CEHv6 Module 05 Scanning PDF
CEHv6 Module 05 Scanning PDF
CEHv6 Module 05 Scanning PDF
Countermeasures
Version 6
Module V
Scanning
Scenario
Source: http://www.abc.net.au/
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective
• Definition
D fi i i off scanning
i
• Types and objectives of Scanning
• Understanding CEH Scanning methodology
• Checking g live systems
y and open
p p ports
• Understanding scanning techniques
• Different tools present to perform Scanning
• Understanding banner grabbing and OS fingerprinting
• Drawing network diagrams of vulnerable hosts
• Preparing proxies
• Understanding anonymizers
• Scanning countermeasures
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Scanning Definition Scanning Tools
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Scanning - Definition
Port Scanning
• A series
i off messages sent bby someone attempting
i to bbreak
k
into a computer to learn about the computer’s network
services
• Each associated with a "well-known" port number
Network Scanning
• Approcedure for identifying
y g active hosts on a network
• Either for the purpose of attacking them or for network
security assessment
Vulnerability Scanning
• The automated process of proactively identifying
vulnerabilities of computing systems present in a network
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Objectives of Scanning
To
o discover
o which po
ports are active/running
/ g
To discover
disco er the IP address of the target system
s stem
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
CEH Scanning Methodology
Banner g
grabbingg
Id tif S
Identify Service
i
/OS Fingerprinting
Draw network
D k diagrams
di off
Scan for Vulnerability
Vulnerable hosts
Prepare proxies
ATTACK!!
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Checking
g for Live Systems
y
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Checking for Live Systems - ICMP
Scanning
In this type of scanning, it is found out which hosts are up in a
net ork by
network b pinging them all
It can also be helpful to tweek the ping timeout value with the –t
option
p
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Angry IP Scanner
• Computer name
• Workgroup name
• MAC address
dd
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Angry IP Scanner: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Ping Sweep
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Ping Sweep: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Firewalk Tool
Firewalk works by sending out TCP or UDP packets with a TTL one
greater than the targeted gateway
• If the gateway allows the traffic, it will forward the packets to the next hop
where they will expire and elicit an ICMP_TIME_EXCEEDED message
• If the gateway host does not allow the traffic, it will likely drop the packets
on the floor and there will be no response
p
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Firewalk Tool (cont’d)
Destination Host
Internet
Hop n
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Firewalk Commands
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Firewalk Output
Firewalk penetrated all of
the filters through the target
gateway but also port scan
the metric and determine
the following ports open:
port 23 (telnet)
port 25 (SMTP)
port
t 80 (HTTP)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Checking for Open Ports
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Three Way Handshake
Computer A Computer B
192.168.1.2:2342 ------------syn-------------->192.168.1.3:80
192.168.1.2:2342 <---------syn/ack-----------192.168.1.3:80
192.168.1.2:2342-------------ack-------------->192.168.1.3:80
Connection Established
The server replies with a packet with both the SYN and the ACK flag set
For the final step, the client responds back to the server with a single ACK
packet
If these
th three
th steps
t are completed
l t d without
ith t complication,
li ti th
then a TCP
connection has been established between the client and the server
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Three Way Handshake:
Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
TCP Communication Flags
The flags
g are as follows:
• Synchronize – It is also called as "SYN” and is used to
initiate a connection between hosts
• Acknowledgement - It is also called as "ACK” ACK and is used in
establishing a connection between hosts
• Push – It is called as "PSH” and instructs receiving system to
send all buffered data immediately
• Urgent
U t - It is
i also
l called
ll d as "URG” andd states
t t ththatt th
the d
data
t
contained in the packet should be processed immediately
• Finish – It is also called as "FIN“ and tells remote system that
there will be no more transmissions
• Reset – It is also called "RST” and is used to reset a connection
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nmap
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nmap: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nmap: Scan Methods
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NMAP Scan Options
-oN(ormal)
-oX(ml)
-oG(repable)
-oA(ll)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NMAP Timing Options
-T Aggressive-
A i parallel
ll l scan & 300 sec timeout
i & 1.25 sec/probe
/ b
--host_timeout --max_rtt_timeout
(default - 9000)
--min_rtt_timeout --initial_rtt_timeout
((default – 6000))
-S <SRC_IP_Address> -e <interface>
-g
g <portnumber> --data
data_length
length <number>
f (fragmentation)
-f (f t ti ) -v (verbose)
( b ) -h h (help)
(h l )
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
HPING2
HPING is a command-line oriented TCP/IP packet assembler/analyzer
It has a Traceroute mode
It has the ability to send files between a covered channel
It not only sends but also supports ICMP echo requests
• TCP
• UDP
• ICMP and
• Raw-IP
Raw IP protocols
Features
• Firewall testing
• Ad
Advanced d portt scanning
i
• Network testing, using different protocols, TOS, fragmentation
• Advanced Traceroute, under all the supported protocols
• Remote OS fingerprinting
• R
Remote
t uptime
ti guessing
i
• TCP/IP stacks auditing
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Hping2 Commands
hping2 10.0.0.5
• This command sends a TCP null-flags packet to port
0 of host 10.0.0.5
hping2 10.0.0.5 -p 80
• This command sends the packet to port 80
hping2 -a 10.0.0.5 -S -p
81 10.0.0.25
• This command sends spoofed SYN packets to the
target via a trusted third party to port 81
hping www.debian.org -p
80 -A
• This command sends ACK to port 80 of
www.debian.org
hping www.yahoo.com -p
80 -A
• This command checks for IPID responses
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SYN Stealth / Half Open Scan
SYN Stealth / Half Open Scan is often referred to as half open scan because it does not
open a ffull
ll TCP connection
ti
