n e r
W ORKGROUP
P o rt S ca n n e r
iac.0.6
A D M IN P C
fr] N e tB IO S N o m e :
H o s t M o n it o r 2 1
STctus
D o m a in
W B A d a p te r A d d re ss
00-15-50-00-07..
4^
W ORKGROUP
D o m a in
1 0 0 .0 .7
W I N - D 3 9 M R S H L ..
j | ] N e tB I O S N a m e s
X f A d a p te r A d d re ss
D 4 - B E - D 9 - C 3 - C E ..
Exp and
Summary
M ic r o s o f t
A J iv c
M < ro s o ft
Stats
T o ld .
131
A c tvc
=a!od
123
A lv #
Report
N e tB IO S S c a n n e r
10. Right-click the IP address. 111 this lab, the selected IP is 10.0.0.4; it will
be different in your network.
5
TA sK
Traceroute
C E H L ab M an u al P ag e 239
v
V ie w
I I M
MegaPing (Unregistered)
F ile
T o o ls
Hdp
D N S L is t H o s t s
NctBICS S c a rr e
F in g e r
N e t w o r k T im e
t* P in 9
A
M * 3 0 S Scarner
Rom:
T r a c e ro u t e
Range
W h o ls
v |
N e t w o r k R e s o u rc e s
N e tE lO S S e i n e r
P r o c e s s In fo
Satus
S y s te m In fo
IP S c a n n e r
10
S h a re S ca n n e r
S e c u r it y S c a n n e r
P o rt S ca n n e r
j j
g l H o s t M o n it o r
Stdft
Names
Nome
3 0 ( jj
A d a p e e rA
M e r g e H o s ts
C c m a in
O p e n S h a re
Hoete Slate
Total:
C o m a in
254
V ie w H o t f ix D e t a b
A ctve
A p p l y H o t F ix es
F ailed251
N e tB IO S
S ? A d o p te r A
^
Dcpand
* b ?Summary
E x p o rt T o File
N e tB I O S f
10.0.0.5
i- J |
B A
254
0 B
*
_____
J ^ N e tB I O S S c a n n e r
So eci:
C o p y s e le c t e d it e m
10.0.0.7
C o p y s e le c t e d r o w
N e tB IG S
C o p y a ll re s u lt;
3 A d o p t e r A
S ave A s
T r a c e ro u te
T r a c c r o u t c s t h e s e le c t io n
12. It will open the T racerou te window, and will trace die IP address
selected.
MegaPing (Unregistered)
F ie
V ie w
T o o ls
H e lp
S. JL 4$ 151 * 88
J j , D N S L is t H o > b
Trace r 0 *
J!L D N S L o o k u p N a m e
& T ools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
| J F in g e r
i l l N e t w o r k T im e
**
aa
Destrebon:
^
-O
W h o ls
1 0 0 0 .4
N e t w o r k R e s o u rc e s
Z te s tr a w n \Jd rc s 5 J s t
R e so lv e I4ans
*{?> P r o c e s s Info
S y s t e m Info
^
Select Al
IP S c a n n e r
N e tB I O S S c a n n e r
Add
*jp S h a re S c a n n e i
D d c tc
S e c u r it y S c a n n e r
>
y
P o rt S ca n n e r
j t A H o t M o n it o r
Tim e
hoo
9 >91
1
A'
*
N am e
D s ta fc
W I N - U L Y 8 S 8 K H C J I P [ 1 _ C o m p le t e .
10.0.0.4
0 & '2 3 / 1 2 1 0 t 4 4 t f
A D M I N P C [ 1 0 .0 .0 .6 ]
C o m p le t e .
10.0.0.6
0 8 / 2 3 /1 2 1 Q 4 S J 1
Report
TA sK
Port Scanning
13. Select Port Scanner from die left pane and add
w w w .ce rtifie d h a ck er .co m 111 the D estin ation A d d ress List and then
click the S tart button.
14. After clicking the Start button it toggles to Stop
15. It will lists the ports associated with www.certifiedl1 acker.com with die
keyword, risk, and port number.
