Network Mapper. Nmap

Σχετικά έγγραφα
Ελίνα Μακρή

NMAP. Tutorial and Examples. Γιώργος Καππές

Στρατηγικές Ασφάλειας

Επίπεδο Μεταφοράς. (ανεβαίνουμε προς τα πάνω) Εργαστήριο Δικτύων Υπολογιστών Τμήμα Μηχανικών Η/Υ και Πληροφορικής

CYTA Cloud Server Set Up Instructions

Ασφάλεια Υπολογιστικών Συστημάτων

ΕΑΠ/ΠΛΗ22/ΑΘΗ.3 4 η ΟΣΣ 15/03/2014 Συμπληρωματικές Διαφάνειες

Δίκτυα Υπολογιστών ΙΙ (Ασκήσεις Πράξης)

Κεφάλαιο 13. Έλεγχος πρόσβασης με Firewall

Επίπεδο δικτύου IP διευθυνσιοδότηση

(C) 2010 Pearson Education, Inc. All rights reserved.

Εργαστήριο Δικτύων Υπολογιστών

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο

EE512: Error Control Coding

Επίπεδο δικτύου IP Forwading κτλ

EPL 603 TOPICS IN SOFTWARE ENGINEERING. Lab 5: Component Adaptation Environment (COPE)

ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΥΠΡΟΥ - ΤΜΗΜΑ ΠΛΗΡΟΦΟΡΙΚΗΣ ΕΠΛ 133: ΑΝΤΙΚΕΙΜΕΝΟΣΤΡΕΦΗΣ ΠΡΟΓΡΑΜΜΑΤΙΣΜΟΣ ΕΡΓΑΣΤΗΡΙΟ 3 Javadoc Tutorial

ιαδικτυακές Εφαρµογές

Ασφάλεια Υπολογιστικών Συστημάτων

Δίκτυα Επικοινωνιών ΙΙ: OSPF Configuration

Instruction Execution Times

Introduction to the TCP IP protocol stack through a role playing game

Internet protocol stack Encapsulation Connection oriented VS connectionless services Circuit Switching Packet Switching Store-and-forward switches

Snort. A multi-mode packet analysis tool 3-1. Ασφάλεια Δικτύων, Τμήμα Πληροφορικής, Ο.Π.Α.,

2 Composition. Invertible Mappings

The Simply Typed Lambda Calculus

Homework 3 Solutions

Capacitors - Capacitance, Charge and Potential Difference

Modbus basic setup notes for IO-Link AL1xxx Master Block

CHAPTER 25 SOLVING EQUATIONS BY ITERATIVE METHODS

Congruence Classes of Invertible Matrices of Order 3 over F 2

Εργαστήριο Ανάπτυξης Εφαρμογών Βάσεων Δεδομένων. Εξάμηνο 7 ο

derivation of the Laplacian from rectangular to spherical coordinates

Example Sheet 3 Solutions

Other Test Constructions: Likelihood Ratio & Bayes Tests

Reminders: linear functions

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 19/5/2007

ΚΥΠΡΙΑΚΗ ΕΤΑΙΡΕΙΑ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ 24/3/2007

Εισαγωγή στη Βιοπληροφορική

Phys460.nb Solution for the t-dependent Schrodinger s equation How did we find the solution? (not required)

Section 1: Listening and responding. Presenter: Niki Farfara MGTAV VCE Seminar 7 August 2016

HY335 4ο Φροντιστήριο

the total number of electrons passing through the lamp.

Partial Trace and Partial Transpose

HOMEWORK 4 = G. In order to plot the stress versus the stretch we define a normalized stretch:

Section 7.6 Double and Half Angle Formulas

Calculating the propagation delay of coaxial cable

Υλοποίηση Δικτυακών Υποδομών και Υπηρεσιών: Χρήση Access - List

Math 6 SL Probability Distributions Practice Test Mark Scheme

Exercises 10. Find a fundamental matrix of the given system of equations. Also find the fundamental matrix Φ(t) satisfying Φ(0) = I. 1.