First, a SYN packet is sent to a port of the machine, suggesting a request for connection,
andd the
th response iis awaited
it d
If the port sends back a SYN/ACK packet, then it is inferred that a service at the
particular port is listening. If an RST is received, then the port is not active/ listening. As
soon as the SYN/ACK packet is received,
received an RST packet is sent,
sent instead of an ACK,
ACK to
tear down the connection
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Stealth Scan
Computer A Computer B
192.168.1.2:2342
192 168 1 2:2342 ------------syn-----------
syn
>192.168.1.3:80
192.168.1.2:2342 <---------syn/ack----------
192.168.1.3:80
192.168.1.2:2342-------------RST-----------
>192.168.1.3:80
Client sends a single SYN packet to the server on the appropriate port
If the port is open then the server responds with a SYN/ACK packet
If th
the server responds
d with
ith an RST packet,
k t then
th the
th remote
t portt iis iin ""closed”
l d”
state
The client sends the RST packet to close the initiation before a connection
can ever be established
Xmas scans directed at any Microsoft system will show all ports on the host as
b i closed
being l d
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
FIN Scan
Computer A Computer B
FIN sca
scan directed
d ec ed at
a open
ope port:
po
192.5.5.92:4031 -----------FIN------------------->192.5.5.110:23
192.5.5.92:4031 <----------NO RESPONSE------------192.5.5.110:23
FIN Scan will not work against any current version of Microsoft Windows
FIN scans directed at any Microsoft system will show all ports on the host as
being closed
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NULL Scan
Computer A Computer B
NULL
U sca
scan d
directed
ec ed at
a open
ope port:
po
192.5.5.92:4031 -----------NO FLAGS SET---------->192.5.5.110:23
192.5.5.92:4031 <----------NO RESPONSE------------192.5.5.110:23
NULL Scan will not work against any current version of Microsoft Windows
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IDLE Scan: Basics
Most network servers listen on TCP ports, such as web servers on port 80 and mail
servers on port 25
The target machine will send back a "SYN|ACK" (session request acknowledgment)
packet if the port is open, and an "RST" (Reset) packet if the port is closed
A machine which receives an unsolicited SYN|ACK packet will respond with an RST. An
unsolicited RST will be ignored
Everyy IP p
packet on the Internet has a "fragment
g identification" number
Many operating systems simply increment this number for every packet they send
So probing for this number can tell an attacker how many packets have been sent since
the last probe
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IDLE Scan: Step 1
IPID Probe
SYN / ACK Packet
Response: IPID=31337
RST Packet
Attacker Zombie
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IDLE Scan: Step 2.1 (Open Port)
Attacker
Target
Zombie
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IDLE Scan: Step 2.2 (Closed Port)
The target will send RST to the “zombie” if port is closed. Zombie will
not send anything back
Attacker
Target
Zombie
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IDLE Scan: Step 3
IPID Probe
SYN / ACK Packet
Response: IPID=31339
RST Packet
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ICMP Echo Scanning/List Scan
ICMP E
Echo
h SScanning
i
• This is not really port scanning, since ICMP does not have a
port abstraction
p
• But it is sometimes useful to determine which hosts in a
network are up by pinging them all
• nmap -P cert.org/24 152.148.0.0/16
List Scan
• This type of scan simply generates and prints a list of
IPs/Names without actually pinging or port scanning them
• A DNS name resolution will also be carried out
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
TCP Connect / Full Open Scan
The connect()
Th t() system
t call
ll provided
id d b
by th
the
operating system is used to open a connection to
every open port on the machine
ACK
SYN
If the port is open, connect() will succeed
ACK
SYN
+
If the port is closed, then it is unreachable ACK
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SYN/FIN Scanning Using IP
Fragments
It is not a new scanning method but a modification of the earlier
methods
The TCP header is split up into several packets so that the packet
filters are not able to detect what the packets intend to do
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
UDP Scanning
• While non root users cannot read port unreachable errors directly,
directly
LINUX is intuitive enough to inform the users indirectly when they
have been received
• This is the technique used for determining open ports by non root
users
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Reverse Ident Scanning
The Ident protocol allows for the disclosure of the username of the owner of
any process connected via TCP, even if that process did not initiate the
connection
So a connection
S ti can b be established
t bli h d with
ith th
the htt
http portt and
d th
then use Id
Identt tto
find out whether the server is running as a root
This can be done only with a full TCP connection to the target port
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Window Scan
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Blaster Scan
A TCP port scanner for UNIX-based
operating
p g systems
y
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
PortScan Plus, Strobe
PortScan Plus
Strobe
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IPSecScan
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NetScan Tools Pro
It is used to:
• Determine the ownership
of IP addresses
• Translate
T l t IP addresses
dd tto
hostnames
• Scan networks
• Probe p ports of target
g
computers for services
• Validate email addresses
• Determine the ownership
of domains
• List the computers in a
domain
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WUPS – UDP Scanner
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SuperScan
It can perform ping scans, scans port using any IP range, and scans any port range from a
built-in list or specified range
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IPScanner
• Pingscan
• TCPPort scan
• Netbios scan
• NT Services scan
• Local Groups scan
• Remote Time of Dayy scan
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Global Network Inventory
Scanner
Global
Gl b lN
Network
t k
Inventory is a software
and hardware inventory
system that can be used
as an audit scanner in
an agent-free and zero
deployment
environments
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Net Tools Suite Pack
N t Tools
Net T l S Suite
it PPack
k iis a collection
ll ti off scanning
i ttools
l
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Net Tools Suite Pack: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
