Week 2: Notes - morgan-hanrahan/Tech-Journal GitHub Wiki

Active Recon Scanning

Scanning Goals

Looking for specific systems and applications to target

  • Find live hosts on the network
    • ICMP (ping) and/or TCP/UDP network scans
    • Doesn't always work, because it might not always respond to the ping based on the firewall protocols
  • Find open ports on those live hosts
    • TCP/UDP host port scans
    • There are 65,535 ports available for TCP/UDP
    • Ports below 1,000 you need to be in root to fire up the port
  • Gathering additional information on IPS/IDS and Firewalls

Finding Live Hosts: ICMP and Ping

  • ICMP - Internet Control Message Protocol
    • Layer 4 protocol - carried over IP
    • Health and maintenance protocol
    • Not intended to carry user data
  • Ping is the most directly used ICMP

NMAP Default Scan

  • NMAP does discovery with
    • an ICMP echo request
    • a TCP SYN packet to port 443
    • a TCP ACK packet to port 80
    • and an ICMP timestamp request