19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

132<br />

Part III: Hacking Network Hosts<br />

Figure 8-2:<br />

In-depth<br />

portscanning<br />

options in<br />

NMapWin.<br />

Figure 8-2 shows the NMapWin Scan tab, where you can select the Scan Mode<br />

options (Connect, UDP Scan, and so on). If you’re a command line fan, you<br />

see the command line parameters displayed in the lower-left corner of the<br />

NMapWin screen. This helps when you know what you want to do and the<br />

command line help isn’t enough.<br />

If you connect to a single port (as opposed to several all at one time) without<br />

making too much noise, you might be able to evade your firewall or IPS. This<br />

is a good test of your network security controls, so look at your logs to see<br />

what they saw during this process.<br />

NetScanTools Pro<br />

NetScanTools Pro (www.netscantools.com) is a very nice all-in-one commercial<br />

tool for gathering general network information, such as the number<br />

of unique IP addresses, NetBIOS names, and MAC addresses. It also has a<br />

neat feature that allows you to fingerprint the operating systems of various<br />

hosts. Figure 8-3 shows the OS Fingerprinting results while scanning a<br />

Linksys router/firewall.<br />

Countermeasures against ping sweeping and port scanning<br />

Enable only the traffic you need to access internal hosts — preferably as far<br />

as possible from the hosts you’re trying to protect — and deny everything<br />

else. This goes for standard ports, such as TCP 80 for HTTP and ICMP for<br />

ping requests.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!