FloppyScan
Interesting ports on 192.168.100.5:
Floppyscan is a dangerous hacking tool (The 1646 ports scanned but not
which can be used to portscan a system shown below are in state: closed)
using a floppy disk PORT STATE SERVICE
53/tcp open domain
88/tcp open kerberos-sec
It boots up mini Linux
135/tcp open msrpc
139/tcp open netbios-ssn
389/tcp open ldap
It displays “Blue
Blue screen of death
death” screen 445/tcp open microsoft-ds
microsoft ds
464/tcp open kpasswd5
593/tcp open http-rpc-epmap
636/tcp open ldapssl
It port scans the network using NMAP
1025/tcp open NFS-or-IIS
1026/tcp open LSA-or-nterm
3268/tcp open globalcatLDAP
It sends the results by e-mail to a 3269/tcp open globalcatLDAPssl
remote server
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
FloppyScan Steps
Step2: The system boots to floppy
and BSOD is displayed on the screen
Step3: Performs
S f NMAP
A scan on the
h
local network
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
E-mail Results of FloppyScan
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Atelier Web Ports Traffic Analyzer
(AWPTA)
AWPTA captures the data that flows in and out of your PC since the
time of booting
Optionally, AWPTA can also log (up to 500mb) all traffic since the
last boot to a file
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Atelier Web Ports Traffic Analyzer
(AWPTA): Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Atelier Web Security Port Scanner
(AWSPS)
It also p
provides traffic details for TCP and UDP traffic,, as well as for
control packets (ICMP), including ping
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
AWSPS: Connections and Listening Ports.
TCP,, UDP and ICMP Statistics
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
AWSPS: IP Statistics/Settings
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
AWSPS: UDP Scan
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
AWSPS: Ping
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IPEye
IPEye scans requested ports, given a valid IP address, and returns a list of ports which are
open, closed, or rejected
IP address of the machine is required while scanning; host names are not accepted
-xmas = Xmas
-syn = SYN scan -fin = FIN scan -null = Null scan
scan
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IPEye: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ike-scan
www.nta monitor.com
www.nta-monitor.com
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ike-scan: Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ike-scan: Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Infiltrator Network Security Scanner
www.infiltration-systems.com
y
IInfiltrator
filt t iis an intuitive
i t iti network
t k security
it scanner th
thatt can quickly
i kl
scan and audit your network computers for vulnerabilities, exploits,
and information enumerations
Features:
Information Gathering
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Infiltrator Network Security
Scanner: Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Infiltrator Network Security
Scanner: Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
YAPS: Yet Another Port Scanner
www.steelbytes.com
Yaps
p is a small and fast TCP/IP/ p port scanner with little configuration
g
options and a fairly plain interface
F t
Features:
Supports simultaneous connections to many targets
S
Supports command
d line
li and
d GUI mode
d
Customizable timeout
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
YAPS: Yet Another Port Scanner:
Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced Port Scanner
www.famatech.com
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced Port Scanner:
Screenshots
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NetworkActiv Scanner
www.networkactiv.com
Features:
• TCP connect() port scanner and TCP SYN port scanner
• UDP port scanner with automatic speed control
• Ping scanning of subnets (UDP or ICMP)
• TCP subnet port scanner for finding Web servers and other
servers
• High performance trace-route
• Remote OS detection by TCP/IP stack fingerprinting
• Whois Client
• DNS Dig system
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NetworkActiv Scanner:
Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NetworkActiv Scanner:
Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NetGadgets
www.noticeware.com
NetGadgets is a complete set of diagnostic tool for every level of Internet user
The tools within NetGadgets provide invaluable data about your Internet and
network connections, other users, and web site information
It combines all the standard Internet tools like Ping, Trace Route, NS Lookup
and Whois,, with other less common tools like Time,, Daytime,
y , Echo Plus,, Email
Verify, Finger, Name Scan, Ping Scan, Port Scan, Service Scan, and others
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NetGadgets: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
P-Ping Tools
You can scan a single or multiple IP address and also log the
results to a text file that are in use
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
P-Ping Tools: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
MegaPing
www.magnetosoft.com
MegaPing
g g is the ultimate must-have toolkit that p
provides all essential
utilities for Information System specialists, system administrators, IT
solution providers, or individuals
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
MegaPing: Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
MegaPing: Screenshot 3
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
LanSpy
www.lantricks.com
LanSpy
py is a set of network utilities p
pooled together
g in a single
g p program
g
with simple and easy-to-use interface
It includes
i l d ffastt portt scanner ffor gathering
th i iinformation
f ti about
b t open ports
t
on remote computer and displays services using these ports
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
LanSpy: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
HoverIP
www.hoverdesk.net
HoverIP is a useful set of network utilities, that can display your IP configuration
((on all network cards),
), perform
p NsLookup p queries,
q , Traceroute,, Ping,
g, and port
p
scanning
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
HoverIP: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
LANView
www.jxdev.com
Features:
• Multiple
p applications
pp in one: LAN Search,, capturing
p g
and analyzing IP packets
• IP Statistics, IP Traffic, Network Connections,Port
Scan,Ping Scan, Local interface, and Windows Socket
information ,,organized
g as independent
p windows allow
multitask operation
• Multiple thread design ensures the efficiency
• LAN Searcher, IP Capture, Port Scan, Ping Scan, and
some other functions are designed as independent
threads
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
