by: hossein soleimany mohammadali taebi azar 1388 december 2009

147
By: Hossein Soleimany MohammadAli Taebi Scanning Azar 1388 December 2009

Upload: jesse-lee

Post on 22-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

By:

Hossein Soleimany

MohammadAli Taebi

Scanning

Azar 1388 December

2009

Page 2: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

2

Definition of scanningTypes and objectives of scanningUnderstanding CEH scanning methodology Checking live systems and open ports Understanding scanning techniquesDifferent tools present to perform scanning Understanding banner grabbing and OS fingerprintingDrawing network diagram of vulnerable hostsScanning countermeasures

This presentation will familiarize you with:

Scanning - dDoS Team - Azar 88 - December 09

Page 3: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

3

Module Flew

Scanning - dDoS Team - Azar 88 - December 09

Page 4: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

4

Type of scanning Port scanning

A series of messages sent by someone attempting to break into a computer to learn about the computer’s network services Each associated with a “well-known” port number

Network scanning A procedure for identifying active host on a network Either for the purpose of attacking them or for network security assessment

Vulnerability scanning The automated process of proactively identifying vulnerabilities of computer systems present in a network

Scanning - dDoS Team - Azar 88 - December 09

Page 5: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

5

Scanning Definition: Scanning is one of the three components of intelligence gathering for an attacker The attacker finds information about the:

Specific IP AddressesOperating systems System architecture Service running on each computer

The various types of scanning are as follows

Port scanni

ng

Network

scanning

Vulnerability scanni

ng

Scanning - dDoS Team - Azar 88 - December 09

Page 6: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

6

Objectives of scannings To detect the live systems running on the networkTo discover which ports are active/runningTo discover the operating system running on the target system (fingerprinting)To discover the services running/listening on the target system To discover IP addresses of the target system

Scanning - dDoS Team - Azar 88 - December 09

Page 7: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

7

CEH Scanning MethodologyWhat is CEH?

Attack!

Scanning - dDoS Team - Azar 88 - December 09

Page 8: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

8

Checking for Live Systems

Scanning - dDoS Team - Azar 88 - December 09

Page 9: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

9

Checking for Alive Systems – ICMP ScannerIn this type of scanning, it is found out which hosts are up in a network by pinging them allICMP scanning can be run parallel so that it can run fastIt can also be helpful to tweak the ping timeout value with the –t option

Scanning - dDoS Team - Azar 88 - December 09

Page 10: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

10

ICMP ECHO Scanning / List Scan

ICMP ECHO Scanning

• This is not really port scanning, since ICMP dose not have a port abstraction• But it is sometimes useful to determine which hosts in a network are up by printing

them all• $ nmap –P ui.ac.ir/24 152.148.0.0/16

List Scan

• This type of scan simply generates and prints a list of IPs/Names without actually pinging or port scanning them

• A DNS name resolution will also be carried out• $ nmap –sL –v 10.0.0.5

Scanning - dDoS Team - Azar 88 - December 09

Page 11: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

11

Ping Sweep Technique •A Ping Sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP address map to live hosts/computers•A Ping Sweep consist of ICMP ECHO requests sent to multiple hosts•If a given address is live, it will return an ICMP ECHO reply

Scanning - dDoS Team - Azar 88 - December 09

Page 12: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

12

Angry IP ScannerAngry IP Scanner (or simply IPScan) is an open-source and cross-platform network scanner designed to be fast and simple to use.Can scan IPs in any rangeIt simply pings each IP address to check if it is aliveProvides NETBIOS information such as:

Computer nameWorkgroup nameMAC address

http://www.angryip.org/

Scanning - dDoS Team - Azar 88 - December 09

Page 13: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

13

Angry IP Scanner - Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 14: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

14

Angry IP Scanner - Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 15: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

15

Angry IP Scanner - Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 16: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

16

Angry IP Scanner - Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 17: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

17

Firewalk ToolFirewalking is a tool that employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networksThe tool employs the technique to determine the filter rules in place on a packet forwarding deviceFirewalk works by sending out TCP or UDP packets with a TTL greater than the targeted gateway

If the gateway allows the traffic, it will forward the packet to the next hope where they will expire and elicit an ICMP_TIME_EXCEEDED message If the gateway host does not allow the traffic, it will likely drop the packet on floor and there will be no response

Scanning - dDoS Team - Azar 88 - December 09

Page 18: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

18

Firewalk Tool

Scanning - dDoS Team - Azar 88 - December 09

Page 19: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

19

Firewalk commands

Scanning - dDoS Team - Azar 88 - December 09

Page 20: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

20

Firewalk Output

Open ports are:Port 23 telnetPort 25 SMTPPort 80 HTTP

Scanning - dDoS Team - Azar 88 - December 09

Page 21: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

21

Checking for Open Ports

Page 22: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

22

Three Way HandshakeComputer [A] initiates a

connection to the server [B] via a packet with only the SYN flag set

The server [B] replies with a packet with both the SYN and the ACK flag set

For the final step, the client [A] responds back to the server [B] with a single ACK packet

[A] [B]

If these three step are completed without complication, then a TCP connection has been established between the client and the server

Scanning - dDoS Team - Azar 88 - December 09

Page 23: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

23

Three Way Handshake: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 24: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

24

FIN ScanFIN scan only works if OS’ TCP/IP implementation is developed according to RFC 793FIN scan will not work against any current version of Microsoft WindowsFin scans directed at any Microsoft system will show all ports on the host being closed

Scanning - dDoS Team - Azar 88 - December 09

Page 25: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

25

SYN Stealth / Half Open ScanSYN Stealth / Half Open Scan is often referred to as half open scan because it dose not open a full TCP connectionFirst, a SYN packet is sent to a port of the machine, suggesting a request for connection, and the response is awaitedIf the port send back a SYN/ACK packet, then it is inferred that a service at the particular port is listening. If an RST is received, then the port is not active/listening. As soon as the SYN/ACK packet received, an RST packet is sent, instead of an ACK, to tear down the connectionThe key advantage is that fewer sites log this scan

Scanning - dDoS Team - Azar 88 - December 09

Page 26: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

26

Xmas Scan

nmap –sX –v 10.0.0.5

• This command force nmap to check specified machine through Xmas Scan Method

Note: Xmas Scan only works if OS system’s TCP/IP implementation is developed according to RFC 793Xmas Scan will not work against any current version of Microsoft WindowsXmas Scan directed at any Microsoft system will shot all ports on the host as being closed

Scanning - dDoS Team - Azar 88 - December 09

Page 27: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

27

NULL Scan

nmap –sN –v 10.0.0.5

• This command force nmap to check specified machine through Xmas Scan Method

The NULL Scan turns off all flags, creating a lack of TCP flags that should never occur in the real world.NULL Scan only works if OS system’s TCP/IP implementation is developed according to RFC 793NULL Scan will not work against any current version of Microsoft WindowsXmas Scan directed at any Microsoft system will shot all ports on the host as being closed

Scanning - dDoS Team - Azar 88 - December 09

Page 28: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

28

IDLE ScanIn 1998, security researcher Antirez posted to the Bugtraq mailing list an ingenious new port scanning technique.Attackers can actually scan a target without sending a single packet to the target from their own IP address!

Scanning - dDoS Team - Azar 88 - December 09

Page 29: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

29

IDLE Scan; how it works?Most network servers listen on TCP ports, such as web servers on port 80 and mail servers on port 25A port is considered “open” if an application is listening on the port, otherwise it is closedOne way to determine whether a port is open is to send a “SYN” (session establishment) packet to the portThe target machine will send back a “SYN|ACK” packet if the port is open, and an “RST” (Reset) packet if the port is closedA machine which receives an unsolicited SYN|ACK packet will respond with an RST. An unsolicited RST will be ignoredEvery IP packet on the Internet has a “fragment identification” numberMany operating systems simply increment this number for every packet they sendSo probing for this number can tell an attacker how many packets have been sent since the last probe

Scanning - dDoS Team - Azar 88 - December 09

Page 30: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

30

IDLE Scan; how it works? Step 1

Choose a “zombie” and probe for its current IPID number

Scanning - dDoS Team - Azar 88 - December 09

Page 31: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

31

IDLE Scan; how it works? Step 2.1 (Open Port)

Send SYN packet to target machine spoofing the IP address of the “zombie”

Scanning - dDoS Team - Azar 88 - December 09

Page 32: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

32

IDLE Scan; how it works? Step 2.2 (Closed Port)

The target will send RST to the “zombia” if port is closed. Zombia not send anything back

Scanning - dDoS Team - Azar 88 - December 09

Page 33: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

33

IDLE Scan; how it works? Step 3

Probe “zombie” IPID again. If IPID incremented by 2 since step 1 so port 80 must be open! Else port must be close.

Scanning - dDoS Team - Azar 88 - December 09

Page 34: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

34

UDPScanning

UDP Row ICMP Port Unreachable Scanning

• This scanning method use a UDP protocol instead of TCP protocol• Though this protocol is simpler, scanning it is more difficult• $ nmap –u –v 10.0.0.5

$ nmap –u -l –v 10.0.0.5

Scanning - dDoS Team - Azar 88 - December 09

Page 35: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

35

Window Scan

This scan can sometimes detect open ports as well as filtered/unfiltered ports due to an anomaly in the TCP window size reported by some operating systemsThis operating systems return a positive TCP window size when a RST packet is sent from an open port, and a negative value when the RST originates from a closed port.

Scanning - dDoS Team - Azar 88 - December 09

Page 36: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

36

TCP Connect / Full Open ScanThis is the most reliable form of TCP scanning The connect() system call provided by the operating system is used to open a connection to every open port on machineIf the port is open, connect() will succeedIf the port is closed, then it is unreachable

Scanning - dDoS Team - Azar 88 - December 09

Page 37: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

37

HPING2

HPING2 is a command-line oriented TCP/IP packet assembler/analyzerIt has a Tracerout modeIt has the ability to send files between a covered channelIt not only sends but also support ICMP ECHO requests

TCPUDPICMPRaw-IP protocols

Scanning - dDoS Team - Azar 88 - December 09

Page 38: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

38

HPING2Features:

Firewall testingAdvanced port scanningNetwork testing, using different protocol, TOS, fragmentationAdvanced Traceroute, under all supported protocolsRemote OS fingerprintingRemote uptime guessingTCP/IP stacks auditing

Scanning - dDoS Team - Azar 88 - December 09

Page 39: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

39

HPING2:Commands

Hping2 10.0.0.5

• This command send a TCP null-flags packet to port 0 of the specific host

Hping2 10.0.0.5 –p 80

• This command sends the packet to port 80

Hping2 www.ui.ac.ir –p 80 –A

• This command sends ACK to port 80 of www.ui.ac.ir

Hping2 –a 10.0.0.5 -S –p 81 10.0.0.25

• This command sends spoofed SYN packets to the target via a trusted third party to port 81

Scanning - dDoS Team - Azar 88 - December 09

Page 40: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

40

HPING2:Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 41: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

41

PortScan Plus, Strobe

PortScan Plus

• Window-based scanner developed by Peter Harrison• The user can specify a range of IP addresses and ports to be scanned• When scanning a host or a range of hosts, it display the open ports on those hosts

Strobe

• A TCP port scanner developed by Julian Assange• Written in C for Unix-based operating systems• Scan all open ports on target host• Provides only limited information about host

Scanning - dDoS Team - Azar 88 - December 09

Page 42: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

42

Blaster ScannerA TCP port scanner for UNIX-based operation systemsPing target host for examining connectivity Scan subnets on networkExamines FTP for anonymous accessExamine CGI bugsExamines POP3 and FTP for brute force vulnerabilitieshttp://sourceforge.net/projects/blasterscan

Scanning - dDoS Team - Azar 88 - December 09

Page 43: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

43

WUDP – UDP ScannerAn UDP port scanner for Windows. With graphical interface

Scanning - dDoS Team - Azar 88 - December 09

Page 44: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

44

NmapNmap is a free open source utility for network explorationIt is designed to rapidly scan large networksFeatures

Nmap is used to carry out port scanning, OS detection, version detection, ping sweep, and many other techniquesIt scans a large number of machines at one timeIt is supported by many operation systemsIt can carry out all types of port scanning techniques

http://nmap.org/

Scanning - dDoS Team - Azar 88 - December 09

Page 45: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

45

Nmap

Scanning - dDoS Team - Azar 88 - December 09

Page 46: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

46

Nmap – Scan MethodsScan methods used by Nmap:

TCP connect() scanning used to open a connection to every interesting port on the machine.

Xmas Tree The attacker checks for TCP services by sending “Xmas-tree” packets

SYN Stealth It is referred to as “half-open” scanning, as full TCP connection is not opened

Null Scan It is an advanced scan that may be able to pass through unmolested firewalls

Windows scan It is similar to ACK scan and can also detect open ports

ACK Scan It is used to map out firewall ruleset

FIN Scan It used when SYN scan isn't clandestine enough. (use a bug in TCP Imp.)

UDP Port Scan Used ICMP_PORT_UNREACH error to realize closed and open ports

Scanning - dDoS Team - Azar 88 - December 09

Page 47: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

47

Nmap – Scan MethodsCommand

Syntax Nmap Scan

-sS TCP SYN Scan-sT TCP connect() Scan-sF FIN Scan-sX Xmas Tree Scan-sN Null Scan-sP Ping Scan-sU UDP Scan-sA ACK Scan-sW Window Scan-sV Version Detection-sO IP Protocol Scan-sR RPC Scan-sL List Scan-sI Idlescan

Scanning - dDoS Team - Azar 88 - December 09

Page 48: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

48

Nmap Screenshot – Zenmap GUILatest version of Nmap use Zenmap GUI

Scanning - dDoS Team - Azar 88 - December 09

Page 49: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

49

Nmap Screenshot – Zenmap GUI

Scanning - dDoS Team - Azar 88 - December 09

Page 50: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

50

Advanced IP ScannerAdvanced IP Scanner is a fast, robust and easy-to-use IP scanner for Windows.his program can scan hundreds computers per second, allowing you to scan 'C' or even 'B' class network

Scanning - dDoS Team - Azar 88 - December 09

Page 51: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

51

Advanced IP Scanner

Scanning - dDoS Team - Azar 88 - December 09

Page 52: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

52

Net Tools Suite Pack

Net Tools Suite Pack is a collection of scanning toolsNet Tools Suite Pack contains

IP Address ScannerPort ListenerNetStatSpooferE-mail BomberFloodersWeb rippersAnd …

Scanning - dDoS Team - Azar 88 - December 09

Page 53: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

53

NetScanTools Pro

NetScanTools Pro is a window-based TCP scanner.It is used to:

Determine the ownership of IP addressesTranslate IP addresses to hostnamesScan networksProbe port of target computers for servicesValidate email addressesDetermine ownership of domainList the computers in a domain

This application has portable version, too and this is commercial.

Scanning - dDoS Team - Azar 88 - December 09

Page 54: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

54

NetScanTools Pro: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 55: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

55

SuperScanIt is a TCP port scanner, pinger and hostname resolverIt can perform ping scan, scan ports using IP range and scan any port range from a built-in list or specified rangeOther Features:

Support for unlimited IP ranges Improved host detection using multiple ICMP methods TCP SYN scanningUDP scanning (two methods) IP address import supporting ranges and CIDR formats Source port scanningExtensive banner grabbingMassive built-in port list description database IP and port scan order randomizationA selection of useful tools (ping, traceroute, Whois etc) Extensive Windows host enumeration capability

Scanning - dDoS Team - Azar 88 - December 09

Page 56: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

56

SuperScan: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 57: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

57

Global Network inventory ScannerThis is a software and hardware inventory system that can be used as an audit scanner in an agent-free and zero development environmentIt can audit remote workstation and network appliances, including network printers, hubs and other devicesit can also be deployed as an agent to perform regular audits initiated through the domain login scriptThe available auditing options include various system information groups, installed software, services, user lists, shares, startup programs and much more.Global Network Inventory can export the scan results to HTML, XML, Microsoft Excel, or text formats, and also send reports via email.Scanning - dDoS Team - Azar 88 - December 09

Page 58: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

58

Global Network inventory Scanner

Scanning - dDoS Team - Azar 88 - December 09

Page 59: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

59

Atelier Web Ports Traffic Analyzer (AWPTA)

AWPTA captures the data that flows in and out of your PC since the time of bootingIt provides Real-time mapping of ports to processes and show history since boot time of every TCP, UDP, or RAW port opened through WinsockOptionally, AWPTA can also log (up to 500mb) all traffic since the last boot to file

Scanning - dDoS Team - Azar 88 - December 09

Page 60: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

60

Atelier Web Ports Traffic Analyzer (AWPTA)

Scanning - dDoS Team - Azar 88 - December 09

Page 61: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

61

Atelier Web Security Port Scanner (AWSPS)

AWSPS provides useful information about other network machines and users on a local area networkIt also provides traffic details for TCP and UDP traffic, as well as for control packet (ICMP), including pingFeatures:

TCP scanning functionality UDP Port ScanningLocal Network Enumeration High-level of detail on the local network set-up

Just see how it works now!

Scanning - dDoS Team - Azar 88 - December 09

Page 62: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

62

Atelier Web Security Port Scanner (AWSPS)

Scanning - dDoS Team - Azar 88 - December 09

Page 63: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

63

FloppyScan

FloppyScan is a dangerous hacking tool which can be used to portscan a system using a floppy diskIt boots up mini Linux It display “blue Screen of Death” screenThis application perform portscanning using NMAPFinally it sends results by e-mail to a remote server

Scanning - dDoS Team - Azar 88 - December 09

Page 64: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

64

IPEyeIPEye is a command-line driven port scanner for WindowsThe basic usage for this tool is:

ipEye <target IP> <scan type> -p <from port> <to port> [optional parameter]

Only SYN scan is valid when scanning a Windows systemIPEye scans requested ports, given a valid IP address, and return a list of ports which are open, close or rejectedIP address of the machine is required while scanning; hostname are not accepted

Scanning - dDoS Team - Azar 88 - December 09

Page 65: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

65

IPEye: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 66: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

66

Infiltrator Network Security ScannerInfiltrator is an intuitive network security scanner that can quickly scan and audit your network computers for vulnerabilities, exploits, and information enumerationsFeatures

Information Gathering Security Auditing and Analysis Generates sleek scan reports Comes with many built in network utilities such as whois client

It’s not free!http://www.infiltration-systems.com/

Scanning - dDoS Team - Azar 88 - December 09

Page 67: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

67

Infiltrator Network Security Scanner

Scanning - dDoS Team - Azar 88 - December 09

Page 68: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

68

Advanced Port ScannerAdvanced Port Scanner is small, fast, and easy-to-use port scanner that runs multi-threaded for optimum performanceFeatures:

Fast and Stable multi-threaded Port Scanning Fully configurable Port ScanExport scan results

Scanning - dDoS Team - Azar 88 - December 09

Page 69: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

69

Advanced Port Scanner

Scanning - dDoS Team - Azar 88 - December 09

Page 70: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

70

ike-Scan

ike-Scan is a command-line tool for discovering, fingerprinting and testing IPSec VPN systems

It constructs and sends IKE Phase-1 packets to the specific hosts and display any responses that received

It allows to:Send IKE packet to any number of destination

hostsConstructs the outgoing IKE packet in a

flexible wayDecode and display any returned packetsCrack aggressive mode pre-shared keysScanning - dDoS Team - Azar 88 - December 09

Page 71: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

71

ike-Scan: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 72: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

72

YAPS: Yet Another Port Scanner

YAPS is small and fast TCP port scanner with little configuration options and a fairly plain interface

Features:Support simultaneous connections to many

targetsSupport command-line and GUI modeCustomizable timeoutCan scan a range of addresses or single

addressCan resolve addressesIncludes names for well-known ports

Scanning - dDoS Team - Azar 88 - December 09

Page 73: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

73

YAPS: Yet Another Port Scanner

Scanning - dDoS Team - Azar 88 - December 09

Page 74: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

74

NetGadgets

NetGadgets is a complete set of diagnostic tool for every level of Internet userThe tools within NetGadgets provide invaluable data about your Internet and network connections, other user, and web site informationIt combines all the standard Internet tools like Ping, Trace Route, NS Lookup and Whois, with other less common tools like Time, Daytime, Echo Plus, Email Verify, finger, Name Scan, Ping Scan, Port Scan, service Scan, and others