C E H L ab M an u al P ag e 240
MegaPing (Unregistered)
File
View
Tools
Help
GJ 8s 8s <5
J 'b
&
r H
&
GO
MegaPing security
scanner checks your
network for potential
vulnerabilities that might
use to attack your network,
and saves inform ation in
security reports
J !
^ AotScamcr
jftjf F01 S c * 1r *
f t Ping
g g T rac ero u te
^Whois
N etw o ik R esources
-^
Pnxowte
Scan Type
A /!h S P a b
-11
P ick m Info
System Info
S100
D eslnrtor A i ^ n t Ua>
S*t*dAl
IP Scnn<
-j j j NetBIOS Sc *nn*i
Share Seanner
w!* |
j P S * u n t y Scanner
j/
J 4 H 05 Monitor
2 o r*
Type
Keyword
O s8cron
R *
S c ann in g (51 %)
= S
3
C e 2 fc
99 Sccon ds R em ain g
TCP
ftp
E k satcd
TCP
w w w -http
Elevated
UDP
E le .x e d
,y 1
.J*
.y!
tcp m u x
UOP
com press..
UOP
Law
.* 5
UOP
rje
Low
UOP
ech o
Echo
Low
y *
'
UOP
ditcntd
Discard
Law
L<*m
Lab Analysis
Document all die IP addresses, open ports and running applications, and protocols
you discovered during die lab.
Tool/Utility
M eg aP in g
IP Scanning
NetBIOS Scanning
Traceroute
Port Scanning
Result:
List o f Active H ost
NetBios Name
Adapter Name
C E H L ab M an u al P ag e 241
P L E A S E TALK T O YO U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
Questions
1. How does MegaPing detect security vulnerabilities on die network?
2. Examine the report generation o f MegaPing.
Yes
0 No
P latform S u p p o rted
0 C lassroom
C E H L ab M an u al P ag e 242
0 iLabs
Lab
KEY
Valuable
information
Test your
knowledge
m. Web exercise
o
W orkbook review
Lab Scenario
You have learned in die previous lab diat MegaPing security scanner checks
your network for potential vulnerabilities that might be used to attack your
network, and saves inform ation in security reports. It provides detailed
inform ation about all computers and network appliances. It scans your entire
network and provides inform ation such as open shared resources, open ports,
services/drivers active 011 the computer, key registry entries, users and groups,
trusted domains, printers, etc. Scan results can be saved in HTM L 01 TXT
reports, which can be used to secure your network.
As an administrator, you can organize safety measures by shutting down
unnecessary ports, closing shares, etc. to block attackers from intruding the
network. As another aspect o f prevention you can use G -Zapper, which blocks
Google cookies, cleans Google cookies, and helps you stay anonymous while
searching online. This way you can protect your identity and search history.
Lab Objectives
This lab explain how G -Zapper automatically d e t e c t s and c le a n s the Google
cookie each time you use your web browser.
Lab Environment
To carry out the lab, vou need:
C E H L ab M an u al P ag e 243
S Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks
You can also download die latest version o f GZ apper from the link
littp://w w w . dumm ysoftware.com /
I f you decide to download the la te s t version , then screenshots shown
in the lab might differ
Install G-Zapper 111 Windows Server 2012 by following wizard driven
installation steps
Administrative privileges to run tools
A com puter running W indow s S erver 2 0 1 2
Lab Duration
Time: 10 Minutes
Overview of G-Zapper
G-Zapper helps protect your identity and search history. G-Zapper will read die
G oogle cook ie installed on your PC, display die date it was installed, determine how
long your se a r c h e s have been tracked, and display your Google searches. GZapper allows you to automatically d e lete or entirely block die Google search
cookie from future installation.
Lab Tasks
S
t a
1.
Launch the Start menu by hovering die mouse cursor on the lower-left
com er o f the desktop.____________________________________
G oogle C ookies
C E H L ab M an u al P ag e 244
Start
Server
Manager
m G-Zapper xs
compatible with Windows
95,98, ME, NT, 2000, XP,
Vista, Windows 7.
Administrator
W ruiows
PowerShel
H-jpw-V
Manager
6009*
Chrome
A ncrym ..