LANView: Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
LANView: Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
LANView: Screenshot 3
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NetBruteScanner
www.rawlogic.com
• This is probably one of the most dangerous and easily exploitable security
holes
It is common for novice users to have their printers or their entire hard
drive shared without being aware of it
This utility will help you to find these resources, so you can secure them
with a firewall or by informing your users how to properly configure
their shares with tighter security
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NetBruteScanner: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SolarWinds Engineer’s Toolset
Engineer's
g Toolset includes 49 p
powerful network management,
g
monitoring and troubleshooting tools to easily and effectively manage
your network
Features:
• Monitors and alerts on availability, bandwidth
utilization, and health for hundreds of network
d i
devices
• Provides robust network diagnostics for
troubleshooting and quickly resolving complex
network issues
• Offers
Off an array off network
t k di
discovery ttools
l th
thatt
facilitate IP address management, port mapping
and ping sweeps
• Eases management of Cisco® devices with tools
for real-time
real time NetFlow analysis,
analysis configuration
management and router management
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SolarWinds Engineer’s Toolset:
Screenshots
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
AUTAPF
www.networkactiv.com
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
OstroSoft Internet Tools
It is intended for use by network, domain and systems administrators, network security
professionals, Internet users, and everyone who wants to know more about network and
Internet
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
OstroSoft Internet Tools:
Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced IP Scanner
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced IP Scanner:
Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced IP Scanner:
Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Colasoft MAC Scanner
Colasoft MAC scanner allows to scan the network and get a list of
MAC addresses
dd along
l with
i h IP address,
dd machine
hi name, and d
manufacturer’s information
It supports multi-threaded
multi threaded scanning
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Colasoft MAC Scanner:
Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Active Network Monitor
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Active Network Monitor:
Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced Serial Data Logger
Advanced Serial Data Logger is a serial port data logging and monitoring
solution that can be used as serial port and RS232 real time sniffer or to log
all received data to a local file
It captures serial data, custom tailors it to your needs, then extracts bits of
data from data packets,
packets and transfers the data to any Windows or DOS
application
It captures
p data either by sending
g keystrokes
y to the application
pp window,, or by
passing the data through Dynamic Data Exchange conversations, ODBC, OLE
It supports RS
RS-485,
485, full duplex mode, flexible parameters, plug
plug-ins,
ins, and can
run as a service
It also transmits requests or commands out the serial port to control or query
your instruments
i directly
di l from
f Advanced
Ad d Serial
S i l Data
D L
Logger over ASCII or
MODBUS protocol
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced Serial Data Logger:
Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced Serial Data Logger:
Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced Serial Port Monitor
This p
program
g allows to check the flow of data through
g a computer's
p COM p
ports
It can work as serial port monitor and supports full duplex mode, output received data to
fil ffree d
file, data source, and
d serial
i lddevice
i simulation
i l i
It supports
pp the miscellaneous baudrates (up p to 115200), number of databits, number of
stop bits, different types to parity, flow control types and others
Itt can
ca monitor
o to the
t e data eexchange
c a ge bet
between
ee aanyy eexternal
te a dev
devices,
ces, co
connected
ected to se
serial
a po
portt
and Windows applications
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Advanced Serial Port Monitor:
Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WotWeb
WotWeb is a port scanner specifically made to scan and display active web
servers and shows the server software running on them
Scanning is fast and accurate and the acquired list of servers can be saved to a
comma separated text file for importing into your favorite spreadsheet
application
pp for further analysis
y
WotWeb was written to aid system administrators who manage large networks
and need to keep track of all their web servers and the type of server software
running on them
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WotWeb: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Antiy Ports
Antiy Ports is a TCP/UDP port monitor that maps the ports in use to the
applications that are currently using them
It offers to kill any selected process and links to additional port information
online
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Port Detective
Port Detective is a tool that helps you find out what ports
are blocked by the router, firewall, or ISP
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Port Detective: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Roadkil’s Detector
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Portable Storage Explorer
Portable Storage Explorer displays remote network computer USB devices, removable
storage,
g , CD-Rom and DVD drive information and state,, drive type,
yp , serial number,, revision,,
device name, last cleaned time, device vendor and product name, operational state, created
and modified time, device library, etc
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
War Dialer Technique
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
War Dialer Technique
War dialing involves the use of a program in conjunction with a modem to penetrate the
modem-based
modem based systems of an organization by continually dialing in
Companies do not control the dial-in ports as strictly as the firewall and machines with
modems attached are present everywhere
A tool that identifies the phone numbers that can successfully make a connection with a
computer modem
It generally works by using a predetermined list of common user names and passwords in an
attempt to gain access to the system
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Why War Dialing?