Scanning - dDoS Team - Azar 88 - December 09

Page 75: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

75

MegaPing

MegaPing is the ultimate must-have toolkit that provides all essential utilities for Information System specialists, system administrators, IT solution provides, or individualsFeatures

Includes scanner, host and port monitors, system information viewers, and various network utilitiesAutomatically detects security vulnerabilities on your networkProvides detailed information about all computers and network appliances

Scanning - dDoS Team - Azar 88 - December 09

Page 76: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

76

MegaPing

Scanning - dDoS Team - Azar 88 - December 09

Page 77: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

77

MegaPing

Scanning - dDoS Team - Azar 88 - December 09

Page 78: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

78

MegaPing

Scanning - dDoS Team - Azar 88 - December 09

Page 79: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

79

HoverIPHoverIP is a useful set of network utilities, that can display your IP configuration (on all network cards), perform NsLookup queries, Traceroute, Ping, and port scanning

Scanning - dDoS Team - Azar 88 - December 09

Page 80: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

80

NetworkActive Scanner

Networkactive Port Scanner is a network exploration and administration tool that allows you to scan and explore internal LANs and external WANs

Features:TCP connect() port scanner and TCP SYN port scannerUDP port scanner with automatic speed controlPing scanning of subnet (UDP or ICMP)TCP subnet port scanner for finding web servers and

other serversHigh performance trace-routeRemote OS detection by TCP/IP stack fingerprintingWhois clientDNS Dig system

Scanning - dDoS Team - Azar 88 - December 09

Page 81: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

81

NetworkActive Scanner: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 82: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

82

P-Ping Tools

P-ping Tools is an administrative network scanner that allows you to scan TCP/UDP ports to see if they are in use

You can scan single or multiple IP address and also log the result to a text file that are in use

The program allows you to scan single port or all of them, as well as scanning for popular service running on an IP range

Scanning - dDoS Team - Azar 88 - December 09

Page 83: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

83

P-Ping Tools: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 84: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

84

NetBruteScannerNetBrute allows you to scan a single computer or multiple IP addresses for available Windows File & Print Sharing resources

This is probably one of the most dangerous and easily exploitable security holes

It is common for novice users to have their printers or their entire hard drive shared without being aware of itThis utility will help you to find these resources, so you can secure them with a firewall or by informing your users how to properly configure their shares with tighter securityhttp://www.rawlogic.com

Scanning - dDoS Team - Azar 88 - December 09

Page 85: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

85

NetBrute Scanner

Scanning - dDoS Team - Azar 88 - December 09

Page 86: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

86

AUTAPFNetworkActiv AUTAPF is easy to use, and quick to configure UDP and TCP Windows based port forwarderFeatures

Define IP address ranges to allow or block for each port being forwardedOptionally control IP address filtering via external program or script –in real-timeHave program forward multiple ports simultaneouslyView the current data throughput speed of each port forwarding operation Have program log connection events to a text fileHave program hide in taskbar

Scanning - dDoS Team - Azar 88 - December 09

Page 87: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

87

AUTAPF

Scanning - dDoS Team - Azar 88 - December 09

Page 88: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

88

Active Network MonitorActive Network Monitor allows Systems Administrators to gather information from all machines in the network without installing server-side applications on these computersAllows to view, store, and compare the received dataSelects a variety of items to be scanned, including installed applications, hotfixes, hardware resources, OS information, and computer informationResults are in-depth; however, they are displayed in

Scanning - dDoS Team - Azar 88 - December 09

Page 89: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

89

LanSpy

LanSpy is a set of network utilities pooled together in a single program with simple and easy-to-use interface

It includes fast port scanner for gathering information about ports on remote computer and display services using this ports

Features:Audit your network for security reason issuesViews processes on remote computerShows a list of installed application on workstationDetects shares, open ports and user account

Scanning - dDoS Team - Azar 88 - December 09

Page 90: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

90

LanSpy: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 91: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

91

LanView

LanView can quickly obtain information about all host on a network, including IP addresses, MAC addresses hostname, users and groups

Features:Multiple application in one: LAN search, capturing

and analyzing IP packetsIP Statistics, IP Traffic, Network Connections, Port

Scan, Ping Scan, Local Interface and Window Socket Information organized as independent window allow multitask operation

Multiple thread design ensures the efficiencyLAN Searcher, IP Capture and some other

functions are designed as independent threads

Scanning - dDoS Team - Azar 88 - December 09

Page 92: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

92

LanView: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 93: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

93

Advanced Serial Port MonitorThis program allows to check the flow of data through a computer’s COM portsIt can work as serial port monitor and supports full duplex mode, output received data to file, free data source, and serial device simulationIt supports the miscellaneous baudrates (up to 115200), number of databits, number of stop bits, different types to parity, flow control types and othersIt can monitor the data exchange between any external devices, connected to serial port and Windows applicationsIt can run with predefined options and actions or execute commands from plugins

Scanning - dDoS Team - Azar 88 - December 09

Page 94: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

94

Advanced Serial Port Monitor

Scanning - dDoS Team - Azar 88 - December 09

Page 95: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

95

Antiy PortsAntiy Ports is a TCP/UDP port monitor that maps the ports in use to the applications that are currently using themIt offers to kill any selected process and links to additional port information online

