5-9-13
Week 1 Case Study
Regarding your recent request about more information on ping sweeps and port scans, I am going to provide you with some information to help you with any confusing that you may have. Port scans and ping sweeps are networking tools that admins use to perform normal and common functions such as, checking server to see if it is running correct or to determine with services are open so they can receive important updates. Hackers use the same function which can provide a hacker with information. Port scans, like I stated earlier, are used to discover what services are running on a certain machine. Each service offered by our servers makes user of ports by which TCP/IP requests are sent. Hackers use this information to determine what types of vulnerabilities they can use; this is why the only ports that are open are the ones that we are using. By keeping all other ports closed this keeps hackers from opening other unnecessary openings. Ping sweeps are often used in combination with Port scans, similar process. Ping sweeps are used to see what targets are available on the network. For instance, we may be on a 192.168.1.0 vlan with only a few computers. The router or DHCP server will assign each machine with its own IP address in order by request, by doing this the IP address can get out of order. A Ping sweep of the IP range 192.168.1.1 – 192.168.1.99 would show the computers are currently on the network. Hackers do this to gain as much access as possible. Port scans and Ping sweeps are something that everyone should know about and know what they do. These are something that every company should worry about. These are the most common ways that hackers will get information from other computers. One of the first things you can do in order to block unauthorized access to it, is to block unneeded ports on your computer, and disable applications that are not really needed and that can be risky for your computer. It is highly
References: http://gregorympyles.wordpress.com/information-systems/case-studies/ping-sweeps-and-port-scans/ http://www.linuxjournal.com/article/4234?page=0,0 Principles of Computers Security: Security + and Beyond, 2nd Edition