Surfog
Tutonal
fLm
11
Computer
Control
Pwl
ItyperV
Virtual
M tw w
SOL S e n a
G-Zapper
Command
Prompt
M v <1
l.retox
51
NstSca'iT...
Pro D em o
Standard
T*
M aw
11
How to Use It
Delete Cookie
R estore Cookie
T e st G oogle
S ettings
Register
C E H L ab M an u al P ag e 245
]jlF x
What is G-Zapper
G-Zapper Protectng your Search Privacy
Did you know Google stores a unique identifier n a cookie on you PC, v*ch alows them 10 track the
keywords you search for G-Zapper w i automatically defect and dean this cookie in your web browser.
- J 1 1 s L ( 1 j n - f i- 7 a n n f t t
th e , w n d n w
* i n i f t n in u .u n u i ^ n h a o c a d
n c i Y ^ u _________ _________
GZapper
The Google search cookie was removed and w ill be re-created with a
new ID upon visiting www.google.com
The cookie was located a t
(Firefox) C:\Users\Administrator\Application
Data\Mozilla\Firefox\Profiles\5vcc40ns.default\cookies.sqlite
Howt
OK
T0 block and delete the Google search cookie, click the Block Cookie button
(Gmail and Adsense w i be unavaJable with the cookie blocked)
http //www. dummvsoftware com
Delete Cookie
Block Cookie
T e s t G oogle
Register
S ettings
p__
Did you know - Google stores a unique identifier in a cookie on your PC. which alows them to track the
keywords you search for. G-Zapper will automatically detect and dean this cookie in you web browser.
.LMiijnfi-Zanrret mrnnnre the, wnrinw and pjiinu .unu..ftnhanrari sftatnh nrtwra______ _____
Gm ail and other Google services w ill be unavailable while the cookie is
manually blocked.
If you use these services, we recom mend not blocking the cookie and
instead allow G-Zapper to regularly clean the cookie automatically.
Are you sure you wish to m anually block the Google cookie?
How
No
Yes
T0 block and delete the Google search cookie, click the Block Cookie bUton
(Gmail and Adsense w l be unavaiaWe with the cookie blocked)
http //www dummvsoftware, com
Delete Cookie
Block Cookie
T e st G oogle
S ettings
R egister
6. It will show a message diat the Google cookie has been blocked. To
verify, click OK
C E H L ab M an u al P ag e 246
Did you know Google stores a unique identtfier in a cookie on your PC. which alows them to track the
keywords you search for GZapper will automatically detect and dean this cookie n you web browser.
Just run GZapper, mmmize the wrxlow. and enjoy your enhanced search privacy
GZapper
The Google cookie has been blocked. You may now search
anonym ously on google.com . Click the Test Google button to verify.
How t
OK
Your identity will be obscured from previous searches and G-Zapper w i regularly clean future cookies
T0 restore the Google search cookie clck the Restore Cookie button
Restore Cookie
Delete Cookie
T e st G oogle
Settings
Regtster
7. To test the Google cookie that has been blocked, click the T e s t G oogle
button.
8. Yoiu default web browser will now open to Googles Preferences page.
Click OK.
AAgoog... P - 2 (5 [ 0 ?references
Preferences
Sign in
S a v e y o u r p r e f e r v n c v w h e n f in i s h e d a n d ! * t u r n t o i w r c h
S a v e P re fe re n c e s
Y o u r c o o k ie s s e e m t o b e d is a b le d .
Setting preferences will not work until you enable cookies in your
browser.
Interface Language
Search I anguage
9. To view the deleted cookie information, click die S ettin g button, and
click V iew Log in the cleaned cookies log .
C E H L ab M an u al P ag e 247
- m
What is G-Zapper
GZapper Settings
Sounds
f* Ray sound effect when a cookie is deleted default wav
Preview
Browse
Clear Log
View Log
OK
Delete Cookie
Restore Cookie
Test Google
Register
Settings
S ' T ools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv 8
Module 03
Scanning
Netw orks
Edit
Format
View
[ x
Help
Lab A nalysis
Document all the IP addresses, open ports and running applications, and protocols
you discovered during die lab.