Scanning - dDoS Team - Azar 88 - December 09

Page 96: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

96

Port Detective

Port Detective is a tool that helps you find out what ports are blocked by the router, firewall, or ISPIt come pre-configured for the most commonly used ports, and you can also add your own ports to the listThe program is intended to check the availability of common ports for the purpose of self-hosting, as many ISPs are blocking these ports to prevent users from running public web server, mail server etc. on their home computers

Scanning - dDoS Team - Azar 88 - December 09

Page 97: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

97

Port Detective

Scanning - dDoS Team - Azar 88 - December 09

Page 98: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

98

Portable Storage Explorer

Portable Storage Explorer displays remote network computer USB devices, removable storage, CD-Rom and DVD drive information and state, drive type, serial number, revision, device name, last cleaned time, device vendor and product name, operational state, created and modified time, device library and etc.

Scanning - dDoS Team - Azar 88 - December 09

Page 99: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

99

Portable Storage Explorer: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 100: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

100

SolarWindsEngineer's Toolset

Engineer’s toolset include 49 powerful network management, monitoring and troubleshooting tools to easily and efficiently manage your network

Features:Monitors and alert on availability, bandwidth utilization

and health for hundreds of network devices Provides robust network diagnostics for troubleshooting

and quickly resolving complex network issuesOffers an array of network discovery tools that facilitate

IP address management, port mapping and ping sweepsEases management of Cisco devices with tools for real-

time NetFlow analysis, configuration management and router management

Scanning - dDoS Team - Azar 88 - December 09

Page 101: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

101

SolarWindsEngineer's Toolset: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 102: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

102

OstroSoft Internet Tools

OstroSoft Internet Tools is an integrated set of network information utilities

It is intended for use by network, domain and system administrators, network security professional, internet users, and everyone who want to know more about network and internet

It gives you vital information such as;Which computers on domain are running a specific service (domain

scanner)What network service is running on a specific remote or local

computer (port scanner)Show you the path TCP packet take from your system to the remote

host (trace-route)And so other applications such as: netstat, host resolver

Scanning - dDoS Team - Azar 88 - December 09

Page 103: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

103

OstroSoft Internet Tools: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 104: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

104

ColaSoft MAC Scanner

ColaSoft MAC Scanner allows to scan the network and get a list of MAC addresses along with IP address, machine, name and manufacturer’s information

It can automatically detect all subnet according to the IP addresses configured on multiple NICs of a machine

It support multi-threaded scanning

Scanning - dDoS Team - Azar 88 - December 09

Page 105: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

105

ColaSoft MAC Scanner: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 106: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

106

Roadkil's DetectorRoadkil’s Detector is a simple port listener, that allow to monitor connections to the specific system portsIt displays the IP address of the connecting agent, the remote machine’s name, as well as time and date of connectionThe output can optionally be saved to a log file

Scanning - dDoS Team - Azar 88 - December 09

Page 107: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

107

WotWeb

WotWeb is port scanner specifically made to scan and display active web servers and shows the server software running on them

IP list can be entered manually or by reading from a fileScanning is fast and accurate and the acquired list of server

can be saved comma separated text file for importing into your favorite spreadsheet application for further analysis

WotWeb was written to aid system administrators who manage large network and need to keep track of all their web servers and the type of server software running on them

Scanning - dDoS Team - Azar 88 - December 09

Page 108: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

108

War Dialer Technique

Page 109: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

109

War Dialer TechniqueWar dialing involves the use of a program in conjunction with a modem to penetrate the modem-based system of an organization by continually dialing inCompanies do not control the dial-in ports as strictly as the firewall and machines with modems attached are present everywhereA tool that identifies the phone numbers that can successfully make a connection with a computer modemIt generally works by using a predetermined list of common user names and passwords in a attempt to gain access to the system

Scanning - dDoS Team - Azar 88 - December 09

Page 110: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

110

ModemScanModemScan is a GUI wardialer software program which utilizes Microsoft Windows TelephonyFeatures:

ModemScan Works with hardware you already own and does not require the additional purchase of specific nor specialized hardwareRandomly selects and dials phone numbers from the dial ranges list to prevent line termination from phone companies which detect sequential dialing runs multiple ModemScan copies with more than one phone line and modem on the same computerImports comma delimited text files containing phone nimbers or ranges

Scanning - dDoS Team - Azar 88 - December 09

Page 111: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

111

PhoneSweep – War Dialing Tool PhoneSweep Dials Every Number In Your Organization PhoneSweep is a robust multi-line scanner which scales to meet your specific

requirements Once the install is complete, PhoneSweep will

Identify computers running remote-access software to bypass the corporate firewall Identify over 460 systems and try to break in Identify approved or unapproved modems that accept incoming calls Identify critical backup modems that have failed

PhoneSweep operates in the mode that you select Connect - Quickly scanning all numbers using patented Single Call Detect Identify - Refine your scan and identify numbers that yielded a modem connection Penetrate - This is the most aggressive setting, using brute-force passwords against

identified modems PhoneSweep is unique with its patented Single Call Detect technology PhoneSweep contains versatile username and password checking functionality PhoneSweep is solidly engineered providing for stops, starts, and system recovery mid-

scan

Scanning - dDoS Team - Azar 88 - December 09

Page 112: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

112

PhoneSweep – War Dialing Tool: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 113: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

