Preview

Ping Sweeps and Port Scanning

Powerful Essays
Open Document
Open Document
9158 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ping Sweeps and Port Scanning
CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

Gathering information about a remote system is often considered the first step an "intelligent hacker” takes in launching an attack against or gain privileged access to a target machine. Intelligence gathered in this research can provide useful information about vulnerabilities or misconfigurations that can be successfully exploited by the potential intruder. The more a hacker knows about a particular system (e.g. the operating system (OS), the hardware architecture and services that are running), the greater are his or her chances of launching a successful attack. By knowing the operating system and system type, a hacker can do a little research and come up with a list of known vulnerabilities.
A series of steps that an "intelligent hacker" would take in this intelligence gathering attempt: include; * Foot printing: this phase involves gathering as much information as possible on the target from authorized source of information (internet protocol (IP) address ranges, domain name system (DNS) servers, mail servers); * Scanning: this phase involves determining which hosts in the targeted network are alive and reachable (through ping sweeps), which services they offer (through port scanning) and which operating systems they run (operating system (OS) fingerprinting); * Enumeration: this phase involves extracting valid accounts or exported resources, system banners, routing tables, simple network management protocol (SNMP) information, etc.
The second phase has an impact particularly strong on all networks since the number of automated scanners is constantly increasing and so is this type of traffic on the borders of every network.
Almost any system administrator of a large network will tell you that their network has been probed before. As cracking tools become more popular and increase in number, this trend is likely to continue. Although network probes are technically not intrusions

You May Also Find These Documents Helpful

  • Powerful Essays

    Pos420 Final Paper

    • 2424 Words
    • 10 Pages

    Windows and Linux operating systems have a few large advantages and disadvantages that are worth analyzing when considering security. Interestingly enough, the…

    • 2424 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    16. Which enables a host to determine another host’s name based on its IP address? Reverse look-up zone…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Regarding your recent request about more information on ping sweeps and port scans, I am going to provide you with some information to help you with any confusing that you may have. Port scans and ping sweeps are networking tools that admins use to perform normal and common functions such as, checking server to see if it is running correct or to determine with services are open so they can receive important updates. Hackers use the same function which can provide a hacker with information.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT 2580

    • 520 Words
    • 3 Pages

    b. The different scans all work hand and hand with each other. Ping will give you all the machines on the network while all the other scans give you more specific details of the scan depending on what you want to check or identify as far as vulnerabilities.…

    • 520 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    9. Which of the following is the term for identifying packets used by TCP to establish a connection?…

    • 800 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    Intense Scan, intense scan plus UDP, intense scan, all TCP ports, intense scan no ping, ping scan, quick scan, regular scan.…

    • 362 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lesson 1

    • 457 Words
    • 2 Pages

    T/ 4 Name resolution is the process of locating the IP address equivalent for a given name.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays