02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

106 Chapter 5 ■ Scanning Networks<br />

Vulnerability Scan A vulnerability scan is used to identify weaknesses or vulnerabilities<br />

on a target system. This type of scan is quite commonly done as a proactive measure with<br />

the goal of catching problems internally before an attacker is able to locate those same vulnerabilities<br />

and act on them.<br />

Checking for Live Systems<br />

How do you check for live systems in a targeted environment? There are plenty of ways to<br />

accomplish this. Some common ways to perform these types of scans are:<br />

■ Wardialing<br />

■ Wardriving<br />

■ Pinging<br />

■ Port scanning<br />

Each of these techniques, along with others we will explore, offers something that the<br />

others don’t, or at least don’t offer in the same way. Once you understand these differences,<br />

you should have a much better idea of how to deploy these methods in a penetration test.<br />

When looking at these methods, keep in mind that you should be paying<br />

attention to the areas in which each is strong and those areas in which they<br />

are weak. Deploying the wrong one could easily waste time as well as alert<br />

the system owner to your presence, thus giving them time to react to your<br />

attack.<br />

Wardialing<br />

The first type of scan is an old but useful one known as wardialing. Wardialing has existed<br />

in an almost unchanged state since the mid-1980s and has stayed around so long because<br />

it has proven to be a useful information-gathering tool. In practice, wardialing is extremely<br />

simple compared to our other forms of scanning in that it simply dials a block of phone<br />

numbers using a standard modem to locate systems that also have a modem attached<br />

and accept connections. On the surface, this type of technique seems to be the digital<br />

equivalent of the dinosaur, but don’t let that fool you—the technique is still very useful.<br />

Understand that modems are still used for a number of reasons, including the low cost<br />

of the technology, ease of use, and the availability of phone lines, which are pretty much<br />

everywhere. Modems are still so commonly used that an attacker can easily dial a block of<br />

phone numbers in just about any town and locate a good number of computers still using<br />

dial-up to attach to the outside world.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!