CEH Lab Manual: Scanning N Etw Orks
CEH Lab Manual: Scanning N Etw Orks
S c a n n i n g N e t w o r k s
M o d u le 03
M o d u le 0 3 - S c a n n in g N e tw o rk s
S c a n n in g a T a r g e t N e tw o rk
S c a n n in g a n e tw o rk re fe rs to a s e t o f p ro c e d u re s fo r id e n tify in g h o s ts , p o /ts , a n d
s e rv ic e s ru n n in g in a n e tw o rk .
L a b S c e n a r io
I CON KEY Vulnerability scanning determines the possibility of network security attacks. It
evaluates the organization’s systems and network for vulnerabilities such as missing
Valuable
information patches, unnecessary services, weak authentication, and weak encryption.
Vulnerability scanning is a critical component of any penetration testing assignment.
s Test your
You need to conduct penetration testing and list die direats and vulnerabilities
knowledge
found in an organization’s network and perform port s c a n n in g , n e tw o rk s c a n n in g ,
H Web exercise and v u ln e ra b ility s c a n n in g ro identify IP/hostname, live hosts, and vulnerabilities.
Q Workbook review
L a b O b j e c t iv e s
ZZ7 T o o ls L a b E n v ir o n m e n t
d e m o n stra te d in
t h is la b a r e 111 die lab, you need:
a v a ila b le in
■ A computer running with W in d o w s S e r v e r 2 0 1 2 , W in d o w s S e rv e r 2008.
D:\CEH-
W in d o w s 8 or W in d o w s 7 with Internet access
T o o ls\ C E H v 8
M o du le 0 3 ■ A web browser
S c a n n in g
N e tw o rk s
■ Admiiiistrative privileges to run tools and perform scans
L a b D u r a t io n
Time: 50 Minutes
O v e r v ie w o f S c a n n in g N e t w o r k s
Building on what we learned from our information gadiering and threat modeling,
we can now begin to actively query our victims for vulnerabilities diat may lead to a
compromise. We have narrowed down our attack surface considerably since we first
began die penetration test with everydiing potentially in scope.
Note that not all vulnerabilities will result in a system compromise. When searching
for known vulnerabilities you will find more issues that disclose sensitive
information or cause a denial of service condition than vulnerabilities that lead to
remote code execution. These may still turn out to be very interesting on a
penetration test. 111 fact even a seemingly harmless misconfiguration can be the
nuiiing point in a penetration test that gives up the keys to the kingdom.
For example, consider FTP anonymous read access. This is a fairly normal setting.
Though FTP is an insecure protocol and we should generally steer our clients
towards using more secure options like SFTP, using FTP with anonymous read
access does not by itself lead to a compromise. If you encounter an FTP server that
allows anonymous read access, but read access is restricted to an FTP directory that
does not contain any files that would be interesting to an attacker, then die risk
associated with the anonymous read option is minimal. On die other hand, if you
are able to read the entire file system using die anonymous FTP account, or possibly
even worse, someone lias mistakenly left die customer's trade secrets in die FTP
directory that is readable to die anonymous user; this configuration is a critical issue.
Vulnerability scanners do have their uses in a penetration test, and it is certainly
useful to know your way around a few of diem. As we will see in diis module, using
a vulnerability scanner can help a penetration tester quickly gain a good deal of
potentially interesting information about an environment.
111 diis module we will look at several forms of vulnerability assessment. We will
study some commonly used scanning tools.
Lab T asks
TASK 1 Pick an organization diat you feel is worthy of your attention. This could be an
educational institution, a commercial company, or perhaps a nonprofit charity.
Overview
Recommended labs to assist you in scanning networks:
■ Scanning System and Network Resources Using A d v a n c e d IP S c a n n e r
L a b A n a ly s is
Analyze and document die results related to die lab exercise. Give your opinion on
your target’s security posture and exposure duough public and free information.
P LEA S E T A LK TO YO U R IN S T R U C T O R IF YOU H A V E Q U ES T IO N S
R E L A T E D TO TH IS LAB.
S c a n n in g S y s te m a n d N e tw o rk
R e s o u r c e s U s in g A d v a n c e d IP
S canner
-A d v a n c e d IP S c a n n e r is a fr e e n e tir o r k s c a n n e r th a t g iv e s y o n v a rio u s ty p e s o f
I CON KEY
in fo rm a tio n re g a rd in g lo c a l n e tir o r k c o m p u te rs .
/ = ־Valuable
information
L a b S c e n a r io
✓ Test your
knowledge 111this day and age, where attackers are able to wait for a single chance to attack an
organization to disable it, it becomes very important to perform vulnerability
S Web exercise
scanning to find the flaws and vulnerabilities in a network and patch them before an
C Q Workbook review attacker intrudes into the network. The goal of running a vulnerability scanner is to
identify devices on your network that are open to known vulnerabilities.
L a b O b j e c t iv e s
The objective of this lab is to help students perform a local network scan and
l— J T o o ls discover all the resources 011 die network.
d e m o n stra te d in
You need to:
t h is la b a r e
a v a ila b le in ■ Perform a system and network scan
D:\CEH-
■ Enumerate user accounts
T o o ls\ C E H v 8
M o du le 0 3 ■ Execute remote penetration
S c a n n in g
N e tw o rk s ■ Gather information about local network computers
L a b E n v ir o n m e n t
L a b D u r a t io n
Time: 20 Minutes
O v e r v ie w o f N e t w o r k S c a n n in g
Lab T asks
S T A S K 1 1. Go to S ta r t by hovering die mouse cursor in die lower-left corner of die
desktop
L a u n c h in g
A d v a n c e d IP
Scann er
FIGURE1.1:Windows8- Desktopview
2. Click A d v a n c e d IP S c a n n e r from die S ta r t menu in die attacker machine
(Windows 8).
Admin ^
S ta rt
Nc m
it t
2*
C om puter M icrosoft Advanced
Clip IP Scanner
O rganizer
m WithAdvancedIP
Scanner, youcanscan Sports tS m
hundreds ofIP addresses
simultaneously. C ontrol
Panel
M icrosoft
O ffice 2010
Upload...
i i i l i l i
finance •
Youcanwake any
machineremotelywith
AdvancedIP Scanner, if
theWake-on־LANfeature
is supportedbyyour
networkcard.
FIGURE13: TheAdvancedIPScannermainwindow
4. Now launch die Windows Server 2008 virtual machine (v ic tim ’s m a c h in e ).
iik O jf f lc k 10:09 FM J
FIGURE1.4:ThevictimmachineWindowsserver2008
a Radmin2.xand3.x 5. Now, switch back to die attacker machine (Windows 8) and enter an IP
Integrationenableyouto address range in die S e le c t ra n g e field.
connect (ifRadminis
installed) to remote 6. Click die S c a n button to start die scan.
computers withjust one
dick.
Status
r Manufacturer MAC address
0 w 10.0.0.1 10.0.a1 Nlctgear, Inc. 00:09:5B:AE:24CC
> ט£* WIN-MSSELCK4K41 10.0.a2 Dell Inc DO:67:ES:1A:16:36
® & WINDOWS# 10.0.03 Microsoft Corporation 1
00: 5:5D: A8:6E:C6
WIN*LXQN3WR3R9M 10.0.05 M icrosoft Corporation 00:15:5D:A8:&E:03
® 15 WIN-D39MR5H19E4 10.0.07 Dell Inc D4:3E.-D9: C3:CE:2D
m Group Operations:
AnyfeatureofAdvanced
IP Scanner can beused
withanynumber of
selectedcomputers. For
example, youcanremotely
shut downacomplete
computer classwithafew
dicks. 5a iv*, 0 d«J0, S unknown
FIGURE1.6:TheAdvancedIPScannermainwindowafterscanning
8. You can see in die above figure diat Advanced IP Scanner lias detected
die victim machine’s IP address and displays die status as alive
9. Right-click any of die detected IP addresses. It will list Wake-On-LAN. Shut
M T A S K 2 down, and Abort Shut d o w n
Extract Victim’
s 5־ A d v a n c e d IP Scanner
10.0.0.1-10.0.0.10
Resuts Favorites |
MAC address
Status Name
n to ru fa c tu re r
10.0.0.1 10.0.011 Netgear. In c 00:09:5B:AE:24CC
IHLMItHMM, — D0t67:E5j1A:16«36
WINDOWS8 t* p ׳ore M icrosoft Corporation □0:15 :צU: A8:ofc:Ot>
hi WIN-LXQN3WR3
WIN ־D39MR5HL<
Copy
Add to ‘Favorites'
! M icrosoft Corporation
Dell Inc
00:15:SD:A8:6E:03
CW:BE:D9:C3:CE:2D
Rescan selected
Sive selected...
Wdke־O n־LAN
Shut dcwn...
Abort shut dcwn
Radrnir
a Wake-on-LAN: You
canwakeanymachine 5 alive. 0 dead, 5 unknown
remotelywithAdvancedIP
Scanner, ifWake-on-LAN FIGURE1.7:TheAdvancedIPScannermainwindowwithAliveHost list
featureis supportedby
your networkcard. 10. The list displays properties of the detected computer, such as IP
address. N a m e , M A C , and N e t B I O S information.
&
״m s i *
S h u td o w n o p tio n s
File Actions Settings View Help
r Use Vtindcms authentifcation
Like us on
Scan
J!] .■ ] Jser narre: Facebook
Winfingerprint Input
11 0.0.0.1-100.0.10
9essM ord:
rn e o c t (sec): [60
3
Options: Results | Favorites |
Message:
InvertedNetmask ® a
1a0.0.1
WIN-MSSELCK4K41
00;C9;5B:AE:24;CC
D0:67:E5:1A:16:36
supported) IPListSmgle W IND O W S It ion 00:15:3C:A0:6C:06
Host Neighborhood $
WIN-LXQN3WR3R9M It ion 00:13:3D:A8:6E:03
» a WIN-D39MR5HL9E4 D4:BE:D9:C3:CE:2D
I” Forced shjtdo/vn
f " Reooot
FIGURE1.8:TheAdvancedIPScannerComputerpropertieswindow
12. Now you have die IP address. Nam e, and other details of die victim
machine.
13. You can also try Angry IP scanner located at D:\CEH-Tools\CEHv8
Module 03 Scanning Networks\Ping Sweep Tools\Angry IP Scanner It
also scans the network for machines and ports.
L a b A n a ly s is
Document all die IP addresses, open ports and dieir running applications, and
protocols discovered during die lab.
Tool/U tility Information Collected/Objectives Achieved
Scan Information:
■ IP address
Advanced IP ■ System name
Scanner ■ MAC address
■ NetBIOS information
■ Manufacturer
■ System status
P L E A S E T A LK TO YO UR IN S T R U C T O R IF YOU H A V E Q U ES T IO N S
R E L A T E D TO TH IS LAB.
Q u e s t io n s
C E H Lab M anual Page 94 Eth ica l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
B a n n e r G ra b b in g t o D e te r m in e a
R e m o t e T a r g e t S y s t e m u s i n g ID
S e rv e
ID S S e rv e is u s e d to id e n tify th e m a k e , ///o d e /, a n d v e rs io n o f a n y w e b s ite 's s e rv e r
s o fh v a re .
I CON KEY L a b S c e n a r io
Valuable 111 die previous lab, you learned to use Advanced IP Scanner. This tool can also be
information
used by an attacker to detect vulnerabilities such as buffer overflow, integer flow,
y* Test your SQL injection, and web application on a network. If these vulnerabilities are not
knowledge fixed immediately, attackers can easily exploit them and crack into die network and
Web exercise cause server damage.
O Workbook review Therefore, it is extremely important for penetration testers to be familiar widi
banner grabbing techniques to monitor servers to ensure compliance and
appropriate security updates. Using this technique you can also locate rogue servers
or determine die role of servers within a network. 111 diis lab, you will learn die
banner grabbing technique to determine a remote target system using ID Serve.
L a b O b j e c t iv e s
The objective of diis lab is to help students learn to banner grabbing die website and
discover applications running 011 diis website.
111 diis lab you will learn to:
N e tw o rk s N e t w o r k s \ B a n n e r G ra b b in g T o o ls \ ID S e r v e
■ You can also download the latest version of ID S e rv e from the link
http: / / www.grc.com/id/idserve.htm
■ If you decide to download the la t e s t v e r s io n , then screenshots shown
in the lab might differ
■ Double-click id s e r v e to run ID S e r v e
L a b D u r a t io n
Time: 5 Minutes
O v e r v ie w o f ID S e r v e
Lab T asks
TASK 1
1. Double-click id s e r v e located at D :\C E H -T o o ls\C E H v 8 M o d u le 0 3 S c a n n in g
Id en tify w e b s it e N e tw o rk s\ B a n n e r G ra b b in g T o o ls\ID S e r v e
s e r v e r in fo rm atio n
2. 111 die main window of ID S erv e show in die following figure, select die
S e v e r Q u e ry tab
0 ID Serve ׳- r o
InternetServer IdentificationUtility,vl .02
ID Serve Personal SecurityFreewarebySteveGibson
Copyright (c) 2003 by Gibson Research Corp
Enter 01 copy / paste an Internet server URL 0 * IP address here (example www rmcrosoft com)
ri
Server
If anIPaddressis
enteredinsteadof aURL,
IDServewill attempt to
determine thedomain The server identified <se* as
name associatedwiththe ^4
IP
Copy goto ID Serve web page E*it
FIGURE21: MainwindowofIDServe
3. Enter die IP address 01־URL address in E n t e r o r C o p y /p a ste a n In te rn a l
s e r v e r U R L o r IP a d d r e s s h e re :
r© ID Serve
Entei or copy I paste an Internet serve* URL or IP adtfress here (example www microsoft com)
the URLor IP as a
command-lineparameter Server query processing
(%
FIGURE22 EnteringdieURLforquery
4. Click Query The Server; it shows server query processed information
ID Serve , ־m x ׳
Enter or copy / paste an Internet seivef URL or IP address here (example www m»c10s0ft com)
<T |www.certifiedhacker.com|
Q IDServecanalso
connect withnon-web Query The Server
W h e n an Internet URL 0* IP has been piovided above,
servers toreceiveand r2 [ press this button to initiate a queiy of the speafied server
FIGURE23: Serverprocessedinformation
L a b A n a ly s is
Document all die IP addresses, dieir running applications, and die protocols you
discovered during die lab.
Q u e s t io n s
C E H Lab M anual Page 98 Eth ica l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
F in g e rp r in tin g O p e n P o r ts U s in g t h e
A m ap Tool
.- b n a p d e te rm in e s a p p lic a tio n s ru n n in g o n e a c h o p e n p o r t.
I CON KEY L a b S c e n a r io
2 ^
Valuable Computers communicate with each other by knowing die IP address in use and
information
ports check which program to use when data is received. A complete data transfer
Test vour always contains the IP address plus the port number required. 111 the previous lab
knowledge we found out that die server connection is using a Standard HTTP port 80. If an
g Web exercise attacker finds diis information, he or she will be able to use die open ports for
attacking die machine.
Q Workbook review
111 this lab, you will learn to use the Amap tool to perform port scanning and know
exacdy what a p p lic a t io n s are running on each port found open.
L a b O b j e c t iv e s
C 5 T o o ls The objective of diis lab is to help students learn to fingerprint open ports and
d e m o n stra te d in discover applications 11 inning on diese open ports.
t h is la b a r e
a v a ila b le in
hi diis lab, you will learn to:
D:\CEH- ■ Identify die application protocols running on open ports 80
T o o ls\ C E H v 8
M o du le 0 3 ■ Detect application protocols
S c a n n in g
N e tw o rk s L a b E n v ir o n m e n t
■ You can also download the latest version of A M A P from the link
http: / / www.thc.org dic-amap.
■ If you decide to download the la t e s t v e r s io n , then screenshots shown
in the lab might differ
L a b D u r a t io n
Time: 5 Minutes
O v e r v ie w o f F in g e r p r in t in g
Fingerprinting is used to discover die applications running on each open port found
0 x1 die network. Fin g erp rin tin g is achieved by sending trig g e r p a c k e t s and looking
up die responses in a list of response strings.
Lab T asks
at T A S K 1
Id en tify
1. Open die command prompt and navigate to die Amap directory. 111 diis lab
A p p lic a tio n
die Amap directory is located at D :\C E H -T o o ls\C E H v 8 M od ule 0 3 S c a n n in g
N e tw o rk s\ B a n n e r G ra b b in g T o o ls\A M A P
P ro to c o ls R u n n in g
on P o rt 8 0 2. Type a m a p w w w .c e r t if ie d h a c k e r .c o m 8 0 , and press E n te r.
33 Administrator: Command Prompt
[D :\ C E H ~ T o o ls \C E H u 8 M o d u le 03 S c a n n i n g N e t w o r k \ B a n n e r G r a b b i n g T o o l s \A M A P > a n a p uw
[u . c e r t i f i o d h a c h e r . c o m 80
Anap 0 5 . 2 <w w w . t h e . o r g / t h c - a n a p ) s t a r t e d a t 2 0 1 2 - 0 8 - 2 8 1 2 : 2 0 : 4 2 - MAPPING modo
C E H Lab M anual Page 100 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
ד
D :\ C E H -T o o ls \C E H u 8 Module 03 S c a n n i n g N e t w o r k \ B a n n e r G r a b b i n g Tools\AMAP>amap I f
. 0 . 0 . 4 75-81
laroap v 5 . 2 <w w w . t h c . o r g / t h c - a n a p ) s t a r t e d a t 2 0 1 2 - 0 8 - 2 8 1 2 : 2 7 : 5 1 - MAPPING mode
P r o t o c o l on 1 0 . 0 _ 0 . 4 : 8 0 / t c p n a t c h e s h t t p
P r o t o c o l on 1 0 . 0 _ 0 . 4 : 8 0 / t c p n a t c h e s h t t p - a p a c h e - 2
W arn in g : C ould n o t c o n n e c t < u n r e a c h a b le > t o 1 0 . 0 . 0 . 4 : 7 6 / t c p , d i s a b l i n g p o r t <EUN
Compiles on all UNIX KN>
basedplatforms - even W a rn in g : C ould n o t c o n n e c t < u n r e a c h a b l e ) t o 1 0 .0 .0 .4 :7 5 /tc p , d isab lin g p o r t <EUN
MacOSX, Cygwinon KH>
W arn in g : Could n o t c o n n e c t < u n r e a c h a b l e > to 1 0 .0 .0 .4 :7 7 /tc p , d isab lin g p o r t <EUN
Windows, ARM-Linuxand KH>
W arning: Could n o t c o n n e c t ( u n r e a c h a b l e ) to 1 0 . 0 . 0 . 4 : 7 8 / t c p , d i s a b l i n g p o r t <EUN
PalmOS KN>
W a rn in g : C ould n o t c o n n e c t < u n r e a c h a b l e > t o 1 0 .0 .0 .4 :7 9 /tc p , d isab lin g p o r t <EUN
|KN>
W arn in g : C ould n o t c o n n e c t < u n r e a c h a b l e > t o 1 0 . 0 . 0 . 4 : 8 1 / t c p , d i s a b l i n g p o r t <EUN
KN>
P r o t o c o l on 1 0 . 0 _ 0 . 4 : 8 0 / t c p n a t c h e s h t t p - i i s
P r o t o c o l on 1 0 . 0 _ 0 . 4 : 8 0 / t c p n a t c h e s webmin
U n id e n tified p o rts : 1 0 .0 .0 .4 :7 5 /tc p 1 0 .0 .0 .4 :7 6 /tc p 1 0 .0 .0 .4 :7 7 /tc p 1 0 .0 .0 .4 :7 8 /
kcp 1 0 .0 .0 .4 :7 9 / t c p 1 0 .0 .0 .4 :8 1 /tc p < to t a l 6>.
Linap v 5 . 2 f i n i s h e d a t 2 0 1 2 - 0 8 - 2 8 1 2 : 2 7 : 5 4
b : \ C E H - T o o l s \ C E H v 8 Module 03 S c a n n i n g N e tw o r k N B a n n e r G r a b b i n g Tools\AMAP>
FIGURE3.2:AmapwithIPaddressandwithrangeofswitches73-81
L a b A n a ly s is
Document all die IP addresses, open ports and dieir running applications, and die
protocols you discovered during die lab.
Tool/U tility Information Collected/Objectives Achieved
Identified open port: 80
WebServers:
■ 11ttp-apache2 ־
■ http-iis
■ webmin
Amap Unidentified ports:
■ 10.0.0.4:75/tcp
■ 10.0.0.4:76/tcp
■ 10.0.0.4:77/tcp
■ 10.0.0.4:78/tcp
■ 10.0.0.4:79/tcp
■ 10.0.0.4:81/tcp
C E H Lab M anual Page 101 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P L E A S E T A LK TO YO UR IN S T R U C T O R IF YOU H A V E Q U ES T IO N S
R E L A T E D TO TH IS LAB.
Q u e s t io n s
1. Execute the Amap command for a host name with a port number other
than 80.
2. Analyze how die Amap utility gets die applications running on different
machines.
3. Use various Amap options and analyze die results.
C E H Lab M anual Page 102 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
M o n ito r in g T C P /IP C o n n e c t i o n s
U s in g t h e C u r r P o r ts T o o l
C u n P o r ts is n e tw o rk m o n ito rin g s o fh ia re th a t d is p la y s th e lis t o f a ll c u r re n tly
o p e n e d T C P / IP a n d U D P p o r ts o n y o u r lo c a l c o m p u te r.
I CON K E Y L a b S c e n a r io
Valuable 111 the previous lab you learned how to check for open ports using the Amap
information
tool. As an e t h ic a l h a c k e r and p e n e t r a t io n t e s t e r , you must be able to block
Test your such attacks by using appropriate firewalls or disable unnecessary services
knowledge running 011 the computer.
w Web exercise You already know that the Internet uses a software protocol named T C P / IP to
m Workbook review format and transfer data. A11 attacker can monitor ongoing TCP connections
and can have all the information in the IP and TCP headers and to the packet
payloads with which he or she can hijack the connection. As the attacker has all
die information 011 the network, he or she can create false packets in the TCP
connection.
As a n etw o rk a d m in is tra to r., your daily task is to check the T C P / IP
c o n n e c t io n s of each server you manage. You have to m o n ito r all TCP and
UDP ports and list all the e s t a b lis h e d IP a d d r e s s e s of the server using the
C u r r P o r t s tool.
C J T o o ls
L a b O b j e c t iv e s
d e m o n stra te d in
t h is la b a r e The objective of diis lab is to help students determine and list all the TCP/IP
a v a ila b le in and UDP ports of a local computer.
D:\CEH-
T o o ls\ C E H v 8 111 in this lab, you need to:
M o du le 0 3
■ Scan the system for currently opened T C P / IP and UDP ports
S c a n n in g
N e tw o rk s ■ Gather information 011 die p o r ts and p ro cesses that are opened
■ List all the IP a d d r e s s e s that are currendy established connections
■ Close unwanted TCP connections and kill the process that opened the
ports
C E H Lab M anual Page 103 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
AB Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
L a b E n v ir o n m e n t
■ You can also download the latest version of C u rrP o rts from the link
http: / / www.nirsoft.11e t/utils/cports.html
■ If you decide to download the la t e s t v e r s io n , then screenshots shown
in the lab might differ
■ A computer running W in d o w s S erv er 2012
a Youcandownload
CuuPorts tool from ■ Double-click c p o r t s .e x e to run this tool
http://www.nirsoft.net.
■ Administrator privileges to run die C u rrP o rts tool
L a b D u r a t io n
Time: 10 Minutes
O v e r v ie w M o n it o r in g T C P / IP
Lab T asks
The CurrPorts utility is a standalone executable and doesn’t require any installation
process or additional DLLs (Dynamic Link Library). Extract CurrPorts to die
desired location and double click c p o r t s .e x e to launch.
TASK 1 1. Launch C u r r p o r t s . It a u t o m a t ic a lly d is p l a y s the process name, ports,
IP and remote addresses, and their states.
D is c o v e r T C P /IP
C urrP orts r ־1 ״1 * י
C o n n e c tio n
File Edit View Option* Help
xSD®v^!taer4*a-*
Process Na.. Proces... Protocol L ocal... Loc- Local Address Rem... Rem... R e rc te Address Remote Host Nam
( T enrome.ere 2 m TCP 4119 10.0.0.7 80 h ttp 173.194.36.26 bcm04501 -in ־f26.1
f <+1 rome.ere 2988 TCP 4120 10.0.0.7 80 h ttp 173.194.3626 bcmOisOl -in-f26.1
chrome.ere 2988 TCP 4121 10.0.0.7 80 h ttp 173.194.3626 bom04501־in ־f26.1
f chrome.exe 2 m TCP 4123 10.0.0.7 80 h ttp 215720420 a23-57-204-20.dep
CT chrome.exe 2 m TCP 414S 10.0.0.7 443 https 173.194 3626 bom04501 -in-f26.1
^ f i r t f c x ere 1368 TCP 3981 127.0.0.1 3982 12700.1 WIN-D59MR5HL9F
£ fir « fc x « x • 1368 TCP 3982 127.0.0.1 3981 12700.1 WIN-D39MR5HL9E
(£ fir« fc x «(« 1368 TCP 4013 10.0.0.7 443 https 173.1943622 bom01t01-in-f22.1
fircfcx.cxc 1368 TCP 4163 100.0.7 443 h ttp j 173.194.36.15 bom04!01 in ־f15.1
f 1rcfcxc.cc 1368 TCP 4166 100.0.7 443 h ttp j 173.194.360 bcm04501 -in-f0.1«
firef cx c<c 1368 TCP 4168 100.0.7 443 h ttp ; 74.125234.15 gra03s05in-f15.1e
\s , httpd.exe 1000 TCP 1070 aaao 0.0.0.0
\th ttp d .e x e 1800 TCP 1070 =
Q lsass.occ 564 TCP 1028 0.0.0.0 0.0.0.0
3 l» 5 5 a e 564 TCP 1028 =
____ »_____
<1 ■11 >
T
79 ~ctal Ports. 21 Remote Connections. 1Selected NirSoft Freeware. ht1p;/AnrA«v.rirsoft.net
C E H Lab M anual Page 104 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Process KJa1^ I Show Tooltips Address Rem.. Remote Address Remote Host Nam *
chrome. Mark Odd/Even Rows ).7 http 173.1943526 bcmQ4s0l-in־f26.1
C* chromel HTML Report ־All I'errs
).7 http 173.194.3526 bcm04s0l-in-f26.1
^ chrome. ).7 http 173.194.3526 bcm04s01 -in-f26.1
HTML Report - Selected terns
C* chrome. ).7 http 23.5720420 a23-57-204-20.dep S
^ chromc. Choose Columns ).7 443 https 173.194.3526 bom04501-in־f26.1
(£ firc fc x .c A uto Size Columns .0.1 3962 127.0.0.1 WIN-D39MR5HL9E
g f-e fc x e R״fr#{h .0.1 3981 127.0.0.1 WIN-D39MR5HL9E
F5
(p firc fo x .e 1(c קז7ס 1l i --- TV.V,0.7 443 https 173.1943622 bem04s01-in-f22.1
(B fa e fc x u e 1368 TCP 4163 10.0.0.7 443 https 173.19436.15 bom04i01־in*f15.1
J ftfM c o ta e I368 TCP 4156 10.0.0.7 443 https 173.19436.0 bcm04s0l*in-f0.1<
® fr e fc x e te 1368 TCP 4158 100.0.7 443 https 741252*4.15 gruC3s05-1n־M5.1e
\h t t o d . e x e 1800 TCP 1070 o.ao.o 0.0.0.0
י
T C P /U D P P o r ts L is t
Countryfile. Youhaveto chxame rx c 2988 TCP 4052 10 0 0 7 443 https 173 194 36 4 bo
put the IpToCountry.csv״
fileinthe samefolder as chiome.exc 2988 TCP 4059 10.0.0.7 80 http 173.194.36.17 bo
FIGURE4.3:HieWebbrowserdisplayingCurrPortsReport- AllItems
5. To save the generated CurrPorts report from die web browser, click
F ile >־S a v e P a g e A s ...C t r l+ S .
C E H Lab M anual Page 105 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
chrome exe 2988 TCP 4073 100 0 7 80 http 173 194 36 15 boi
2Zy"Bydefault, the logfile chrome exe 2988 TCP 408; 100 0 7 80 http 173 194 36 31 bo!
is savedas cports.loginthe ch*omc exe 2988 TCP 4090 100 0 7 80 http 173 194 36 4 boi
same folder where
cports.exeis located. You chiome.exe 2988 TCP 4103 10.0.0.7 80 http 173.194.36.25 boj
canchangethe default log daom e.exe 2988 TCP 4104 10.0.0.7 80 http 173.194.36.25 b03
filenamebysettingthe
LogFilenameentryinthe
cports.cfgfile. FIGURE4.4: TheWebbrowsertoSaveCurrPortsReport- AllItems
6. To view only die selected report as HTML page, select reports and click
V ie w >־H T M L R e p o r t s ־S e l e c t e d Ite m s .