C E H L ab M an u al P ag e 248
T ool/U tility
GZapper
PLEASE
TALK TO
Y O U R I N S T R U C T O R IF YOU
R E L A T E D T O T H IS LAB.
HAVE
QUESTIONS
Q uestions
1. Examine how G-Zapper automatically cleans Google cookies.
2. Check to see if G-zappei is blocking cookies on sites other than Google.
Internet C onnection R equired
0 Y es
No
Platform Supported
0 Classroom
C E H L ab M an u al P ag e 249
iLabs
Lab
KEY
Valuable
inform ation
T est vour
knowledge
Q
W eb exercise
W orkbook review
Lab S cenario
111 die previous lab you have learned how you can detect, delete, and block cookies.
Attackers exploit die XSS vulnerability, which involves an attacker pushing
malicious JavaScript code into a web application. When anodier user visits a page
widi diat malicious code in it, die users browser will execute die code. The browser
lias 110 way of telling the difference between legitimate and malicious code. Injected
code is anodier mechanism diat an attacker can use for session liijacking: by default
cookies stored by the browser can be read by JavaScript code. The injected code can
read a users cookies and transmit diose cookies to die attacker.
Lab O bjectives
The objective of diis lab is to reinforce concepts of network security policy, policy
enforcement, and policy audits.
need:
C E H L ab M an u al P ag e 250
You can also download die latest version of A dvanced Colasoft P acket
Builder from die link
http:/ / www.colasoft.com/download/products/download_packet_builder.
php
If you decide to download die la test version, dien screenshots shown in
die lab might differ.
A web browser widi Internet connection nuuiing in host macliine
Lab D uration
Time: 10 Minutes
Users are also able to edit decoding infonnation in two editors: D ecod e Editor and
Hex Editor. Users can select any one of die provided templates: Ethernet Packet,
IP Packet, ARP Packet, or TCP Packet.
Lab Tasks
S
ta sk
Scanning
Network
C E H L ab M an u al P ag e 251
Start
Sem *
Adm inistrator
Windows
PowerSN>ll
Googte
Chrome
S#Th
ik
com p ute r
C otaoft
Packpt
Bunder t.O
*
v
control
1'anrt
ManagM
91
Command
Prompt
SQL J*rv*
Irn-.aljt 0
C enter.
MfrtjpaC*
Studc
M och n#.
*J
e
te r
V
s-
CMtoo
MeuMa
refax
Nnwp
7ftmap
GUI
o
FIGURE 17.2 Windows Server 2012 - Apps
Edt
Send
^
1-
1 S?
Add
55
Checksum [ A
Packet
No.
N o p x k e c elected:
\$
fa ta l
HeEdfcor
Packets
Selected
Sourer
0 byte* |
>0:0
<L
C o la s o ft
Adapter
Packet Lilt
Delta Time
&
Insert
4 $ Oecode Editor
Operating system
requirements:
= 1
Help
5. Before starting of vonr task, check diat die Adapter settings are set to
default and dien click OK.
Select Adapter
Adapter:
? -iF.W lT.rtf&TaTi.Fi
Physical Address
Link Speed
D4:BE:D9:C3:CE:2D0
100.0 l*)ps
1500 bytes
IP Address
10.0.0.7/255.255.255.0
Default Gateway
10.0 .0.1
Adapter Status
Operational
OK
Cancel
Help
C E H L ab M an u al P ag e 252
6. To add 01 create die packet, click Add 111 die menu section.
There are two ways to
create a packet - Add and
Insert. The difference
between these is the newly
added packet's position in
the Packet List. The new
packet is listed as the last
packet in the list if added
but after the current packet
if inserted.
File
Edit
0
1 Import
[ ^
Send
Export
Help
Add
0
Insert
Decode Editor
7. When an Add P ack et dialog box pops up, you need to select die template
and click OK.
