Module 03: Scanning Networks

 

Module 03: Scanning Networks

Scenario

Earlier, you gathered all possible information about the target such as organization information (employee details, partner details, web links, etc.), network information (domains, sub-domains, IP addresses, network topology, etc.), and system information (OS details, user accounts, passwords, etc.).

Now, as an ethical hacker, or as a penetration tester (hereafter, pen tester), your next step will be to perform port scanning and network scanning on the IP addresses that you obtained in the information-gathering phase. This will help you to identify an entry point into the target network.

Scanning itself is not the actual intrusion, but an extended form of reconnaissance in which the ethical hacker and pen tester learns more about the target, including information about open ports and services, OSes, and any configuration lapses. The information gleaned from this reconnaissance helps you to select strategies for the attack on the target system or network.

This is one of the most important phases of intelligence gathering, which enables you to create a profile of the target organization. In the process of scanning, you attempt to gather information, including the specific IP addresses of the target system that can be accessed over the network (live hosts), open ports, and respective services running on the open ports and vulnerabilities in the live hosts.

Port scanning will help you identify open ports and services running on specific ports, which involves connecting to Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) system ports. Port scanning is also used to discover the vulnerabilities in the services running on a port.

The labs in this module will give you real-time experience in gathering information about the target organization using various network scanning and port scanning techniques.

Objective

The objective of this lab is to conduct network scanning, port scanning, analyzing the network vulnerabilities, etc.

Network scans are needed to:

  • Check live systems and open ports
  • Identify services running in live systems
  • Perform banner grabbing/OS fingerprinting
  • Identify network vulnerabilities
  • Draw network diagrams of vulnerable hosts

Overview of Scanning Networks

Network scanning is the process of gathering additional detailed information about the target by using highly complex and aggressive reconnaissance techniques. The purpose of scanning is to discover exploitable communication channels, probe as many listeners as possible, and keep track of the responsive ones.

Types of scanning:

  • Port Scanning: Lists open ports and services
  • Network Scanning: Lists the active hosts and IP addresses
  • Vulnerability Scanning: Shows the presence of known weaknesses

Lab Tasks

Ethical hackers and pen testers use numerous tools and techniques to scan the target network. Recommended labs that will assist you in learning various network scanning techniques include:

  1. Perform host discovery

    • Perform host discovery using Nmap
    • Perform host discovery using Angry IP Scanner
  2. Perform port and service discovery

    • Perform port and service discovery using MegaPing
    • Perform port and service discovery using NetScanTools Pro
    • Explore various network scanning techniques using Nmap
    • Explore various network scanning techniques using Hping3
  3. Perform OS discovery

    • Identify the target system’s OS with Time-to-Live (TTL) and TCP window sizes using Wireshark
    • Perform OS discovery using Nmap Script Engine (NSE)
    • Perform OS discovery using Unicornscan
  4. Scan beyond IDS and Firewall

    • Scan beyond IDS/firewall using various evasion techniques
    • Create custom packets using Colasoft Packet Builder to scan beyond IDS/firewall
    • Create custom UDP and TCP packets using Hping3 to scan beyond IDS/firewall
    • Create custom packets using Nmap to scan beyond IDS/firewall
  5. Draw network diagrams

    • Draw network diagrams using Network Topology Mapper
  6. Perform network scanning using various scanning tools

    • Scan a target network using Metasploit

Comments

Popular posts from this blog

Lab 1: Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools

Lab 5: Perform Cryptanalysis using Various Cryptanalysis Tools

Task 2: Perform OS Discovery using Nmap Script Engine (NSE)