Ντίρλης Νικόλαος- ΕΤΥ 3ο ΦΡΟΝΤΙΣΤΗΡΙΟ ΠΑΡΑΣΚΕΥΗ 25 ΟΚΤΩΒΡΙΟΥ 2013 ΑΙΘΟΥΣΑ Β4

Models for Probabilistic Programs with an Adversary

VBA ΣΤΟ WORD. 1. Συχνά, όταν ήθελα να δώσω ένα φυλλάδιο εργασίας με ασκήσεις στους μαθητές έκανα το εξής: Version ΗΜΙΤΕΛΗΣ!!!!

PARTIAL NOTES for 6.1 Trigonometric Identities

ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΥΠΡΟΥ ΤΜΗΜΑ ΠΛΗΡΟΦΟΡΙΚΗΣ. ΕΠΛ342: Βάσεις Δεδομένων. Χειμερινό Εξάμηνο Φροντιστήριο 10 ΛΥΣΕΙΣ. Επερωτήσεις SQL

Δίκτυα Επικοινωνιών ΙΙ: Network Programming Εισαγωγή, TCP, UDP, Ports

6.1. Dirac Equation. Hamiltonian. Dirac Eq.

Πρόβλεμα Online Gaming με modem Thomson και Speedtouch

Συστήματα Διαχείρισης Βάσεων Δεδομένων

Section 8.3 Trigonometric Equations

Econ 2110: Fall 2008 Suggested Solutions to Problem Set 8 questions or comments to Dan Fetter 1

HY335Α Δίκτυα Υπολογιστών Xειμερινό Εξάμηνο Πανεπιστήμιο Κρήτης, Τμήμα Επιστήμης Υπολογιστών. Routing Algorithms. Network Layer.

IPv6. Ιατρέλλης Όμηρος Καθηγητής Εφαρμογών

ST5224: Advanced Statistical Theory II

ΑΣΦΑΛΕΙΑΣ ΣΕ INTERNET HOSTS

The challenges of non-stable predicates

ΚΥΠΡΙΑΚΟΣ ΣΥΝΔΕΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ CYPRUS COMPUTER SOCIETY 21 ος ΠΑΓΚΥΠΡΙΟΣ ΜΑΘΗΤΙΚΟΣ ΔΙΑΓΩΝΙΣΜΟΣ ΠΛΗΡΟΦΟΡΙΚΗΣ Δεύτερος Γύρος - 30 Μαρτίου 2011

Nowhere-zero flows Let be a digraph, Abelian group. A Γ-circulation in is a mapping : such that, where, and : tail in X, head in

Τεχνολογίες ιαδικτύου

Web and HTTP. Βασικά Συστατικά: Web Server Web Browser HTTP Protocol

ΕΛΛΗΝΙΚΗ ΔΗΜΟΚΡΑΤΙΑ ΠΑΝΕΠΙΣΤΗΜΙΟ ΚΡΗΤΗΣ. Ψηφιακή Οικονομία. Διάλεξη 10η: Basics of Game Theory part 2 Mαρίνα Μπιτσάκη Τμήμα Επιστήμης Υπολογιστών

C.S. 430 Assignment 6, Sample Solutions

3.4 SUM AND DIFFERENCE FORMULAS. NOTE: cos(α+β) cos α + cos β cos(α-β) cos α -cos β

Approximation of distance between locations on earth given by latitude and longitude

Ψηφιακή ανάπτυξη. Course Unit #1 : Κατανοώντας τις βασικές σύγχρονες ψηφιακές αρχές Thematic Unit #1 : Τεχνολογίες Web και CMS

Case 1: Original version of a bill available in only one language.

Potential Dividers. 46 minutes. 46 marks. Page 1 of 11

Σχήμα 4.1. Δίκτυο μη συγκεκριμένης τοπολογίας (mesh topology)

Εγκατάσταση λογισμικού και αναβάθμιση συσκευής Device software installation and software upgrade

ΕΙΣΑΓΩΓΗ ΣΤΗ ΣΤΑΤΙΣΤΙΚΗ ΑΝΑΛΥΣΗ

Advanced Subsidiary Unit 1: Understanding and Written Response

ΠΑΝΕΠΙΣΤΗΜΙΟ ΠΕΙΡΑΙΩΣ ΤΜΗΜΑ ΠΛΗΡΟΦΟΡΙΚΗΣ ΠΜΣ «ΠΡΟΗΓΜΕΝΑ ΣΥΣΤΗΜΑΤΑ ΠΛΗΡΟΦΟΡΙΚΗΣ» ΚΑΤΕΥΘΥΝΣΗ «ΕΥΦΥΕΙΣ ΤΕΧΝΟΛΟΓΙΕΣ ΕΠΙΚΟΙΝΩΝΙΑΣ ΑΝΘΡΩΠΟΥ - ΥΠΟΛΟΓΙΣΤΗ»

Μηχανισμοί πρόβλεψης προσήμων σε προσημασμένα μοντέλα κοινωνικών δικτύων ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ

ΠΑΡΑΡΤΗΜΑ Β - ΠΛΗΡΟΦΟΡΙΑ & ΤΕΧΝΙΚΕΣ ΠΡΟΔΙΑΓΡΑΦΕΣ

Υλοποίηση Δικτυακών Υποδομών και Υπηρεσιών: Access Lists

Ψηφιακή ανάπτυξη. Course Unit #1 : Κατανοώντας τις βασικές σύγχρονες ψηφιακές αρχές Thematic Unit #1 : Τεχνολογίες Web και CMS

Section 9.2 Polar Equations and Graphs

Ανάλυση Δικτυακής Κίνησης Πρωτοκόλλων Υπηρεσιών. Ασφάλεια Δικτύων. (4 η άσκηση) Διαχείριση Δικτύων - Ευφυή Δίκτυα, 9 ο Εξάμηνο,

ΠΑΝΕΠΙΣΤΗΜΙΟ ΠΑΤΡΩΝ ΤΜΗΜΑ ΗΛΕΚΤΡΟΛΟΓΩΝ ΜΗΧΑΝΙΚΩΝ ΚΑΙ ΤΕΧΝΟΛΟΓΙΑΣ ΥΠΟΛΟΓΙΣΤΩΝ ΤΟΜΕΑΣ ΣΥΣΤΗΜΑΤΩΝ ΗΛΕΚΤΡΙΚΗΣ ΕΝΕΡΓΕΙΑΣ

UNIVERSITY OF CALIFORNIA. EECS 150 Fall ) You are implementing an 4:1 Multiplexer that has the following specifications:

Δίκτυα Η/Υ στην Επιχείρηση

PortSip Softphone. Ελληνικά Ι English 1/20

CHAPTER 48 APPLICATIONS OF MATRICES AND DETERMINANTS

ΠΑΝΕΠΙΣΤΗΜΙΟΥ ΠΕΛΟΠΟΝΝΗΣΟΥ ΤΜΗΜΑ ΕΠΙΣΤΗΜΗΣ ΚΑΙ ΤΕΧΝΟΛΟΓΙΑΣ ΤΗΛΕΠΙΚΟΙΝΩΝΙΩΝ Υλοποίηση Δικτυακών Υποδομών και Υπηρεσιών

RMCLab. Remote Monitored and Controlled Laboratory

Υλοποίηση Δικτυακών Υποδομών και Υπηρεσιών: OSPF Cost

Inverse trigonometric functions & General Solution of Trigonometric Equations

Κεφάλαιο 2. Πηγές δεδομένων του Honeynet

Κάθε γνήσιο αντίγραφο φέρει υπογραφή του συγγραφέα. / Each genuine copy is signed by the author.

ΠΑΝΕΠΙΣΤΗΜΙΟ ΘΕΣΣΑΛΙΑΣ ΤΜΗΜΑ ΠΟΛΙΤΙΚΩΝ ΜΗΧΑΝΙΚΩΝ ΤΟΜΕΑΣ ΥΔΡΑΥΛΙΚΗΣ ΚΑΙ ΠΕΡΙΒΑΛΛΟΝΤΙΚΗΣ ΤΕΧΝΙΚΗΣ. Ειδική διάλεξη 2: Εισαγωγή στον κώδικα της εργασίας

Transcript:

Network Mapper Nmap 3-1

Contents Introduction Target Specification Host Discovery Port Scanning Service and Version Detection OS Detection Examples Assignment 3-2

Contents Introduction Target Specification Host Discovery Port Scanning Service and Version Detection OS Detection Examples Assignment 3-3

Network Mapper (nmap) Definition A powerful utility for network exploration or security auditing. Is used to discover computers and services on a computer network, thus creating a "map" of the network. History First release: September 1, 1997 in Phrack Magazine - The Art of Portscanning http://www.insecure.org/nmap/p51-11.txt written by Gordon Lyon Current Version: 6.4 3-4

Nmap is (1) Flexible Supports advanced techniques for mapping out networks filled with IP filters, firewalls, Routers etc. Includes Several port scanning mechanisms (both TCP & UDP), OS Detection, version Detection ping sweeps etc 3-5

Nmap is (2) Free (under GNU license) Open source Portable Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more... Very popular Movie star Matrix Reloaded Bourne Ultimatum Die Hard 4 3-6

Nmap Package Nmap command-line executable Zenmap advanced GUI and results viewer Ncat data transfer, redirection, and debugging tool Ndiff utility for comparing scan results 3-7

Nmap - Links Available for downloading: http://nmap.org/download.html Installation instructions for all supported OS http://nmap.org/book/install.html Reference Guide : http://nmap.org/book/man.html 3-8

Nmap Screenshots nmap Zenmap 3-9

Contents Introduction Target Specification Host Discovery Port Scanning Service and Version Detection OS Detection Examples Assignment 3-10

Target Specification Classless Inter-Domain Routing(CIDR) addressing IP Address format: two groups Examples: most significant part : network address - identifies a whole network or subnet least significant portion :host identifier - particular host interface on that network 192.168.1.0/24 - Scan: 192.168.1.0 till 192.168.1.255 192.168.1.40/16 - Scan: 192.168.0.0 till 192.168.255.255 132.18.3.210/32 - Scan:??? 78.184.23.1/0 - Scan:??? 210.43.1-255.4-140 - Scan:??? 3-11

Scanning with nmap Nmap 192.168.1.1 Port scanning on the specified host 3-12

Contents Introduction Target Specification Host Discovery Port Scanning Service and Version Detection OS Detection Examples Assignment 3-13

Host Discovery (1) List Scan (-sl) lists each host of the network specified, without sending any packets to the target hosts nmap -sl www.skai.gr 3-14

Host Discovery (2) Skip port scan (-sp) ping scan - prints out the available hosts that responded nmap -sp 192.168.1.1/24 3-15

Host Discovery (3) No Ping (-PN) Performs port scanning without checking if host is up. nmap -sn 192.168.1.1 3-16

Host Discovery (4) TCP SYN Ping (-PS) Sends an empty TCP packet with the SYN flag set The SYN flag suggests to the remote system that you are attempting to establish a connection. If destination port closed -> RST (reset) packet sent back If destination port open -> SYN/ACK TCP packet is sent back RST is sent in return from Nmap In both cases, host is alive 3-17

Host Discovery (5) TCP ACK Ping (-PA) Sends an empty TCP packet with the ACK flag set Such an ACK packet purports to be acknowledging data over an established TCP connection, but no such connection exists If destination host is alive-> RST (reset) packet sent back Since - PA and - PS are similar, why have both? 3-18

Host Discovery (7) UDP Ping (-PU) Sends an empty UDP packet by default, on port 40125 Return value ICMP port unreachable Destination host up other types of ICMP errors Destination host down or unreachable No answer Destination host probably up Packet is ignored 3-19

Host Discovery (8) SCTP INIT Ping (-PY) Stream Control Transmission Protocol Sends a SCTP packet containing a minimal INIT chunk The INIT chunk suggests to the remote system that you are attempting to establish a connection. If destination port closed -> ABORT packet sent back If destination port open -> INIT/ACK packet is sent back ABORT is sent in return from Nmap 3-20

Host Discovery (9) ARP Ping (-PR) Sends an ARP Request If ARP response -> Host is alive ICMP Ping (-PE) Sends an ICMP type 8 (echo request) packet If ICMP response type 0 (echo reply) -> Host is alive IP Protocol Ping (-PO) Sends IP packets with the specified protocol number set in their IP header. E.g. ICMP (protocol 1) IGMP (protocol 2) IP-in-IP (protocol 4) Response: If protocol supported, responses using the same protocol as a probe If protocol not supported, ICMP protocol unreachable messages 3-21

Contents Introduction Target Specification Host Discovery Port Scanning Service and Version Detection OS Detection Examples Assignment 3-22

Port Scanning - Port States Open An application is actively accepting TCP connections, UDP datagrams or SCTP associations on this port. Closed A closed port is accessible (it receives and responds to Nmap probe packets), but there is no application listening on it. Filtered unable to determine whether the port is open because packet filtering prevents its probes from reaching the port. dedicated firewall device, router rules, or host-based firewall software. Unfiltered (only ACK Scan) Port is accessible, but Nmap is unable to determine whether it is open or closed 3-23

Port Scanning (1) TCP SYN Scan (-ss) Sends a TCP packet with the SYN flag set The SYN flag suggests to the remote system that you are attempting to establish a connection. RST (reset) packet sent back -> dest. port closed SYN/ACK TCP packet is sent back -> dest. port open RST is sent in return from Nmap If no response is received -> port is marked as filtered ICMP unreachable -> port is marked as filtered This technique is often referred to as half-open scanning 3-24

Port Scanning (2) TCP ACK scan (-sa) Used only to determine Filtered/Unfiltered ports Both open and closed ports return RST Sends an empty TCP packet with the ACK flag set Such an ACK packet purports to be acknowledging data over an established TCP connection, but no such connection exists Response: RST packet -> port is unfiltered both open/closed ports return RST No response -> port is filtered 3-25

Port Scanning (3) TCP Window scan (-sw) exactly the same as ACK scan exams the TCP Window field of the RST packets returned. open ports use a positive window size closed ports have a zero window Unreliable since the TCP Window field implemented in the minority of systems 3-26

Port Scanning (4) TCP RFC 793 states that any packet not containing SYN, RST, ACK bits will result RST if the port is closed no response at all if the port is open Three different port scanning Techniques combination of the other three bits FIN, PSH, URG Null scan (-sn) Does not set any bits FIN scan (-sf) Sets just the TCP FIN bit Xmas scan (-sx) Sets the FIN, PSH, and URG flags, lighting the packet up like a Christmas tree. 3-27

Port Scanning (5) UDP scans (-su) Sends UDP packets For known protocol ports, protocol-specific payload is sent DNS port 53 SNMP ports 161/162 DHCP ports 67/68 For the rest, an empty payload is sent Return value ICMP port unreachable Port is closed other types of ICMP errors Port is filtered UDP packet Port is open 3-28

Port Scanning (6) SCTP INIT scan (-sy) Sends SCTP packet containing an INIT chunk The INIT chunk suggests to the remote system that you are attempting to establish a connection. Response: ABORT packet -> destination port closed INIT/ACK packet -> destination port open ABORT is sent in return from Nmap No response is received -> port filtered ICMP unreachable -> port filtered 3-29

Port Scanning (7) SCTP COOKIE ECHO scan (-sz) Sends SCTP packet containing an SCTP COOKIE ECHO chunk Response: ABORT packet -> port is closed. No Response -> port is open filtered Remote host drops packets containing COOKIE ECHO chunks Downsize: cannot differentiate between open and filtered ports. 3-30

Contents Introduction Target Specification Host Discovery Port Scanning Service and Version Detection OS Detection Examples Assignment 3-31

Service and Version Detection Version scan (-sv) Tries to determine: the service protocol e.g. FTP, SSH, Telnet, HTTP Application name e.g. ISC BIND, Apache httpd, Solaris telnetd version number hostname device type e.g. printer, router miscellaneous details 3-32

Contents Introduction Target Specification Host Discovery Port Scanning Service and Version Detection OS Detection Examples Assignment 3-33

OS Detection Enable OS detection (-O) Nmap compares the scan results against known OS fingerprints. Each fingerprint includes a freeform textual description of the OS a classification which provides the vendor name (e.g. Sun), underlying OS (e.g. Solaris), OS generation (e.g. 10), device type general purpose router Switch game console 3-34

Contents Introduction Target Specification Host Discovery Port Scanning Service and Version Detection OS Detection Examples Assignment 3-35

Examples 3-36

Contents Introduction Target Specification Host Discovery Port Scanning Service and Version Detection OS Detection Examples Assignment 3-37

Assignment Scan network and check whether specific ports are open Scan network and determine Virtual Machines Scan network and determine OS Fingerprints Ports/services Etc 3-38