2 Colasoft Packet
Builder supports *.cscpkt
(Capsa 5.x and 6.x Packet
File) and*cpf (Capsa 4.0
Packet File) format. You
may also import data from
.cap (Network Associates
Sniffer packet files), *.pkt
(EtherPeekv7/TokenPeek/
A1roPeekv9/ OmniPeekv9
packet files), *.dmp (TCP
DUMP), and *rawpkt (raw
packet files).
n n
Add Packet
Select Template:
ARP Packet
Delta Time:
0.1
OK
Second
Cancel
Help
8. You can view die added packets list 011 your right-hand side of your
window.
Packets
Packet List
TA sK
0.100000
S elected
Destination______,
00:00:00:00:00:00
D ecod e Editor
FIGURE 17.7: Colasoft Packet Builder Packet List
9. Colasoft Packet Builder allows you to edit die decoding information in die
two editors: D ecod e Editor and Hex Editor.
C E H L ab M an u al P ag e 253
Decode Editor
P a c k e t:
Num:000001 L e n g th :64 C a p tu re d :
B - E t h e r n e t Type I I
[0 /1 4 ]
l e s t i n a t i o n A d d re ss:
J S o u rc e A d d re s s :
Q B u s t Mode Option: If
you check this option,
Colasoft Packet Builder
sends packets one after
another without
intermission. If you want to
send packets at the original
delta time, do not check
this option.
! ^ P ro to c o l:
- s j ARP - A d d re s s R e s o lu t io n P r o t o c o l
(ARP)
[12.
1
0x0800
( E th e r n e t)
! #( P ro to c o l T ype:
j... H ardw are A d d re ss L e n g th :
[1 8 /1 ]
... P r o t o c o l A d d re s s L e n g th :
|
<#1ype:
1
00: 0 0 : 0 0 :0 0 : 0 0 :0 0
[1 9 /1 ]
(ARP Reque.
-^J>S0 u r c e P h y s ic s :
j3 S o u rc e IP :
D e s t i n a t i o n P h y s ic s :
D e s t i n a t i o n IP :
[6 /6 ]
0x0806
[1 4 /2 8 ]
!
\
[0 /6 ]
00: 0 0 : 0 0 :0 0 : 0 0 :0 0
0 .0 .0 .0
[2 2 /6 ]
[2 8 /4 ]
00: 0 0 : 0 0 :0 0 : 0 0 :0 0
0 .0 .0 .0
- E x t r a D a ta :
[3 2 /6 ]
[3 8 /4 ]
[4 2 /1 8 ]
Number o f B y te s :
18 b y t e s
FCS :
L # FCS:
,< L
[1 6 /2 ]
[4 2 /1 8 ]
0xF577BDD9
111
>J
Total
Hex Editor
0000
000E
001C
002A
0038
FF FF FF FF FF FF
00 01 08 00 06 04
00 00 00 00 00 00
00 00 00 00 00 00
00 00 00 00
00
00
00
00
00
01
00
00
00
00
00
00
00
00
00
00
00
00
00
00
60 bytes
00 08 06
00 00 00
00 00 00
00 00 00
....
V
10. To send all packets at one time, click Send All from die menu bar.
11. Check die Burst Mode option in die Send All Packets dialog window, and
dien click Start.
Colasoft Capsa
^4
Jown Checksum
1
Send
Packets
Packet List
No.
Packet Analyzer
Send All
Delta Tim e
Source
0.100000 00:00:00:00:00:00
S elected
Destination
FF:FF:FF:FF:FF:FF
C E H L ab M an u al P ag e 254
12.
Click Start
Select...
A
1000 A
1000
-
Loop Sendng:
Delay Between Loops:
Sending Information
0 T h e progress bar
presents an overview of the
sending process you are
engaged in at the moment.
Total Packets:
Packets Sent:
Progress:
Start
Stop
Close
Help
13.
C E H L ab M an u al P ag e 255
To
sent
from
die
File
menu,
select
Colas
L?
File
Edit
Send
Import...
1*
Export
10
Help
Exit
+^ T Packet:
X
glete
0 1
a
All Packets...
^
ketN o . |_ jJ I
Selected Packets...