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Wardialing
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
PhoneSweep – War Dialing Tool
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
THC Scan
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ToneLoc
ToneLoc is a popular war dialing computer program for MS-DOS
It is used to:
• Find PBX‘s
• Find loops or milliwatt test numbers
• Find dial-up long distance carriers
• Find any number that gives a constant tone, or something that your
modem will recognize as one
• Finding carriers (other modems)
• Hacking PBX's
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ModemScan
www wardial net
www.wardial.net
Features:
• ModemScan works with hardware you already own and does
not require the additional purchase of specific nor
specialized hardware
• Randomly selects and dials phone numbers from the dial
ranges list to prevent line termination from phone
companies which detect sequential dialing
• Runs multiple ModemScan copies with more than one phone
line and modem on the same computer
• Imports comma delimited text files containing phone
numbers or ranges
• Flexible phone number dialing
• Utilizes Microsoft's Telephony
p y settings
g for easyy modem and
location setup
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
War Dialing Countermeasures
SandTrap Tool
Sandtrap can detect war dialing attempts and notify the administrator immediately upon
being called,
called or upon being connected to,
to via an email message,
message pager or via HTTP POST to
a web server
• Incoming Caller ID
• Login attempt
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Banner Grabbing
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
OS Fingerprinting
OS fingerprinting
g p g is the method to determine the operating
p g system
y that is
running on the target system
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Active Stack Fingerprinting
Based on the fact that OS vendors implement the TCP stack differently
Specially crafted packets are sent to remote OSs and the response is noted
The Firewall logs your active banner grabbing scan since you are probing directly
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Passive Fingerprinting
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Active Banner Grabbing Using
Telnet
You can use telnet to grab the banner of a website
telnet www.certifiedhacker 80 HEAD / HTTP/1.0
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GET REQUESTS
You might
g want to tryy
these additional get
requests for banner
grabbing
Take a look at :
GET REQUESTS
KNOWN_TESTS.htm
file
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
p0f – Banner Grabbing Tool
Run p0f –i
You will see the OS
<your
y Open
p IE and visit
fingerprinted on
interface card websites
number> the p0f window
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
p0f for Windows
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Httprint Banner Grabbing Tool
httprint
p is a web server fingerprinting
g p g tool
It relies on web server characteristics to accurately identify web servers, despite the fact
that they may have been obfuscated by changing the server banner strings, or by plug-
ins such as mod
mod_security
security or servermask
httprint can also be used to detect web-enabled devices which do not have a server
banner string, such as wireless access points, routers, switches, and cable modems
httprint uses text signature strings and it is very easy to add signatures to the
signature database
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Httprint: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Miart HTTP Header
It also includes:
Ping tool
Traceroute tool
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Miart HTTP Header: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tools for Active Stack
Fingerprinting
XPROBE2
RING V2 http://www.sys-security.com/
Most of the port scanning tools like Nmap are used for active stack
fingerprinting
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Netcraft
Netcraft toolbar
(htt //
(http://www.netcraft.com)
t ft )
can be used to identify the
remote OS of a target
system passively
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Disabling or Changing Banner
Apache
p Server
• Apache 2.x users who have the mod_headers module loaded can
use a simple
p directive in their httpd.conf
p file to change
g banner
information Header set Server "New Server Name“
• Apache 1.3.x users have to edit defines in httpd.h and recompile
Apache to get the same result
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IIS Lockdown Tool
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: ServerMask
It modifies web server's "fingerprint" by removing unnecessary HTTP response data,
modifying cookie values and adjusting other response information
Modified…
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: ServerMask (cont’d)
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Hiding File Extensions
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: PageXchanger
PageXchanger is a IIS server module that negotiates content with browsers and
mask file extensions
Features:
• Allows removal of file extensions in source code without affecting site
functionality
• Redirects requests for pages and allows content to be served without file
extensions
• URLs no longer display file extensions in a Web browser's address or location bar
Benefits:
• Security: Enhances security by obscuring technology platform and stops hacker
exploits
• Migration: Changes site technology easily without broken links or numerous
redirects
• Content Negotiation: Transparently selects and serves language, image, and
other content based on the user's browser
• A clean URL site: Easier for users to navigate, simple to maintain, and makes for
more effective and lasting URLs in all company communications
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
PageXchanger: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
V l
Vulnerability
bilit SScanning
i
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Bidiblah Automated Scanner
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Bidiblah Automated Scanner:
Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Qualys Web-based Scanner
www.qualys.com/eccouncil
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SAINT
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ISS Security Scanner
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ISS Security Scanner: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nessus
An attacker can use this tool to violate the security aspects of a software
product
Features:
• Plug-in-architecture
• NASL (Nessus Attack Scripting Language)
• Can test unlimited number of hosts
simultaneously
• Smart service recognition
• Client-server architecture
• Smart plug-ins
• Up-to-date security vulnerability database
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nessus: Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nessus: Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GFI LANGuard
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GFI LANGuard Features
Checks p
password p
policyy
Finds out all the services that are running on the target network
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SATAN (Security Administrator’s
Tool for Analyzing Networks)
Security-auditing tool developed by Dan Farmer and Weitse
Venema
In addition,
addition the attacker needs a UNIX-based operating system
and at least 20MB of disk space
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Retina
It can scan every machine on the target network, including a variety of operating
system platforms
platforms, networking devices,
devices databases
databases, and third party or custom
applications
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Retina: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nagios
www.nagios.org
Features:
• Monitoring of network services (SMTP, POP3, HTTP, NNTP,
PING, etc.)