113

THC Scan

It is a type of war dialer that scans a defined range of phone numbers

Scanning - dDoS Team - Azar 88 - December 09

Page 114: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

114

ToneLoc

ToneLoc is a pupolar war dialing computer program for MS-DOS

It dials numbers to look for some kind of toneCommand-line option for ToneLoc:

toneloc [datafile] /M:[mask] /R:[range] /D:[exRange] /X:[exMask] /C:[config] /S:[start time] /E:[end time] /H:[hours] /T[-] /K[-]

Scanning - dDoS Team - Azar 88 - December 09

Page 115: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

115

ToneLoc

It is used to:Find BPXsFind loops or miliwatt test numberFind dial-up long distance carriersFind any number that gives a constant tone or something

that your modem will recognize as oneFinding carriers (other modems)Hacking PBXs

Scanning - dDoS Team - Azar 88 - December 09

Page 116: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

116

War Dialing Countermeasures SandTrap Tool

SandTrap can detect war dialing attempts and notify the administrator immediately upon being called or upon being connected to via an email message, pager or via HTTP POST to a web server

Condition that can be configured to generate notification messages include:

• Incoming caller ID• Login attempt

Scanning - dDoS Team - Azar 88 - December 09

Page 117: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

117

SandTrap Tool: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 118: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

118

Banner Grabbing

Scanning - dDoS Team - Azar 88 - December 09

Page 119: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

119

Active Stack Fingerprinting

Based on the fact that OS vendors implement the TCP stack differentlySpecially crafted packets are sent to remote OSs and the response is notedThe responses are then compared with a database to determine the OSThe Firewall logs your active banner grabbing scan since you are probing directly

Scanning - dDoS Team - Azar 88 - December 09

Page 120: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

120

Active Stack FingerprintingIn Nmap, active stack fingerprint is done through eight tests:

A TCP packet with the SYN and ECN -Echo flags enabled is sent to an open TCP port. A TCP packet with no flags enabled is sent to an open TCP port. A TCP packet with the URG, PSH, SYN and FIN flags enabled is sent to an open TCP port. A TCP packet with the ACK flag enabled is sent to an open TCP port. A TCP packet with the SYN flag enabled is sent to a closed TCP port. A TCP packet with the ACK flag enabled is sent to a closed TCP port. A TCP packet with the URG, PSH and FIN flag enabled is sent to a closed TCP port. A UDP packet is sent to a closed UDP port. The objective is to extract an ICMP port unreachable message back from the target machine.

Scanning - dDoS Team - Azar 88 - December 09

Page 121: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

121

Passive Fingerprinting

Passive banner grabbing refers to indirectly scanning a system to reveal its server’s operating system

It is also based on the differential implantation of the stack and the various ways on OS responds to it

It used sniffing techniques instead of scanning techniqueIt is less accurate than active fingerprinting

Scanning - dDoS Team - Azar 88 - December 09

Page 122: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

122

Active Banner Grabbing Using TelnetYou can use telnet to grab the banner of a website

telnet ui.ac.ir 80 HEAD / HTTP/1.0

Scanning - dDoS Team - Azar 88 - December 09

Page 123: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

123

P0F for WindowsP0f is a passive OS fingerprinting technique that is based on analyzing the information sent by a remote hostThe captured packets contain enough information to identify the remote OS

How to run p0f?

Run p0f –i <your interface card number>

Open IE and visit websites

You will see the OS fingerprinted

in the p0f window

Scanning - dDoS Team - Azar 88 - December 09

Page 124: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

124

P0F for Windows

Scanning - dDoS Team - Azar 88 - December 09

Page 125: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

125

GET Requests

You might want to try these additional GET Requests for banner grabbing

Scanning - dDoS Team - Azar 88 - December 09

Page 126: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

126

Httprint Banner Grabbing Tool

Httprint is a web server fingerprinting toolIt relies on web server characteristics to accurately

identify web servers, despite the fact, that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask

Httprint can also used to detect web-enabled devices which do not have a server banner string, such as wireless access points, routers, switches and cable modems

Httprint uses text signature string and it is very easy to add signatures to the signature database

Scanning - dDoS Team - Azar 88 - December 09

Page 127: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

127

Httprint Banner Grabbing Tool: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 128: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

128

Tool for Active Stack Fingerprinting

XProbe2

• It is a remote OS detection tool which determine the OS running on the target system whit minimal target disturbance

Ring V2

• This tool is designed whit a different approach to the OS detection• This tool identifies the OS of the target system whit a matrix-based

fingerprinting approach• You can get it from http://www.sys-security.com

Most of the port scanning tools like Nmap are used for active stack fingerprinting

Scanning - dDoS Team - Azar 88 - December 09

Page 129: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

129

ServerMask

It modifies web server fingerprint by removing unnecessary HTTP response data, modifying cookie values and adjusting other response information

ServerMask hides the identity of server

Scanning - dDoS Team - Azar 88 - December 09

Page 130: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

130

ServerMsk: Features

Numerous HTTP masking optionsUnique cookie masking featureDisables potentially dangerous features like Microsoft