Num: 00(
EJ-@ E th e r n e t Type I I
] 0 /1 4 [
^ D e s t i n a t i o n A d d re ss:
FF: FF:1
S o u rce A d d re ss:
0 0 :0 0 :(
Save As
x I
5avein ! " ! : o l a e c - f t
flfc l
Nome
Dtc modified
Type
Desktop
< 3
Libraries
lA ff
Computer
Network
r n ______
...
r >1
F1Unm*
| Fjiekct ecpld
vj
Sav
Sv c typ
v|
Crcl
Packets.cscpkt
Lab A nalysis
Analyze and document die results related to the lab exercise.
T ool/U tility
Colasoft Packet
Builder
C E H L ab M an u al P ag e 256
PLEASE TALK TO
Y O U R I N S T R U C T O R IF YOU
R E L A T E D T O T H IS LAB.
HAVE
QUESTIONS
Q uestions
1. Analyze how Colasoft Packet Builder affects your network traffic while
analyzing your network.
2. Evaluate what types of instant messages Capsa monitors.
3. Determine whether die packet buffer affects performance. If yes, dien what
steps do you take to avoid or reduce its effect on software?
Internet C onnection Required
Yes
0 No
Platform Supported
0 Classroom
C E H L ab M an u al P ag e 257
0 iLabs
Lab
The Dnde automatically scans all devices within specified subnets, draws and lays out
a wap ofyour networks, monitors services ofyour devices, and a/eftsyon in case
some service hasp roblems.
Test your
knowledge
Lab S cenario
Web exercise
111 the previous lab you learned how packets can be captured using Colasoft
Packet Builder. Attackers too can sniff can capture and analyze packets from a
network and obtain specific network information. The attacker can disrupt
communication between hosts and clients by modifying system configurations,
or through the physical destruction of the network.
Workbook review
As an expert eth ic a l h ack er, you should be able to gadier information 011
organ ization s n etw ork to c h e c k for vu ln erab ilities and fix th em b efo re an
a tta ck er g e t s to co m p ro m ise th e m a c h in e s using th o s e vu ln erab ilities. If
you detect any attack that has been performed 011 a network, immediately
implement preventative measures to stop any additional unauthorized access.
111 this lab you will learn to use The Dude tool to scan the devices in a network
and the tool will alert you if any attack has been performed 011 the network.
Lab O bjectives
The objective of diis lab is to demonstrate how to scan all devices widiin specified
subnets, draw and layout a map o f your networks, and monitor services 011 die
network.
V
J Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv 8
Module 03
Scanning
Netw orks
C E H L ab M an u al P ag e 258
You can also download the latest version o f The Dude from the
http: / / www.1nikiodk.com / thedude.php
Lab D uration
Time: 10 Minutes
O verview o f T h e Dude
The Dude network monitor is a new application that can dramatically improve die
way you manage your network environment It will automatically scan all devices
within specified subnets, draw and layout a map of your networks, monitor services
o f your devices, and alert you in case some service lias problems.
Lab Tasks
1. Launch the Start menu by hovering the mouse cursor on the lower-left
corner of the desktop.
i | Windows Server2012
Ser*r 2012 M a 1e Candklate DitaceM*
______________________________________________________________________________________ Ev^mbonoopy BuildWX:
ta sk
Start
Server
Maiwgcr
Computer
iL
~
v
-J
M m n itr.
T<xJ1
command
Prompt
1 n 0u0f
f>
0lp
C E H L ab M an u al P ag e 259
Setting*
Local Server
71S E 1
A3<*T3S USS
A Admn#
E
- B
I-
O*
Ssttnst
Dkovo 70011*
.*.
vJ
irk*
Lay*
0
D*wic
?5?
Hdo
CJ
Contert*
H
H
- l l
jjyi2m c* m .TffB
a d m in @ lo c a lh o s t - T h e D u d e 4 .0 b e ta 3
5references
Flea
FLnctona
H tfa y Action*
Lntu
Lc0*
7 A^icn
7 Cecus
7 & ent
7 Syslog
Notic?