• Monitoring of host resources (processor load, disk and memory
usage, running processes, log files, etc.)
• Simple plugin design that allows users to easily develop their
own host and service checks
• Ability to define network host hierarchy, allowing detection of
and distinction between hosts that are down and those that are
unreachable
• Contact notifications when service or host problems occur and
get resolved (via email, pager, or other user-defined method)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nagios: Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nagios: Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nagios: Screenshot 3
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Nagios: Screenshot 4
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
PacketTrap's pt360 Tool Suite
Features:
Real Time Reporting
Dashboard
Favorites
Recent Tools Lists
Networks
Custom Tools and Categories
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
PacketTrap's pt360 Tool Suite:
Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NIKTO
F easy updates,
For d the
h main
i scan d
database
b iis off CSV fformat
SSL support
Plug-in support
IdentTCPScan
• Examines open ports on the target host and reports the services
running on those ports
• It
I is
i a special
i l ffeature that
h reports the
h UID
UIDs off the
h services
i
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Draw Network Diagrams of
Vulnerable Hosts
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
FriendlyPinger
It can be used for pinging of all devices in parallel at once and in assignment of external
commands (like telnet, tracert, net.exe) to devices
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
LANsurveyor
www.solarwinds.com
VisioLANsurveyor
y automaticallyy discovers yyour network and p
produces
comprehensive and easy-to-view network maps that can be exported
into Microsoft Office
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Ipsonar
www.lumeta.com
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
LANState
www.10 strike.com
www.10-strike.com
Benefits:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Insightix Visibility
www.insightix.com
Features:
• Complete IT Asset Discovery – It delivers a comprehensive
inventoryy of everyy device on the network,, including g firewalled,,
unmanaged and virtual devices, and provides location information
and a full list of associated properties
• Accurate Network Topology Map – It maps the entire physical
network topology,
p gy, including g all devices,, such as workstations,,
servers, printers, wireless access points, VoIP phones, switches,
routers, and more
• Real-Time Change Detection – It continuously monitors the
network for anyy changesg made to the network and/or / anyy of the
devices on the network
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IPCheck Server Monitor
www.paessler.com
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IPCheck Server Monitor:
Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IPCheck Server Monitor:
Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IPCheck Server Monitor:
Screenshot 3
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
PRTG Traffic Grapher
www.paessler.com
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
PRTG Traffic Grapher Screenshot:
Customizable Screen Layout
y
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
PRTG Traffic Grapher Screenshot: Access
Monitoring
g Data from Anywhere
y Using
g a Web Browser
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Preparing Proxies
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Proxy Servers
Proxy is a network computer that can serve as an
intermediate
te ed ate for
o co
connection
ect o with
t ot
other
e co
computers
pute s
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Use of Proxies for Attack
Logged
d proxy
PROXY VICTIM
(2)
The last proxy IP address
ATTACKER
CHAIN OF PROXIES is logged
There can be thousands
of proxies used in the
attack process
Traceback can be
extremely difficult
(3)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Free Proxy Servers
Attacks using thousands of proxy servers around the world are difficult to trace
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Free Proxy Servers (cont’d)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SocksChain
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Proxy Workbench
Configuration:
User
Internet
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ProxyManager Tool
ProxyManager connects to
the Internet and downloads
lists of proxy servers from
various websites
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Super Proxy Helper Tool
S
Super Proxy
P Helper
H l will
ill h
help
l you to:
• Fi
Find
d anonymous, ffree, or ffastest proxy
• Check proxy status response time within a country
• Determine Proxy type (Transparent, Anonymous, or High
anonymity)
• Import export proxy
• Download proxy lists from the web
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Super Proxy Helper Tool (cont’d)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Happy Browser Tool (Proxy-based)
You can even use hundreds of proxy servers to browse the web
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Happy Browser Tool (Proxy-based)
(cont d)
(cont’d)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
MultiProxy
What if your Firewall is blocking you from various proxy servers and
anonymizers?