Process Na P I Show Tooltips Address Rem... Rem... Remote Address Remote Host Nam
^ Be aware! The logfile C chrome. Mark Odd/Even Rows ).7 80 h ttp 175.19436.26 bom04s01-1n־f26.1
isupdatedonlywhenyou HTML Report - All Items ).7 80 h ttp 173.1943626 bom04s01-1n-f26.1
refreshtheports list C c h ro m e f
HTML Report ■ Selected terns F
80 h ttp 173.1943626 bcm04s01-in־f26.1f
manually, orwhenthe O'chrome “ ■0.7 80 h ttp 215720420 323-57-204-20.dep
turnedon. ® ,fir e fc x e Auto Size Columns Ctrl ♦■Plus .0.1 3982 127.0.0.1 WIN-D39MR5HL9E
(gfircfcxe: .0.1 3981 127JX011 WIN-D39MR5HL9E
Refresh F5
fircfcx e<v J>.7 443 https 173.1943622 bom04s01 -in-f22.1
L f ircfox.cxc 1368 TCP 4163 1000.7 443 h ttp ; 173.194.36.15 bomOlsOl -in ־f1 5.1
fircfcx.cxc 1368 TCP 4166 1000.7 443 h ttp : 173.194360 bomOlsOI -in ־f0.1c
^ firc fc x .c x c 1368 TCP -4168 100.0.7 443 https 74125234.15 gruC3s05 in -f 15.1c
httpd.exe 1000 TCP 1070 0.0.0.0 0.0.0.0
httpd.exe 1000 TCP 1070 s
Q lsa sse xe 564 TCP 1028 00.0.0 0.0.0.0
Q b a s te x e 564 TCP 1028
« -------a .-------- 14nn T rn י«׳*־ו־ ___ AAA A AAAA
79 ~ctel Ports. 21 Remote Connections, 3 Selected Hi1 Soft Freew are. http.׳,׳,w w w .r irsoft.net
FIGURE4.5:CurrPortswithHTMLReport- SelectedItems
a Youcanalsoright-
clickonthe Webpageand 7. Tlie selected re p o rt automatically opens using the d e fa u lt b r o w s e r .
savethe report.
C E H Lab M anual Page 106 E th ic a l H ackin g and Counterm easures Copyright O by EC-Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Open Fie...
an*N
Ctrl»0
1r/Desktop/cpo»ts x6Crepwthtml fi *
S*.« P a g e A ;. Ctrl-S
Sir'd link-
Page :er.p.
Pnnt Preview
P rm L .
fic it Offline
Local Local
Po rt
T o ral Rem ote
Kcm ole
Po rt
Remote Rem ote Ilo t l .N io it
Name ID Pori Nam e Address Port Nam e
Address
chtoxne.exe 2988 TCP 4148 1 0 0 0 .7 443 https 1 73 .19 43 6 26 boxu04s01 -ui-1‘26. Ie l0 0 .n e t Established C
fiiefox-cxc 1368 TCP 4163 100.0.7 443 https 173.19436 15 bom04s01-1a-115.lel00.net Established C
שCommand-line option:
/stext <F11ename>means FIGURE4.7:TheWebbrcnvsertoSawQirrPortswithHTMLReport- SelectedItems
savethelist of all opened
TCP/UDPports into a 9. To view the p r o p e r t ie s of a port, select die port and click F ile >־
regular text file.
P r o p e r tie s .
C E H Lab M anual Page 107 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
I P N ctlnfo C trM
Close Selected TCP Connections Ctri+T Local Address Rem... Rem.. Remote Address Remote Host Nam י׳1
Kill Processes Of Selected Ports 10.0.0.7 80 http 173.194.3626 bom04301 - in-f26.1
FIGURE4.8:CunPoitstoviewproperties foraselectedport
10. The P r o p e r t ie s window appears and displays all the properties for the
selected port.
11. Click O K to close die P r o p e r t ie s window
Properties *
Process Name: firefox.exe
Process ID: 1368
Protocol: TCP
Local Port: 4166
Local Port Name:
Local Address: 10.0.0.7
Remote Port: 443
Remote Port Name: |https________________
Command-line option: Remote Address: 1173.194.36.0
/shtml <Filename>means
savethelist of all opened Remote Host Name: bom04s01-in-f0.1e100.net
TCP/UDP ports into an State: Established
HTMLfile(Horizontal).
Process Path: C:\Program Files (x86)\M0zilla Firefox\firefox.exe
Product Name: Firefox
File Description: Firefox
File Version: 14.0.1
Company: Mozilla Corporation
Process Created On: 8/25/2012 2:36:28 PM
User Name: WIN-D39MR5HL9E4\Administrator
Process Services:
Process Attributes:
Added On: 8/25/2012 3:32:58 PM
Module Filename:
Remote IP Country:
Window Title:
OK
FIGURE4.9:TheCurrPortsPropertieswindowfortheselectedport
C E H Lab M anual Page 108 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
12. To close a TCP connection you think is suspicious, select the process
and click F ile >־C lo s e S e l e c t e d T C P C o n n e c t io n s (or C trl+ T ).
S T A S K 2
C urrPorts -_,»r ד
C lo s e T C P
C o n n e c tio n IPNetlnfo Ctrt+1
Close Selected TCP Connections C trl-T Local Address Rem... Rem... Remote Address Remote Host Nam י ׳I
Kill Processes OfSelected Ports 10.0.0.7 60 http 173.19436.26 bom04s01-in־f26.1
7? Tot«! Porte, 21 Remote Connection! 1 Selected IlirSort fre e w a re . r-tto :׳v/Yv*/n rso tt.n et
J
FIGURE4.10: ,HieCunPoitsCloseSelectedTCPConnectionsoptionwindow
13. To k ill the p ro ce sse s of a port, select die port and click F i le >־K ill
P r o c e s s e s o f S e l e c t e d P o r ts .
FIGURE4.11: TheCurrPortsKillProcessesofSelectedPortsOptionWindow
14. To e x it from the CurrPorts utility, click F ile >־E x it . The CurrPorts
window c l o s e s .
C E H Lab M anual Page 109 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P N etlnfo GH+I
Close Selected TCP Connections CtrK T .. Local Address Rem.. Rem״ Remcte Address Remcte Host Nam
K il Processes O f Selected Ports 10.0.0.7 80 http 173.194.36.26 bom04s01-in-f26.1
hid Command-line option: Save Selected Items Ctifc-S 10D.0.7 80 http 173.194.3626 bom04s01-in-f26.1
79 זctal Ports. 21 Remote Connections. 1 Selected Nil Soft free were. Mtpy/vvwvv.r it soft.net
L a b A n a ly s is
Document all die IP addresses, open ports and their running applications, and
protocols discovered during die lab.
feUIIn commandline, the
syntaxof /close Tool/U tility Information Collected/Objectives Achieved
command:/close <Local
Address> <Local Port> Profile Details: Network scan for open ports
<RemoteAddress>
<Remote Port* נ. Scanned Report:
■ Process Name
■ Process ID
■ Protocol
CurrPorts ■ Local Port
■ Local Address
■ Remote Port
■ Remote Port Name
■ Remote Address
■ Remote Host Name
C E H Lab M anual Page 110 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P L E A S E T A L K TO YO UR IN S T R U C T O R IF YOU H A V E Q U ES T IO N S
R E L A T E D TO TH IS LAB.
Q u e s t io n s
1. Analyze the results from CurrPorts by creating a filter string that displays
Q CurrPorts allows you
toeasilytranslate all menus, only packets with remote TCP poit 80 and UDP port 53 and running it.
dialogboxes, and strings to
other languages. Analyze and evaluate die output results by creating a filter that displays only
die opened ports in die Firefox browser.
כ. Determine the use of each of die following options diat are available under
die options menu of CurrPorts:
a. Display Established
b. Mark Ports Of Unidentified Applications
c. Display Items Widiout Remote Address
d. Display Items With Unknown State
C E H Lab M anual Page 111 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
Lab
S c a n n in g f o r N e tw o rk
V u ln e r a b ilitie s U s in g t h e G F I
L a n G u a rd 2 0 1 2
G F I L A N g w r d s c a n s n e tw o rk s a n d p o r ts to d e te c t, a s s e s s , a n d c o rre c t a n y s e c u rity
v u ln e r a b ilitie s th a t a re fo u n d .
I CON K E Y L a b S c e n a r io
Valuable You have learned in die previous lab to monitor T C P IP and U D P ports 011 your
information
local computer or network using C u rrP o rts. This tool will automatically mark widi a
✓ Test your pink color suspicious TCP/UDP ports owned by u n id e n tifie d applications. To
knowledge prevent attacks pertaining to TCP/IP; you can select one or more items, and dien
Web exercise close die selected connections.
Q Workbook review Your company’s w e b s e r v e r is hosted by a large ISP and is well protected behind a
firewall. Your company needs to audit the defenses used by die ISP. After starting a
scan, a serious vulnerability was identified but not immediately corrected by the ISP.
All evil attacker uses diis vulnerability and places a b a c k d o o r on th e s e rv e r. Using
die backdoor, the attacker gets complete access to die server and is able to
manipulate the information 011 the server. The attacker also uses the server to
le a p fro g and attack odier servers 011 the ISP network from diis compromised one.
Z U T o o ls
d e m o n stra te d in
As a s e c u r it y a d m in is tra to r and p e n e tra tio n t e s t e r for your company, you need to
t h is la b a r e conduct penetration testing in order to determine die list of t h r e a t s and
a v a ila b le in v u ln e r a b ilitie s to the network infrastructure you manage. 111 diis lab, you will be
D:\CEH- using G F I L a n G u a rd 2 0 1 2 to scan your network to look for vulnerabilities.
T o o ls\ C E H v 8
M o du le 0 3 L a b O b j e c t iv e s
S c a n n in g
N e tw o rk s
The objective of diis lab is to help students conduct vulnerability scanning, patch
management, and network auditing.
111 diis lab, you need to:
■ Perform a vulnerability scan
C E H Lab M anual Page 112 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Time: 10 Minutes
O v e r v ie w o f S c a n n in g N e t w o r k
C E H Lab M anual Page 113 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
AB Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
Lab T asks
Follow die wizard-driven installation steps to install die GFI LANguard network
scanner on die host machine windows 2012 server.
1. Navigate to W in d o w s S e r v e r 2 0 1 2 and launch the S t a r t menu by
B TASK 1 hovering the mouse cursor in the lower-left corner of the desktop
S c a n n in g for
V u ln e r a b ilitie s
Zenmap fileinstalls
the followingfiles: FIGURE5.1:WindowsServer2012- Desktopview
■ NmapCore Files
2. Click the G F I L an G u ard 2 0 1 2 app to open the G FI L an G u ard 2 0 1 2
■ NmapPath window
■ WinPcap 4.1.1
■ NetworkInterface
Import
■ Zenmap (GUI frontend) Marager
Windows Google
■ Neat (ModernNetcat) bm r ♦ *
■ Ndiff Nnd
e FT־
£ SI
2)12
FIGURE5.2WindowsServer2012- Apps
3. The GFI LanGuard 2012 m ain w in d o w appears and displays die N e tw o rk
A u d it tab contents.
/ / To executeascan
successfully, GFI
LANguardmust remotely
logonto target computers
withadministrator
privileges.
C E H Lab M anual Page 114 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
■ Full scan Cunent Vulnerability Level is: High % Enable agents to automate netooric secant? audit and totfstribute scanning load
across client machines
■ Launcha customscan
L a u n c h a S can
■ Set up aschedule scan Manually set-up andtnuser an aoerSess neVrxt seajrit/ audrt.
-I
LATES1 NLWS
1־
V# ?4-A*j-7017 -Patch MmuxirTimri -N n pi txkul a fy n le d ID I -XI }u n jp \fe»g 1! Ttft ■mu lar ־l w mr»־
1 ( 74 A q 701? Patch Mfwtgnnnnl Added DCport for APS81? IS. Mohr. Arrvhm !) 5 2 Pro nnd Standivd tr.vi•n-
V*, 24-AJO-2012 -Patch M4uu«m< -Aiktod kuxkI 101APS812-1S. Mobm A uob* 10.1.4 Pro mtd St—a-0 - -M j ut
FIGURE5.3:TheGFILANguardmamwindow
m Customscans are
4. Click die L a u n c h a Scan option to perform a network scan.
recommended: GFI LanGuard 2012
> I « ־I Doshboerd Scan Remediate AdMty Monitor Reports Configuration Ut*oes «t Di»e1«s thb version
■ Whenperforminga
onetime scanwith W elcome to GFI LanG uard 2012
particular scanning 1
GFI LanGuard 2012 &ready to audit your network k* *AmafrMws
parameters/profiles
■ Whenperformingascan Local Computer Vulnerublllty Level
for particular network use ־van a;# Agents־or Launch a scan ־options 10 auoa
V ie w D a s h b o a rd
Cunent Vulnerability Luvul is; High % Enable agents to automate neteror* secant* aud* and totfstnbute scanning load
across client machines
L a u n c h a Scan
Manually *<rt-up andtnwer anagerttest network»taint/ autirl
^ If intrusiondetection
software (IDS) is running
duringscans, GFI FIGURE5.4:TheGFILANguardmainwindowindicatingtheLaunchaCustomScanoption
LANguard sets off a
multitude of IDSwarnings 5. Launch a N ew sca n window will appear
andintrusionalerts inthese
applications. i. 111 die Scan Target option, select lo c a lh o s t from die drop-down list
ii. 111 die Profile option, select F u ll Scan from die drop-down list
iii. 111 die Credentials option, select c u rre n tly lo g g ed on u s e r from die
drop-down list
6. Click S c a n .
C E H Lab M anual Page 115 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Scar־a02׳t: P10•*:
b a te : v M jf-J S^n v *
Ot0en:־fc- ?axrrard:
k»/T«rt(r ockcCon uso־ V IIZ * 1 1 ״
Scar Qaccre...
Son ■ n d ti Ovrrvlew SOM R ru lti Dcta ll<
m For largenetwork
environments, aMicrosoft
SQLServer/MSDE
database backendis
recommendedinsteadof
theMicrosoft Access
database.
FIGURE5.5: Selectinganoptionfornetworkscanning
7. Scanning will s ta rt; it will take some time to scan die network. See die
following figure
m Quickscans have
relativelyshort scan
durationtimes comparedto
full scans, mainlybecause
quickscans perform
vulnerabilitychecks of only
asubset of the entire
database. It is
recommendedto runa
quickscanat least once a
week.
8. After completing die scan, die s c a n re s u lt will show in die left panel
C E H Lab M anual Page 116 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
& yI
ta u K k a lm k in
I Dashboaid Scan Remcdute Actwty Monitor Reports Configuration Lttrfrtm
ScanTarget Kate:
ccaftoct V ... | FalSar H
jsandffc: Eaaswofd:
Cj-rr&tbcaed on iser V II
Scan R r u ik i ovrrvm n Scan R r a k i Details
V u ln e ra b ility le v e l:
m Types of scans: The average vulnerabilty le.ei lor ttus sea־nr s 1
Scana singlecomputer:
Select this optionto Results statistics:
scanalocal host or one Audit operations processed; 1>703 aw*! operations processed
of computers defined W fa :ili« !* W VJUH> ra W J t« !a i K t - n •can n » 11 ״t41:ate 101 r r s q v wunr is*lvatd or not found
i
throughanIPrange. ----------12- 1
Scanalist of computers:
Select this optionto FIGURE5.7:TheGFILanGuardCustomscanwizard
import alist of targets
fromafileor to select 9. To check die Scan Result Overview, click IP ad d ress of die machiiiein die
targets fromanetwork
list. right panel
Scancomputers intest 10. It shows die V u ln e ra b ility A s s e s s m e n t an d N e tw o rk & S o ftw a re A udit:
file: Select this optionto
scantargets enumerated click V u ln e ra b ility A s s e s s m e n t
inaspecific text file.
GFI LanGuard 2012
Scanadomain or E- J |^ | Daihboard Sean R nrw U r AdMyMorilor Reports Configuration UtMws W, Dis c u m tvs vtssaan
1Results Details
# V a n t n r y t : lornlhost |
| - 1000 ר־V |WIW l)J9MIC>Mt9L4l (Window. J] j [ ׳W»UJ39MRSHL9f4| (Windows Server ?01? 164)
« , <1>rrafcj1ty W ^ n r r n t |
•־ n Net-war* & Softwire Audit
Vulnerability level:
T►•* corrvwar dues not have a Vuhe'aHty te.el •VII. * :
Po s s ib le reaso n s:
flteetlKMQL llirv^dl(klh•) u.
.״M •'■<V> IIc— tfiiSldriIftwwl
C E H Lab M anual Page 117 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
/ 7 Duringa full scan, L d > «־ Dashboard Scan Rernediate Activity Men!tor Reports Configuration UUkbes W, Di 8cub 8 •»a v«a«on._
updates <0 $ u a U r « « t : l1 ) u lm l
f S I S ItM J(m R-K M M U H U M ](W M tom . V u ln e ra b ility A sse ssm e n t
- • Yuhefablty Assessment s«tea ene of the folowno wjfcerabilry 01*99'** ייה»*ל
■ Systemsoftware A * *־יsecurity wirerablofa (3)
information, including J l MeCtomSearity Vuherabirtes (6)
*qn security Vumeratxaties (3) A
unauthori2ed j , low Searity Viinerablitfes (4J
4 PofanBd Vuherabltea (3)
10
Xbu you toanalyze the ־ ״security vjre tb i'.a
outdatedsignatures .
^
Low Security Vulnerabilities 14(
15
ycu to a ׳iy» thelc« 9eculty
FIGURE5.9:List ofVulnerabilityAssessmentcategories
12. Click N e tw o rk in die right panel, and then click S y s te m
& S o ftw a re A u d it
P a tc h in g S t a t u s , which shows all die system patching statuses
C r i L in O u a rd 2012 1- ״r ״1
to■ > •4 - 1 Dashboard Sran Re*»״Aate Activity Monitor Rrpoits Configuration JM M et <U) ' D iic in t llm vm*an
la u a d ia New Sean
amount ofinformation t ServicePnrinmi1t3datr Roittn (1) )Mk Missing Security Updates (,J
'0
I \״ftoary.a^ftraarcruOtI
f •1su1sSeu1UyUl>0at«*(3) Alotwt Mu U nWy.'t u!« mistfio mcuICv update I
■ - Jb j
retnevedfromscanned m Missing Non-Security Updates )16(
targets, full scans often S % Ports
Alan* you to analyie the rwn-security ipaaws rfamssen
FIGURE5.10: Systempatchingstatusreport
13. Click P o rts, and under diis, click O p en T C P P o rts
C E H Lab M anual Page 118 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
m Acustomscanis a
& •> l«- I Scan Rancdijlr £*!1vty Monitor Reports Corrfigura
1- 1■■
CJ, Uiscuu tins1
■ Typeof scanningprofile X Law Seeunty VUnerabttiei (4} s ^ t-.H |Deunpecr: LSASS, If Iha » m « is not ratafc* be-*ae m3
ratfc ;<■» o w : Ctotafipy Network x, Oath a owers / Ser
^ POCWlOai Viiic'attittet (3) - 9 ::- 2 |C«SObacn: Me Protect. MSrtQ, t ״te 1V. M>)eic ־-» -י- » * c ro( IrsUltod D*m«r* could ttt trojan: BLA trojan . Se 4׳
(Le., the typeof checks # Moang Service Pocks 0״d tp d str lo tto s CO « £ l2^l|t«croor:N fss1i5Jcar1ty5canr*rr/servct:1r*n0M ^
srtscnServer /S«>־ic*: LTknown]
to execute/type ofdata B
# MsangSecuity Updates (3)
*•ernoHc 81Software Audit
9 ^ 1433 [CesccCcr: Microsoft SQL Server database r a ־a j r w :
a — er ActKRy YVlndvw
*' f..<»t»*׳ceve ׳y v a n thread 1 (tdlr) S o ״nr rad ) יdp ( | 5 0 ־r *׳. vl ! ;<*) error•
FIGURE5.11:TCP/UDPPortsresult
14. Click S y s t e m In fo rm atio n in die light side panel; it shows all die details of
die system information
15. Click P a s s w o r d P o lic y
GH LanGuard 2012 r־־° n n
E B > 1 4 -1 Dathboaid Scan fn m ijlr Act*«y Monitor Reports Corriiguratioo Ualiwt W. 1)1*1 lew •«« vnun
launch a Mewsean
ScarTarget P0. «־t:
ocaKx: v |... I (׳SjIScan
3 •
&ederate: ?aaiwd:
Z~M~CTt, bcced on toe־ V 1U1J 1__
Scaf 0 0 ^כפ.-.
Scan R rta tf Overview Scan le a k ! Detalie
% open IX P Ports (5) J *!־*׳run poaaw d length: chars 0
Sf A r1ard*«e J Vaxnuri EMSSiwrd age: 42days
*50 ־ ׳1־fr»ane J **״!־unoaa'w ordsgeiodays
| Systsn Infer׳TMharj J ! f a s « p f f r m ׳force
a 9ki\׳. W J >Mgw rfl mtary: n o h ttay
0
,
|l HW.\fxC. !■■>>•>1
securityscan.
״ ׳ ••־I I >«- ׳V 1״n thn-rtd I (Klfc•) ScantheflUC*) i f<* 41'׳' ! ־ ’A) I '"׳י י
FIGURE5.12InformationofPasswordPohcy
16. Click G ro u p s: it shows all die groups present in die system
C E H Lab M anual Page 119 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
׳-T o -
m Ahighvulnerability
level is the result of
* >־ Dashboard Sun ftftnca&e
GFI LanGuard 2012
ActmrtyMonitor Reports Configuration U19CUB3UlttVWttKJR— ר
vulnerabilities or missing vl W **Scan
patches whose average CrM e re s t -igemane: Password:
H
high. ■cc':era
specificdate/time and at a
specific frequency.
Scheduledscans canbe set
toexecuteonce or W w rt* ״- . S*rf« 1 l1f1 .nl 1 (tdl• | )׳Scan tfve*0 ? frt*) *r«*d S * fe ) | & u « |
periodically.
FIGURE5.13:InformationofGroups
17. Click die D a sh b o a rd tab: it shows all the scanned network information
GFI LanGuard 2012 1 °n ^ ׳
> «- I Dashboardl Sun Km•*•(• Activity Monitor Reports Configuration UUkbe; זי/. ־OitcuMlna vwawn.-
5 ״I q Gmp
!t f#
Cemctm
\'i\
•w«v
^
1ViAirrnhlfces
4
* t
Pale►**
V
►aH
*J
fei
SdNiare
v (
it 6mel1n*ork E n tire N e tw o rk -1 c o m p u te r
f j UKJ»-c«t: ttlh-03»Ma.5rt.4£-»
Security Seniors
^' ־ucj1!)<»w>:y10«j<1iR<x1>
wnwarn iwuw•
m It is recommended to 1 o
use scheduled scans: rS \ 0 c«XT|־H1tcrs
Lratra-onied Aco*c
0 coneuteis
profiles andparameters
• To tngger scans
automaticallyafter office
hours andto generate
alerts andauto- w Computer V14>erabfeyCBtnbulivi : o ־fu t M By Gperatng System
distributionof scan
o
Maraqe saerts
resultsviaemail *41 •»?i ■ .KTJlii...
ZjHar-scan...
Sc-=r a d rsfrar. !TfaraaLgi p.gyy
L a b A n a ly s is
Dociunent all die results, direats, and vulnerabilities discovered during die scanning
and auditing process.
C E H Lab M anual Page 120 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P L E A S E T A L K TO YO U R IN S T R U C T O R IF YOU H A V E Q U ES T IO N S
R E L A T E D TO TH IS LAB.
Q u e s t io n s
C E H Lab M anual Page 121 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
E x p lo rin g a n d A u d itin g a N e tw o r k
U s in g N m a p
N /n a p (Z e n m a p is th e o ffic ia l A ',m a p G U I) is a f ir e , o p e n s o u rc e (lic e n s e ) u t ilit y f o r
I C O N K E Y L a b S c e n a r io
Valuable 111 die previous lab you learned to use GFI LanGuard 2012 to scan a network to
information
find out die vulnerability level, system patching status, details for open and closed
Test vour ports, vulnerable computers, etc. A11 administrator and an attacker can use die same
knowledge
tools to fix or exploit a system. If an attacker gets to know all die information about
S Web exercise vulnerable computers, diey will immediately act to compromise diose systems using
reconnaissance techniques.
ט Workbook review
Therefore, as an administrator it is very important for you to patch diose systems
after you have determined all die vulnerabilities in a network, before the attacker
audits die network to gain vulnerable information.
Also, as an e t h ic a l h a c k e r and n e tw o rk a d m in is tra to r for your company, your job
is to carry out daily security tasks, such as n e tw o rk in v e n to ry , service upgrade
s c h e d u le s , and the m o n ito rin g of host or service uptime. So, you will be guided in
diis lab to use Nmap to explore and audit a network.
L a b O b j e c t iv e s
Hie objective of diis lab is to help students learn and understand how to perform a
network inventory, manage services and upgrades, schedule network tasks, and
monitor host 01 service uptime and downtime.
hi diis lab, you need to:
■ Scan TCP and UDP ports
■ Analyze host details and dieir topology
■ Determine the types of packet filters
C E H Lab M anual Page 122 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
L a b D u r a t io n
Time: 20 Minutes
O v e r v ie w o f N e t w o r k S c a n n in g
T AS K 1 Lab T asks
In te n s e S c a n Follow the wizard-driven installation steps and install Nmap (Zenmap) scanner
in die host machine (W in d o w S e r v e r 2 0 1 2 ).
1. Launch the S t a r t menu by hovering die mouse cursor in the lower-left
corner of the desktop
FIGURE6.1:WindowsServer2012—Desktopview
C E H Lab M anual Page 123 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
S t 3 f t A d m in is tra to r
■ WinPcap4.1.1 o w
■ NetworkInterface Command
Prompt Frtfo*
Import e
*ח ©
■ Zenmap (GUI frontend)
Me^sPing HTTPort
■ Neat (ModernNetcat) iSW M
■ Ndiff CWto* K U
1
FIGURE6.2WindowsServer2012- Apps
3. The N m ap - Z e n m a p G U I window appears.
FIGURE6.3:TheZenmapmainwindcw
/ Inport scan
techniques, onlyone 4. Enter the virtual machine W in d o w s S e r v e r 2 0 0 8 IP a d d r e s s (10.0.0.4)
methodmaybeused at a t!1e j a r g e t: text field. You are performing a network inventory for
time, except that UDP scan r o J
(־sU) andanyone of the the virtual machine.
SCTPscantypes (־sY, -sZ)
maybe combinedwithany 5. 111 tliis lab, die IP address would be 1 0 .0 .0 .4 ; it will be different from
one ofthe TCP scantypes. your lab environment
6. 111 the text field, select, from the drop-down list, the
P r o file : ty p e o f
p ro file you want to scan. 111 diis lab, select In t e n s e S c a n .
C E H Lab M anual Page 124 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
H o s t! Services
icc> | Nm ap O utput Ports f Hosts | T o po lo gy | Host Details | Scans
WhileNmap attempts OS < Host
toproduce accurateresults,
keepinmindthat all ofits
insights are basedon
packets returned bythe
target machines or the
firewallsin front ofthem
׳׳ 10.0.0.4
S t o r t i n g Nmap C .O l ( h t t p : / / n m s p . o r g ) at 2012 0 8 24
NSE: Loaded 9 3 s c r i p t s f o r s c a n n in g .
MSE: S c r i p t P r e - s c a n n in g .
I n i t i a t i n g ARP P in g Scan a t 1 5 :3 5
S c a n n in g 1 0 . 0 . 0 . 4 [ 1 p o r t ]
C o m p le te d ARP P in e S can a t 1 5 : 3 5 , 0 . 1 7 s e la p s e d (1 t o t a l
h o s ts )
I n i t i a t i n g P a r a l l e l DNS r e s o l u t i o n o f 1 h o s t , a t 1 5 :3 5
C o m p le te d P a r a l l e l DNS r e s o l u t i o n o f 1 h o s t , a t 1 5 :3 5 ,
0 .5 0 s e la p s e d
I n i t i a t i n g SYN S t e a l t h S can a t 1 5 :3 5
S c a n n in g 1 0 . 0 . 0 . 4 [1 0 0 0 p o r t s ]
D is c o v e r e d o pe n p o r t 135! ׳t c p on 1 6 .0 .0 .4
D is c o v e r e d o pe n p o r t 1 3 9 / t c p on 1 0 .0 .0 .4
D is c o v e r e d o pe n p o r t 4451 ׳t c p on 1 6 .0 .0 .4
I n c r e a s in g se n d d e la y f o r 1 6 . 0 . 0 . 4 f r o « 0 t o צ d ee t o 72
o u t o f 179 d ro p p e d p ro b e s s in c e l a s t in c r e a s e .
D is c o v e r e d o pe n p o r t 4 9 1 5 2 / t c p o n 1 0 . 0 . 6 . 4
Nmap accepts D is c o v e r e d o p e n p o r t 4 9 1 5 4 / t c p o n 1 0 . 0 . 6 . 4
multiple host specifications D is c o v e r e d o pe n p o r t 4 9 1 5 3 / t c p o n 1 0 . 0 . 6 . 4
FIGURE6.5:TheZenmapmainwindowwiththeNmapOutputtabforIntenseScan
9. After the scan is c o m p le t e , Nmap shows die scanned results.
C E H Lab M anual Page 125 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Zenm ap T= I
Scan I o o ls £ ro file Help
D e v ic e t y p e : g e n e r a l p u rp o s e
M i c r o s o f t W indow s RPC
;0 7 :1 0 ( M ic r o s o f t ) ח
R u n n in g : M i c r o s o f t WindONS 7 | 2008
OS CPE: c p « : / o : ׳n ic r o s o f t : w in d o w s _ 7 c p e : /
o : » ic r o s o f t : w i n d o w s _ s e r v e r _ 2 0 0 8 : : s p l
0 לd e t a i l s : M i c r o s o f t W indow s 7 o r W indow s S e r v e r 2 00 8 SP1
U p tim e g u e s s : 0 .2 5 6 d a y s ( s i n c e F r i Aug ?4 0 9 : 2 7 : 4 0 2 0 1 2 )
N ttw o rK D is t a n c e ; 1 hop
TCP S c u u c tic e P r e d i c t i o n : D i f f i c u l t y - 2 6 3 (O o od l u c k ! )
Q The following I P I P S e q u e n ce G e n e r a tio n : I n c r e m e n t a l
options control host S e r v ic e I n f o : OS: W in d o w s; CPE: c p e : / o : n ic r o s c f t : w in d o w s
discovery:
Filter Hosts
■ -sL(list Scan)
■ -sn(Noport scan) FIGURE6.6:TheZenmapmainwindowwiththeNmapOutputtabforIntenseScan
■ -Pn (Noping) 10. Click the P o r ts / H o s ts tab to display more information on the scan
■ ■PS<port list> (TCP results.
