You are on page 1of 18

SCANNING NETWORK

Speaker:

A F M Bakabillah
Network & Security Consultant
MCT MCSE MCSA Microsoft Certified: Azure Administrator Associate
MTCNA MTCRE MTCSE RHCE CEH ITIL CISCO CyberOps Associate
SCANNING NETWORK

Definition:

 Scanning is a set of procedures for identifying live hosts, ports, and


services, discovering Operating system and architecture of target
system, Identifying vulnerabilities and threats in the network.
Network scanning is used to create a profile of the target organization.
SCANNING NETWORK

Objectives of Network Scanning

 To discover live hosts/computer, IP address, and open


ports of the victim.
 To discover services that are running on a host
computer.
 To discover the Operating System and system
architecture of the target.
 To discover and deal with vulnerabilities in Live hosts.
SCANNING NETWORK

What are the types of scanning?

 Scanning is primarily of three types.


 These are network scanning, port scanning, and vulnerability
scanning
SCANNING NETWORK
TCP Flags:
 TCP flags are used within TCP packet transfers to indicate a particular connection state
or provide additional information. Therefore, they can be used for troubleshooting
purposes or to control how a particular connection is handled.
 6 TCP Flags are available.
SCANNING NETWORK
SCANNING NETWORK

What is network scanner tools?


 Network scanning helps to detect all the active hosts on a network and
maps them to their IP addresses. Network scanners send a packet or ping
to every possible IP address and wait for a response to determine the
status of the applications or devices (hosts)
 Useful Tools:
 Nmap
short for Network Mapper, is a free and open source tool used for vulnerability checking, port
scanning and, of course, network mapping. Despite being created back in 1997, Nmap remains the
gold standard against which all other similar tools, either commercial or open source, are judged.
 hping3
a network tool able to send custom ICMP/UDP/TCP packets and to display target replies like ping
does with ICMP replies. It handles fragmentation and arbitrary packet body and size, and can be
used to transfer files under supported protocols.
SCANNING NETWORK
Nmap example:
SCANNING NETWORK
Nmap example:
SCANNING NETWORK
SCANNING NETWORK

Ping Sweep Countermeasures:


SCANNING NETWORK

OS Discovery:
SCANNING NETWORK

How to identify a Target OS:


SCANNING NETWORK

How to identify a Target OS:


SCANNING NETWORK

Firewall Evasion:

Technique Example:
SCANNING NETWORK

Firewall Evasion:

Example : Source Port Manipulation


SCANNING NETWORK

Firewall Evasion:

Example : IP Spoofing
MORE EVASION TECHNIQUE

 https://linuxsecurity.com/features/nmap-firewall-evasion-
techniques
 https://pentestlab.blog/2012/04/02/nmap-techniques-for-avoiding-
firewalls/

You might also like