Keftroric Maps
B Lccd
1 U n ir t i
-A
[.Ca 1MUd
Ctert. a 9 bu /t x 384 M
S * *x 2 1 5 b c *.'U M 2 b c
a d m i r t @ l o c a l h o s t - T h e D u d e 4 .0 b e t a 3
reference*
Local Seiver
a
Ca-'teri*
* b
r h tZ
IIIIJHb
*
- 1 +
Sett re#
D ko v * |
*T oo
1*
|lrk*
_d 2
Q Addra# list*
A vawro
0 *
fl Om icM
f * . Ftes
n F_nccon8
B
n
H a a y Action*
1^*
Leo*
? Acttcn
7 Defcus
7 Event
R
- Q
| !Connected
7 Sjobg
Mb No tie?
fcw ortc Ma08
Lccdl
'
Cie t. 1x
$59bus / t x 334bp*
:<* a215bo*<'u642bc
C E H L ab M an u al P ag e 260
Device Discovery
General
Services
Device Types
Advanced
Discover
Cancel
!-
Agent: |Pg?
P Add Networks To Auto Scan
Black List: |i
Device Name Preference: |DNS. SNMP. NETBIOS. IP
Discovery Mode:
Recursive Hops:
/
2
I I I I I
I I I
20
10
14
50
6. 111 the Device Discovery window, specify S ca n N etw ork s range, select
d efau lt from die A gent drop-down list, select DNS, SNMP, NETBIOS,
and IP from die D ev ice N am e P referen ce drop-down list, and click
D iscover.
Device Discovery
General
Services
Device Types
Advanced
number you want to scan for
0
Recursive Hops: [1
]] / r
2
I-
1 --------------------------------------------------------------4
10
14
20
SO
C E H L ab M an u al P ag e 261
f t ^t
Sanhfla! _
Ccrtemt_______________
f~ l *ric teo Lata
Adnns 4 .
fat
ll B S
+
- _
e:
Chats
Oevteaa
*- *Pie
Q Fu1dion
| S W
| ^Tooia
tt 1a
|lks
209m: [10
WW*IXY858KH04P
WN-D39MR5 HL9E4
AOMN
MflfeMtttLUUKAl
ptVem
asy*B
WIN
N.
?U't'.lO'.-tfS \
- ^
tob>10m
dn *^M
ap*
| | Dhcovef
Aeten07*40
H1-*
-00*
127A*en
L f Uofcoa
Qy
B*<2
_e [o
Q Local
Metwortc*
Q NotActfont
H PjTriS
Q adrrin 127.0,0.1
QPxtee
5 > Sennco
QTcde
YHhH.K0H)ftR3fi?M
r i'r -r ^ r
Q m - x 3 2 5 oc w I95bpj
Saver r | ( ( 4(>> * 3 9 t c
8. Select a device and place die m ouse cursor o n it to display the detailed
inform ation about diat device.
CartvM
~*1Zoom.[TO
j o ^ StfttKujo Dwovw
Ad<*3a Lota 5
*AAdm
r
R Afl*rta
*Chat
Q08V
1008
^ Plea
Q Functions
** H atovV
Lnk *
Lcoa
J?Acton]
tftteO
T. JLYKSO-CiPW
rd
cvn
a
xn
p
u
cr,
IP 100 0 9
M
ACCtt - 10
S*'42m (7V
SjcrT!.*.vw.-.-Y35am3ip
Ipwue 0028<J771
C7 Detua
Ewr ?
L7Sbg
* Mb Mod
tetwo*M
aps,!
B
B local
n Nnwwk
No!llc<Uor2
Q Parris
H * 127.00.1
P cN
Q>Samcas
)>*
l*
I_i**W
UL'itX>:
1 a t
(<
iwttdai e UU liriMMOll-
n-n
11*: .1rc1c:r
H Tocte
1 2 :3
12:31
Iecu
lam0a.'iaaeoip
12:40
1*:
12: X
| mdiv0vnn-uiYKBocnP
13: ta
. W * . n m , t W -llr8!a.H0TP
n .1 3 4 ttp a /fc 3 3 k b c
9.