WevDav with one click (Windows 2000 SP3 or greater only)Controls other signatures such as the SMTP banner display Compatible with IIS Lockdown, URLScan, major third party

server-side scripting platforms like ASP.NET, ColdFusion, PHP, JSP and Perl

Support FrontPage publishing and Outlook Web AccessSupport-fast, stable ISAPI filter with no noticeable server

performance impactQuick and easy installation and configuration

Scanning - dDoS Team - Azar 88 - December 09

Page 131: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

131

PageXchanger

PageXchanger is a IIS server module that negotiates content whit browsers and mask file extensions

Features: Allows removal of file extensions in source code without affecting site Redirects requests for pages and allows content to be served without file

extensions URLs no longer display file extensions in a Web browser’s address or

location bar Benefits:

Security: Enhances security by obscuring technology platform and stops hacker exploits

Migration: Changes site technology easily without broken links or numerous redirects

Can not negotiation: Transparently selects and serves language, image and other content based on user’s browser

A clean URL site: Easier for users to navigate, simple to maintain and mask for more effective and lasting URLs in all company communicationsScanning - dDoS Team - Azar 88 - December 09

Page 132: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

132

Miart HTTP Header

Miart HTTP Header is a simple tool to get the HTTP Header information from any website by entering the URL into the programIt also includes

Ping toolTraceroute toolDomain name/IP resolver

http://www.miart.co.uk/pages/downloads/miartweb/mtdw002/http_header_tool.aspxIt is an extension for dreamweaver!

Scanning - dDoS Team - Azar 88 - December 09

Page 133: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

133

Miart HTTP Header

Scanning - dDoS Team - Azar 88 - December 09

Page 134: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

134

Netcraft

Netcraft toolbar can be used to identify the remote OS of a target system passivelyhttp://toolbar.netcraft.com

Scanning - dDoS Team - Azar 88 - December 09

Page 135: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

135

Draw Network Diagrams of vulnerable Hosts

Page 136: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

136

FriendlyPinger

A powerful and user-friendly application for network administration and monitoringIt can be used for pinging of all devices in parallel at once and in assignment of external commands (like telnet, traceroute) to devices

Scanning - dDoS Team - Azar 88 - December 09

Page 137: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

137

FriendlyPinger

Scanning - dDoS Team - Azar 88 - December 09

Page 138: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

138

IPsonarLumeta’s Ipsonar actively scans the network to collect all data related to these factors via Network Discovery, Host Discovery, Leak Discovery, and Device Fingerprint Discoveryhttp://www.lumeta.com/

Scanning - dDoS Team - Azar 88 - December 09

Page 139: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

139

LANState is a network mapping, monitoring, management and administration software solution for corporate Microsoft Windows network

Benefits:LANState builds a network map automatically by

scanning Windows network neighborhood or IP address range

Save your network map for future use, print it and export it to a bitmap file

Be notified by background device monitoring via a screen message, sound or e-mail when your servers go down or start working

LANState

Scanning - dDoS Team - Azar 88 - December 09

Page 140: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

140

LANState: ScreenShot

Scanning - dDoS Team - Azar 88 - December 09

Page 141: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

141

IPCheck Server Monitor helps organizations to monitor critical network resources and detect system failures or performance problems immediately, thus minimizing downtimes and their economic impact

Features: Powered by Peassler’s riliable IPCheck technology Remote management via web browser, PocketPC or Windows

client Notifies users about outages by e-mail, ICQ or pager/SMS and

more Monitors network services with its comprehensive sensor type

selection Multiple location monitoring using secure Remote Probes

IPCheck Server Monitor

Scanning - dDoS Team - Azar 88 - December 09

Page 142: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

142

IPCheck Server Monitor: Screenshot

Scanning - dDoS Team - Azar 88 - December 09

Page 143: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

143

Insightix VisibilityInsightix Visibility obtains a complete inventory of all network devices, including firewalled, unmanaged and virtual devices, and provides location information and full list of associated propertiesFeatures

Complete IT Asset DiscoveryAccurate Network Topology MapReal-Time Change Detection

Scanning - dDoS Team - Azar 88 - December 09

Page 144: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

144

Scanning CountermeasuresThe firewall of a particular network should be good enough to detect the probes of an attacker. The firewall should carry out inspection having a specific rule setNetwork intrusion detection systems should be used to find out the OS detection method used by some tools such as NmapOnly necessary ports should be kept open and rest should be filteredAll sensitive information that is not to be disclosed to the public over the Internet, should not be displayed

Scanning - dDoS Team - Azar 88 - December 09

Page 145: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

145

Secure Filtering, Monitoring and Access Control SentryPC enables you to control, restrict and monitor access and usage of your

PC Features:

Compete Time Management Application on Scheduling Filtering Website Filtering Chat Filtering Keystroke Filtering Powerful Security Features Protects your users Logs:

Keystrokes Type Application Usage Website Visits Chat Conversations Windows Viewed

SentryPC

Scanning - dDoS Team - Azar 88 - December 09

Page 146: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

You can ask your question now!

But we answer them just if we can! :D

Page 147: By: Hossein Soleimany MohammadAli Taebi Azar 1388 December 2009

Thanks for your attention!