MultiProxy uses different proxies every time you visit the Internet
Add thousands of proxies to the list and your Firewall does not see a
pattern in your traffic
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
MultiProxy (cont’d)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How Does MultiProxy Work
List of Proxy Servers
164.58.28.250:80
194.muja.pitt.washdctt.dsl.att.ne
j p
t:80
web.khi.is:80
customer-148-223-48-
114.uninet.net.mx:80
163.24.133.117:80
paubrasil.mat.unb.br:8080 Target
164.58.18.25:80
bpubl014.hgo.se:3128
Attacker bpubl007.hgo.se:3128
www.reprokopia.se:8000
193.188.95.146:8080
193.220.32.246:80
AStrasbourg-201-2-1-
26.abo.wanadoo.fr:80
gennet.gennet.ee:80
t t 80
pandora.teimes.gr:8080
mail.theweb.co.uk:8000
mail.theweb.co.uk:8888
194.6.1.219:80
194.79.113.83:8080
ntbkp.naltec.co.il:8080
195 103 8 10:8080
195.103.8.10:8080 Internet
pools1-31.adsl.nordnet.fr:80
pools1-98.adsl.nordnet.fr:80
195.167.64.193:80
server.sztmargitgimi.sulinet.hu:8
MultiProxy running 0
at 127.0.0.1:8088 los.micros.com.pl:80
195.47.14.193:80
mail.voltex.co.za:8080
196.23.147.34:80
196.40.43.34:80
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
TOR Proxy Chaining Software
Tor uses random set of servers every time a user visits a site
A branch of the U.S. Navy uses Tor for open source intelligence
gathering, and one of its teams used Tor while deployed in the
Middle East
Visit http://tor.eff.com
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
TOR Proxy Chaining Software
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Additional Proxy Tools
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Anonymizers
Bypasses the
security line
www.proxify.com
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Primedius Anonymizer
www primedius com
www.primedius.com
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
StealthSurfer
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Anonymous Surfing: Browzar
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Anonymous Surfing: Browzar 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Anonymous Surfing: Browzar 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Torpark Browser
www.torrify.com/index.php
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Torpark Browser: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GetAnonymous
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GetAnonymous: Screenshots 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
GetAnonymous: Screenshots 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
IP Privacy
www.privacy pro.com
www.privacy-pro.com
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Anonymity 4 Proxy (A4Proxy)
www.inetprivacy.com
Benefits:
• Visits any website in the world without telling them who you are and
where
h you li
live
• Optionally modifies the operating system and other technical
information sent out by your browser
• Confuses the websites further by sending them a fake IP address along
with your requests
• Downloads files with programs like GetRight and other download
managers staying anonymous to the sites from which you download
• If you are a webmaster, submit multiple webpages to search engines
without having to worry about submission limits - submit each page
using a different anonymous proxy!
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Anonymity 4 Proxy: Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Anonymity 4 Proxy: Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Anonymity 4 Proxy: Screenshot 3
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Psiphon
Psiphon is a human rights software project developed by the Citizen Lab at the
Munk Centre for International Studies
They can access with their home computers to friends and family members who
live behind firewalls of states that censor
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Psiphon: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Connectivity Using Psiphon
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Connectivity to Wikipedia – Step 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Connectivity to Wikipedia – Step 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Connectivity to Wikipedia – Step 3
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Bloggers Write Text Backwards
to Bypass Web Filters in China
Bloggers and journalists in China are using a novel approach to bypass Internet filters
i their
in th i country
t – they
th write it backwards
b k d or from
f right
i ht tto lleft
ft
The content therefore remains readable by human beings but defeats the web filtering
software
ft
China is known to implement ‘packet filtering’ – a technique that detects TCP packets
containing
i i controversial
i l keywords
k d lik
like Tibet,
Tib D Democracy, Ti
Tiananmen, etc
To dodge these censors, Internet writers in China are writing backwards when posting
to web
b forums
f andd bl
blogs
They do it using this web tool that flips sentences to read right to left instead of left to
right, and vertically instead of horizontally
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Vertical Text Converter
http://www.cshbl.com/gushu.html
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How to Check If Your Website Is
Blocked In China or Not
"How do I find out if web users in China can access my website at xyz.com?”
If you get a "Packets lost" error or there is a time-out while connecting to your site,
chances are that the site is restricted
1. Just Ping - They have checkpoints inside Hong Kong and Shanghai in China
• http://www.just-ping.com/index.php
2. Watch Mouse - This service too has monitoring stations inside Hong Kong and Shanghai in
China
• http://www.watchmouse.com/en/ping.php
p // / /p g p p
3. Website Pulse - In addition to Hong Kong and Shanghai, Website Pulse conducts website
connectivity test from a computer located in Beijing as well
• http://www.websitepulse.com/help/testtools.china-test.html
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Mowser and Phonifier
Surf the web using Mowser and Phonifier, a new service that is free and
converts any website into a mobile phone friendly format
www.mowser.com
www.phonifier.com
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
AnalogX Proxy
AnalogX Proxy is a small and simple server that allows any other
machine on your local network to route it’s
it s requests through a central
machine
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NetProxy
www.grok.co.uk
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Proxy+
www.proxyplus.net
Features:
• Separates the LAN from the
Internet to protect from attacks
• Insecure interfaces (connected to
the internet) are detected
automatically
• Cache
C h increases
i speed
d off d
data
retrieval and enables the use of data
even if a connection is not
established
• Sends and receives mail for many
Internet mail boxes at one time
using the POP3 protocol
• Full SMTP mail server for one or
more domains
• Option
i forf lleaving
i messages on
POP3 server
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ProxySwitcher Lite
www.proxyswitcher.com
F t
Features:
Change proxy settings on the fly
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
JAP
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
JAP: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Proxomitron
Proxomitron is a flexible HTTP web filtering proxy that enables to filter web
content in
i any b
browser
This program runs as a local proxy server and needs to configure browser to
use a local
l l host
h at port 8080
8 8 iin order
d to activate
i fil
filtering
i
Proxomitron allows you to remove and replace ad banners, Java scripts, off-
site images,
images Flash animations
animations, background images,
images frames
frames, and many other
page elements
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Proxomitron: Screenshots
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Google Cookies
"Google builds up a detailed profile of your
search terms over many years. Google
probably knew when you last thought you
were pregnant, what diseases your children
have had, and who your divorce lawyer is."