SYNPing)
■ -PA<port list> (TCP 11. Nmap also displays die P o rt, P r o to c o l, S t a t e . S e r v ic e , and V e r s io n of
ACKPing) the scan.
■ -PU<port list> (UDP Zenmap T ־T
Ping) Scan I o o ls P ro file H elp
■ -PY<port list>(SCTP Target: 10.0.0.4 Scan Cancel
INTTPing)
C om m and: nm a p -T4 -A - v 10.0.0.4
■ -PE;-PP;-PM(ICMP
PingTypes) Services Nm gp Out p u ( Tu[ . ul ut j y Hu^t Details Sk m :.
FIGURE6.7:TheZenmapmainwindowwiththePorts/HoststabforIntenseScan
C E H Lab M anual Page 126 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
12. Click the T o p o lo g y tab to view Nmap’s topology for the provided IP
address in the In t e n s e s c a n Profile.
FIGURE6.8:TheZenmapmainwindowwithTopologytabfor IntenseScan
13. Click the H o s t D e t a ils tab to see die details of all hosts discovered
during the intense scan profile.
Zenmap r^ r°r* 1
Scan lo o ls P rofile Help
U p tim e :
Last b oo t:
22151
IPv6: N o t available
M AC: 00:15:50:00:07:10
- Operating System
Nam e: M ic ro s o ft W ind ow s 7 o r W indow s Server 2008 SP1
Accuracy:
Ports used
Filter Hosts
FIGURE6.9:TheZenmapmainwindowwithHostDetailstabforIntenseScan
C E H Lab M anual Page 127 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
14. Click the Scans tab to scan details for provided IP addresses.
Zenm ap 1- 1 ° ׳x
Scan Tools Profile Help
a InNmap, option-p
<port ranges> means scan FIGURE6.10:TheZenmapmainwindowwithScantabforIntenseScan
onlyspecifiedports. 15. Now, click the S e r v i c e s tab located in the right pane of the window.
This tab displays the li s t of services.
16. Click the h ttp service to list all the HTTP Hostnames/lP ad d re sse s.
Ports, and their s t a t e s (Open/Closed).
Zenmap י ־ז° ד * מ
Scan Tools Profile Help
msrpc
n etb io s5 5 ־n
Q InNmap, option-F
means fast (limitedport)
scan.
<L
FIGURE6.11:TheZenmapmainwindowwithServicesoptionforIntenseScan
C E H Lab M anual Page 128 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
17. Click the m srp c service to list all the Microsoft Windows RPC.
Zenmap ־ ז1 י םx ׳
Scan I o o ls P ro file H elp
FIGURE6.12TheZenmapmainwindowwithmsrpcServiceforIntenseScan
18. Click the n e t b io s - s s n service to list all NetBIOS hostnames.
Zenmap TTT
Scan I c o ls E ro file H e lp
FIGURE6.13:TheZenmapmainwindowwithnetbios-ssnServiceforIntenseScan
TASK 2 19. sends a T C P fra m e to a remote device with URG, ACK, RST,
X m as scan
SYN, and FIN flags set. FIN scans only with OS TCP/IP developed
X m as Scan
C E H Lab M anual Page 129 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
21. On the P r o file tab, enter Xm as Scan in the P r o file n a m e text field.
P ro file E d ito r
nm ap -T4 -A -v 10.0.0.4
Profile Scan | Ping | Scripting | Target | Source[ O thct | Tim ing Help
Description
P ro file In fo rm a tio n
The description is a fu ll description
Profile name XmasScanj 0♦ v»hac the scan does, w h ich m ay
be long.
D * « n ip t 10n
m The option-host-
timeout <time>givesup
on slowtarget hosts.
FIGURE6.15:TheZenmapProfileEditorwindowwiththeProfiletab
C E H Lab M anual Page 130 E th ic a l H ackin g and Counterm easures Copyright © by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
22. Click the S c a n tab, and select X m a s T r e e s c a n (־s X ) from the TCP
s c a n s : drop-down list.
UDPscanis activated P ro file E d ito r 1_T□ ' x
withthe -sUoption. It can
be combinedwithaTCP !m a p -T4 -A -v 10.0.0.4
scantype suchas SYNscan
(־sS) to checkboth Profile Scan | Ping | Scripting | Target) Source | O ther Tim ing
Help
׳FIN scan (s F )
ח Idle Scan (Zom bie) (-si) TCP SYN scan (-5S)
accordinglyto avoid
floodingthe networkwith FIGURE6.16:TheZenmapProfileEditorwindowwiththeScantab
useless packets that the
target machinedrops.
23. Select N o n e in die N o n -T C P s c a n s : drop-down list and A g g r e s s iv e (־
T 4 ) in the T im in g t e m p la t e : list and click S a v e C h a n g e s
Scar
Help
Profile Ping | Scripting [ Target Source | O ther | Tim ing
Enable all ad/anced/aggressive
Scan o p tio n * o ptio ns
FIGURE6.17:TheZenmapProfileEditorwindowwiththeScantab
24. Enter the IP address in die T a r g e t : field, select the X m as sca n opdon
from the P r o file : field and click S c a n .
C E H Lab M anual Page 131 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Zenm ap
C om m and: nm ap -sX -T 4 - A -v 1 0 0 .0 /
(SCTPINITscan) is often
referredto as half-open
scanning, becauseyoudonft
openafull SCTP
association. Yousendan
INITchunk, asifyouwere
goingto open areal
associationandthenwait
for aresponse.
Filter Hosts
FIGURE6.18:TheZenmapmainwindowwithTarget andProfileentered
25. Nmap scans the target IP address provided and displays results on the
N m a p O u tp u t tab.
£Q! When scanning
systems, compliant with Zenm ap izc
this RFCtext, anypacket Scan Tools P ro file H elp
not containingSYN, RST, v l Profile.
or ACKbits resultsin a T a rg e t 10.0.0.4 Xmas Scan |Scani|
* 10.0.0.4
S t a r t i n g Nmap 6 .0 1 ( h ttp ://n m a p .o r g ) a t 2 0 1 2 - 0 8 -2 4
N<F לlo a d e d 93 s c r ip t s f o r s c a n n in g .
NSE: S c r i p t P r e - s c a n n in g .
I n i t i a t i n g ARP P in g S can a t 1 6 :2 9
S c a n n in g 1 0 . 0 . 0 . 4 [ 1 p o r t ]
C o m p le te d ARP P in g Scan a t 1 6 : 2 9 , 0 .1 5 s e la p s e d ( 1 t o t a l
h o s ts )
I n i t i a t i n g P a r a l l e l DMS r e s o l u t i o n o f 1 h o s t , a t 1 6 :2 9
c o m p le te d P a r a l l e l d n s r e s o l u t i o n o f l n o s t . a t 1 6 : 2 9 ,
0 .0 0 s e la p s e d
I n i t i a t i n g XMAS S can a t 1 6 :2 9
S c a n r in g 1 0 . 0 . 6 . 4 [1 0 9 0 p o r t s ]
I n c r e a s in g se nd d e la y f o r 1 0 . 0 . 0 . 4 f r o m 0 t o 5 due t o 34
o u t o f 84 d ro p p e d p ro & e s s in c e l a s t in c r e a s e .
a The option, -sA(TCP C o m p le te d XMAS S can a t 1 6 : 3 0 , 8 .3 6 s e la p s e d :1 0 0 0 t o t a l
ACKscan) is usedtomap p o r ts )
Initiating Scrvice scon ot 16:30
out firewall rulesets, I n i t i a t i n g OS d e t e c t i o n ( t r y # 1 ) a g a i r s t 1 0 . 0 . 0 . 4
determiningwhether they NSE: S c r i p t s c a n n in g 1 0 . 0 . 0 . 4 .
are stateful or not and I n i t i a t i n g MSE a t 1 6 :3 0
FIGURE6.19: TheZenmapmainwindowwiththeNmapOutputtab
26. Click the S e r v i c e s tab located at the right side of die pane. It d is p la y s
all die services of that host.
C E H Lab M anual Page 132 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Zenm ap ־0 =1
Scan I o o ls P ro file H elp
: L oa de d 0 3 * c r i p t c f o r s c a n n in g .
ח
NSE: S c r i p t P r e - s c a n n in g .
I n i t i a t i n g ARP P l r g S can a t 1 6 :2 9
S c a n r in g 1 0 . 0 . 0 . 4 [ 1 p o r t ] m
C o m p le te d ARP P in g S can a t 1 6 : 2 9 , 8 .1 5 s e la p s e d ( 1 t o t a l
h o s ts )
I n i t i a t i n g 3a r a l l e l DNS r e s o l u t i o n o f 1 h o s t , a t 1 6 :2 9
C o m p le te d P a r a l l e l DNS r e s o l u t i o n 0-f l n e s t , a t 1 6 : 2 9 ,
0 .0 0 s e la p s e d
I n i t i a t i n g XMAS S can a t 1 6 :2 9
S c a n r in g 1 0 . 0 . 0 . 4 [1 0 0 0 p o r t s ]
I n c r e a s in g se nd d e la y f o r 1 0 . 0 . 0 . 4 f r o m e t o 5 due t o 34
o u t o f 84 d -o p p e d p ro o e s s in c e l a s t in c r e a s e .
C o m p le te d XMAS S can a t 1 6 : 3 0 . 8 .3 6 s e la p s e d (1 0 0 0 t o t a l
p o r ts )
I n i t i a t i n g S e r v ic e s c a n a t 1 6 :3 0
I n i t i a t i n g OS d e t e c t i o n ( t r y # 1 ) a g a in s t 1 0 . 0 . 0 . 4
NSE: S c r i p t s c a n n in g 1 0 . 0 . 0 . 4 .
I n i t i a t i n g USE a t 1 6 :3 0
C o m p le te d NSE a t 1 6 : 3 0 , 0 .0 0 s e la p s e d
Nnap scan report for 10.0.0.4
H ost is u p ( 0 .0 0 0 2 0 s l a t e n c y ) . V
FIGURE6.20: ZenmapMainwindowwithServicesTab
S T A S K 3
27. N u ll s c a n works only if the operating system’s TCP/IP implementation
Null S c a n is developed according to RFC 793.111 a 111111 scan, attackers send a TCP
frame to a remote host with NO Flags.
28. To perform a 111111 scan for a target IP address, create a new profile.
Click P r o file >־N e w P ro file o r C o m m a n d C trl+ P
The optionNull Scan
(-sN) does not set anybits Zenmap
(TCPflagheaderis 0).
[ New Prof Je or Command C trk P | nas Scan v Scan | Cancel |
9 £d it Selected Prof <e Q rl+E
OS « Host
w 10.0.0.4
FIGURE6.21:TheZenmapmainwindowwiththeNewProfileorCommandoption
C E H Lab M anual Page 133 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
FIGURE622: TheZenmapProfileEditorwiththeProfiletab
30. Click die Scan tab in the P r o file E d it o r window. Now select the N ull
m The option, -b S c a n (־sN ) option from the T C P s c a n : drop-down list.
<FTP relay host> (FTP
P ro file E d ito r
bounce scan) allows a
user to connect to one n m a p -6X -T4 -A -v 10.0.0.4
FTP server, and then
Help
ask that files be sent to a P ro file] Scan | p!ng | S cnp tm g j larget | Source Jth e r Tim ing
P rof le name
third-party server. Such Scan o ptio ns
a feature is ripe for This is how the profile w ill be
Targets (optional): 1C.0.0.4 id entified n th e d ro p-d o w n co m b o
abuse on many levels, so box n th e scan tab.
TCP scan: Xmas Tree scan (-sX) |v
most servers have
ceased supporting it. Non-TCP scans: None
The option, -r (Don't 1 1 IPy 6 support (-6) Xmas Tree !can (-sX)
randomizeports): By
default, Nmap randomizes Cancel Save Changes
the scannedport order
(except that certain
commonlyaccessibleports FIGURE6.23:TheZenmapProfileEditorwiththeScantab
aremovednear the
beginning for efficiency 31. Select N one from the N o n -T C P scan s: drop-down field and select
reasons). This
randomizationis normally A g g r e s s iv e (-T 4 ) from the T im in g t e m p la t e : drop-down field.
desirable, but youcan
specify-r for sequential 32. Click S a v e Changes to save the newly created profile.
(sortedfromlowest to
highest) port scanning
instead.
C E H Lab M anual Page 134 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
< P ort < P rcto ccl < State < Service < Version
Q The option-sR(RPC O S < H o st
conjunctionwiththe
variousport scanmethods
ofNmap. It takes all the
TCP/UDPports found
openandfloods themwith
SunRPCprogramNULL
commands inanattempt to
determinewhether theyare
RPCports, andif so, what
programandversion
number theyserveup.
Filter Hosts
FIGURE6.25:TheZenmapmainwindowwithTarget andProfileentered
34. Nmap scans the target IP address provided and displays results in N m ap
O u tp u t tab.
C E H Lab M anual Page 135 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Zenmap B Q u
Scan Tools P rofile Help
C o m m a n d: nm a p -s N -T 4 -A -v 10.C.0.4
OS < H ost
IM 10.00.4
nm a p -sN •T4 • A - v 10.0.04
פן Details
S ta r t in g Mmap 6 .0 1 ( h t t p : / / n 1r a p . o r g ) at 2012 0 8 24
N S t: Loaded 93 s c r i p t s f o r s c a n n in g .
ח
NSE: S c r i p t P r e - s c a n n in g .
I n i t i a t i n g ARP P in g Scan a t 1 6 :4 7
S c a n n in g 1 0 . 6 . 0 . 4 [1 p o r t ]
C o n p le te d ARP P in g S can a t 1 6 : 4 7 , 0 . 1 4 s e la p s e c ( 1 t o t a l
h o s ts )
I n i t i a t i n g P a r a l l e l DNS r e s o l u t i o n o f 1 h o s t . 2t 1 5 :4 7
C o n p le t e d P a r a l l e l DNS r e s o l u t i o n o-F 1 h o s t , a t 1 6 : 4 7 ,
0 .2 8 s e la p s e d
i n i t i a t i n g n u l l sca n a t 1 6 :4 7
S c a n n in g 1 0 . 0 . 0 . 4 [1 0 0 0 p o r t s ]
I n c r e a s in g se n d d e la y f o r 1 0 . 0 . 0 . 4 -fro m 0 t o 5 d u e t o 68
o u t o f 169 d ro p p e d p ro b e s s in c e l a s t i n c r e a s e .
C o n p le t e d NULL S can a t 1 6 : 4 7 , 7 .7 B s e la p s e d (1 0 0 0 t o t a l
p o r ts )
I n i t i a t i n g S e r v ic e s c a n a t 1 6 :4 7
The option-version- I n i t i a t i n g OS d e t e c t i o n ( t r y * l ) a g a in s t 1 0 . 0 . 0 . 4
versionscanningis doing.
It is a subset ofwhat you FIGURE6.26: TheZenmapmainwindowwiththeXmapOutputtab
getwith— packet-trace,
35. Click the H o s t D e t a ils tab to view the details of hosts, such as H ost
S ta tu s , A d d re ss e s . O pen P o rts, and C lo s e d P o r ts
Zenmap ׳-[nrx '
Scan Tools £ r o fle Help
C o m m a n d: nm ap -s N -T 4 •A -v 10.0.0.4
OS « Host - 10.0.0.4!
* 10.0.0.4 B Host Status
State: up
O pen ports:
ports:
0
0
ie
Closed ports: 1000
Up tirr e : N o t available
Last b oo t: N o t available
S Addresses
IPv4: 10.0.0.4
IPv6: N o t a vailable
M AC: 00:15:5D:00:07:10
• C o m m e n ts
Filter Hosts
FIGURE627: TheZenmapmainwindowwiththeHostDetailstab
T A S K 4
36. Attackers send an A C K probe packet with a random sequence number.
A C K F la g S c a n No response means the port is filtered and an R S T response means die
port is not filtered.
C E H Lab M anual Page 136 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
categories. It is necessaryto
update the database onlyif
youhaveaddedor
removedNSEscripts from
thedefault scriptsdirectory
orifyouhavechangedthe
categories ofanyscript.
This optionisgenerally
used byitself: nmap ־־
script-updatedb.
Filter Hosts
FIGURE6.28:TheZenmapmainwindowwiththeNewProfileorCommandoption
38. On the P r o file tab, input A C K F la g S c a n in the P r o file n a m e text field.
P ro file E d ito r ־r a n
nm a p -sN -T4 -A -v 10.0.0.4
Help
Profile [scan | Ping | Scripting | Target | S o ire e [ C thei | Tim ing
Description
P ro file In fo rm a tio n
The d e scrp tio n is a fu ll description
Profile name |A C K PagScanj o f wh at the scan does, w h ich m ay
be long.
Description
basedon network
performance. FIGURE6.29:TheZenmapProfileEditorWindowwiththeProfiletab
39. To select the parameters for an ACK scan, click the S c a n tab in die
P ro file E d it o r window, select A C K s c a n (־s A ) from the N o n -T C P
s c a n s : drop-down list, and select N o n e for all die other fields but leave
the T a r g e t s : field empty.
C E H Lab M anual Page 137 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
H e lp
The option: —min-rtt- Profile | Scan Ping S cnpting T3rg=t Source Other Tim ing
Enablealladvanced,aggressive
timeout <time>, --max-rtt- Scan o ptio ns options
timeout <time>, —initial-
Targets (optional): 10004 Enable OS detection (-0 ), version
rtt-timeout <t1me> (Adjust detection (-5V), script scanning (■
probe timeouts). Nmap TCP scan: ACK scan (־sA) |v |
sC), and traceroute (־־ttaceroute).
maintains a running Non-TCP scans: None
timeout value for T im in g tem plate: ACK s c a n ( sA)
determining how long it
[34 Enable all advanced/aggressi\ FIN scan (-sF)
waits for a probe response
before giving up or □ O perating system detection (- M a im o n scan (-sM )
FIGURE 6.30: The Zenmap Profile Editor window with the Scan tab
Profile Editor
n m a p -sA -sNJ -T4 -A -v -PO 100.0.4 [Scan]
FIGURE 6.31: The Zenmap Profile Editor window with the Ping tab
4 1 . 111 t h e Zenm ap m a i n w i n d o w , i n p u t d i e I P a d d re ss o f th e ta rg e t
m a c h i n e ( in d i i s L a b : 10.0.0.3), s e l e c t A C K Flag Sca n f r o m Profile:
d r o p - d o w n lis t, a n d t h e n c li c k Scan.
C EH Lab Manual Page 138 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Zenmap ־ם
Scan Tools Profile Help
Filter Hosts
FIGURE 6.32: The Zenmap main window with the Target and Profile entered
42. N m a p s c a n s d ie ta rg e t I P a d d re ss p ro v id e d a n d d is p la y s r e s u l t s o n
Nmap Output ta b .
X ן
Zenmap
r Sc$n Tools £ r o fle Help
C o m m a n d: nm a p -s A -P 0 1C.0.0.4
Filter Hosts
FIGURE 6.33: The Zenmap main window with the Nmap Output tab
4 3 . T o v i e w m o r e d e ta i ls r e g a r d i n g t h e h o s t s , c li c k d i e Host Details t a b
C EH Lab Manual Page 139 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Zenmap
Scan Tools P rofile H e lp
Filtered ports:
IS
to know an appropriate
Closed ports:
scanning rate for a
network, or you may have S ea m e d ports: 1000
B A d d re s s e s
IPv4: 1a0.0.4
IPv6: N o t available
M AC: 0Q15:50:00:07:10
♦ Comments
Filter Hosts
FIGURE 6.34: The Zenmap main window with the Host Details tab
L a b A n a ly s is
D o c u m e n t all d i e I P a d d r e s s e s , o p e n a n d c lo s e d p o r t s , s e n d e e s , a n d p r o t o c o l s y o u
d i s c o v e r e d d u r i n g d i e la b .
T y p es o f S can u sed :
■ In te n s e scan
■ X m as scan
י N u ll sc a n
■ A C K F la g s c a n
I n te n s e S c a n —N m a p O u tp u t
■ A R P P in g S c a n - 1 h o s t
■ P a ra lle l D N S r e s o lu ti o n o f 1 h o s t
N m ap ■ S Y N S te a lth S c a n
• D i s c o v e r e d o p e n p o r t o n 1 0 .0 .0 .4
o 1 3 5 / tc p , 1 3 9 / tc p , 4 4 5 / tc p , . ..
■ M A C A d d re ss
■ O p e r a tin g S y s te m D e ta ils
■ U p tim e G u e s s
■ N e tw o r k D is ta n c e
■ T C P S e q u e n c e P re d ic tio n
■ I P I D S e q u e n c e G e n e ra tio n
■ S e rv ic e I n f o
C EH Lab Manual Page 140 Ethical Hacking and Countermeasures Copyright © by EC ־Coundl
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Q u e s t io n s
1. A n a ly z e a n d e v a lu a te t h e r e s u lts b y s c a n n i n g a ta r g e t n e t w o r k u s in g ;
a. S te a l th S c a n ( H a l f - o p e n S c a n )
b. nm ap -P
2. P e r f o r m I n v e r s e T C P F la g S c a n n in g a n d a n a ly z e h o s t s a n d s e r v ic e s f o r a
t a r g e t m a c h i n e i n d i e n e tw o r k .
I n te r n e t C o n n e c tio n R e q u ire d
□ Y es 0 No
P la tfo rm S u p p o rte d
0 C la s s ro o m 0 iL a b s
C EH Lab Manual Page 141 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
A s a n e x p e r t p e n e t r a t i o n te s te r , y o u s h o u l d b e a b le t o d e t e r m i n e w h e d i e r a T C P
p o r t is o p e n t o s e n d a SYN ( s e s s io n e s t a b li s h m e n t ) p a c k e t t o t h e p o r t . T h e ta r g e t
m a c h i n e w ill r e s p o n d w i d i a SYN ACK ( s e s s io n r e q u e s t a c k n o w le d g e m e n t) p a c k e t i f
d ie p o r t is o p e n a n d RST (re s e t) i f d i e p o r t is c lo s e d a n d b e p r e p a r e d t o b l o c k a n y
s u c h a tta c k s 0 1 1 t h e n e t w o r k
L a b O b j e c t iv e s
T h e o b je c tiv e o f d iis la b is a s s is t t o tr o u b l e s h o o t , d ia g n o s e , m o n i t o r , a n d d i s c o v e r
d e v ic e s 0 1 1 n e tw o r k .
1 1 1 d iis la b , y o u n e e d to :
■ D i s c o v e r s I P v 4 / I P v 6 a d d r e s s e s , h o s t n a m e s , d o m a i n n a m e s , e m a il
a d d re sse s, a n d U R L s
D e t e c t lo c a l p o r t s
C EH Lab Manual Page 142 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
S 7Tools L a b E n v ir o n m e n t
demonstrated in
T o p e r f o r m d i e la b , y o u n e e d :
this lab are
available in ■ N e t S c a n T o o l s P r o l o c a t e d a t D:\CEH-Tools\CEHv8 Module 03 Scanning
D:\CEH- Networks\Scanning Tools\NetScanTools Pro
Tools\CEHv8
■ Y o u c a n a ls o d o w n l o a d t h e l a t e s t v e r s i o n o f N etScan Tools Pro f r o m
Module 03
Scanning t h e l i n k h t t p : / / w w w . 1 1 e t s c a n t o o l s . c o m / n s t p r o m a i 1 1 .h t m l
Networks ■ I f y o u d e c id e t o d o w n l o a d d i e l a t e s t v e r s i o n , d i e n s c r e e n s h o t s s h o w n i n d i e
la b m i g h t d if f e r
L a b D u r a t io n
T im e : 1 0 M i n u te s
O v e r v ie w o f N e t w o r k S c a n n in g
N e t w o r k s c a n n i n g is d i e p r o c e s s o f e x a m i n in g d i e activity on a network, w h i c h c a n
i n c l u d e m o n i t o r i n g data flow a s w e ll a s m o n i t o r i n g d i e functioning o f n e t w o r k
d e v ic e s . N e t w o r k s c a n n i n g s e r v e s t o p r o m o t e b o d i d i e security a n d p e r f o r m a n c e
o f a n e tw o r k . N e t w o r k s c a n n i n g m a y a ls o b e e m p l o y e d f r o m o u ts id e a n e t w o r k in
o r d e r t o i d e n t if y p o te n t ia l network vulnerabilities.
N e tS c a n T o o l P r o p e r f o r m s th e fo llo w in g to n e tw o r k sc a n n in g :
■ Monitoring n e t w o r k d e v i c e s a v a il a b il it y
■ Notifies I P a d d r e s s , h o s t n a m e s , d o m a i n n a m e s , a n d p o r t s c a n n i n g
1. L a u n c h t h e Sta rt m e n u b y h o v e r i n g d i e m o u s e c u r s o r i n t h e l o w e r - l e f t
c o rn e r o f th e d e s k to p
C EH Lab Manual Page 143 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
S ta rt Administrator A
h m o וי f*
Control Hjrpw-V
Pan*l
Mdchir*.
Q V
('nmittnd
I't. n.".־
e w rr
© *I
20 ז2
x-x-ac n 9
FIGURE 7.2 Windows Server 2012 - Apps
3. I f y o u a r e u s i n g t h e D e m o v e r s i o n o f N e t S c a n T o o l s P r o , t h e n c li c k
Start the DEMO
£L) Database Name be 4. T h e Open or C reate a N ew Result Database-NetScanTooIs Pro
created in the Results
Database Directory and it w i n d o w w ill a p p e a r s ; e n t e r a n e w d a t a b a s e n a m e i n D atabase Name
will have NstProData- (enter new name here)
prefixed and it will have the
file extension .db3 5. S e t a d e f a u l t d i r e c t o r y r e s u l t s f o r d a t a b a s e file l o c a t i o n , c li c k Continue
P ro je ct N am e (o pb on al)
S e t D e fau lt D irectory
N am e Telep h on e Number
U s e L a s t R e s u lts D a ta b a s e Continue
E x it Program
FIGURE 7.3: setting a new database name for XetScan Tools Pro
C EH Lab Manual Page 144 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
test • NetScartTools* Pro Demo Version Build 8-17-12 based o n version 11.19
file Eflit A«es51b!11ty View IP«6 Help
— IP version 6 addresses
have a different format
from IPv4 addresses and
they can be much longer or
far shorter. IPv6 addresses 1
Wefccrwto NrtScanTooh#f^5 [W o Vbtfen 11 TH fattwaiv n a drro ro< k>* •re* t00“i Cut todi hav• niror luiti
Th■ du ro M i a be ccn«e>ted to j W vtfden
always contain 2 or more H m x x d '•on ■hr A Jo i^ e d cr Vtao.a tads cr 1» »|כgroined by fuidian on the kft panel
colon characters and never R03 iso- root carract : «־ta״oet. orwn icon :coa I8!en to net« 11k traff c.
contain periods. Example: ttu ; icon tooo *®•ו wfyojoca sy*em. end groy !con loots contact •hid p51t> w * a w
2 0 0 1 :4 8 6 0 :b 0 0 6 :6 9 Autom ated too is Fleet ' i t FI '«&,to vie ״C <?a te rg h * local help !ncLdng Gerttirg Suited tfam&xi
( i p v 6 .g o o g l e .c o m ) M3nu3l lo ci: 13III
o r ::1 (internal fw o rn e tools
8. C li c k OK
test NetScanToois® Pro Demo Version Build 8 17 12 based on version 11.19 ־היד°• - ז
File fd it AccettibHity View IM MHp
C EH Lab Manual Page 145 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
test NetScanTools® Pro Demo Version Build 8 17 12 based on version 11.19 ,- ! ״s i
File Fdit Accessibility View IPv6 Help
!alTool! •ARPPi׳׳y J
Automated Tool
About the ARP Scan Tool
שARP Scan (sometimes • Use U ib t o o l l o s e n d a n A R P R o q iM & t t o e v u ry IP v 4 ad d ress o n y o u r LAN. IPv4 connected
1 2. C li c k Do Arp Scan
C EH Lab Manual Page 146 Ethical Hacking and Countermeasures Copyright O by EC ־Coundl
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
test NetScanTools* Pro Demo Version Build 8-17 12based0nvefs»00 11.19 “־היו י ־־
File Edil Accessibility View IPv6 Help
I ]Addts^avaKat
ARP Ping ip v l M . . . W1CAdtireflfl I / r M 4 n u r* c f3 re r B c a ta ■ * E n tr y Type l>5c•!
1 0 .0 .0 .1 0( ׳ n e t;c a r, la c . 1 dynam o 10. 0.0
10.0.0.2 EC . &»11 lac vm-MSSCL. d y n azd c 1 0 .0 .0
־ar The Connection can (M
ASP Scan AC Scan)
(MAC wrtpeap Interfax i p
incoming connections on u
Cache forennct Scon OSsy T n c {•>»)
TCP or UDP ports. It can
also listen for ICMP
(IZZ₪
0 Resolve P s
Connection Monitor
packets. The sources of the
Favorite Tools
incoming connections are
Active OhcC׳vify Tool!
shown in the results list and Pasiive Ofitovtry Too 11
are logged to a SQLite o m Tools
database. P3<Mt LPV81 Tools
exttmai toon
r^ooram Into
פב
f*: test - NetScanTods® Pro Demo Version Build 8-17-12 based on version 11.19 !־ n ' *
f4 e Ed* Accessibility View IPv6 Help
♦ Dano limitations.
• None.
Connection Monitc
cry Type lo c a l
n a x le 1 0 .0 .0
naxic 10.0.0
O K PSfw r Oucorc
LJ DHCP is a method of
dynamically assigning IP
addresses and other
a
DNS-Tools
Tools-core
«
network parameter
information to network
J
clients from DHCP serv.
Pn u n r DutoveiyTc
P « l r l level Tool
External Too 11
C EH Lab Manual Page 147 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
y test - NetScanTools* Pro Demo Version Build 8 -1 7-12 based o r version 11.19 T~Tn 1 « '
I Aurcmated To015
Fnri DHCPServers an fa r
AddItoie
For Hdo. p׳-e£8F: IM A ס׳יד״־גA.־omv־rd
Q NetScanner, this is a
Ping Scan or Sweep tool. It Cache F orenwes ' * ״° ] ־ *״*־ [ ־
MAC addresses and Stop 10.0.0.7 L . Jfc j%» ־v 411 iD Hyper-V V ir ta • ! Eth ern et Adapter #2
A j.jA IC
WtKOIM N«tSunT00i13 P 10 S?
AUtOIMt«J ToOh
M jn g jJ T00K (411:
About the Ping Scanner (aka NetScanner) lool
• use rim rooJ ro pmo . יranoe or lm of IPv4 addresses. rtvstool shows you cb rompute׳s
m adflf«s«s. To teeafl ee*׳ces n your subnrt mdudmg trios*blocking ping, you can
1
are active w tJiir! tr*rano^ii5t(tJ1* hav« to rapond to omo). Uso it *vith * * u t o f F
>10
um ARP Son
Pn g ErV1«K«J
tool.
• You can ■nport a text lest of IPv4 addresses to png
fir,g m
Don't mres this speaal feature m this took use the Do SMB/NBNS scan כסqg: n « B » S resoonscs
-Graphi cal
fiom unprotected W!ndo*s computers.
• Don't forget td nght didc m the results for a menu with more opaons.
ravontf 001ז:
Mint Ducoycnr to ׳
Paijivt Discovery 10
DNS roou
P a a e ti m l tool}
t<tcma! Tools
°rooram inro
1 7 . C li c k Start
C EH Lab Manual Page 148 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
--- test - NetScanTools * Pro Demo Version Build 8-17-12 based o r version 11.19
«e 6dK Accessibility View IPv6
m
Pro»ucuou5 Mode S<onr ^
1 103 I oca ARP Scat
□ D 3 S * ׳E.fc8\S5car
F־r»01 » * Tools
□ Do Sulnel M ai: Sea!־
Arthit Oil cover? Tools
EnaSfc Post-Scan
Pais** Discovery Tools M O b lg of
DNS Too 11 rton-Resso'dn; P s
ri1h 3■>בI^
Welcome unnei/N etSiannei 9
•,׳u tw ateO Tooli
M «nu«ITouu lair
About the Poit Scanner Iool \
NEVER SCAN A COMPUTER YOU DO NOT OWN OR HAVE THE OWNER’S PERMISSION TO SCAN.
• use rtm זool to scan j taro** for ICP or יוגוווports that . מורiKrrnang (open wirh senna*
noo tnrunced fcstenino).
Whois is a client utility • lypes of scanning supported ruli Connect TCP Scan (see notes below}. U0P port u'reachasle
scan, combined tu> ful connect and uop scan, TCP SYN only scan and tcp orrer
son.
that acts as an interface to a • Don't miss this special feature in this tool: After a target has bee scanned, an a״alfss .vineow
will open in >our Oeh J t web browser.
remote whois server • Don't fo rg e t מזnght c*<k n we resjits for 3 menu with more options.
database. This database
P nq Scanner Notes: settings that strongly affect scan speed:
may contain domain, IP • Come:San Timeout. use 200c* less on a fact networkcorrection yjdhneaiby cor״p.te i. - « 3 ) 3003 ־seconds) or
more ona dau: cameao־׳.
address or AS Number • Wot After Connect -J i s c-110•• o5 ־׳each port test worts before deodng that ih ; port is not 5c»»e.
registries that you can • settirxcAXbv settee* ccmccxns. Try0, (hen (ry lire. Notice the dfference.
Port Scanner
• SetOnqs^ax°«<MConnectors
access given the correct
query U
P =f»»cu0\j1 Mode ‘
Domo KmlUtlons.
• Hone.
2 0 . C li c k S ca n Range of Ports
C EH Lab Manual Page 149 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
test - NetScanTools® Pro Demo Version Build 8-17-12 based on version 11.19 1-1°׳ ״ ־
fte Ed* Accessibility View 6י\)ו Help
Poit Scanner
J
Pro«ucuom Mode ‘
MrPasp :-ir-^acr :־
10.D.0.
f3vor1t* Tools Comect T rcout
A<t*«׳DtscoreryTools ( 100D= !second]
Passr* Discoverytools :
DNS roois
watAfte'Conncc
p«*«ttml loon (ICOO -1 s*aofl
txtemji tools
programinro :
L a b A n a ly s is
D o c u m e n t a ll d i e I P a d d r e s s e s , o p e n a n d c lo s e d p o r t s , s e r v ic e s , a n d p r o t o c o l s y o u
d is c o v e r e d d u r i n g d i e la b .
A R P S c a n R e s u lts :
■ IP v 4 A d d re ss
■ M A C A d d re ss
■ I / F M a n u fa c tu re r
■ H o s tn a m e
■ E n try T y p e
■ L o c a l A d d re ss
N e tS c a n T o o ls
p ro In f o r m a tio n fo r D is c o v e r e d D H C P S e rv e rs:
■ I P v 4 A d d r e s s : 1 0 .0 .0 .7
■ I n t e r f a c e D e s c r i p t i o n : H y p e r-V V irtu a l
E th e r n e t A d a p te r # 2
■ D H C P S e r v e r I P : 1 0 .0 .0 .1
■ S e r v e r H o s t n a m e : 1 0 .0 .0 .1
■ O f f e r e d I P : 1 0 .0 .0 .7
■ O f f e r e d S u b n e t M a s k : 2 5 5 .2 5 5 .2 5 5 .0
C EH Lab Manual Page 150 Ethical Hacking and Countermeasures Copyright O by EC-Coundl
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Q u e s t io n s
1. D o e s N e t S c a i i T o o l s P r o s u p p o r t p r o x y s e r v e r s o r fire w a lls ?
In te rn e t C o n n e c tio n R e q u ire d
□ Y es 0 No
0 C lassroom 0 iLabs
C EH Lab Manual Page 151 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
111 d ii s la b , y o u w ill l e a r n t o d r a w n e t w o r k d ia g r a m s u s i n g L A N S u r v e y o r . T o b e a n
e x p e r t network administrator a n d penetration te s te r y o u n e e d t o d is c o v e r
n e t w o r k t o p o l o g y a n d p r o d u c e c o m p r e h e n s i v e n e t w o r k d ia g r a m s f o r d is c o v e r e d
n e tw o r k s .
L a b O b j e c t iv e s
T h e o b je c t iv e o f d iis la b is t o h e l p s t u d e n t s d is c o v e r a n d d ia g r a m n e t w o r k to p o l o g y
a n d m a p a d is c o v e r e d n e t w o r k
1 1 1 d iis la b , y o u n e e d to :
■ D ra w ’ a m a p s h o w i n g d i e lo g ic a l c o n n e c t iv it y o f y o u r n e t w o r k a n d n a v ig a te
a r o u n d d ie m a p
■ C r e a te a r e p o r t d i a t in c lu d e s a ll y o u r m a n a g e d s w itc h e s a n d h u b s
C EH Lab Manual Page 152 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
ZZy Tools L a b E n v ir o n m e n t
demonstrated in
T o p e r f o r m d i e la b , y o u n e e d :
this lab are
available in ■ L A N S u r v e y o r l o c a t e d a t D:\CEH-Tools\CEHv8 Module 03 Scanning
D:\CEH- Networks\Network Discovery and Mapping Tools\LANsurveyor
Tools\CEHv8
■ Y o u c a n a ls o d o w n l o a d t h e l a t e s t v e r s i o n o f LAN Surveyor f r o m d i e l i n k
Module 03
Scanning h ttp : / / w w w .s o la r w i11d s . c o m /
Networks ■ I f y o u d e c id e t o d o w n l o a d d i e la t e s t v e r s i o n , d i e n s c r e e n s h o t s s h o w n i n d i e
la b m i g h t d if f e r
■ A w e b b ro w s e r w id i In te r n e t a ccess
L a b D u r a t io n
T im e : 1 0 M i n u te s
O v e r v ie w o f L A N S u r v e y o r
S o la r W in d s L A N s u r v e y o r a u to m a tic a lly d is c o v e r s y o u r n e t w o r k a n d p r o d u c e s a
c o m p r e h e n s i v e network diagram t h a t c a n b e e a sily e x p o r t e d t o M i c r o s o f t O f f i c e
V is io . L A N s u r v e y o r a u to m a tic a lly d e te c ts new devices a n d c h a n g e s t o network
topology. I t s im p lifie s i n v e n t o r y m a n a g e m e n t f o r h a r d w a r e a n d s o f tw a r e a s s e ts ,
a d d r e s s e s r e p o r t i n g n e e d s f o r P C I c o m p l i a n c e a n d o t h e r r e g u l a to r y r e q u i r e m e n ts .
1. L a u n c h t h e S ta rt m e n u b y h o v e r i n g d i e m o u s e c u r s o r i n t h e l o w e r - l e f t
c o rn e r o f th e d e s k to p
2. C li c k t h e LANSurvyor a p p t o o p e n t h e LANSurvyor w i n d o w
C EH Lab Manual Page 153 Ethical Hacking and Countermeasures Copyright © by EC ־Coundl
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
LANsurveyor's
Responder client Manage S ta rt A d m in istra to r £
Q w
w :a
e
rwn«t hptom ף״ l i
MegaPing NMScanL.
Pto Demo
*s
3. R e v i e w t h e l i m i t a t i o n s o f t h e e v a l u a t i o n s o f t w a r e a n d t h e n c li c k
Continue w ith Evaluation t o c o n t i n u e t h e e v a l u a t i o n
S olarW in ds LA N surveyor ן- יי * ים י
TFile Edit Men aye Monitor Report Tods Window Help
s o la rw in d s
^ LANsurveyor uses an
almost immeasurable
amount of network
bandwidth. For each type
of discovery method
(ICMP Ping, NetBIOS,
SIP, etc.)
C EH Lab Manual Page 154 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
so larw in d s7'
» Support
TheSohrwinds Supoorl W et»i» offer* a senprehersve set of tool* tc help you nanaoea^d nartaai yo»r SohrWind* appleations
v b t tne <]1a w js a i£ .g a 2 s , r ic q y y r ty Q vy»t9»». o r Jp o a ic
C EH Lab Manual Page 155 Ethical Hacking and Countermeasures Copyright O by EC ־Coundl
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
| pubiu. pmats
—LANsurveyor's network □ SNK׳Pv3Devbe5 I SNMPv3 Options..
discovery discovers aU
network nodes, regardless
Other IP Service Dixovery
of whether they are end
nodes, routers, switches or Ivi lANsuveya F e j pender;
0 N e l8 IC S Clwvs
Mapping Speed
Slower Faster
0
ConfigurationMa^aperon*
Save0KcovetyConfgwa׳ion. I D isco ver Configuafon..
Mapping Progress
HopO: 10.0.0.1-10.0.0.254
SNMP Sends
SNMP R ecess:
03 LANsurveyor rs Last Node Contacted:
capable o f discovering ICMP Ping Sends:
and mappmg multiple ICMP Receipts
VLANs on Layer 2. For Subnets Mapped
example, to map a Nodes Mapped WIN-D39MR5HL9E4
switch connecting Routers Mapped
multiple, non- Switches Mapped
consecutive VLANs
Cancel
7. LAN surveyor d is p la y s d i e m a p o f y o u r n e t w o r k
C EH Lab Manual Page 156 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
S c la A V in d s LA N su rv eyo r - [M a p 1] | ^ = X
נ.נ.0.0- • (.0.0.255
׳non•'
■ 10091
״V*4 UCONJWRSfWW
MN-LXQN3WRJNSN
10006
-
12-
L a b A n a ly s is
D o c u m e n t all d ie I P a d d r e s s e s , d o m a i n n a m e s , n o d e n a m e s , I P r o u t e r s , a n d S N M P
n o d e s y o u d i s c o v e r e d d u r i n g d i e la b .
I P a d d r e s s : 1 0 .0 .0 .1 - 1 0 .0 .0 .2 5 4
I P N o d e s D e ta ils :
■ S N M P S en d - 62
■ I C M P P i n g S e n d 31־
■ I C M P R e c e ip ts 4 ־
L A N S u rv e y o r
■ N odes M apped 4 ־
N e tw o r k s e g m e n t D e ta ils :
■ IP A d d re ss - 4
■ D o m a in N a m e s - 4
■ N ode N am es - 4
C EH Lab Manual Page 157 Ethical Hacking and Countermeasures Copyright O by EC ־Coundl
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S RELATED TO
T H I S LAB.
Q u e s t io n s
1. D o e s L A N S u i v e y o r m a p e v e r y I P a d d r e s s t o its c o r r e s p o n d i n g s w it c h o r
h u b p o rt?
2. C a n e x a m i n e n o d e s c o n n e c t e d v ia w ir e le s s a c c e s s p o i n t s b e d e t e c t e d a n d
m apped?
I n te rn e t C o n n e c tio n R e q u ire d
□ Yes 0 No
Platfo rm Supported
0 C lassroom 0 iL a b s
C EH Lab Manual Page 158 Ethical Hacking and Countermeasures Copyright © by EC-Council
AB Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
L a b O b j e c t iv e s
T h e o b je c t iv e o f d iis la b is t o h e l p s t u d e n t s d i s c o v e r a n d d ia g r a m n e t w o r k t o p o l o g y
a n d m a p a d is c o v e re d n e tw o r k
h i d iis la b , y o u n e e d to :
■ D i s c o v e r a n e t w o r k u s i n g discovery te c h n i q u e s
■ D i a g r a m t h e n e t w o r k to p o l o g y
■ D e t e c t n e w d e v ic e s a n d m o d i f i c a ti o n s m a d e i n n e t w o r k t o p o l o g y
■ P e r f o r m i n v e n t o r y m a n a g e m e n t f o r h a r d w a r e a n d s o f tw a r e a s s e ts
C EH Lab Manual Page 159 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
L a b E n v ir o n m e n t
ZZ7 Tools T o p e r f o r m d i e la b , y o u n e e d :
demonstrated in
■ F r i e n d ly P i n g e r l o c a t e d a r D:\CEH-Tools\CEHv8 Module 0 3 Scanning
this lab are
Networks\Network Discovery and Mapping Tools\FriendlyPinger
available in
D:\CEH- ■ Y o u can also download die latest version o f Friendly Pinger from the
Tools\CEHv8 link http://www.kilierich.com/fpi11ge17download.htm
Module 03
Scanning ■ I f y o u d e c id e t o d o w n l o a d t h e la t e s t v e r s io n , d i e n s c r e e n s h o t s s h o w n i n d i e
Networks la b m i g h t d if f e r
■ A c o m p u t e r r u n n i n g Windows Server 2 0 1 2
■ A w e b b ro w s e r w id i I n te rn e t a ccess
L a b D u r a t io n
T im e : 1 0 M i n u te s
O v e r v ie w o f N e t w o r k M a p p in g
N e t w o r k m a p p i n g is d i e s t u d y o f d i e p h y s ic a l connectivity o f n e tw o r k s . N e t w o r k
m a p p i n g is o f t e n c a r r ie d o u t t o discover s e r v e r s a n d o p e r a t i n g s y s te m s r u i n i n g o n
n e tw o r k s . T h i s te c l u ii q u e d e te c ts n e w d e v ic e s a n d m o d i f i c a ti o n s m a d e i n n e t w o r k
t o p o lo g y . Y o u c a n p e r f o r m i n v e n t o r y m a n a g e m e n t f o r h a r d w a r e a n d s o f tw a r e
a s s e ts .
F rie n d ly P in g e r p e r f o r m s th e fo llo w in g to m a p th e n e tw o rk :
■ Monitoring n e t w o r k d e v i c e s a v a il a b il it y
■ Notifies i f a n y s e r v e r w a k e s o r g o e s d o w n
■ Ping o f a ll d e v i c e s i n p a r a l l e l a t o n c e
Lab T asks
2. F o l l o w d i e w iz a r d - d r iv e n in s ta l la t io n s te p s a n d in s ta ll F r i e n d ly P in g e r .
task 1
3. L a u n c h t h e Sta rt m e n u b y h o v e r i n g d ie m o u s e c u r s o r i n d i e lo w e r - le f t
Draw Network c o rn e r o f th e d e s k to p
Map
C EH Lab Manual Page 160 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
S ta r t A d m in is tra to r ^
V 9 «
6. C li c k No
& To see the route to a
ם
H
device, right-click it, select Friendly Pinger [Demo.map] 1
file Edit View Pinq Notification Scan FWatchcr Inventory Help
"Ping, Trace" and then
"TraceRoute". 1& □ צ£ - y a fit *־
In the lower part of the V Denro
map a TraceRoute dialog *
window will appear. ׳
In the process of D em ons tra tio n
determination of the
intermediate addresses, m ap
they will be displayed as a
list in this window and a
route will be displayed as
red arrows on the map
Internet M.ui
S hull cut Sm v ti
S -
W oik Statio n
Workstation
(*mall)
-
dick the client orco to add גnew device... ^ 2 1 /2 4 /3 7 & OG 00:35
FIGURE 9.3: FPinger Main Window
C EH Lab Manual Page 161 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
7. S e l e c t File f r o m t h e m e n u b a r a n d s e l e c t d i e Wizard o p t i o n
מg
קדm
fcV Save A j Image...
^ Print...
^ Lock... Ctrl* B
^ Create Setup...
5T In la n d
fr! S c iy c i
0 Options... F9
a W in k S ta tiu n
I 1,11 |
r'r;m
CiedtOdllinitialllldL
C] Map occupies the most
part of the window. Right- FIGURE 9.4: FPinger Staiting Wizard
click it. In the appeared
contest menu select "Add” 8. T o c r e a t e i n i t i a l m a p p i n g o f t h e n e t w o r k , t y p e a r a n g e o f IP addresses
and then ״Workstation". A
i n s p e c i f i e d f i e ld a s s h o w n i n t h e f o l l o w i n g f i g u r e c li c k Next
Device configuration dialog
window will appear. Specify
the requested parameters:
Wizard ---
device name, address,
description, picture
Local IP address: 10.0.0.7
10.0.0.1•2d
You can specify an exacter range of scanning to speed up
this operation. For example: 10.129-135.1 •5.1 •10
| I Timeout 1000
The device is displayed Timeout allows to increase searching,
as an animated picture, if it but you can miss some addresses.
is pinged, and as a black
and white picture if it is not
pinged
1 0 . C li c k Next
C EH Lab Manual Page 162 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Wizard
IP address Name
0 10.0.0.2 W1N-MSSELCK4K41
0 10.0.0.3 W indows8
0 10.0.0.5 W1N-LXQN3WR3R9M
□ 10.0.0.7 W1N-D39MR5HL9E4
11. Set the default options in the Wizard selection windows and click Next
Wizard
£0 Ping verifies a
connection to a remote
host by sending an ICMP Q e v i c e s ty p e: W orkstation
(Internet Control Message
Protocol) ECHO packet to
Address
the host and listening for
an ECHO REPLY packet.
OUse IP-address
A message is always sent to | ® Use DNS-name |
an IP address. If you do
not specify an address but a Name
hostname, this hostname is ח Remove DNS suffix
resolved to an IP address
using your default DNS
server. In this case you're
vulnerable to a possible
Add* ion
invalid entry on your DNS
(Domain Name Server) OA dd devices to the new map
server. (•> Add devices to the current map
C EH Lab Manual Page 163 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
H >׳״ £ ft J* & g
םIf you want to ping
inside the network, behind
the firewall, there will be no
problems If you want to
ping other networks behind
the firewall, it must be
configured to let the ICMP
packets pass through. Your
network administrator
should do it for you. Same
with the proxy server.
13. T o s c a n th e s e le c te d c o m p u te r in th e n e tw o r k , s e le c t d ie c o m p u te r a n d
s e l e c t t h e Sca n t a b f r o m t h e m e n u b a r a n d c li c k Scan
F rie n d ly P in g e r [D e fa u lt.m a p ]
M Scan..
^ You may download the Lb ם - y a * e ? F61 50* m
latest release:
http: / / www. kilievich.com/
fpinger■
click the clicnt area to add c new devicc.. 233:1 S i. 3/4/4 ^ 00:00:47
C EH Lab Manual Page 164 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Scanning
S c a n n in g c o m p le te
? Help y ok X Cancel
1 5 . C l i c k t h e Inventory t a b f r o m m e n u b a r t o v i e w d i e c o n f i g u r a t i o n d e ta i ls
o f th e s e le c te d c o m p u te r
V F rie n d ly P in g e r fD e fa u lt.m a p l
T ^ rr־
£□ Audit software and Pk Edit V1«w Ping Notification S<*n FWat<hcr Irvcnto ry\Ndp________________
hardware components
installed on tlie computers
1 גC a :* B S J \&\^ * ׳
over the network
m E l Inventory Option!.״ Ctil-F#
C EH Lab Manual Page 165 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
W Inventory
File E d it V ie w R eport O p tio n s H e lp
la e: 0 ־S ? 1 1 ■ E
W IN-D39MR5HL9E4 |g General[ Misc| M'j Hardware] Software{ _v) History| ^ K >
Computer/User
Service pack
C otecton tme
Inventory x '
5 Search of
File E dit V ie w R eport O p tio n s H e lp
HTTP, FTP, e-mail
e i g? 0 ₪ *a a <^0
and other network
G*? fieneraj Misc hardware | Software | History |
services
Network
IP addresses 110.0.0.7
J o ta l space 465.42 Gb
Display $ettng$
C EH Lab Manual Page 166 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
TT
File Edit View Report Options Help
0 ^ 1 3 1 0
H w 1N-D39MFS5HL9E4|| General Miscl Mi H a rd w a re [^ ] Software History | < >1
4x Intel Pentium III Xeon 3093
B Memory
<2
4096 Mb
- Q j B IO S
Q| AT/AT COMPATIBLE D ELL •6222004 02/09/12
- £ ) יMonitors
Genetic Pn P Monitor
- ■V D isplays ad ap ters
B j ) lnte<R) HD Graphics Family
E O D isk drives
q ST3500413AS (Serial: W2A91RH6)
- ^ N etw ork ad ap ters
| j | @netrt630x64.inf,%rtl8168e.devicedesc%^ealtekPQeGBE Family Controller
-^ S C S I and R A ID controllers
@spaceport.inf,%spaceport_devicedesc%;Micro$oft Storage Spaces Controller
I J
FIGURE 9.14: FPinger Inventory wizard Hardware tab
1 9 . T h e So ftw are t a b s h o w s d i e i n s t a l l e d s o f t w a r e o n d i e c o m p u t e r s
Inventory -----------H
File Edit View Report Options Help
[£) Q
5r 0 י€ 1 3 1 0
WIN-D39MR5HL9E4 G§* general | M ׳sc \ H«fdware| S Software | History | QBr < >
Version
Developer
Homepage | ft Go
L a b A n a ly s is
D o c u m e n t all d i e I P a d d r e s s e s , o p e n a n d c lo s e d p o r t s , s e r v ic e s , a n d p r o t o c o l s y o u
d is c o v e r e d d u r i n g d i e la b .
C EH Lab Manual Page 167 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
I P a d d r e s s : 1 0 .0 .0 .1 - 1 0 .0 .0 .2 0
F o u n d IP a d d re ss:
■ 1 0 .0 .0 .2
■ 1 0 .0 .0 .3
■ 1 0 .0 .0 .5
■ 1 0 .0 .0 .7
D e t a i l s R e s u l t o f 1 0 .0 .0 .7 :
j
F r i e n d l v P i n g» e r
■ C o m p u te r n a m e
■ O p e r a tin g s y s te m
■ IP A d d re ss
■ M A C a d d re ss
■ F ile s y s t e m
■ S iz e o f d i s k
■ H a rd w a re in fo rm a tio n
■ S o ftw a re in f o rm a tio n
Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S RELATED TO
T H I S LAB.
Q u e s t io n s
1. D o e s F P i n g e r s u p p o r t p r o x y s e r v e r s fire w a lls?
2. E x a m i n e th e p r o g r a m m i n g o f la n g u a g e u s e d i n F P in g e r .
I n te r n e t C o n n e c tio n R e q u ire d
□ Yes 0 No
0 C lassroom 0 iL a b s
C EH Lab Manual Page 168 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
Lab
I f a n a tta c k e r g a in s p h y s ic a l a c c e s s to a s w itc h o r o t h e r n e tw o r k d e v ic e , h e o r
s h e w ill b e a b l e t o s u c c e s s f u l l y i n s t a l l a r o g u e n e t w o r k d e v i c e ; t h e r e f o r e , a s a n
a d m in is tra to r, y o u s h o u ld d is a b le u n u s e d p o r ts in th e c o n f ig u r a tio n o f th e
d e v ic e . A l s o , i t is v e r y i m p o r t a n t t h a t y o u u s e s o m e m e t h o d o l o g i e s t o d e t e c t
s u c h r o g u e d e v ic e s 0 1 1 th e n e tw o rk .
L a b O b j e c t iv e s
T h i s l a b w ill g iv e y o u e x p e r i e n c e 0 1 1 s c a n n i n g t h e n e t w o r k f o r v u l n e r a b i l i t i e s ,
a n d s h o w y o u h o w t o u s e N e s s u s . I t w ill t e a c h y o u h o w to :
■ U s e th e N e s s u s to o l
■ S c a n th e n e tw o r k f o r v u ln e r a b ilitie s
C EH Lab Manual Page 169 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
L a b E n v ir o n m e n t
£ זTools T o c a n y o u t d ie la b , y o u n e e d :
demonstrated in
■ N e s s u s , l o c a t e d a t D:\CEH-Tools\CEHv8 Module 03 Scanning
this lab are
N etw orksW ulnerability Scanning Tools\Nessus
available in
D:\CEH- ■ Y o u c a n a ls o d o w n l o a d t h e l a t e s t v e r s i o n o f N e s s u s f r o m t h e l i n k
Tools\CEHv8 h t t p : / / w w w . t e n a b l e .c o m / p r o d u c t s / n e s s u s / n e s s u s - d o w n l o a d -
Module 03 a g re e m e n t
Scanning
Networks ■ I f y o u d e c i d e t o d o w n l o a d t h e latest version, t h e n s c r e e n s h o t s s h o w n
in th e la b m ig h t d if fe r
■ A w e b b ro w s e r w ith I n te r n e t access
L a b D u r a t io n
T im e : 2 0 M i n u te s
O v e r v ie w o f N e s s u s T o o l
m Nessus is public
Domain software related N e s s u s h e lp s s t u d e n t s t o le a r n , u n d e r s t a n d , a n d d e t e r m i n e vulnerabilities a n d
under the GPL.
w eaknesses o f a s y s te m a n d network 111 o r d e r t o k n o w h o w a s y s te m c a n b e
exploited. N e t w o r k v u ln e r a b ilitie s c a n b e network topology a n d OS
vulnerabilities, o p e n p o r t s a n d r u n n i n g s e r v ic e s , application and service
c o n f i g u r a t i o n e r r o r s , a n d a p p li c a ti o n a n d service vulnerabilities.
Lab T asks
8 TAs K 1 1. T o i n s t a l l N e s s u s n a v i g a t e t o D:\CEH-Tools\CEHv8 Module 03
Scanning Netw orksW ulnerability Scanning Tools\Nessus
Nessus
Installation 2. D o u b l e - c l i c k t h e Nessus-5.0.1-x86_64.msi file .
Run CencH
C EH Lab Manual Page 170 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
6. S e l e c t t h e r a d i o b u t t o n t o a c c e p t t h e l i c e n s e a g r e e m e n t a n d c li c k Next.
7. S e le c t a d e s t i n a t i o n f o l d e r a n d c li c k Next.
C EH Lab Manual Page 171 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
InstalShield
< Back Next > Cancel
FIGURE 10.5: The Nessus Install Shield Wizard for Setup Type
9. T h e N e s s u s w i z a r d w ill p r o m p t y o u t o c o n f i r m t h e i n s t a l l a t i o n . C li c k
Install
C EH Lab Manual Page 172 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
InstalShield
< Back Instal Cancel
1 0 . O n c e i n s t a l l a t i o n is c o m p l e t e , c li c k Finish.
Q Path of Nessus home The InstalShield Wizard has successfuly nstaled Tenable
Nessus (x64). Ckk Finish to exit the wizard.
directory for windows
\programfiles\tanable\nessus
Cancel
■ T l i e m a j o r d i r e c t o r i e s o f N e s s u s a r e s h o w n i n t h e f o l l o w i n g ta b l e .
C EH Lab Manual Page 173 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
w e lc o m e to Nessus!
PI m m c o n n e c t v i a S S L b y c lic k in c J h » r « .
You are hkely to get a security alert from your web browser saying that the SS L certificate is invalid. You may either choose to temporarily accept the risk, or
can obtain a valid S S L certificate from a registrar. Please refer to the Nessus documentation for more information.
Security Alert
— The Nessus
J j You are about to view pages over a secure connection.
Server Manager
used in Nessus 4 ע Any information you exchange with this site cannot be
has been viewed by anyone else on the web.
deprecated
^In the future, do not show this warning
OK More Info
C EH Lab Manual Page 174 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
X Snagit g j £t
& * ^ II C crtfica te Error: M avigation... '
1
There is a problem with this website's security certificate.
The security certificate presented by this w ebsite w as not issued b y a trusted certificate authority.
The security certificate presented by this websrte w as issued fo r a different w eb site s address.
Sccu n ty certificate problem s m a y indicate an ottem pt to fool y o u o r intercept a n y data you send to the
server.
W c recommend that you close this webpage and do not continue to this website.
M ore information
OK More Info
1
FIGURE 10.11: Internet Explorer Security Alert
R ff
W elcom e to N e s s u s ׳
T W ik you foi liintrtllli •j tin• w uM 1 •>>< h * H i N m iii •v* tflknv y!>u l <1 portoim
m warning, a custom 1I *ah 3pe«d vukierntilNty diSEOvery. to detem\r* *tven hcets are rumlna wttich se1v1r.es
1 A1j« n lU 1a1 mtrlili mj, la 1m U w t« no Im l )■ » ia •acurlly |W ■I w.
certificate to your >L-umplianca chocks, to verify and prove that « v v , host on your network adheres to tho security pokey you 1
יScan sehwliJnm, to automatically rui *cant at the freijwncy you
organization must be used ׳And morel
!!•< stofted *
C EH Lab Manual Page 175 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
loo*n: admin
Confirm P«*Mword:
< Prev | Next > |
Because f/* admin user can change the scanner configuration, the admin has (he ability to execute commands on the remote host. Therefore, It should be
i that the admin user has the same privileges as the *root ( ״or administrator) user on the remote ho:
> ■ el
C EH Lab Manual Page 176 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
N W III PluflM
SU8VCWII0M ACM I Ml NI
S41v(Ju Rapotto
N m a i fAQ •* «׳״Suy^otW w m ••ייIni 01 Ope״nlr*j SyvtMn otwMbwaowi) moa>«»« 1■to•
IVrjalAQor rtaouis fA<J lound cti arr, lenaUa1mvCcI
•vaeelto ncto«n| n n u n M o iy
M<«I6 Dtotc** FAQ K» •• Ratoawonarf-aod S«4xc>|pt«n You agiaa 10 r«v * «*•<> «<«* to• to
Tt^aUa to••ach ayatoan on which You have inttaltod a Prjntr'Kl Scama•
Deployment Options T<«» ׳pj Ojaniriton MiVAPthntandiuj 1N» pit^ifcrtcn ow cotnwcM »a* m
S*C»m 2141.1 Vau ara * *atimj 01!>trifi10n You m*» copy M M iwget * 4
•MMMaM T t N t V t »IM«M Md Tm1U» HonMF«*d s<Mot*«M rwgto to
— <1rt>to »1*dto« *♦ ew׳w00׳tn teeing onV Upon eompte^oti ot #* d m t*»
rigM to * a lt>« Pkj£n& ptmUtod by to* HomaFaad SubfeuipCanis
Ptc/w*‘. ;■wFwd SK.t־vjlp־i:»1 («. *(fle a b*e n *•־,ox !tent# •*> toe Suts<־i *
*0 ״c«aa( an r«ftj (of 4nd pay 81) !« ■׳>associated « P Tmi
Su&ttrfpaa• You awv not u&a tw H>r *׳f sad Subscripted 91anted to You lot
* ■!־inj pu>p0M± to aacuf• Y«u>01 any third party's, laatwoifcs or to any etoa■
tw cl«M«o« taning h * rorvpioductrxi «nv»or1׳r>*r1• T e a M a m
tofanuci a fr«* Sut«rp#on undat this Suction 21c|al t coti
apmant and DiMnbttoan
C is t* Metsus Ftogm Deralopment 1 tenable I
« & ״JM ■am at lha Subbcitpttaoa 10wtto and dovobp 1
ס
N«84u « Ptu^lns
th a r td with any 3rd patty.
Sample Repoita
not case N*5»u 9 FAQ
Deployment Options ■
• ־am» * con^
Training | Hpql^ter |
C EH Lab Manual Page 177 Ethical Hacking and Countermeasures Copyright C by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Nessus FAQ
registration, Mobile Devices FAQ
I raining
compile the
FIGURE 10.16: Nessus Registration Completed
plugins obtained
from port 443 of 2 3 . N o w lo g in to y o u r e m a il f o r th e a c tiv a tio n c o d e p r o v id e d a t th e tim e o f
plugins.nessus.or r e g is tr a tio n as s h o w n in th e fo llo w in g fig u re .
gplugins- <d •uflKfccjr
customers.nessus P
|
X _ uSmqSma yaH00.C0׳n ' •
ms •r, 3onMme 0» n׳cu ir-n‘1-4 *aorta \- ״־is >0u •11t1wo»repsK<trasc3rr>»ri1(».f1if10t.ו ‘ •**׳:
i 1
PtaawconW t If!• Nmmii n*tt »wn ^•9» ■w* ^ . ,Twwjuaiiu.'Ui'ntrHntantMuyMHiiimuum" • ***יי ״ I cnm ««!• STOCMt
Ne inttmal Aixeii « ״i w Mnaui * « *׳- '׳
M>t« tl'MU• inttiiiilnr camoi •׳a t * 1 •׳ t— «** ״e»a *aM e• in anamit* p«»״״.»* y>p* tia uw. ana c*>»* >* 1• •יזוMatpUJ-<n»
You an Andottna ic-jlsti 1t»jr m ilv a n at
M t x caaa toittiaiaftBfl
2 4 . N o w e n t e r t h e a c t i v a t i o n c o d e r e c e i v e d t o y o u r e m a i l I D a n d c li c k Next.
C EH Lab Manual Page 178 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P l u g in Feed R e g is t r a t io n
As• information about new vulnerabilities 18 discovered and released into the public domain, Tenabte's research staff designs programs ("plugins”) that enable
Nessus to detect their presence. The plugins contain vulnerability Information, the algorithm to test for the presence of the security Issue, and a set of
remediation actions. To use Nessus, you need to subscribe to a "Plugin Feed*. You can do so by voting http 7/www.nessus.orQyreolster/ to obtain an
Activation Code.
IbsdJ Once the plugins liave • To use Nessus at your workplace, pufdiaae a commetG d Prgfcaatonalfccd
11
• To um NcMuti at In a non ■commercial homo environment, you can get HomeFeed (or free
been downloaded and • Tenable SecurltvCentor usore: Enter 'SoairltyCenter* In the field below
compiled, the Nessus GUI • To perform offline plugin updates, enter 'offline' In the field below
2 5 . T h e Registering w i n d o w a p p e a r s a s s h o w n i n d i e f o l l o w i n g s c r e e n s h o t .
R e g is t e r in g . . .
N e s s u s is f e t c h in g t h e n e w e s t p lu g in s e t
P le a a e w a it...
C EH Lab Manual Page 179 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
/>.0 tc
•TASK 2
Network Scan
Vulnerabilities
nessus
I «•«״
׳ T E N A »L g
L i
,1 / / / 1
n essu s
3 0 . A f t e r y o u s u c c e s s f u l l y l o g i n , t h e Nessus Daemon w i n d o w a p p e a r s a s
s h o w n in th e fo llo w in g s c r e e n s h o t.
m To add a new policy,
dick Policies ^־־Add Policy.
C EH Lab Manual Page 180 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
^WARNING: Any
changes to the
Nessus scanner
configuration will
affect ALL Nessus
users. Edit these
options carefully
3 3 . T o c o n f i g u r e d i e c r e d e n t i a l s o f n e w p o l i c y , c li c k d i e Credentials t a b
s h o w n i n t h e l e f t p a n e o f Add Policy.
C EH Lab Manual Page 181 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
3 4 . T o s e l e c t t h e r e q u i r e d p l u g i n s , c li c k t h e Plugins t a b i n t h e l e f t p a n e o f
Add Policy.
P • . ״ ״ »׳
3 5 . T o c o n f i g u r e p r e f e r e n c e s , c li c k t h e Preferen ces t a b i n t h e l e f t p a n e o f
Add Policy.
3 9 . C li c k Submit.
C EH Lab Manual Page 182 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
CD Tools
demonstrated in
this lab are
available in
D:\CEH-
Tools\CEHv8
Module 03
Scanning
Networks
4 4 . C li c k Launch S ca n a t d i e b o t t o m - r i g h t o f t h e w i n d o w .
Note: T h e I P a d d r e s s e s m a y d i f f e r i n y o u r l a b e n v i r o n m e n t
C EH Lab Manual Page 183 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
M o d u le 0 3 - S c a n n in g N e tw o rk s
4 5 . T h e s c a n l a u n c h e s a n d starts scanning t h e n e t w o r k .
Z
•נ־י■׳
MUl-a* •*«-—■».»» * «Qi C«uMUrm tlmb«n rf UTMMB1 W . i■■— 1
Me
•MM•
C EH Lab Manual Page 184 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
4 8 . D o u b l e - c l i c k a n y result t o d i s p l a y a m o r e d e t a i l e d s y n o p s i s , d e s c r i p t i o n ,
s e c u r ity le v e l, a n d s o lu tio n .
4 9 . C l i c k t h e Download Report b u t t o n i n t h e l e f t p a n e .
5 0 . Y o u c a n d o w n l o a d a v a il a b le r e p o r t s w i t h a .nessus e x t e n s i o n f r o m t h e
d r o p - d o w n lis t.
Download R eport X
Download Format 1
Chapters
C hap ter Selectio n N ot A llow ed
5 1 . N o w , c li c k Log out.
B ■׳־׳ P ■ *6
>M a
■69■
FIGURE 10.37: Log out Nessus
L a b A n a ly s is
D o c u m e n t all d i e r e s u lts a n d r e p o r t s g a d i e r e d d u r i n g d i e la b .
C EH Lab Manual Page 185 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
S c a n T a rg e t M a c h in e : L o cal H o st
R esult: L o c a l H o s t v u l n e r a b i l i t i e s
PL E A S E TALK T O Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
Q u e s t io n s
1. E v a lu a te th e O S p la tfo rm s th a t N e s s u s h a s b u ild s fo r. E v a lu a te w h e th e r
N e s s u s w o r k s w ith th e s e c u r ity c e n te r.
2. D e te r m in e h o w th e N e s s u s lic e n s e w o r k s in a V M (V ir tu a l M a c h in e )
e n v iro n m e n t.
In te rn e t C o n n e c tio n R e q u ire d
0 \ es □ No
0 C lassroom □ iL a b s
C EH Lab Manual Page 186 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
Web exercise L a b S c e n a r io
A s a k e y te c h n iq u e in n e tw o r k s e c u r ity d o m a in , in t r u s i o n d e te c tio n s y s te m s
(ID S e s ) p la y a v ita l r o le o f d e te c tin g v a r io u s k in d s o f a tta c k s a n d s e c u r e th e
n e t w o r k s . S o , a s a n a d m i n i s t r a t o r y o u s h o u l d m a k e s u r e t h a t s e r v ic e s d o n o t r u n
a s t h e root user, a n d s h o u l d b e c a u t i o u s o f p a t c h e s a n d u p d a t e s f o r a p p l i c a t i o n s
f r o m v e n d o r s 0 1 s e c u r i t y o r g a n i z a t i o n s s u c h a s C ER T a n d CVE. S a f e g u a r d s c a n
b e im p le m e n te d s o t h a t e m a il c lie n t s o f tw a re d o e s n o t a u to m a tic a lly o p e n o r
e x e c u t e a t t a c h m e n t s . 1 1 1 t h i s l a b , y o u w ill l e a r n h o w n e t w o r k s a r e s c a n n e d u s i n g
th e G lo b a l N e t w o r k I n v e n t o r y to o l.
L a b O b j e c t iv e s
T h i s l a b w ill s h o w y o u h o w n e t w o r k s c a n b e s c a n n e d a n d h o w t o u s e G l o b a l
N e t w o r k I n v e n t o r y . I t w ill t e a c h v o u h o w to :
U s e th e G lo b a l N e tw o r k I n v e n to r y to o l
C EH Lab Manual Page 187 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
L a b E n v ir o n m e n t
T o c a n y o u t d ie la b , y o u n e e d :
ZZ לTools
demonstrated in ■ G l o b a l N e t w o r k I n v e n t o r y t o o l l o c a t e d a t D:\CEH-Tools\CEHv8 Module
this lab are 03 Scanning Networks\Scanning Tools\Global Network Inventory
available in Scanner
D:\CEH-
Tools\CEHv8 ■ Y o u c a n a ls o d o w n l o a d t h e l a t e s t v e r s i o n o f G l o b a l N e t w o r k I n v e n t o r y
Module 03 f r o m th is lin k
Scanning h t t p : / /w w w .m a g n e to s o f t.c o m /p r o d u c ts /g lo b a l n e tw o rk in v e n to r y /g n
Networks i f e a tu re s .h tm /
■ I f y o u d e c i d e t o d o w n l o a d t h e l a t e s t v e r s i o n , t h e n screenshots s h o w n
in th e la b m ig h t d iffe r
■ A w e b b ro w s e r w ith I n te r n e t acc e ss
■ F o l l o w d i e w iz a r d - d r iv e n in s ta l la t io n s te p s t o in s ta ll Global Network
Inventory
■ A d m in i s t r a ti v e p r iv ile g e s t o r u n to o l s
L a b D u r a t io n
T im e : 2 0 M i n u te s
O v e r v ie w o f G lo b a l N e t w o r k In v e n t o r y
Lab T asks
task 1
1. L a u n c h t h e S ta rt m e n u b y h o v e r i n g d i e m o u s e c u r s o r i n t h e l o w e r - l e f t
Scanning the c o rn e r o f d ie d e s k to p .
network
C EH Lab Manual Page 188 Ethical Hacking and Countermeasures Copyright O by EC ־Coundl
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
5 t 9 |־׳£ Administrator
fL m * וי
Control Hypr-V SQLServs
Panel Wtual
Machine.
Scan computers by IP
*J ■F *
Command Mozfla
range, by domain, single Prompt £11*10*
computers, or computers,
defined by the Global
£
Mww&plcm B
Network Inventory host S- Bui
Search01.. Global
file Nec»ort
PutBap © H
& S c a n only
items that you
need by
customizing scan
elements
C EH Lab Manual Page 189 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
□ Reliable IP
detection and
identification of
network
appliances such
as network
printers,
document
centers, hubs,
and other devices
6. N o w s w it c h b a c k t o W i n d o w s S e r v e r 2 0 1 2 m a c h i n e , a n d a n e w A u d i t
W i z a r d w i n d o w w ill a p p e a r . C lic k Next ( o r i n d i e t o o l b a r s e le c t Scan ta b
a n d c lic k Launch audit wizard).
VIEWS SCAN
RE S UL TS ,
/ NCL UD/ NC
HISTORIC
RE S UL TS
FOR ALL To continue, click Next.
SCANS,
INDIVIDUAL c Back Next > Cancel
C EH Lab Manual Page 190 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
To continue, c ic k Next.
______
C EH Lab Manual Page 191 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
comes with
dozens of OConnect as cxrrertiy logged on user
( • ) Connect as
customizable a d ^ iriS '3 (-•׳
Domain \ User name
reports. New
reports can be
Password
...........'
easily added
through the user
interface
C EH Lab Manual Page 192 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
iJ Scan progress
@ Open this dialog sdien scan starts Elapsed time: 0 min 6 sec
@ Close this dialog when scan completes Scanned nodes: 0 /24
. Sl0p _ Cl°” 1/
FIGURE 11.10: Global Network Inventory Scanning Progress
Pi'v -
fie V ie w Stan Tools Reports
□]E
H elp
C EH Lab Manual Page 193 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
& * Global Network Type ״ HoitN » SMtu: י MAC A * Vanda » CJS * Proceisci wCornu w r »
J Duiein * ׳o ^ e n a j p COUNT-11
Inventory grid color JIPA ddrew 10XL0.7 (COUNT =1ן
scheme is completely TncU aro: G/22/2012 3:36:38 PM (COUNT-1)
customizable. ■» C5T0J. jV/N 039MR Succe« |D4־BE D 9 C |R cakk ntsfR] Corc(TM' Send: H202!
You can change Global
Network Inventory colors
by selecting Tools | Grid
colors from main menu
and changing colors
Re»dy ^esufc^jto^jegt^oj^ca^o^oc^cdfcj^
*5 ' □ ]e t 1 1^-sa a w-
▼ a x
נכk Mcritofj |{jjjj Logical dska ^ CX>k&tszi mo "Sntcn | j* Networx oocpteo
n 1*a □ * a y w cto i ( j S^eton dot• Hoi focce Q Socuty ccrto■ J Startup |H Dcck!op
Nam• Sn Dovcoi [# J NoifcKJS |^ Sharoe U w group( ^ U*«ra LoggoCon^
- !■ יA 1addrestM -: Tp-M<tyrte-r Q :■^:•;ore ^ MantcsrdJ *5 י *י
S ״f WORKGROUP uperatmg ®]^ jan rm y Scanl#|| :., !־■=!;•׳Q p !=■| »־ ^ervces
^lj1CM7^iN-D^.־.־l
:■I lOiXOi’^N-ULYC"
םTo configure
Hcs4 H.. - Status ־״MAC A... ■״־barrio- ~ O S K s rw ־יPrco3350r.. ״יCorrmert■״
results history d t ' o m a r : \ v t R r . i i - O U ׳ ־l .־JLrJ -־
Id Tn rg ra « p B /2 2 ;2 P lZ 3 -3 6 ^ P M [ C D U H r = l l
| Results history | ;*» Ccnpu |WM-039VIR|S1jrowt rU-BF-D»C:|R^rri lrvel(R)Core(TM; Seiial H??ר
C EH Lab Manual Page 194 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
101*1ו
16. T l i e Memory ta b s u m m a r i z e s d i e m e m o r y i n y o u r s c a n n e d m a c h i n e .
mail address that ** s« a □ מ « * I j0> tf| Operating S,׳d-• Q 1י»ת0 ו׳*חווו | 'J. b*r/1r*c
N am * "J* y - . •■ ־ ■ ־ ־ c t*n o c t« ׳׳■)׳ti״ fff ■
t•5 ■׳startup |k >י»»«ים
people should use H % A ll *d d tess e* D»ve*t [#] N *BI0S |I Shw*1 p UMfcro״ %- IIwt or
when sending e- 4 # WORKGROUP
j MwitMV f l w f «
*■־w p y ־
mail to you at this ■m I0.C .0.4 (W IN -U L Y 8 ...
account. The e-
Td a lP h ^ c d v e n w x / .M a - S a la b le H -yrea... - Total vfc u a L. ~ A v a to e V rtja ... - lo t a ...- - ftvalable..■-
mail address must d[D V .C R t 5 F 0 U P [C r M J N '= ] J
for example,
someone@mycom
pany.com
7 o b i 1 its u ;1
Results history depth: Last scan for each address O iip la /e d group: A ll groups
1 7 . I n d i e N etBIO S s e c t io n , c o m p l e t e d e ta ils c a n b e v ie w e d .
C EH Lab Manual Page 195 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
! □ is ? i B i a i a s p 5 ! ■ !a & » B
V*y* results
Mencry ®S Memory device(
Toid3i.enld
Rea fly Remits history depth ia<t scan ret earn naorett t»< pt»/»d g ro u p : All g ro u p s
[□ E T |E p |g |B ) |• ־IB; * a ■a
□ Name -
2 Conjutasrrf— Q Prccc350ra |^ Marboard I^J) M em ory מMcntcrycfcvccs
Specifies HI as a □ *3 $ »־ccc •I־: k Ventרה Locicoldbks ^ D»sdr>c* ■יPrrtco •> Netted־,odatfco
the friendly name Narr« m #> CIO כjj] OpcralinqCyslcrr Q n -nvrormont
*i* All address•: 7י Q ij0 «• cr J Ctoitup ■ Deaktoo
associated with - i f WORKGROUP ^ Devicc: It#] NetClDC ^ Shares |J? Jxryw A - _bera I, Lojj=dor
your e-mail ? S iiilL
»•ia iJiw N S :׳
address. When
you send H o s tN c n e ־/ / * -D39-4R5H L9E4(C OU N T-51
TU0I5 i cn|i|
Rsad/ RcsuMts history depth: Lost scan foi each ooaes! Displayed group; All qioupa
C EH Lab Manual Page 196 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Rod/ Results fcitory depth lost icon lor toch address Oowove^rou^lUroups
2 0 . T h e Port connectors s e c t io n s h o w s p o r t s c o n n e c t e d i n d i e n e tw o r k .
1S
vipwr^ui: wax NetBIOS £ Sharps J i. Lfte 1 User* | Logged on
Outgoing mail a שb # n Fiocessois ^ M<ji1 b0 f J may Memory d evus
(SMTP) ־Specifies your Name L. l-bntcrj £ Logcal disks D: •£׳־ Networx 0d3?1cr:
Simple Mail Transfer H- All SddtKteS ; c j n c u r r r jr , * WOS |S ) 0p«1fcrg S y r« r —ן Q fcrvronm^nt | S «m :«
f r £* WORKGROUP
Protocol (SMTP) server for Portconnectors JO ^ hrr י a Startup !r j Desktop
■»F ll^ T fMM־״Di־9■־־־־־
outgoing messages
0 ^10 «־.(W׳fW׳N־ULY8""
2 1 . T h e Service s e c t io n g iv e d i e d e ta ils o f d ie s e r v ic e s in s ta l le d i n d i e m a c h i n e .
C EH Lab Manual Page 197 Ethical Hacking and Countermeasures Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Configure reports
N»♦ -
from the main z i Domr* V»ORC13RO UP |CDUMI«l4/)
_!J Hcs* ׳sLan^ WIM^»IR5HL9E4(COUNT■!47|
menu, click zi rr^ an p 3/22!20H 3 3&38FM [COUNT =147)
the Add button on . Ldcte A c x b 2t U pcare S e r/ c e 41loma1׳e R u fM rg ־־: 'P?! 1g -a n F ilei [vf־fc)\Comrmn Fite'iAdobi
& A security Narr< y Tort c«m ed oo Q System alots |^ Hotfixes ^ Ccc^rfy eerier j* Startup |H Desktop
B V^l All addr»<«#e H Scan ajrrrcrv ^ 80S |׳jgj] Cporatrj Syotom IrwUkd •oftwuo B Envtrontnonrt I ׳J, Sorvcoo
account y ~ * £ WORKGROUP h■ v®00 1- ?מ |v
password is ■- m o ״M ( w n ' u’l ^ " . " ’
created to make
sure that no other
user can log on to
Global Network - Tinettarp: 1rj2>2 3 3 6 : 3 3 3 2 ־FM (COUNT-11
ך g • W w iih w lE fo . |P4:BE:D9:C|100.D7 l2552EE.2g|1H.01 [vicreolt |E therrct QIC|N0
Inventory. By
default, Global
Network
Inventory uses a
blank password I otall ren^j
Rea^ ^esujt^jjto^jepth^as^a^o^seJ^ddrts^
L a b A n a ly s is
C EH Lab Manual Page 198 Ethical Hacking and Countermeasures Copyright O by EC ־Counc11
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
I P S c a n R a n g e : 1 0 .0 .0 .1 — 1 0 .0 .0 .5 0
S c a n n e d I P A d d r e s s : 1 0 .0 .0 .7 ,1 0 .0 .0 .4
R e s u lt:
■ S can su m m a ry
■ B io s
G lo b a l N e tw o r k
■ M e m o ry
In v e n to ry
■ N e tB IO S
■ U se rG ro u p
■ L ogged O n
■ P o rt c o n n e c to r
■ S e rv ic e s
■ N e tw o rk A d a p te r
PL E A S E TALK T O Y O U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S LAB.
Q u e s t io n s
1. C a n G lo b a l N e tw o r k In v e n to r y a u d it re m o te c o m p u te rs a n d n e tw o rk
a p p lia n c e s , a n d i f y e s , h o w ?
2. H o w c a n y o u e x p o r t th e G lo b a l N e tw o r k a g e n t to a s h a re d n e tw o rk
d ir e c to r y ?
In te r n e t C o n n e c tio n R e q u ire d
□ Yes 0 No
P la tfo rm Supported
0 C lassro om 0 iL a b s
C EH Lab Manual Page 199 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
I C O N K E Y
L a b S c e n a r io
p=7
V a lu a b le
111 t h e p r e v i o u s l a b , y o u g a t h e r e d i n f o r m a t i o n l i k e scan s u m m a ry , N e tB IO S
in f o r m a t io n
d e t a ils , s e r v ic e s r u n n i n g o n a c o m p u t e r , e tc . u s i n g G l o b a l N e t w o r k I n v e n t o r y .
Test your
k n o w le d g e N e tB IO S p r o v id e s p ro g ra m s w ith a u n if o r m set o f c o m m a n d s f o r r e q u e s t in g
d i e l o w e r - l e v e l s e r v ic e s d i a t d i e p r o g r a m s m u s t h a v e t o m a n a g e n a m e s , c o n d u c t
w W e b e x e r c is e
s e s s io n s , a n d send d a ta g ra m s b e tw e e n nodes on a n e tw o r k . V u ln e r a b ility lia s
o v e r T C P /IP ( N e t B T ) s e r v ic e s , t h e N e t B I O S N a m e S e rv e r ( N B N S ) . W it h d iis
s e r v ic e , t h e a tta c k e r c a n fin d a c o m p u t e r ’s I P a d d re s s by u s in g it s N e tB IO S
n a m e , a n d v ic e v e r s a . T h e r e s p o n s e t o a N e t B T n a m e s e r v ic e q u e r y m a y c o n t a in
s e r v ic e q u e r y a n d t h e n l o o k i n g c a r e fu lly a t th e re s p o n s e to d e te r m in e w h e t h e r
a n y ra n d o m d a ta f r o m t h a t c o m p u t e r 's m e m o r y is in c l u d e d .
b lo c k s u c h In t e r n e t- b a s e d a tta c k s b lo c k th e p o r t 1 3 7 U s e r D a ta g r a m P ro to c o l
u s in g P r o x y S w it c h e r .
L a b O b je c t iv e s
T h is la b w i l l s h o w y o u h o w n e t w o r k s c a n b e s c a n n e d a n d h o w to use P ro x y
S w it c h e r . I t w i l l te a c h y o u h o w to :
■ H id e y o u r IP a d d re s s f r o m th e w e b s ite s y o u v is it
■ P r o x y s e rv e r s w itc h in g f o r im p r o v e d a n o n y m o u s s u r fin g
C E H Lab M anual Page 200 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
L a b E n v ir o n m e n t
T o c a n y o u t th e la b , y o u n e e d :
a va ila b le in ■ I f y o u d e c id e t o d o w n l o a d t h e la t e s t v e r s io n , t h e n s c r e e n s h o t s s h o w n i n
D:\CEH-
t h e la b m i g h t d i f f e r
Tools\CEHv8
M odule 03 ■ A c o m p u te r r u n n in g W indows Server 2012
S canning
■ A w e b b ro w s e r w ith In te r n e t access
N e tw o rks
■ F o l lo w W iz a r d - d r iv e n in s t a lla t io n s te p s t o in s t a ll Proxy Sw itch er
■ A d m i n i s t r a t i v e p r iv ile g e s t o r u n t o o ls
L a b D u r a t io n
T im e : 1 5 M in u te s
O v e r v ie w o f P r o x y S w it c h e r
n e t w o r k c o n n e c t io n . A s t h e n a m e in d ic a te s , P r o x y S w it c h e r c o m e s w i t h s o m e
d e f a u l t a c t i o n s , f o r e x a m p l e , s e t t i n g p r o x y s e t t in g s f o r I n t e r n e t E x p l o r e r , F i r e f o x ,
a n d O p e ra .
L a b T a s k s
C l A u to m a tic
1. In s t a ll P r o x y W o r k b e n c h i n W indows Server 2012 ( H o s t M a c h in e )
change o f proxy
c o n fig u ra tio n s (or 2. D:\CEH-Tools\CEHv8 Module 03 Scanning
P r o x y S w it c h e r is lo c a t e d a t
any o th e r a ctio n ) Netw orks\Proxy Tools\Proxy S w itch e r
based on n e tw o rk
in fo rm a tio n 3. F o llo w th e w iz a r d - d r iv e n in s t a lla t io n s te p s a n d in s t a ll i t i n a ll p la t f o r m s
4. T h is la b w i l l w o r k i n th e C E H la b e n v ir o n m e n t - o n W indow s S e rve r
2012, W indow s S e rve r 2008 יa n d W indow s 7
c lic k Options in d ie m e n u b a r.
C E H Lab M anual Page 201 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Qownloatfs CW-I
moderns c m * v *«״A
S<* UpS^K.
e •!1• -■cc9u fi *
♦You Images Documents Calendar Mote •
C3 Often different Search Web Developer
Page Info
internet Sign n
Cle«r Recent Ustsr. 01 +“ Sh1ft*IW
connections
require
com pletely
different proxy
server settings G o o g le
and it's a real pain
to change them
m anually Gocgie Search I'm feeling Lucky
6 11
A .««t> ng Piogam m ei Business SolUion* P ir a c y t Te •Google Aboul Google Google com
§י & ם % p * k 3
General Tabs Content Applications Privacy Secuiity S>nc Advanced
Connection
c o m p a tib le w ith In te r n e t
Cached W eb Content
E x p lo r e r , F ir e fo x , O p e ra
Your vreb content cache >scurrently using 8.7 M B of disk space Clear Now
a n d o th e r p ro g ra m s
I I Override a u to m ate cache m anagem ent
You 1 application cache is c jiie n t l/ using 0 bytes 0 1 disk space Clear Nov/
B a r eve..
OK Cancel Help
F IG U R E 1 2 2 F ire fo x N e tw o rk Settin g s
C E H Lab M anual Page 202 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
O No prox^
No Pro>y f o r
localhcst, 127.0.0.1
Reload
OK Cancel Help
8. N o w t o I n s t a ll P r o x y S w it c h e r S ta n d a r d , f o l l o w th e w iz a r d - d r iv e n
in s t a lla t io n s te p s .
9. T o la u n c h P r o x y S w it c h e r S ta n d a r d , g o t o S ta rt m e n u b y h o v e r in g d ie
m o u s e c u r s o r in d ie lo w e r - le ft c o r n e r o f th e d e s k to p .
TASK 1
Proxy Servers
Downloading
F IG U R E 1 2 4 : W m d cK vs S e rv e r 2012 - D e s k to p v ie w
O R
C E H Lab M anual Page 203 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
A d m in is tra to r ^
S ta rt
Fsb W * 91 S I
is free to use
w ith o ut lim itations Compute Control Hyper-V
Panel
for personal and Machine... Centof...
v rr *
£«p«- <0 *
Proxy
Checker
F IG U R E 125 : W in d o w s S e rv e r 2012 - A p p s
at* o
ם i f th e s e rv e r b e c o m e s
in a c c e s s ib le P r o x y S w itc h e r
s S e rv e r.
Customize... ja te D a ta c e n te r
w ill tr y to fin d w o rk in g
p ro x y s e rv e r ־a re d d is h
^ D p ^ u ild 8400
b a c k g ro u n d w ill b e A /Q \ t— 1 l A r - r ״/ 1! ׳
d is p la y e d t ill a w o rk in g
p ro x y s e rv e r is fo u n d .
F IG U R E 126 : S e le ct P ro x y S w itc h e r
N ext
C E H Lab M anual Page 204 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
F IG U R E 12 7 : P ro x y L is t w iz a rd
& ־Proxy
s w itc h in g from Common Tasks
com m and line (•) find New Servers. Rescan Servers. Recheck Dead
(can be used a t O Find 100 New Proxy Servers
logon to O find New Proxy Severs Located in a Specific Country
a u to m a tic a lly s e t O Rescan Working and Anonymous Proxy Servers
co n n e ctio n
se tting s).
F IG U R E 12.8: S e le c t co m m o n tasks
C E H Lab M anual Page 205 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Caned
DL
&
F IG U R E 1 2 9 : L is t o f d o w n lo a d e e d P r o s y S e rv e r
Cancel
F IG U R E 1 21 0: C lic k o n S ta rt b u tto n
p r o x y s e rv e rs .
C E H Lab M anual Page 206 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
33/32
IS illi& S S itS iS k
F IG U R E 1211: S e le ctin g d o w n lo a d e d P ro x y se rve r fro m B a s ic A n o n y m ity
p r o x y s e rv e r, a n d c lic k d ie
fTJ ic o n .
f lit
a (3 P ro x y S w itc h e r U n r e g is te r e d ( D ir e c t C o n n e c tio n ) 1~ l~a ! *
3 # □ ׳n [a a. a a if j \
Px»y Scanner £5 Server
2 \y
State
A Li s |
He>ponte
י/ | Proxy S«rvera
Lointiy
|X j
F IG U R E 1 2 1 2 S e le ctin g th e p ro x y se rve r
c o n n e c t io n ic o n .
C E H Lab M anual Page 207 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
2l8.152.121.1&4:8030tested as [fAlve-SSL!
218.152.121.184:8030tested as (Alive]
host54-159-110-95 9»rverdedicati arnba 8080 גtested as RAIve-SSL)]
031.147.48.116.atotc.nctvigator.con>:3123tested09 [(Mrvc SSL))
E a u c An on ym ity ML
£□ S ta rtin g from
18. G o to a w e b b ro w se r ( F ir e fo x ) , a n d ty p e d ie f o llo w in g U R L
version 3.0 Proxy
h t t p : / / w ^ v . p r o x y s w i t c h e r , c o m / c h e c L p h p t o c h e c k d i e s e le c t e d p r o x y
S w itc h e r
s e r v e r c o m i e t i v i t y ; i f i t i s s u c c e s s f u l l y c o n n c t e d , t h e n i t s h o w 's d i e f o l l o w i n g
in co rp o ra te s
in te rn a l pro xy fig u r e .
a p p lic a tio n s
(besides In te rn e t
E xplorer) th a t
Your possible IP address is: 2 0 2 .5 3 .1 1 .1 3 0 , 1 9 2 .1 6 8 .1 .1
s u p p o rt HTTP
Location: U nknow n
p ro xy v ia Proxy
S w itc h e r. By
Proxy Inform ation
d e fa u lt it w a its fo r Proxy Server: DFTFCTFD
c o n n e c tio n s on Proxy IP: 95.110.159.67
Proxy Country: Unknown
localhost:3 128
F IG U R E 121 4: D e te c te d P ro x y se rve r
p ro x y .
C E H Lab M anual Page 208 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
*Tu Ricerca Immagini Maps Play YouTube Mews Gmail Document! Calendar Utao
G o o g le proxy server
03 A fte r th e an o n ym o u s
p ro x y se rve rs h ave b eco m e Ricerca
ava ila b le fo r sw itc h in g yo u
c a n a ctiv a te a n y o n e to
b e co m e in v is ib le fo r th e sites Proxy Wikipodia
y o u v isit. Immagin■
1 11
it.wkj ped a.org/tv k •Pioxy
In informatica e telecomunica^ow un proxy 6 un programma che si mleipone tra un
client ed un server farendo da trainee o neerfaccia tra 1 due host owero ...
Maps
Alt/i usi del termrne Proxy Pioxy HTTP Note Voo correlate
Video
Public Proxy Servers - Free Proxy Server List
Noose ivwiv publicpfoxyserveis conV Tiacua questa pagina
Public Proxy Server* is a free and *!dependent proxy checking system. Our service
Shopping
helps you to protect your Ktently and bypass surfing restrictions since 2002.
Ptu contanuti Proxy Servers -Sored By Rating -Proxy Servers Sorted By Country -Useful Links
L a b A n a ly s is
y o u d i s c o v e r e d d u r i n g d i e la b .
S e r v e r : L i s t o f a v a ila b le P r o x y s e r v e r s
S e le c te d P r o x y S e r v e r I P A d d r e s s : 9 5 .1 1 0 .1 5 9 .5 4
P r o x y S w it c h e r
S e le c te d P r o x y C o u n t r y N a m e : I T A L Y
R e s u lte d P r o x y s e r v e r I P A d d r e s s : 9 5 .1 1 0 .1 5 9 .6 7
P L E A S E T A L K T O Y O U R I N S T R U C T O R I F Y O U H A V E Q U E S T I O N S
R E L A T E D T O T H I S L A B .
Q u e s t io n s
1. E x a m in e w h i c h te c h n o lo g ie s a re u s e d f o r P r o x y S w it c h e r .
2. E v a lu a t e w h y P r o x y S w it c h e r is n o t o p e n s o u r c e .
C E H Lab M anual Page 209 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
In t e r n e t C o n n e c tio n R e q u ir e d
0 Y es □ N o
P la tfo r m S u p p o rte d
0 C la s s r o o m □ iL a b s
C E H Lab M anual Page 210 Eth ica l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Lab
w
1 3
i
I C O N K E Y L a b S c e n a r io
2 3 ־V a lu a b le
Y o u h a v e le a r n e d i n d ie p r e v io u s la b h o w to h id e y o u r a c tu a l IP u s in g a P r o x y
in fo r m a tio n
S w it c h e r a n d b ro w s e a n o n y m o u s ly . S im ila r ly a n a tta c k e r w i t h m a lic io u s in te n t
Test your can pose as som eone e ls e u s in g a p ro x y s e rv e r and g a th e r in fo r m a t io n lik e
k n o w le d g e
account o r bank d e ta ils o f an in d iv id u a l by p e r fo r m in g s o c ia l e n g in e e rin g .
ס W e b e x e r c is e O nce a tta c k e r g a in s r e le v a n t in f o r m a t io n he o r she can hack in to th a t
a d m in is tr a to r s t o tra c e d ie re a l s o u rc e o f a tta c k s .
A s a n a d m i n i s t r a t o r y o u s h o u l d b e a b le t o p r e v e n t s u c h a t t a c k s b y d e p l o y i n g a n
in t r u s io n d e te c tio n s y s te m w it h w h ic h y o u c a n c o lle c t n e t w o r k in f o r m a t io n fo r
a n a ly s is t o d e t e r m in e i f a n a tta c k o r in tr u s io n h a s o c c u rre d . Y o u c a n a ls o u s e
P roxy W o rk b e n c h to u n d e rs ta n d h o w n e tw o r k s a re s c a n n e d .
L a b O b je c t iv e s
T h is la b w i l l s h o w y o u h o w n e tw o r k s c a n b e s c a n n e d a n d h o w t o u s e P r o x y
W o r k b e n c h . I t w ill te a c h y o u h o w to :
■ U s e th e P r o x y W o r k b e n c h to o l
■ D a i s y c h a i n t h e W ’i n d o w s H o s t M a c h i n e a n d V i r t u a l M a c h i n e s
L a b E n v ir o n m e n t
T o c a r r y o u t th e la b , y o u n e e d :
C E H Lab M anual Page 211 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Y o u c a n a ls o d o w n l o a d t h e la t e s t v e r s io n o f P ro x y W o rk b e n c h fro m
th is lab are t h e la b m i g h t d i f f e r
a va ila b le in
A c o m p u te r r u n n in g W indow s Server 2012 as a tta c k e r ( h o s t m a c h in e )
D:\CEH-
Tools\CEHv8 A n o t h e r c o m p u te r r u n n in g W indow Server 2008, and W indow s 7 as
M odule 03 v ic tim ( v ir t u a l m a c h in e )
S canning
A w e b b ro w s e r w ith In te rn e t access
N e tw o rks
F o l l o w W iz a r d - d r iv e n in s t a lla t io n s te p s t o in s t a ll Proxy W orkbench
A d m i n i s t r a t i v e p r iv ile g e s t o r u n t o o ls
L a b D u r a t io n
T im e : 2 0 M in u te s
O v e r v ie w o f P ro x y W o rk b e n c h
P r o x y W o r k b e n c h is a p r o x y s e r v e r t h a t d i s p l a y s i t s d a t a i n r e a l t i m e . T h e d a t a
f l o w i n g b e t w e e n w e b b r o w s e r a n d w e b s e r v e r e v e n a n a ly z e s F T P i n p a s s iv e a n d
a c tiv e m o d e s .
L a b T a s k s
n e tw o rk . They S ca n n in g N e tw o rk s \P ro x y T o o ls \P ro x y W o rkb e n ch
can help preve nt ר Y o u c a n a ls o d o w n l o a d t h e la t e s t v e r s io n o f P roxy W o rkb e n ch fro m
s e c u rity a tta c k s
th is l i n k h t t p : / / p r o x y w o r k b e n c h . c o m
as th e only w a y
in to th e n e tw o rk 4. F o llo w th e w iz a r d - d r iv e n in s t a lla t io n s te p s a n d in s t a ll i t i n a ll p la t f o r m s
fro m th e In te rn e t o f W in d o w s o p e ra tin g sy s te m
is via th e p ro xy _
T h is la b w i l l w o r k i n th e C E F I la b e n v ir o n m e n t - o n W in d o w s S e rve r
serve r
2012, W in d o w s S e rve r 2 0 0 8 י and W in d o w s 7
6. O p e n F ir e fo x b r o w s e r in y o u r W in d o w s S e rve r 2012, a n d g o to T o o ls
a n d c lic k o p tio n s
C E H Lab M anual Page 212 E th ic a l H ackin g and Counterm easures Copyright O by E C •Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
Qownloatfs CW-I
moderns
S<* UpS^K.
c m * v *«״A
e •!1• -■cc9u fi *
♦You Search Images Web Developer Documents Calendar Mote •
Page Info
5 «ז1 £ ו1*«) ז6 ״ ז י ה י9 Sign n
Cle«r Recent U stsr. Cl 1+“ Sh1ft*IW
G o o g le
Gocgie Search I'm feeling Lucky
11
AtfM«t «Mg Piogammei Bumoeti SolUion* Piracy t Te •Google Aboul Google Google com
N e tw o rk t a b , a n d d ie n c lic k Settings.
Options
§י & ם % p 3
General Tabs Content Applications Privacy Security S>nc Advanced
f t T h e s o c k e ts p a n e l j
General | MetworV Update | Encryption j
sh o w s th e n u m b e r o f A liv e
Connection
s o c k e t c o n n e c tio n s th a t
P r o x y W o r k b e n c h is Configure h o * h re fo i connects to the Internet | S g t n g i.
m a n a g in g . D u r in g p e rio d s
o f n o a c tiv ity th is w ill d ro p Cached Web Content
b a c k to z e ro S e le c t Your w eb content cache 5יcurrently using 8.7 M B of disk space Clear Now
You 1 application cache is c jiie n t l/ using 0 bytes of disk space Clear Nov/
B a r eve..
OK Cancel Help
C E H Lab M anual Page 213 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Rgload
OK Cancel Help
1 1 . L a u n c h th e S ta rt m e n u b y h o v e r in g d ie m o u s e c u r s o r i n th e lo w e r - le f t
c o r n e r o f th e d e s k to p .
S c a n c o m p u te rs b y I P
ra n g e , b y d o m a in , s in g le
c o m p u te rs , o r c o m p u te rs ,
d e fin e d b y th e G lo b a l
N e tw o r k In v e n to r y h o s t
file 4 W indows Server 2012
WaoomW1P iW 2 taeneCjickttr 0H iK tT r
baLMcncowtuid MO.
g. - ?•
F IG U R E 13.4: W in d o w s S e rv e r 2012 - D e s k to p v ie w
C E H Lab M anual Page 214 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
S T h e e v e n ts p a n e l Fa m • וי
d is p la y s th e to ta l n u m b e r
o f e v e n ts th a t P ro x y Control HyperV SO I Server
Pand Virtual
W o r k b e n c h h a s in Machine ״
m e m o ry . B y c le a rin g th e
W
d a ta ( F ile > ־C le a r A ll
D a t a ) th is w ill d e c re a s e to Command MO? 113 Searct101_
z e ro i f th e re a re n o
c o n n e c tio n s th a t a re A liv e
£ Prompt
H
Firefox
O
dobai Proxy
Network Woricbenu.
Inventory
Detkc Si
F IG U R E 13.5: W in d o w s S e rv e r 2012 - A p p s
fig u r e .
Proxy Workbench H I
File V ie w T o o ls H e lp
< III
>
1
Memory: 95 KByte Sockets: 1CO Events: 754 u n ; 1iciu ic . u n ; 11 7angwrrx?n— Luyymy. u n ; .
J
F IG U R E 13.6: P ro x v W o rk b e n c h m a in w in d o w
C E H Lab M anual Page 215 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Proxy Workbench
File View IL^o o ls J Help
5
Monitoring: W
Save Data...
Configure Ports.
U- 3
=tails for All Activity
Failure Simulation... m n ih m
All Activity |10m | T0 I Protocol | Started ^
^ SMTF Real Tim e 9־י099 • ח י J 127.0.0.151199 173.194.36.24:80(w»w*.g.. HTTP 18:23:39.3}
POPd Options... tJ 127.0.0.1 51201 74.125.31.106:80|pt4ao HTTP 18:23:59.0־
& The *Show th e k # HTTP T־־TWny TTWU(WW) 3d 127.0.0.1 51203 173.19436.21:443(naig. HTTP 18:24:50.6(
real tim e data ^ HTTPS Proxy • Secure Web |443) £ J 127.0.0.151205 173.19436.21:443(na*g HTTP 18:24:59.8'
^ FTP • File T ransler Protocol (21)
;jd 127.0.0.151207 173.1943621:443(naig HTTP 18:25:08.9־
w in d o w ' a llo w s Pass Through ■For Testing Apps (1000) l1?7nn1-5־R1911 17׳n *־c״* ול־n » ו*י׳וHTTP ■ m - w ip r
>
th e u ser to
Real time data for All Activity
s p e c ify w h e th e r
000032 / l.1 ..User-Agent 2f 31 2e 31 Od 0a 55 73
th e re al-tim e d ata 000048 : Mozilla/5.0 (W 3a 20 4d 6f 7a 69 6c 6c
000064 indows NT 6.2; U 69 be 64 6f 77 ?3 20 4e
pane should be 000080 OU64; rv :14.0) G 4f 57 36 34 3b 20 72 76
000096 ecko/20100101 Fi 65 b3 6b 6£ 2f 32 30 31
displayed o r no t 000112 refox/14.0.1. Pr 72 65 66 6£ 78 2f 31 34
000128 oxy-Connection: 6f ?8 79 2d 43 6f 6e 6e
000144 keep-alive..Host 6b b5 65 70 2d 61 6c 69
000160 : mail.google.co 3a 20 6d 61 69 6c 2e 67
000176 m. . . . 6d Od 0a Od 0a
Memory: 95 KByte Sockets: 100 Events: 754 I eiiim a ic UII 11c1u4c. uu unuuic u i i L« ׳ty1c u n 1_<.yymy. u n ׳ju i
C E H Lab M anual Page 216 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
HTTP Properties
General
Port: Iftfififi
^ M a n y p e o p le
u n d e rs ta n d s o c k e ts m u c h
b e tte r th e n th e y
th in k . W h e n y o u s u r f th e
w e b a n d g o to a w e b s ite
c a lle d w w w a lta v is ta .c o m ,
y o u a re a c tu a lly d ire c tin g
y o u r w e b b ro w s e r to o p e n
a s o c k e t c o n n e c tio n to th e
s e rv e r c a lle d
" w w w .a lta v ia ta .c o m " w ith
p o r t n u m b e r 80
OK Cancel
F IG U R E 13.9: P r o s y W o rk b e n c h H T T P fo r P o r t 8080
F IG U R E 13.10: P ro x v W o rk b e n c h C o n fig u re d p ro x y
1 9 . R e p e a t d ie c o n f ig u r a t io n s te p s o f P r o x y W o r k b e n c h f r o m Step 1 1 to Step
1 5 i n W in d o w s S e r v e r 2 0 0 8 V i r t u a l M a c h in e s .
C E H Lab M anual Page 217 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
M a c h in e .
2 2 . P r o x y W o r k b e n c h G e n e ra te s d ie t r a f f ic w i l l b e g e n e ra te d as s h o w n i n d ie
& Proxy f o llo w in g fig u r e o f W indow s Server 2008
W orkbench
changes th is . Not 2 3 . C h e c k d ie To C o l u m n ; i t is f o r w a r d i n g d i e t r a f f i c t o 10.0.0.3 ( W in d o w s
o nly is it an S e rv e r 2 0 0 8 v ir t u a l M a c h in e ) .
aw esom e proxy
server, but you
Mcnfanj MN1r2CiU.׳;־43110002|
can see all o f th e | £4AOT*!>
^ SHIP 0.*!>>ו\»*<»׳1מ ן 0 ל7 w Muon »105גג.זמ 06.K2S.31T
data flo w in g ^1 CQC•) ■l^ff»-0^r»IH1(l
I.(flff:iilffllW'/tilHIUII 144a laccc » 0525&43 06052? סט A ׳•«־־-=־ UK
vr.
u -י
*0010041
laaaixzo
« 052*100
«05 261E
06052C92? CV9►*. ■ * 1 5 7
06®274B <V13r>M
4ca1facc tWJ
* « ? ׳•<״
Mar a y 3ES KBylei T» 1mnate 01( R cIlb c Qr 'h rb»f־ C m ^ ! ׳CK -oggrg 01( 613AM
A iL d
C E H Lab M anual Page 218 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
2 5 . S e le c t O n d i e w e b s e r v e r , c o n n e c t t o p o rt 80 in W indow s 7 v ir t u a l m a c h in e ,
a n d c lic k OK
-TTTP Properties
General |
Port: [fiflffi
2 6 . N o w C h e c k d ie tr a f f ic i n 10.0.0.7 ( W in d o w s 7 V ir t u a l M a c h in e ) “ TO”
c o lu m n s h o w s t r a f f ic g e n e ra te d f i o m d ie d if f e r e n t w e b s ite s b r o w s e d i n
« >»: ® o 11 1► ;>
■
הו7צ&ו
r*e VWur Toeli Help
Q2 In the
n*Vlet»7naQa7} DcUI1 t a H T T P IW - W « b 180801
C onnectio n Tree, f t All«5ctr»*y 1 laslSUto
m il►
B/*5 C25 1 BylesS
I
_L*a
74 3• 20
100031a 6871 209173 |4bc fl0< 000272 Btwt-Uimh 20 60 ?4 656a ?4 2d 4c 65 t>0 67 30 32 20 *3 68 4ל
ISL
F IG U R E 13.14: P r o s y W o rk b e n c h G e n e ra te d T ra ffic in W in d o w s 7 V ir tu a l M a c h in e
L a b A n a ly s is
p r o t o c o l s y o u d i s c o v e r e d d u r i n g d i e la b .
C E H Lab M anual Page 219 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P r o x y s e r v e r U s e d : 1 0 .0 .0 .7
P o rt s c a n n e d : 8080
P ro x y W o rk b e n c h
R e s u lt: T r a f f ic c a p tu re d b y w in d o w s 7 v ir t u a l
m a c h in e ( 1 0 .0 .0 .7 )
P L E A S E T A L K T O Y O U R I N S T R U C T O R I F Y O U H A V E Q U E S T I O N S
R E L A T E D T O T H I S L A B .
Q u e s t io n s
1. E x a m in e t h e C o n n e c t io n F a i lm e - T e r m i n a t io n a n d R e fu s a l.
2. E v a lu a te h o w r e a l- tim e lo g g in g r e c o r d s e v e r y t h in g i n P r o x y W o r k b e n c h .
In t e r n e t C o n n e c tio n R e q u ir e d
0 Y es □ N o
P la tfo r m S u p p o rte d
0 C la s s r o o m □ iL a b s
C E H Lab M anual Page 220 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
AB Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
I CON KEY L a b S c e n a r io
Q W o r k b o o k r e v ie w n e tw o rk . A n a tta c k e r m a y u s e a n e tw o r k p r o b e t o c a p tu r e r a w p a c k e t d a ta a n d
th e n u s e th is r a w p a c k e t d a ta t o r e tr ie v e p a c k e t i n f o r m a t io n s u c h as s o u rc e a n d
c h e c k s u m , T im e t o L iv e ( T I L ) , a n d p r o t o c o l ty p e .
T h e r e f o r e , a s a n e t w o r k a d m i n i s t r a t o r y o u s h o u l d b e a b le t o i d e n t i f y a t t a c k s b y
a d d re s s e s , p r o t o c o l ty p e , h e a d e r le n g th , s o u rc e a n d d e s tin a tio n p o r t s , e tc . a n d
c o m p a r e th e s e d e ta ils w i t h m o d e le d a t t a c k s ig n a tu r e s t o d e te r m in e i f a n a tta c k
h a s o c c u r r e d . Y o u c a n a ls o c h e c k t h e a t t a c k lo g s f o r t h e l i s t o f a t t a c k s a n d ta k e
e v a s iv e a c t io n s .
A ls o , y o u s h o u ld b e f a m ilia r w i t h th e H T T P t u n n e lin g te c h n iq u e b y w h ic h y o u
c o n d u c t in g s im p le n e t w o r k a n d v u ln e r a b ilit y s c a n n in g a n d d e t e r m in e th e e x t e n t
to w h ic h a n e tw o r k ID S c a n i d e n t i f y m a lic io u s t r a f f i c w i t h i n a c o m m u n ic a t io n
c h a n n e l . 111 t h i s l a b y o u w i l l l e a r n H T T P T u n n e lin g u s in g H T T P o r t .
L a b O b je c t iv e s
T h is la b w i l l s h o w y o u h o w n e tw o rk s c a n b e s c a n n e d a n d h o w to use H T T P ort
and H T T H o st
L a b E n v ir o n m e n t
111d i e la b , v o u n e e d d ie H T T P o r t to o l.
C E H Lab M anual Page 221 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
■ Y o u c a n a ls o d o w n l o a d t h e la t e s t v e r s io n o f H T T P o rt fro m d ie lin k
h t t p : / / w w w .t a 1 g e t e d . o r g /
■ I f y o u d e c id e t o d o w n l o a d t h e la t e s t v e r s io n , t h e n s c r e e n s h o t s s h o w n i n
£ " Tools th e la b m i g h t d i f f e r
d em o nstrate d in
■ I n s t a ll H T T H o s t o n W in d o w s S erver 2008 V ir t u a l M a c h in e
th is lab are
ava ila b le in ■ I n s t a ll H T T P o r t o il W in d o w s S e rve r 2 0 1 2 H o s t M a c h in e
D:\CEH-
■ F o l lo w t h e w iz a r d - d r iv e n in s t a lla t io n s te p s a n d in s ta ll it.
Tools\CEHv8
M odule 03 ■ A d m in is tra tiv e p riv ile g e s is r e q u i r e d t o r u n d i i s t o o l
Scanning
N e tw o rks ■ T h is la b m ig h t n o t w o r k i f r e m o te s e r v e r f ilt e r s / b lo c k s H T T P tu n n e lin g
p a c k e ts
L a b D u r a t io n
T im e : 2 0 M in u te s
O verview o f H TTPort
HTTPort c re a te s a t r a n s p a r e n t t u n n e lin g t u n n e l d ir o u g h a p r o x y s e r v e r o r fir e w a ll.
H T T P o r t a llo w s u s in g a ll s o r ts o f I n t e r n e t S o f t w a r e f r o m b e h i n d d ie p r o x y . I t
bypasses HTTP p ro xie s and HTTP, fire w a lls , and tra n sp a re n t a ccelerators.
L a b T a s k s
Stopping IIS B e fo r e r u n n in g d ie t o o l y o u n e e d t o s to p IIS A dm in S ervice and World
S ervices W ide W eb Publishing se rvices on W indow s S erver 2008 v irtu a l m achine.
01 HTTPort
cre a te s a
tra n sp a re n t
tu nn el th ro ug h a
proxy se rve r or
fire w a ll. T his
a llo w s you to use
a ll so rts o f
In te rn e t s o ftw a re
fro m behind th e
proxy.
C E H Lab M anual Page 222 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
ץ Stana*.- J ~
>t:p jcrvce IL Acrrr StrVtt on LOCOCaiOutt*
F IG U R E 14.1: S to p p in g I I S A d m in S e rv ic e in W in d o w s S e rv e r 2008
& It bypasses
*te Action jjen Kels
HTTPS and HTTP E f IB
N^ltwl ריAb- [ >rrf | E
proxies, Servwj ClomJ) I S « v « « (lo ca l)
a c c e le ra to rs , and 2 8
י צn e servce
Rf*t»r; «יt t ' t e
'1
SfcvOU S’ Mijs. Coov MWU0K*...
CfetYea Mar^aoerent S e <׳־ce TUtWtbM..
11 1
C«so aion:
(V» ׳d f Web a n ־w r< r r end
0
^ «v׳xto/.9 Aucto ErekJrtit s J s e
1
Ha'sOeid...
־he W a P l..
b u ilt-in SOCKS4 » דדלמי׳ו־כ: חrr y .y ■ f c : ־rr ״r
lnforrr~-.cn 5e r a * ־Hjrage-
^ Y <־־to/.S Cotor SySteri
0
£ (M fld M Dectoymeot Sevces Serve Ha-aoesr...
^ M m s Driver Fourdaoon -Lee ״cce Diver “ ׳ * ־xr- Ha־׳aoe; u...
server. 1■״ 3 0 8
־.. «Y־־d ׳/.s & ׳ ׳Repo יט ׳Semoe 1
Ab ־.-sero... Ste tec
»/.9
i^ %Yrd ? ׳e i: Cotecto Thssevfc...
% \V'tkr/.$ ®׳e it uw Thssevfc... Stated
^!Y rd o/.s F»e.\dl ViW owsF.. . Stated
$*Yrd>/.e CngUi/ler I aat Adds, mod■.״
CJt«Yrtto/.9 1 1 ו׳5«קמי׳י׳«יו״ ftovd » a ... Stated
«v־׳d0/9 ModJes trwtalei & » a b « n s... Stated
C i« v׳xto/.® BioceM Activation Seivd I ^ r •יזל Undo... Stated
30
^ ■V'cto/n 5«mote M ׳V e*«״nt M Re*»t V J« o » ״B... Stated
try M ints *׳S.. . stated
a it m *■ »
^ %Y׳Yfew,« uoflat* stated
^ * v r H n p webP'oxvAuto-oaeovJ KrHTTPl...
^ . v <»׳-Autocar *c ^***TMC...
Perfcrwsrce Aflao*׳
H n y r B fi
060
Pre* ^־ ״
•\'08>'׳taecr bet) Stated
JE 3 S JB
\ £ x a r d e ; A Sarri8•: /
£־:c -T ;'׳g .'־,o'c y-1:c • ■er: -vb1?־n; ' r ׳c t.:• r: ; 0 ־־0 ^ ־
F IG U R E 1 4 2 : S to p p in g W o r ld W id e W e b S e rv ic e s in W in d o w s S e rv e r 2008
stro n g tra ffic Scanning N etw orks\T unneling Tools\H TTH ost
e n cryp tio n , w h ic h 5. O pen H TTHost fo ld e r a n d d o u b le c lic k htthost.exe .
m akes proxy
logging useless, 6. T lie H TTH ost w i z a r d w i l l o p e n ; s e le c t d i e O ptions ta b .
C E H Lab M anual Page 223 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
A pply
HTTHost 1.8.5
N etw ork
B ind lis te n in g to : P o rt: B ind e x t e r n a l to :
|0.0.0.0 [80 10.0.0.0
Allow a c c e s s fr o m : P e r s o n a l p a s s w o rd :
10.0.0.0
[־ P a s s th r o u g h u n r e c o g n iz e d r e q u e s t s to :
H o s t n a m e o r IP : P o rt: O rig in a l IP h e a d e r fie ld :
1127.0.0.1 |81 | x ־O rig in a l ־IP
m apping c o r n e r o f th e d e s k to p .
"E x te rn a l HTTP
p ro xy ״o f local
po rt
F IG U R E 14.4: W in d o w s S e rv e r 2012 - D e s k to p ^ ie w
C E H Lab M anual Page 224 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
5 t3 ft Administrator
i. m » 91 1
T ools
Con>puter Control Wyper-V SOI Server
d e m on stra te d in Panel Virtual incaknor
Machine... Cent•!.״
th is lab are
*נ V n
a va ila b le in
Command M021IU
D:\CEH- Prompt Firefox Nctwodc
£
Tools\CEHv8 ■
“ יי ■ ״ ״-
F־־־ © if
M odule 03 Proxy MegaPng
Workbea.
Scanning
N e tw o rks -T *8
F IG U R E 14.5: W in d o w s S e rv e r 2012 - A p p s
H ost n a m e o r IP a d d r e s s : Port:
F o r e a c h s o ftw a re to
c re a te c u s to m , g iv e n a ll th e
Proxy re q u ire s a u th e n tic a tio n
a d d re sse s fro m w h ic h it U se rn a m e : P assw ord!
o p e ra te s . F o r a p p lic a tio n s
th a t a re d y n a m ic a lly
c h a n g in g th e p o rts th e re
Misc. o p tio n s
S o c k s 4 - p ro x y m o d e , in
w h ic h th e s o ftw a re w ill U ser-A gent: B ypass m o d e :
c re a te a lo c a l s e rv e r S o c k s IE 6 .0
(1 2 7 .0 .0 .1 )
U se p e rs o n a l re m o te h o s t a t (b la n k = u s e public)
I------------------------------ P I--------------
F IG U R E 14.6: H T T P o r t M a in W in d o w
m a c h in e .
1 8 . 111 d i e U ser personal rem ote host a t s e c tio n , c lic k s ta rt and d ie n sto p and
b e 80.
C E H Lab M anual Page 225 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
19 . H e r e a n y p a s s w o r d c o u ld b e u s e d . H e r e a s a n e x a m p le : E n t e r d ie p a s s w o r d
as ‘*m agic״
In real w o rld
r|a HTTPort3.SNFM | 3 ' ־ x
environm ent,
S y s te m Proxy | p 0 rt m a p p in g | A bout | R e g iste r |
people som e tim e s
use passw ord HTTP p roxy to b y p a s s (b la n k = direct o r firewall)
U se p e rs o n a l re m o te h o s t a t (b la n k * u s e public)
H ost n a m e o r IP a d d re s s : *ort: P a s sv » rd :
|1 0 .0 .0 .4
I80 |............1
? | <—T his b u tto n h e lp s S ta rt
Built-in SOCKS4 se rv e r
W R un SOCKS s e rv e r (p o rt 108 0 )
A vailable in "R e m o te H ost" m o d e :
r Full SOCKS4 s u p p o rt (BIND)
? | 4— This b u tto n h e lp s
C E H Lab M anual Page 226 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Tools
re m o te , h o s t, n a m e
d em o nstrate d in (=J R e m o te po rt
th is lab are L_o
ava ila b le in S e le c t a m a p p in g to s e e sta tistic s : LEDs:
D:\CEH- No s ta ts - s e le c t a m a p p in g □ □□□
Tools\CEHv8 n /a x n /a B /sec n /a K O Proxy
M odule 03 Built-in SOCKS4 s e rv e r
Scanning W R un SOCKS s e rv e r (p o rt 1080)
N e tw o rks A vailable in " R e m o te H ost" m o d e :
r Full SOCKS4 s u p p o rt (BIND)
? | 4— T his b u tto n h e lp s
c lic k E dit a n d e n te r P o r t v a lu e t o 21
1 HTTPort 3.SNFM - 1° r x •
r*
1 S y s te m | Proxy Port m a p p in g | A bout | R e g iste r |
w e b p a rt of No s ta ts - inactive □□□ם
n /a x n /a B /sec n /a K O Proxy
M ic ro s o ft Search
Server 2008 w ill dulit־in server 1
C E H Lab M anual Page 227 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
H ost n a m e o r IP a d d r e s s : Port:
|1 0 .0 .0 .4 [80
Misc. o p tio n s
U ser-A gent: B y p ass m o d e :
IE 6 .0 נ ד [ R e m o te h o s t
U se p e rs o n a l re m o te h o s t a t (b la n k = u s e public)
p r o p e r ly .
HTTHost 1 A 5
A p p lic a tio n lo g :
M A IN : H T T H O S T 1 . 8 . 5 P ER S O N A L G IF T W A R E D E M O s t a r t i n g ^
M A IN : P r o je c t c o d e n a m e : 9 9 re d b a llo o n s
M A IN : W r it t e n b y D m it r y D v o in ik o v
M A IN : ( c ) 1 9 9 9 - 2 0 0 4 , D m it r y D v o in ik o v
M A IN : 6 4 t o t a l a v a ila b le c o n n e c t io n ( s )
M A IN : n e tv /o r k s t a r t e d
M A IN : R S A k e y s in it ia liz e d
M A IN : lo a d in g s e c u r ity f i l t e r s . . .
Q T o m a k e a d a ta tu n n e l
M A IN : lo a d e d f i l t e r " g r a n t . d l l " ( a llo w s a ll c o n n e c tio n s w ith in
th ro u g h th e p a s s w o rd
M A IN : lo a d e d f i l t e r " b l o c k . d l l " ( d e n ie s al I c o n n e c tio n s w ith ir
p ro te c te d p ro x y , s o w e c a n
M A IN : d o n e , t o t a l 2 f i l t e r ( s ) lo a d e d
m a p e x te rn a l w e b s ite to M A IN : u s in g t r a n s f e r e n c o d i n g : P r im e S c r a m b le r 6 4 / S e v e n T e
lo c a l p o rt, a n d fe d e ra te th e g r a n t . d l l: f ilt e r s c o n e c tio n s
s e a rc h re s u lt. b lo c k . d ll: f ilt e r s c o n e c tio n s
!L IS T E N E R : lis t e n in g a t C.C.0.C:sT|
z]
S ta tis tic s ( Application log O p t io n s S e c u r ity | S e n d a G ift
2 9 . G o t o W in d o w s F ir e w a ll w it h A dvanced S e cu rity
C E H Lab M anual Page 228 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
N ew Rule i n d i e r i g h t p a n e o f d i e w i n d o w .
Windows Firewall v/ith Advanced Security ■ -:° ־- ־
Fie Action View Help
Steps.
D rive in V irtu a l
M achines
C E H Lab M anual Page 229 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P ro to co l and Porta
Specify the protocols and ports to which ths r ie apofes
Steps
Q H T T P o r t d o e s n 't r e a lly !? m o te p o d s
c a re f o r th e p ro x y as s u c h ,
O Specific remoteports:
i t w o rk s p e r fe c tly w ith
Example 80.443.5000-5010
fire w a lls , tra n s p a re n t
a c c e le ra to rs , N A T s a n d
b a s ic a lly a n y th in g th a t le ts
H T T P p r o to c o l th ro u g h .
N ext
New O utbound Rule Wizard
Action
Q Youneedtoinstall htthost Specify the acton to be taken when סconnect!:>n notches the condticno specified in the n ie .
onaPC, whois generally
accessibleontheInternet - Steps:
typicallyyour "home" PC. This
4 HUe Type What acbon ohodd b« taken whon a connexion match08 tho opochod conoticno7
means that if yon starteda
Webserver on thehome PC, 4 Protocol and Porta
everyoneelsemust be ableto O Alowttv connection
connect toit. There aretwo 4 Action
Tho nclxJes cornoctiona that 0 סוpiotectod wth IPaoc 09 wel cs t103׳c otc not.
showstoppers for htthost on 4 Profile
homePCs O AlowItic cwviediui If MIs secuie
4 Name
Ths ncbdes only conredions that have been authent1:ated by usng IPsec. Comecticns
wil be secued using the settngs in IPsec p־op5rtes and nJes r the Correction Security
RuteTode.
'• ) H o c k th e c o n n e c tio n
C E H Lab M anual Page 230 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P rofile s e c t i o n ,
3 4 . 111 d i e s e le c t a ll th re e o p tio n s . The r u le w ill a p p ly to :
Desaiption (optional):
£ 3 T h e d e fa u lt T C P p o r t
< Back Finish Cancel
fo r F T P c o n n e c tio n is p o r t
2 1. S o m e tim e s th e lo c a l
In te r n e t S e rv ic e P r o v id e r
b lo c k s th is p o r t a n d th is
w ill re s u lt in F T P
3 6 . T h e n e w m le Port 21 B locked is c r e a t e d a s s h o w n i n d i e f o l l o w i n g f i g u r e .
^ H T T P o r t d o e s n 't re a lly ©BranchCache Peer Cn<o.er/ //SD Cut) BranchCache •Peer Discove.. Al V Filter by Group
c a re f o r th e p ro x y as su ch :
© Core Networking ־DNS(UDP-OutJ Core Networking Al View
© C o ir Networking- Dynamic Hod Config.. Core Networking Al
i t w o rk s p e r fe c tly w ith
© Core Networking -Dynamic Host Corvfig... Core Networking Al (Oj Refresh
fire w a lls , tra n s p a re n t © Core Networking -Group Pcfccy CLSASS-- Core Networking Domain [a» Export List...
a c c e le ra to rs , N A T s a n d @PCore Netwoit'ing - Grcup PcEcy (fJP-Out) CoreNetworking Domain Li Help
b a s ic a lly a n y th in g th a t le ts © Core Networking - Group Poicy (TCP-O-. Core Networking Domain
th e H T T P p ro to c o l
© Core Networking - internet Group Mana... Core Networking Al Port 21Blocked
© Core Ndwwiing- lPHTTPS(TCP-OutJ Cote Networking Al * Disable Rule
th ro u g h . © Core Networking - (Pw6-0ut) Core Networking Al
© Core Networking Listener Do ״Core Networking Al 4 cut
© Core Networking Muh < yt* listener O j״. Core Networking Al Gfe Copy
© Cote Networking -Mul!< aU Iktenet Rep. Core Networking Al X D«l«t«
© Cor« Networking •Vuh cast .!s:«n«r Rep. Cor• Networking Al (£ | Propeitie*
© Core Networking rfcignfccf Discovery A... Core Networking Al
© C or.1NetmD1tmg ־Meaghbct Discoveiy 5 , Core Networking Al U Help
F IG U R E 14.19: W in d o w s F ire w a ll N e w ru le
3 7 . R i g h t - c l i c k d i e n e w l y c r e a t e d r u l e a n d s e le c t P roperties
* W indows Firewall w ith Advanced Security
* ►י ^ q !
g f Windows Firewall with Adv; I Actions
f t inbound Rules Name Group * Profie Ervsl Outbound Rules -
O Outbound Rules
ConnectionSecurityRul O.P01t21 Blocked
^BranchCache Content Retrieval (HTTP-O״. Branc hCac he ־Cor
Disable Rale New Rule...
X/ Monitoring Cut V Filter by Profile ►
©BranchCache Hosted Cache Ciem(HTT״. BranchCache - Hos
©BranchCache Hosted Cechc Saver(HTTP_ BranchCache ־Ho: Copy V Filter by State ►
©BranchCache Peet Disccvay (WSD-Ckjt) BranchCache - Pee Delete V Fliter by Group ►
© Cote Networbng - Df5 (U0P-0ut) Core Networking
S H T T P o r t th e n Properties Vi*w ►
© Core Networking D>rwm : Host Ccnfig. Lore Networking
in te rc e p ts th a t c o n n e c tio n Hdp jO! Refresh
© Core Networbng •D>neo>c Most Config... Core Networking
a n d ru n s it th ro u g h a © Cote Networbng •Group Policy (ISASS-... Core Networking Dom*n Yet ^ Export Litt...
tu n n e l th ro u g h th e p ro x y . ©Core Networking Group Policy (NP-Out) Core Networking Dom»n Ves
Q Help
© Core Networbng Group PolKy(TCP-0.- Core Networking Dom»n Yes
© Core Networbng •Internet Group kbiu.. Core Networking Al Yet Port 21 Blocked -
©Core Networbng IPHTTPS(TCP-0ut) Core Networking Al Yes ♦ Disable Rule
© Core Networbng -IPv6 (1P»׳$<־XjtJ Core Networking Al Yes
© C oie Netwoibng -Mufticsst Listener Do... Core Networking Al Yes 4 c ״t
© Core Networbng - Multicast Listener Qu... Core Networking Al Yes •41 Copy
©CoreNerwcrbng -MJbcsst Listener Rep... Core Networking Al Yes X Delete
© Cote Netwoibng - Mulbcest Listener Rep... Core Networking Al Yes
Properties
© Core Networbng - Neighbor Discovery A״. Core Networking Al Yes
© Core Networbng Neighbor Discovery S... Core Networking Al Yes
0 Help
I^ C cie Netwoibng ■Packet Too Big (ICMP... Core Networking Al Yb
© Cote Networbng •Parameter Problem (1- ״Core Networking Al Yes
© Core Networbng Reuter Atf^trtscment.- Core Networking Al YCS
© Core Netwoibng * Rcotei Sol*׳tation (1C~ Core Networking Al Yes
r ... n -.----- 11—
C E H Lab M anual Page 232 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Prctocdtype:
Prctocd runber
i— ‘ W it h H T T P o r t , y o u
c a n u se v a rio u s In te r n e t
s o ftw a re fr o m b e h in d th e
p ro x y , e .g ., e - m a il, in s ta n t
m e sse n g e rs, P 2 P file
sh a rin g , IC Q , N e w s , F T P ,
IR C e tc . T h e b a s ic id e a is
th a t y o u se t u p y o u r
In te r n e t s o ftw a re
£ 3 H T T P o r t d o e s n e ith e r
fre e z e n o r h a n g . W h a t y o u
a re e x p e rie n c in g is k n o w n
as ״b lo c k in g o p e ra tio n s ”
7 ^ H T T P o r t m a k e s it
p o s s ib le to o p e n a c lie n t
sid e o f a T C P / IP
c o n n e c tio n a n d p ro v id e it
to a n y s o ftw a re . T h e
k e y w o rd s h e re a re : "c lie n t "
a n d "a n y s o ftw a re ".
C E H Lab M anual Page 233 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
L a b A n a ly s is
D o c u m e n t a ll d i e I P a d d re s s e s , o p e n p o r t s a n d r u n n in g a p p lic a tio n s , a n d p r o t o c o ls
y o u d i s c o v e r e d d u r i n g d i e la b .
P r o x y s e r v e r U s e d : 1 0 .0 .0 .4
H T T P o rt P o rt s c a n n e d : 80
R e s u lt: f t p 1 2 7 .0 .0 .1 c o n n e c t e d t o 1 2 7 .0 .0 .1
P L E A S E T A L K T O Y O U R I N S T R U C T O R I F Y O U H A V E Q U E S T I O N S
R E L A T E D T O T H I S L A B .
Q u e s t io n s
1. H o w d o y o u s e t u p a n H T T P o r t t o u s e a n e m a il c lie n t ( O u d o o k ,
M e s s e n g e r , e tc . ) ?
2. E x a m in e i f s o ft w a r e d o e s n o t a llo w e d it in g d ie a d d re s s t o c o n n e c t to .
In t e r n e t C o n n e c tio n R e q u ir e d
0 Y es □ N o
P la tfo r m S u p p o rte d
0 C la s s r o o m □ iL a b s
C E H Lab M anual Page 234 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
i con k e y L a b S c e n a r io
/ / V a lu a b le
Y o u h a v e le a r n e d in th e p r e v io u s la b t h a t H T T P t u n n e l i n g is a t e c h n i q u e w h e r e
in f o r m a t io n
c o m m u n ic a tio n s w ith in n e tw o rk p r o t o c o ls a re c a p tu re d u s in g th e H T T P
s Test your p r o t o c o l. F o r a n y c o m p a n ie s t o e x is t 0 11 t h e I n t e r n e t , t h e y r e q u i r e a w e b s e r v e r .
k n o w le d g e
These w eb s e rv e rs p ro v e to be a h ig h d a ta v a lu e ta rg e t fo r a tta c k e rs . The
a tt a c k e r u s u a lly e x p lo it s d ie W W W s e rv e r r u n n in g IIS a n d g a in s c o m m a n d l i n e
W e b e x e r c is e
access to th e s y s te m . O nce a c o n n e c tio n has been e s ta b lis h e d , th e a tta c k e r
m W o r k b o o k r e v ie w
u p lo a d s a p r e c o m p ile d v e r s io n o f th e H T T P t u n n e l s e r v e r ( lits ) . W i t h th e lits
c a p tu re s th e t r a f f ic in H T T P h e a d e rs a n d fo rw a rd s it to th e W W W s e rv e r p o r t
8 0 , a f t e r w h i c h t h e a t t a c k e r t r ie s t o l o g i n t o t h e s y s t e m ; o n c e a c c e s s is g a in e d h e
o r s h e s e ts u p a d d i t i o n a l t o o l s t o f u r t h e r e x p l o i t t h e n e t w o r k .
M e g a P in g s e c u r ity s c a n n e r c h e c k s y o u r n e t w o r k f o r p o t e n t ia l v u ln e r a b ilit ie s t h a t
m ig h t b e u s e d t o a tt a c k y o u r n e t w o r k , a n d s a v e s in f o r m a t io n i n s e c u r ity r e p o r t s .
t r o u b l e s h o o t is s u e s .
L a b O b je c t iv e s
T h is la b g iv e s a n i n s ig h t i n t o p i n g in g t o a d e s t in a t io n a d d r e s s lis t . I t te a c h e s
h o w to :
■ T ra c e ro u te
■ P e rfo rm N e tB IO S s c a n n in g
C E H Lab M anual Page 235 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
L a b E n v ir o n m e n t
T o c a n y o u t d ie la b , y o u n e e d :
D:\CEH•
■ I f y o u d e c id e t o d o w n l o a d t h e la te s t ve rs io n , th e n s c re e n s h o ts s h o w n
Tools\CEHv8
i n th e la b m ig h t d if f e r
M odule 03
S canning ■ A d m in is t r a t iv e p r iv ile g e s t o r u n t o o ls
N e tw o rks
■ TCP/IP s e t t i n g s c o r r e c d y c o n f i g u r e d a n d a n a c c e s s ib l e D N S s e rv e r
■ T h is la b w i l l w o r k i n th e C E H la b e n v ir o n m e n t , o n W in d o w s S e rve r
P IN G sta n d s fo r
2012, W in d o w s 2008, and W in d o w s 7
P a c k e t In te r n e t G ro p e r.
L a b D u r a t io n
T im e : 1 0 M in u te s
O v e r v ie w o f P in g
re s p o n s e p ro c e s s , p in g m e a s u re s d ie tim e f r o m tr a n s m is s io n t o r e c e p tio n , k n o w n as
d ie round-trip tim e , a n d r e c o r d s a n y lo s s p a c k e ts .
L a b T a s k s
TASK 1 1. L a u n c h th e S ta rt m e n u b y h o v e r in g d ie m o u s e c u r s o r o n th e lo w e r - le ft
c o r n e r o f th e d e s k to p .
IP Scanning
F IG U R E 13.1: W in d o w s S e rv e r 2012 - D e s k to p v ie w
C E H Lab M anual Page 236 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
F IG U R E 15.2: W in d o w s S e rv e r 2012 - A p p s
&י־DNSLidrtosfe
* DNS Lookup Name
Q Fngcr
1S Network Time
gg Ping
C Q A ll S c a n n e rs c a n sca n g g Traceroute
in d iv id u a l c o m p u te rs , a n y Who 11
ra n g e o f I P ad d re sse s, ^ Network R#toufc#t
d o m a in s , a n d se le c te d ty p e <<•>Process Info
o f c o m p u te rs in s id e
Systam Info
d o m a in s
£ IP Scanner
$ NetBIOS Scanner
•'4? Share Scanner
^ Security Scanner
-J? Port Scanner
Jit Host Monitor
*S Lbt Ho>ts
F ig u r e 15.3: M e g a P in g m a in w in d o w s
4. S e le c t a n y o n e o f d ie o p tio n s fro m d ie le f t p a n e o f d ie w in d o w .
C E H Lab M anual Page 237 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
^ 3^>׳ v ^ eg
^< ״DNS
!״U X .Hosts
List IWU r ^ —
_ r « a P - 1 'S W W
* t DNS Lookup Name
^ Finger
Network Time t I3 Scanner IP Sconncr SKtngj
8a8 Ping
Select
iraccroutc
I | 10 0 0 1 10 0 0 254 | 1 SM 1
^ Whois “ I
Network Resources ► Scam•׳׳
<§> Process Info
^ System Info
■*iiaui.111
■ £ NetBIOS Scanner
Y* Share Scanner
j & Security Scanncr
^ Port Scanner
^ Host Monitor
F IG U R E 15.4: M e g a P in g I P S c a n n in g
a n d a liv e h o s ts .
MegaPing (Unregistered)
Pie View Tools Help
11 g ft A <>
CD N e t w o r k u t ilit ie s :
i , DN: List Hosts
D N S lis t h o s t, D N S lo o k u p IP5i«nnw
,p, DNS Lookup Name
n a m e , N e tw o r k T im e Q Finger
S y n c h ro n i2 e r, P in g , a Network Time X IP Scanner $ IP Scanner Satnge
T ra c e ro u te , W h o is , a n d i t Ping Setect.
Traceroute
F in g e r.
|R5rg»־ 10 . 0 0 . 1 10 0 0 254 I Start
HVhols
1
“ 5 Network Resources F S ca re
o— l —
% rocess Info
^ System Info
Status: ZoTDCTCC 25^ accroco33 m 15 8CCS3
F IG U R E 15.5: M e g a P in g I P S c a n n in g R e p o r t
S T A S K 2 8. NetB IO S S c a n n e r f r o m t h e l e f t p a n e a n d t y p e i n t h e I P r a n g e
S e le c t th e
i n t h e From a n d To f i e l d s . 111 t h i s l a b , t h e IP ra n g e is f r o m 10.0.0.1 t o
NetBIOS 1 0.0.0 .2 54 C l i c k S ta rt
Scanning
C E H Lab M anual Page 238 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
W f/egaPing (Unregistered) T IP I
File View Tools Hdp
rP- A
J* | DNS List Hosts
N c G C S Ssonrcr
,5, DNS Lookup Name
g Finger
סM egaPing can 3 Network Time
more.
9. The N etB IO S s c a n w i l l lis t a ll th e h o s ts w i t h t h e ir N etB IO S nam es and
a d a p te r a d d re sse s
MegaPing (Unregistered)
Me VtfA Tori? Help
unnecessary
/״y Port Scanner
iac.0.6 ADMIN• PC Alive
Told. 131
2 ( Host Munitur fr] NetBIOS Nome: 6
Actvc 3
ports, clo sin g W B Adapter Addre« 00-15-50-00-07־.. M<T0?cfr ״ =a!od 123
4^ Domain WORKGROUP
shares, etc. 100.0.7 WIN-D39MRSHL.. A lv#
» j | ] NetBIOS Names 3
X f Adapter Address D4-BE-D9-C3-CE.. Report
NetBIOS Scanner
F IG U R E 15.7: M e g a P in g N e t B IO S S c a n n in g R e p o r t
b e d iffe r e n t in y o u r n e tw o r k .
5 TAs K 3
1 1 . T h e n , r i g h t - c l i c k a n d s e le c t t h e T ra c e ro u te o p tio n .
T ra ce ro u te
C E H Lab M anual Page 239 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
v MegaPing (Unregistered) I I M
File View Tools Hdp
Traceroute
Tnccroutcs the selection
F IG U R E 15.8: M e g a P in g T ra c e ro u te
1 2 . I t w i l l o p e n th e T ra c e ro u te w in d o w , a n d w i l l tra c e d ie I P a d d re s s
s e le c t e d .
MegaPing (Unregistered)
Fie Vie■a Tools Help
S. JL 4$ 151*« 88
Jj, DNS List Ho>b
Tracerout*
J!L DNS Lookup Nam•
& T ools | J Finger
i l l Network Time ** aa TracerouteSetthot
d em o nstrate d in
Destrebon:
th is lab are ^ Whois 1050.4 □ Resolve I4an־s
a va ila b le in -O Network Resources Ztestrawn \Jdrcs5 Jst
Process Info
D:\CEH- System Info
■ ^ IP Scanner □ Select Al
Tools\CEHv8 NetBIOS Scanner Add
M odule 03 *jp Share Scannei
Security Scanner Ddctc
S canning >׳y Port Scanner
F IG U R E 15.9: M e g a P in g T ra c e ro u te R e p o r t
S TAs K 4 1 3 . S e le c t P o r t S c a n n e r f r o m d ie l e f t p a n e a n d a d d
1 5 . I t w i l l lis t s t h e p o r t s a s s o c ia t e d w i t h w w w . c e r t i f i e d l 1 a c k e r . c o m w i t h d ie
k e y w o r d , r is k , a n d p o r t n u m b e r .
C E H Lab M anual Page 240 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
MegaPing (Unregistered)
ך- ז ״י v ן
File View Tools Help
F IG U R E 15.10 : M e g a P iiig P o r t S c a n n in g R e p o r t
L a b A n a ly s is
D o c u m e n t a ll d ie I P a d d re s s e s , o p e n p o r t s a n d r u n n i n g a p p lic a t io n s , a n d p r o t o c o ls
y o u d i s c o v e r e d d u r i n g d i e la b .
IP S can R ange: 1 0 .0 .0 .1 — 1 0 .0 .0 . 2 5 4
P e r fo r m e d A c tio n s :
■ I P S c a n n in g
■ N e tB IO S S c a n n in g
■ T ra c e ro u te
M e g a P in g
■ P o r t S c a n n in g
R e s u lt:
■ L is t o f A c tiv e H o s t
■ N e tB io s N a m e
■ A d a p te r N a m e
C E H Lab M anual Page 241 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P L E A S E T A L K T O Y O U R I N S T R U C T O R I F Y O U H A V E Q U E S T I O N S
R E L A T E D T O T H I S L A B .
Q u e s t io n s
1. H o w d o e s M e g a P in g d e te c t s e c u r it y v u ln e r a b ilit ie s o n d ie n e t w o r k ?
2. E x a m in e t h e r e p o r t g e n e r a t io n o f M e g a P in g .
In t e r n e t C o n n e c tio n R e q u ir e d
□ Y es 0 N o
P la tfo r m S u p p o rte d
0 C la s s r o o m 0 iL a b s
C E H Lab M anual Page 242 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
L ab
I CON KEY L a b S c e n a r io
n e t w o r k a n d p r o v id e s in f o r m a t io n s u c h as o p e n s h a re d re s o u rc e s , o p e n p o rts ,
m . W e b e x e r c is e
s e r v ic e s / d r iv e r s a c tiv e 0 11 t h e c o m p u t e r , k e y r e g i s t r y e n t r i e s , u s e r s a n d g r o u p s ,
o W o r k b o o k r e v ie w
tru s te d d o m a in s , p r in t e r s , e tc . S can r e s u lts can be saved in H T M L o r T X T
re p o r ts , w h ic h c a n b e u s e d t o s e c u re y o u r n e tw o r k .
n e t w o r k . A s a n o th e r a s p e c t o f p r e v e n t io n y o u c a n u s e G - Z a p p e r , w h ic h b lo c k s
G o o g le c o o k ie s , c le a n s G o o g le c o o k ie s , a n d h e lp s y o u s ta y a n o n y m o u s w h ile
s e a r c h in g o n lin e . T h is w a y y o u c a n p r o t e c t y o u r id e n t i t y a n d s e a rc h h is t o r y .
L a b O b je c t iv e s
T h is la b e x p la in h o w G - Z a p p e r a u t o m a t ic a lly d e te c ts and c le a n s th e G o o g le
c o o k ie e a c h t im e y o u u s e y o u r w e b b r o w s e r .
L a b E n v ir o n m e n t
T o c a r r y o u t th e la b , y o u n e e d :
C E H Lab M anual Page 243 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
Tools\CEHv8 i n th e la b m ig h t d i f f e r
M odule 03
In s ta ll G -Z apper in W in d o w s S e r v e r 2 0 1 2 b y f o llo w in g w iz a r d d r iv e n
Scanning
in s t a lla t io n s te p s
N etw orks
A d m in is t r a t iv e p r iv ile g e s t o r u n t o o ls
A c o m p u te r r u n n in g W in d o w s S e rv e r 2012
L a b D u r a t io n
T im e : 1 0 M in u te s
O v e r v ie w o f G - Z a p p e r
G - Z a p p e r h e lp s p r o t e c t y o u r i d e n t i t y a n d s e a r c h h is t o r y . G - Z a p p e r w i l l r e a d d i e
Google co o k ie i n s t a l l e d o n y o u r P C , d is p la y d ie d a te i t w a s in s t a lle d , d e t e r m in e h o w
y o u r searches h a v e
lo n g been tra cke d , and d isp la y y o u r G o o g le s e a rc h e s . G -
c o o k ie f r o m f u t u r e in s t a lla t io n .
L a b T a s k s
S t ask 1 1. L a u n c h th e S ta rt m e n u b y h o v e r in g d ie m o u s e c u r s o r o n th e lo w e r - le f t
Google Cookies
F IG U R E 16.1: W in d o w s S e rv e r 2012 - D e s k to p v ie w
C E H Lab M anual Page 244 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Administrator £
S ta rt
Server
Manager
Wruiows 6009* Wjpw-V Ancrym.. G-Zapper
PowerShel Chrome t/dru^e- Surfog
Tutonal
fLm V # 11 □
Computer Control HyperV SOL Sena
Pwl Virtual
M«tww
m G - Z a p p e r xs *J w Q
c o m p a tib le w ith W in d o w s Command M v ii
Prompt l.retox
9 5 ,9 8 , M E , N T , 2 0 0 0 , X P ,
V is ta , W in d o w s 7.
'-x-olglan n $ 51
NetSca'iT...
Pro Demo Standard
Maw r* 11
F IG U R E 162 : W in d o w s S e rv e r 2012 - A p p s
3. The G -Zapper m a in w i n d o w w i l l a p p e a r a s s h o w n i n th e f o l l o w i n g
s c re e n s h o t.
W h a t is G -Zapper
Did you know •Google stores a unique identifier in a cookie on your PC , vrfich alo w s them to track the
keywords you search fo r G-Zapper w i autom atically d etect and clean this cookie in your w eb browser.
Ju s t run G-Zapper, m rw nee the w ndow , and en!oy your enhanced search privacy
T 0 restore the Google search cookie d ick the Restore Cookie button
F IG U R E 16.3: G - Z a p p e r m a in w in d o w s
4. T o d e le t e t h e G o o g le s e a r c h c o o k ie s , c l i c k t h e D e le te C o o kie b u tto n ; a
w i n d o w w i l l a p p e a r t h a t g iv e s i n f o r m a t i o n a b o u t t h e d e le t e d c o o k ie
lo c a t io n . C lic k OK
C E H Lab M anual Page 245 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
W h at is G-Zapper
Did you know ■Google stores a unique identifier n a cookie on y o u P C , v*»ch alo w s them 10 track the
■# keywords you search for G-Zapper w i autom atically defect and d e an this co okie in your w eb browser.
_.lm tJun_G 7an nftj the, w ndnw * in i ftninu.unui ^ n h ao cad joauacu_______ _______
G־Zapper
The Google search cookie was removed and will be re-created with a
C ] A n e w c o o k ie w ill b e
g e n e ra te d u p o n y o u r n e x t
© new ID upon visiting www.google.com
Howt
OK
T 0 block and delete the G oogle search cookie, click the B lo ck Cookie button
(Gm ail and A dsense w i be u n avaJab le with the cookie blocked)
F IG U R E 1 6 .4 : D e le tin g s e a rc h c o o k ie s
5. T o b lo c k th e G o o g le s e a rc h c o o k ie , c lic k d ie B lo c k c o o k ie b u tto n . A
w i n d o w w i l l a p p e a r a s k in g i f y o u w a n t t o m a n u a lly b lo c k th e G o o g le
c o o k ie . C l i c k Yes
W h a t is G -Zapper
סT he tin y tra y Did you know - G oogle stores a unique identifier in a cookie on your P C . w hich alo w s them to track the
keywords you search for. G-Zapper will autom atically d etect and d e an this cookie in y o u w eb browser.
icon runs in th e p____ .L M iijn fi- Z a n rre t m rnnnre the, w nrinw and pjiinu .unu..ftnhanrari sftatnh nrtvara_________ _______
background, Manually Blocking the Google Cookie
ta k e s up very
little space and Gmail and other Google services will be unavailable while th e cookie is
can n o tify you by manually blocked.
If you use these services, we recom m end not blocking the cookie and
sound & a nim ate instead allow G-Zapper to regularly clean th e cookie automatically.
w hen th e Google
Are you sure you wish to manually block the Google cookie?
c o o k ie is blocked.
How
Yes No
T 0 block and delete the Google search cookie, click the Blo ck Cookie bU ton
(Gm ail and A dsense w l be unavaiaW e with the cookie blocked)
F IG U R E 1 6 .5 : B lo c k G o o g le c o o k ie
6. I t w i l l s h o w a m e s s a g e d i a t th e G o o g le c o o k ie h a s b e e n b lo c k e d . T o
v e r if y , c lic k OK
C E H Lab M anual Page 246 E th ic a l H ackin g and Counterm easures Copyright O by EC-Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
W h a t is G-Zapper
Did you know ■G oogle stores a unique kfentifiet in a cookie on your P C . w hich alo w s them to track the
1 ^ 0 keywords you search for G-Zapper will autom atically d etect and d e a n this cookie n y o u w eb browser.
Ju s t run G-Zapper, mmmize the w rxlo w , and enjoy your enhanced search privacy
G־Zapper
The Google cookie has been blocked. You may now search
anonymously on google.com. Click the Test Google button to verify.
H ow t OK
Your identity will be obscured from previous searches and G-Zapper w i regularly clean M u re cookies
M ozilla Firefox.
7. T o te s t th e G o o g le c o o k ie t h a t h a s b e e n b lo c k e d , c lic k th e T e s t G oogle
It's fa r to o easy
b u tto n .
fo r som eone using
your PC to g e t a 8. Y o iu d e fa u lt w e b b r o w s e r w ill n o w o p e n t o G o o g le ’s P re fe re n c e s p a g e .
glim p se o f w h a t C lic k OK.
you've been
searching for. AA goog... P - 2 (5 [ 0 ?references יו
-
♦You Search Images Maps Play YouTube News Gmal More ־ Sign in
1
F IG U R E 16.7: C o o k ie s d is a b le d m a ssag e
c lic k V ie w Log i n t h e c le a n e d c o o k ie s l o g .
C E H Lab M anual Page 247 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
W h a t is G -Zapper
G-Zapper Settings
Sounds
G - Z a p p e r, m in im iz e th e
w in d o w , a n d e n jo y y o u r
D eaned Cookies Log
e n h a n c e d s e a rc h p r iv a c y
W Enab le logging of cookies that h ave recently been cleaned. C lear Log V ie w Log
OK
F IG U R E 16.8: V ie w in g th e d e le te d lo g s
1 0 . T h e d e le t e d c o o k ie s i n f o r m a t i o n o p e n s i n N o t e p a d .
F IG U R E 16.9: D e le te d lo g s R e p o r t
L a b A n a ly s is
D o c u m e n t a ll t h e I P a d d re s s e s , o p e n p o r t s a n d r u n n i n g a p p lic a t io n s , a n d p r o t o c o ls
y o u d i s c o v e r e d d u r i n g d i e la b .
C E H Lab M anual Page 248 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
A c tio n P e rfo rm e d :
■ D e t e c t d i e c o o k ie s
■ D e le t e t h e c o o k ie s
G ־Z a p p e r
■ B l o c k t h e c o o k ie s
R e s u l t : D e le t e d c o o k ie s a re s t o r e d i n
P L E A S E T A L K T O Y O U R I N S T R U C T O R I F Y O U H A V E Q U E S T I O N S
R E L A T E D T O T H I S L A B .
Q u e s t io n s
1. E x a m i n e h o w G - Z a p p e r a u t o m a t i c a l l y c le a n s G o o g l e c o o k ie s .
2. C h e c k t o s e e i f G - z a p p e i i s b l o c k i n g c o o k i e s o n s ite s o t h e r t h a n G o o g l e .
In t e r n e t C o n n e c tio n R e q u ir e d
0 Y es □ N o
P la tfo r m S u p p o rte d
0 C la s s r o o m □ iL a b s
C E H Lab M anual Page 249 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
Lab
I CON KEY L a b S c e n a r io
V a lu a b le
11 1 d i e p r e v i o u s l a b y o u h a v e l e a r n e d l i o w y o u c a n d e t e c t , d e le t e , a n d b l o c k c o o k ie s .
in fo r m a tio n
A tta c k e rs e x p lo it d ie XSS v u ln e r a b ilit y , w h ic h in v o lv e s an a tta c k e r p u s h in g
Test your m a lic io u s J a v a S c r ip t c o d e i n t o a w e b a p p lic a tio n . W h e n a n o d ie r u s e r v is its a p a g e
k n o w le d g e
w i d i d i a t m a lic io u s c o d e i n it , d ie u s e r ’s b r o w s e r w i l l e x e c u te d ie c o d e . T h e b r o w s e r
Q W e b e x e r c is e lia s 110 w a y o f t e l l i n g t h e d i f f e r e n c e b e t w e e n l e g i t i m a t e a n d m a l i c i o u s c o d e . I n j e c t e d
c o d e is a n o d i e r m e c h a n i s m d i a t a n a t t a c k e r c a n u s e f o r s e s s io n h i j a c k i n g : b y d e f a u l t
Q W o r k b o o k r e v ie w
c o o k ie s s t o r e d b y th e b r o w s e r c a n b e r e a d b y J a v a S c r ip t c o d e . T h e in je c t e d c o d e c a n
r e a d a u s e r ’ s c o o k ie s a n d t r a n s m i t d io s e c o o k ie s t o d i e a tt a c k e r .
s u c h a tt a c k s b y v a l id a t in g a ll h e a d e r s , c o o k ie s , q u e r y s tr in g s , f o r m fie ld s , a n d h id d e n
f ie ld s , e n c o d in g i n p u t a n d o u t p u t a n d f i l t e r m e ta c h a r a c te r s i n t h e i n p u t a n d u s in g a
w e b a p p lic a t io n f ir e w a ll t o b l o c k th e e x e c u t io n o f m a lic io u s s c r ip t .
A n o d i e r m e t h o d o f v u ln e r a b ilit y c h e c k in g is t o s c a n a n e t w o r k u s in g th e C o la s o ft
p e r f o r m in g A R P p o is o n in g , s p o o f in g th e n e t w o r k , a n d D N S p o is o n in g .
L a b O b je c t iv e s
^ T T o o ls
d em o nstrate d in T h e o b je c t iv e o f d i is la b is t o r e in f o r c e c o n c e p t s o f n e t w o r k s e c u r it y p o li c y , p o li c y
th is lab are e n f o r c e m e n t , a n d p o l i c y a u d it s .
a va ila b le in
D:\CEH- L a b E n v ir o n m e n t
Tools\CEHv8
M odule 03 11 1 d i i s l a b , y o u n e e d :
S canning
■ D:\CEH-Tools\CEHv8 M odule 03
C o la s o f t P a c k e t B u ild e r lo c a t e d a t
N e tw o rks
S canning N etw orks\C ustom P acket C reator\C olasoft P a cke t B uilder
C E H Lab M anual Page 250 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
■ W indow 8 r u n n i n g o n v ir t u a l m a c h in e as ta r g e t m a c h in e
h t t p : / / w w w .c o la s o ft.c o m / d o w n lo a d /p r o d u c ts /d o w n lo a d _ p a c k e t_ b u ild e r .
php
■ I f y o u d e c id e t o d o w n l o a d d i e la te s t version, d ie n s c re e n s h o ts s h o w n in
d ie la b m ig h t d if f e r .
■ A w e b b r o w s e r w i d i I n t e r n e t c o n n e c t io n n u u iin g i n h o s t m a c liin e
L a b D u r a t io n
T im e : 1 0 M in u te s
O v e r v ie w o f C o la s o f t P a c k e t B u ild e r
b e u s e d t o v e r i f y n e t w o r k p r o t e c t i o n a g a in s t a tt a c k s a n d in t r u d e r s . C o la s o f t P a c k e t
B u i l d e r f e a t u r e s a d e c o d i n g e d i t o r a l l o w i n g u s e r s t o e d i t s p e c i f i c p r o t o c o l f i e l d v a lu e s
m u c h e a s ie r .
L a b T a s k s
S t a s k 1
1. In s t a ll a n d la u n c h d ie C olasoft P acket Builder.
S canning 2. L a u n c h th e S ta rt m e n u b y h o v e r in g d ie m o u s e c u r s o r o n th e lo w e r - le f t
N e tw o rk c o r n e r o f th e d e s k to p .
F IG U R E 17.1: W in d o w s S e rv e r 2012 - D e s k to p v ie w
3. C l i c k t h e C o la s o ft P a c k e t B u ild e r 1.0 a p p to o p e n th e C o la s o ft
“Q Y o<u c a n d o w n lo a d
y P a c k e r B u ild e r w i n d o w
C o la s o ft P a c k e t B u ild e r
fro m
h ttp : / / w w w . c o la s o ft. co m .
C E H Lab M anual Page 251 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Administrator
S ta rt
Es m * * *
compule r control v
1'and Manager
Mochn#.
*J V 91 9
CMtoo $ o
F IG U R E 17.2 W in d o w s S e rv e r 2012 - A p p s
4. T h e C o la s o f t P a c k e t B u ild e r m a in w i n d o w a p p e a rs .
4 $ Oecode Edro*־
1 S ?’ &
Add Insert
1
Packet No. No pxkec elected:
♦
Checksum
\$Packet Lilt
[As^J 55
Adapter
Packets
Colasoft
0 Selected 0 1
Delta Time Sourer
O p e ra tin g syste m
^ He«Edfcor fatal 0 byte* |
re q u ire m e n ts : >0:0
W in d o w s S e rv e r 200 3 a n d
6 4 - b it E d itio n <L
W in d o w s 2 0 0 8 a n d 6 4 - b it
E d itio n F IG U R E 17.3: C o la s o ft P a c k e t B u ild e r m a in screen
W in d o w s 7 a n d 64-b it
E d itio n
5. B e fo re s ta r tin g o f y o u r ta s k , c h e c k th a t d ie A d a p te r s e t t in g s a re se t to
d e fa u lt a n d d ie n c lic k OK.
Select Adapter *
A d ap ter:
OK C ancel Help
C E H Lab M anual Page 252 E th ic a l H ackin g and Counterm easures Copyright <0by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
T h e re a re tw o w a y s to
c re a te a p a c k e t - A d d a n d
In s e rt. T h e d iffe re n c e
b e tw e e n th e s e is th e n e w ly File Edit Send Help
a d d e d p a c k e t's p o s itio n in
th e P a c k e t L is t . T h e n e w 0
ff
p a c k e t is lis te d as th e la s t 1 Import Export־״־ Insert
Add
p a c k e t in th e lis t i f ad d e d
b u t a fte r th e c u rre n t p a c k e t
[ ^ Decode Editor
i f in s e rte d .
7. W h e n an A dd P a cke t d ia lo g b o x p o p s u p , y o u n e e d t o s e le c t d i e t e m p la t e
a n d c lic k OK.
Q c o la s o f t P a c k e t
B u ild e r s u p p o rts * .c s c p k t
Add Packet ־n n
(C a p s a 5 .x a n d 6 .x P a c k e t
F ile ) a n d * c p f (C a p s a 4.0
P a c k e t F ile ) fo rm a t. Y o u Select Template: ARP Packet
m a y a ls o im p o rt d a ta fro m
״.c a p (N e tw o r k A s s o c ia te s
S n iffe r p a c k e t file s ), * .p k t
Delta Time: 0.1 Second
(E th e r P e e k v 7 / T o k e n P e e k /
A 1 ro P e e k v 9 / O m n iP e e k v 9
p a c k e t file s ), * .d m p (T C P
D U M P ), a n d * ra w p k t (ra w
p a c k e t file s ).
OK Cancel Help
F IG U R E 17.6: C o la s o ft P a c k e t B u ild e r A d d P a c k e t d ia lo g b o x
Decode E ditor
F IG U R E 17.7: C o la s o ft P a c k e t B u ild e r P a c k e t L is t
C E H Lab M anual Page 253 E th ic a l H ackin g and Counterm easures Copyright O by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Decode Editor
Packet: Num:000001 Length:64 Captured:•
B-© Ethernet Type I I [0/14]
le s tin a tio n Address: FF: FF: FF: FF: FF: FF [0/6]
J© Source Address: 00:00:00:00:00:00 [6/6]
Q B u s t M o d e O p tio n : I f
j ! ^ P r o to c o l: 0x0806 (ARP) [12.
y o u c h e c k th is o p tio n , - sj ARP - Address Resolution Protocol [14/28]
C o la s o ft P a c k e t B u ild e r
!••••<#>Hardware type: 1 (Ethernet)
se n d s p a c k e ts o n e a fte r
a n o th e r w ith o u t ! ץ#( Protocol Type: 0x0800 [16/2]
in te rm is s io n . I f y o u w a n t to j..© Hardware Address Length: 6 [18/1]
s e n d p a c k e ts a t th e o rig in a l
ן..© Protocol Address Length: 4 [19/1]
d e lta tim e , d o n o t c h e c k
th is o p tio n . ! |—<#1ype: 1 (ARP Reque.
\ -^J>S0urce Physics: 00:00:00:00:00:00 [22/6]
j3 ״Source IP : 0.0.0.0 [28/4]
D estination Physics: 00:00:00:00:00:00 [32/6]
j D estination IP : 0.0.0.0 [38/4]
- •© Extra Data: [42/18]
Number of Bytes: 18 bytes [42/18]
FCS:
L # FCS: 0xF577BDD9
d ie n c lic k Start.
ר
£ 0 1 O p tio n , L o o p S e n d in g :
^4 C o la s o f t C a p s a
T h is d e fin e s th e re p e a te d
tim e s o f th e se n d in g Jown Checksum Send Send All Packet Analyzer
e x e c u tio n , o n e tim e in
d e fa u lt. P le a s e e n te r z e ro i f 1 Packet List Packets 1 Selected 1
y o u w a n t to k e e p se n d in g
No. Delta Time Source Destination
p a c k e ts u n til y o u p a u se o r
s to p it m a n u a lly . 1 0.100000 00:00:00:00:00:00 FF:FF:FF:FF:FF:FF
C E H Lab M anual Page 254 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
£ 3 S e le c t a p a c k e t fro m
th e p a c k e t lis tin g to a c tiv a te
S e n d A ll b u tto n
F IG U R E 17.11: C o h s o ft P a c k e t B u ild e r S e n d A H P a c k e ts
12. C lic k S ta rt
□ B u rs t M ode (n o d e la y b e tw e e n p a ck e ts)
Sen d in g In fo rm a tio n
£ 0 T h e p ro g re s s b a r T o tal P a c k e ts : 1
p re s e n ts a n o v e r v ie w o f th e
s e n d in g p ro c e s s y o u are P a c k e ts S e n t: 1
e n g a g e d in a t th e m o m e n t.
P ro g re ss:
S ta r t S to p C lo se H elp
F IG U R E 1 7 .12 C o la s o ft P a c k e t B u ild e r S e n d A H P a c k e ts
C E H Lab M anual Page 255 E th ic a l H ackin g and Counterm easures Copyright <0by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
יli״ ר״
Colas
F IG U R E 17.13: E x p o r t A ll P a c k e ts p o tio n
Save As x I
Q O p tio n , P a c k e ts S e n t
T h is s h o w s th e n u m b e r o f 5avein!"! ־:o la e c -ft
p a c k e ts s e n t s u c c e s s fu lly .
f lf c l Nome D«tc modified Type
C o la s o ft P a c k e t B u ild e r
No items match your search.
d is p la y s th e p a c k e ts se n t
Rcccnt plocca
u n s u c c e s s fu lly , to o , i f th e re
is a p a c k e t n o t s e n t o u t.
■
Desktop
< 3
Libraries
lA f f
Computer
Network
r n _______ ... [>1
F1Un»m* | Fjiekct• e « c p ld v j Sav•
Packets.cscpkt
L a b A n a ly s is
A n a l y z e a n d d o c u m e n t d i e r e s u l t s r e l a t e d t o t h e l a b e x e r c is e .
C o la s o ft P a c k e t
S e le c t e d P a c k e t N a m e : A R P P a c k e ts
B u ild e r
R e s u lt : C a p tu r e d p a c k e ts a re s a v e d i n p a c k e ts .c s c p k t
C E H Lab M anual Page 256 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
P L E A S E T A L K T O Y O U R I N S T R U C T O R I F Y O U H A V E Q U E S T I O N S
R E L A T E D T O T H I S L A B .
Q u e s t io n s
a n a ly z in g y o u r n e t w o r k .
2. E v a lu a te w h a t ty p e s o f in s t a n t m e s s a g e s C a p s a m o n it o r s .
3. D e te r m in e w h e t h e r d ie p a c k e t b u f f e r a ffe c ts p e r fo r m a n c e . I f y e s , th e n w h a t
s te p s d o y o u ta k e t o a v o id o r r e d u c e it s e f f e c t o n s o ft w a r e ?
In t e r n e t C o n n e c tio n R e q u ir e d
□ Y es 0 N o
P la tfo r m S u p p o rte d
0 C la s s r o o m 0 iL a b s
C E H Lab M anual Page 257 Eth ica l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Lab
Test your
k n o w le d g e
L a b S c e n a r io
P a c k e t B u ild e r . A tta c k e r s t o o c a n s n i f f c a n c a p t u r e a n d a n a ly z e p a c k e t s f r o m a
W o r k b o o k r e v ie w
n e tw o rk and o b ta in s p e c if ic n e tw o rk in fo r m a t io n . The a tta c k e r can d is r u p t
o r t h r o u g h th e p h y s ic a l d e s t r u c t io n o f th e n e t w o r k .
A s a n e x p e r t e th ic a l h a c k e r, y o u s h o u l d b e a b l e t o g a d i e r i n f o r m a t i o n 0 11
111 t h i s l a b y o u w i l l le a r n t o u s e T h e D u d e t o o l t o s c a n t h e d e v ic e s i n a n e t w o r k
a n d th e t o o l w i l l a le r t y o u i f a n y a tt a c k h a s b e e n p e r f o r m e d 0 11 t h e n e t w o r k .
L a b O b je c t iv e s
T h e o b j e c t i v e o f t h i s l a b i s t o d e m o n s t r a t e h o w t o s c a n a l l d e v ic e s w i t h i n s p e c i f i e d
s u b n e t s , d r a w a n d l a y o u t a m a p o f y o u r n e t w o r k s , a n d m o n i t o r s e r v ic e s 0 11 d i e
n e tw o rk .
V—J Tools
d em o nstrate d in L a b E n v ir o n m e n t
th is lab are
T o c a r r y o u t th e la b , y o u n e e d :
a va ila b le in
D:\CEH- ■ T h e D u d e is lo c a t e d a tD:\CEH-T0 0 ls\C EH v8 M odule 03 S canning
Tools\CEHv8 N e tw o rk s \N e tw o rk D is c o v e ry and M apping T o o ls\T h e Dude
M odule 03 ■ Y o u c a n a ls o d o w n l o a d t h e la t e s t v e r s io n o f The Dude fro m th e
S canning h ttp : / / w w w .m ik r o tik .c o m / th e d u d e .p h p
N e tw o rks
C E H Lab M anual Page 258 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.
M o d u le 0 3 - S c a n n in g N e tw o rk s
■ I f y o u d e c id e t o d o w n l o a d t h e la t e s t v e r s io n , t h e n s c re e n s h o ts show n
i n th e la b m ig h t d if f e r
■ A c o m p u te r r u n n in g W in d o w s S e rv e r 2 0 1 2
in s t a ll The Dude
■ A d m i n i s t r a t i v e p r iv ile g e s t o r u n t o o ls
L a b D u r a t io n
T im e : 1 0 M in u te s
O v e r v ie w o f T h e D u d e
T h e D u d e n e t w o r k m o n i t o r is a n e w a p p lic a t io n d i a t c a n d r a m a t ic a lly i m p r o v e d ie
w a y y o u m a n a g e y o u r n e t w o r k e n v i r o n m e n t I t w i l l a u t o m a t i c a l l y s c a n a l l d e v ic e s
w i t h i n s p e c i f i e d s u b n e t s , d r a w a n d l a y o u t a m a p o f y o u r n e t w o r k s , m o n i t o r s e r v ic e s
o f y o u r d e v ic e s , a n d a l e r t y o u i n c a s e s o m e s e r v ic e l i a s p r o b l e m s .
L a b T a s k s
1. L a u n c h th e S ta rt m e n u b y h o v e r in g th e m o u s e c u r s o r o n th e lo w e r - le f t
c o r n e r o f th e d e s k to p .
E t a s k 1 1 1 1 t h e S ta rt m e n u , t o l a u n c h T h e Dude, c l i c k T he Dude i c o n .
Server Computer
Maiwgcr Onm SS?
b U * f>
~ e
v - —1 יי
M m n ttr. command 1n»0u0f
T<xJ1 Prompi
0—l»p
C E H Lab M anual Page 259 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
F IG U R E 182 : W in d o w s S e rv e r 2012 - S ta rt m e n u
H 0 »ו»י
H D*wic«»
?5? Flea 5
□ Functona
M Htfay Action*
H Lntu
□ Lc0*
£7
£7 Cecus -A
£ 7 &׳em
£7 Syslog
E Notic?
- B Keftroric Maps
B Lccd
t- ! U n i r t i J
F IG U R E 18.3: M a in w in d o w o f T h e D u d e
4. C lic k th e D is c o v e r b u t t o n o n th e t o o lb a r o f d ie m a in w in d o w .
---- -------------- — ■■
admin@localhost - The Dude 4.0beta3 . ״1 x
□ 0 יו*ו
f“־l OmiaN
f * . Ftea י
f=1 F_nccon8
B Haay Action*
n 1^“*י
□ Legs
£ ? ActJcn
£7 Defcus
£7 Event
£7 Sjobg
R Mb Notie?
- Q Network Maos
B Lccdl
M '׳
F IG U R E 18.4: S e le c t d is c o v e r b u tto n
5. The D e vice D is c o v e ry w in d o w a p p e a rs .
C E H Lab M anual Page 260 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Coundl
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
Device Discovery
Agent: |P£g? !-
P Add Networks To Auto Scan
Black List: |1
F IG U R E 18.6: D e v ic e d is c o v e ry w in d o w
6. 111 t h e D e v i c e D i s c o v e r y w i n d o w , s p e c i f y S can N e tw o rk s r a n g e , s e l e c t
d e fa u lt fro m d ie A g e n t d ro p -d o w n DNS, SNMP, NETBIOS.
l i s t , s e le c t
D iscover.
Device Discovery
Agent: 5 S S H B I
r Add Networks To Auto Scan
Black List: [none
7. O n c e t h e s c a n is c o m p l e t e , a ll t h e d e v ic e s c o n n e c t e d t o a p a r t i c u l a r
n e t w o r k w i l l b e d is p la y e d .
C E H Lab M anual Page 261 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
VI1hK.K0H)1m3^M
Qm - ׳x 3 2 5 ■
׳oc« ׳w I 95bpj Saver r 1 ( ( 4 (>> * 3 9 t®c«
F IG U R E 1 8 .8 : O v e r v i e w o f n e t w o r k c o n n e c t i o n
C artvM
♦• ״% j o ^ StfttKujo Dwovw ~*1Zoom
. [TO
5 Ad<*«3a Lota
A Admr*
R Afl*rta
□ Chat* t f t t e O T . JLYKSO-Ci P Wrdcvnaxnpucr‘,
Q 08V1008 IP• 100 0 9
M
ACCtt ■- 10
^ Plea
Q Functions S*'42 m (7V
U > i 1 Q r«0 0 a 1C2 coj fn&nory vrtuai memoiy. cfck
□ HatovV*•*® SjcrT!ז.*־״.vw.-’.׳-Y35am3ip
□ Lnk* C esacto- -fc*».=«e ntes« Famly G Wsdd 42 9eppng 7 M/MCOUPATBU - V irc 0*5 I t o i a i 6 & End
□ ־Lcoa 6001WipxnsrFix)
]J? Acton Ipwue 0028<־J771
C7 Detua
£? Ewr
L7S«bg
Mb Mod*®
B rielwork Maps
B local
n NHwwk•
2 N9Ulc4B0r•
Q Parris
H•*™ 127.00.1 1ג4< «נו )>«• n-n
□ P׳cN» J?*
I !_•« a M■ «L'
I? •#
iwttdai e UU liriM M O ll- ■ ••: יuUCMKJP
Q> Samcas
H Tocte
F IG U R E 1 8 .9 : D e t a i l e d i n f o r m a t i o n o f t h e d e v i c e
C E H Lab M anual Page 262 E th ic a l H ackin g and Counterm easures Copyright © by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
F IG U R E 1 8 .1 0 : S e le c tin g L o c a l i n f o r m a t i o n
Conterts
3 Address Usts Type, (* 3 M * f^ ־ ־i T] □ י
£ AcJ-rriS i l l l
Q Ao-nls L^v:c UiZ.-r'tnT׳,c«>־ Mao
gowns 100a! j«-=le Local
Q Devicw 1000.12 incte Local
1000255 MTCfc Local
5! ׳Fte»
Q Functor• ADVf, iincte Local
Q Ktolciy Actons V/V2H9STOSG M-rle Local
ם Lrk» WttOUMRSHL WCte Local
WHCSCI• SG1 w•*־־ Local
־1ס 1יה״
C7 Aden WIUJO0MI tncb Local
CfOebuo w!H«5sr.c1u u-de Local
r7Ev«4 vmo Local
LfS ^ o fl
CJ Mbr*d».
W K M W S8
w*C0w»
M* |״
*mcl*
Local
Local
F IG U R E 1 8 .1 1 : S c a n n e d n e t w o r k c o m p le t e i n f o r m a t io n
C E H Lab M anual Page 263 E th ic a l H ackin g and Counterm easures Copyright C by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
11. A s described previously, you m ay select all die o th e r o p tio n s fro m the
d ro p -d o w n lis t to v ie w d ie respective in fo rm a tio n .
n F_racn8
Q HistoryActions
H Linlcs
=3 Leg* י v י
C־fActon _ WIN-2N95T0SGIEM \ 1000
(ZJ Dcbuo
Even!
O S/*log
□ Mto Nodoo
Q ISetwoifcMips
r B - l gcjj
<| 1■ j [>
־r ־ \־ ^־־T
^ ־ ר ^ ל ^ ה־ רז
.1
WM-LXQ\3\VR3!WM
L a b A n a ly s is
Analyze and docum ent die results related to die lab exercise.
IP A d d re s s R a n g e : 10.0.0.0 — 10.0.0.24
D e v ic e N a m e P re fe re n ce s: D N S , S N M P ,
The D ude N E T B IO S , IP
C E H Lab M anual Page 264 E th ic a l H ackin g and Counterm easures Copyright O by E C ־Counc11
A ll Rights Reserved. Reproduction is Strictly Prohibited
M o d u le 0 3 - S c a n n in g N e tw o rk s
In te r n e t C o n n e c tio n R e q u ire d
□ Y es 0 No
P la tfo r m S u p p o rte d
0 C la s s ro o m 0 iLabs
C E H Lab M anual Page 265 E th ic a l H ackin g and Counterm easures Copyright © by EC-Council
A ll Rights Reserved. Reproduction is Strictly Prohibited.