C E H L ab M an u al P ag e 262
10. Select options from die drop-down list to view complete information.
< _
19
Local S w
SetBngj
Q Add's** Luts
4 Mm
130245
Aq*0U
13024S
130?44
1302S0
3U
* u
5U
Q I undior*
IW y /towns
M Lrk
>Logs
7A=1n
7 Debug
? Stfog
Mb Nedcx
Aden
NetwOlk Map Bennt dn11*d
Ner*ek Map Bennt chanjed
tM a k Map b tm rU tfa
Nerwak Map B 1r * changed
FMflCik Mat' blvw'i: J w j*0
Nmvck Map Brnfr! changed
fMocik Map
Merwak Map Be-nem changed
fjnC*k Map b c w : changed
Nefc<k Map Bemem changed
NetWClk Map
Netwcik Map Berotm changed
r(.ck Map 0 c1*sr. changed
rer*cfk Map Beroen: changed
ta t a k Map Bc1 * T. cha' Sed
tieCMdk Map B f w t changed
Netwcik Map Bwnert changed
rjefMCik Map Berne'S changed
13024C
7 U
Owl
r*1LVvis
rte
C U
130 ?
7U
130254
fi U
130? K
9u
u
u
u
13 U
10
12
130258
130302
14 U
130348
15 U
13.03.14
130340
1303-03
13.0306
Hw1! .<>j0
Be'IW >.' jeO
6 U
1303 16
7 u
13.0320
16 U
130322
130324 Netwcik Map Bwmnl
jed
1303 27 Netwcik Map Beroen! changed
eta'
19 U
20u
CemtcM
a d ^ n ^ io c a lh o s t - The
fafaenoee
oI
e I ~
Conot?
Heb
Dude 4,Obeta3
ih ti^rS S B S S X S A l
O toca sn
Getnrgj
J C J U
Comats
3 Address Lists
& Adms
Q Agents
Q O w i
i l l l
Type, ( *
De*c*
100 a !
Q Devicw
1000.12
'< Fte
Q Functor
1000255
A D **
V/N2H9STOSG
Q Ktateiy Actons
Lrkj
1 C17Aclcn
C f CebuQ
r> E v .rt
Lf S^oo
CJ Mb!*<!.
WMOUMR5HL
V / f N 6t< SG1
W IU J O 0 M I
w!s5sn.c1u
W KMW S8
w woowss
U iZ.-r'tn <
n -= te
in c te
MTCte
Mncte
M rle
WCte
w *
unci*
M de
trmo
M* |
*met*
M * f^ i
T]
lias
Local
Local
Local
Local
Local
Local
Local
Local
Local
Local
Local
Local
Ser.'?0t2I6rc* ^24
C E H L ab M an u al P ag e 263
11. As described previously, you may select all the other options from the
drop-down list to view die respective information.
12. Once scanning is complete, click the
button to disconnect.
S e ttn o )
Local Server
d
C*
*to
+
R
Agert
Chate
O w c es
C.
FLnaens
History Actions
Linlcs
Onoowf
Tooli
ft
*.
,1
* i"
W IN -D 39N R SH 1.91=4
(ZJ Dcbuo
Event
r
S*Crgc
Leg*
C f A cton
<|
t>
Q
H
WikULYSSBKHQIP
t p u 22% IM fT t SOS. v .it 34% d isk 75%
r* =1
= 3
Address U8I8
Adn<rM
ADMIN
v.
W IN -2N 95T 0S G IE M
1000
O S/*>og
Mto Nodeo
Netv.'Oik Mips
B - l g cjj
j [>
r \ ^T
^ ^ ^
.1
WM -LXQ \3\VR3!W M
Lab A nalysis
Analyze and document die results related to die lab exercise.
T ool/U tility
T he D ude
C E H L ab M an u al P ag e 264
PLEASE TALK TO
Y O U R I N S T R U C T O R IF YOU
R E L A T E D T O T H IS LAB.
HAVE
QUESTIONS
In te r n e t C o n n e c tio n R e q u ire d
Y es
0 No
P la tfo r m S u p p o rte d
0 C la s s ro o m
C E H L ab M an u al P ag e 265
0 iLabs