BBC technology commentator Bill Thompson
Wh should
When h ld I use SSLP
SSLProxy??
• Let’s say you want to launch an attack on a remote server which has SSL installed
• The exploits you send will be caught by the IDS and you want to mask this detection
• Run SSLproxy
p y on yyour machine and tunnel all the exploits
p through
g this p
proxy,
y, which will use SSL to
transmit the packets to the remote server blinding the IDS
INTERNET
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How to Run SSL Proxy
Window 1: Client – Hacker Machine Run:
• sslproxy -L127.0.0.1 -l55 -R <some remote IP> -r
443 -c dummycert.pem -p ssl2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
HTTP Tunneling Techniques
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Why Do I Need HTTP Tunneling
Let’s say your
organization has
blocked all the p
ports in
your firewall and only
allows port 80/443
and you want to use
FTP to connect to
some remote server on
the Internet
ol
http protocol
toc
pro
p
htt
ia
tv
en
ssi
ta
Da
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Httptunnel for Windows
httptunnel creates a bidirectional virtual data connection tunnelled in HTTP requests. The HTTP
requests can be sent via an HTTP proxy if so desired
If WWW access is allowed through an HTTP proxy, it is possible to use httptunnel and, say, telnet or
PPP tto connectt to
t a computer
t outside
t id the
th firewall
fi ll
On the server you must run hts. If I wanted to have port 80 (http) redirect all
traffic to port 23 (telnet) then it would go something like:
hts -F server.test.com:23 80
On the client you would run htc. If you are going through a proxy, the -P option is
needed otherwise omit it.
Then telnet localhost and it will redirect the traffic out to port 80 on the proxy server and on to
port 80 of the server, then to port 23.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How to Run Httptunnel
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
HTTP-Tunnel
Features:
• Bypasses any firewall
• Secures Internet browsing
• Can use favorite programs without being monitored
• Has extra security for online transactions
• Encrypts all your Internet traffic
• Visits sites that were previously blocked
• Prevents 3rd party monitoring or regulation of your Internet
browsing and downloads
• Uses yyour favorite applications
pp p
previouslyy blocked
• Hides your IP address
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
HTTP-Tunnel: Screenshot 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
HTTP-Tunnel: Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
HTTP-Tunnel: Screenshot 3
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
HTTPort
HTTPort (client)
HTTP ( li ) and
d HTTHost
HTTH (server)
( ) are free
f tools
l which
hi h can be
b used
d to tunnell any TCP traffic
ffi
through HTTP protocol
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Spoofing IP Address
When the victim replies back to the address, it goes back to the spoofed address
and not to the attacker’s real address
You will not be able to complete the three-way handshake and open a successful
TCP connection by spoofing an IP address
Example: (7.7.7.7 is
the spoofed address)
Hping2 www.eccuni.us -a
7.7.7.7
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Spoofing IP Address
Attacker
10.0.0.5
Peter
10.0.0.25
Spoofed Address
Copyright © by EC-Council
EC-Council 10.0.0.50 All Rights Reserved. Reproduction is Strictly Prohibited
Spoofing IP Address Using
Source Routing
For this technique to work, an attacker must inject himself into the path that
traffic would normally take, to get from the destination machine back to the source
Source routing allows you specify the path a packet will take through the Internet
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Spoofing IP Address Using
Source Routing (cont
(cont’d)
d)
Source routing works by using a 39-byte source route option field in the
IP header
When the recipient responds, the packet goes to the attacker’s machine
before reaching the spoofed address
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Spoofing IP Address Using
Source Routing (cont
(cont’d)
d)
For this
F hi technique
h i to work,
k an attacker
k must iinject
j hi
himself
lf iinto the
h
path that traffic would normally take to get from the destination
machine back to the source
2. Replies
sent back
Spoofed to: 10.0.0.5
Address Attacker Peter
10.0.0.5 10.0.0.50 10.0.0.25
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Source Routing Command
The command in Windows:
•tracert –j 10
10.0.0.50
0 0 50 10
10.0.0.5
0 0 5
Countermeasures
• DISABLE IP SOURCE ROUTING AT THE ROUTER
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Detecting IP Spoofing
When an attacker is spoofing packets, he/she is usually at a different location than the
address being spoofed
Attacker's TTL will be different from the spoofed address' real TTL
If you check the received packet’s TTL with spoofed one, you will see TTL does not match
Attacker
Target
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Scanning Countermeasures
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tool: SentryPC
SentryPC enables you to control, restrict, and monitor access and usage of your
PC
Features:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
SentryPC: Screenshot 2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
What Happened Next?
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
ATTACK!!
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Summary
The objective of scanning is to discover live systems, active/running ports, the operating systems, and the
services running on the network
FTP bounce scanning is a type of port scanning which makes use of the Bounce attack vulnerability in FTP
servers
War dialing
g involves the use of a p
program
g in conjunction
j with a modem to p
penetrate the modem-based
systems of an organization by continually dialing in
OS fingerprinting is the method to determine the operating system that is running on the target system
Proxy is a network computer that can serve as an intermediate for connecting with other computers
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited