The de-facto standard for the first step in enumerating the target.
Let’s try to understand a few concepts.
TCP connect scan -sT
If three-way handshake (SYN –> SYN ACK –> ACK) is complete on a TCP port, the port is considered open.
Port scanning on port range 3388-3390 using
nc -nvv -w 1 -z 10.11.1.220 3388-3390
Hence, if a port is OPEN, it will reply the incoming SYN request with SYN ACK request then the client will further send ACK to complete the handshake. But if the port is closed then the incoming SYN request is responded with a RST (reset) request.
Now if the port is protected by a firewall, then the incoming SYN request is responded with nothing, hence indicating filtered port.
SYN scan -sS
In this kind of the scan, nmap sends a TCP SYN request just like the TCP connect scan, but when it receives the SYN ACK response, instead of sending back ACK request to complete the three way handshake, it send RST request and hence the handshake is never complete. That’s why is it also called as Half-open scan.
This is beneficial because it makes the scanning fast and also since the handshake is not complete hence this request does not get logged and detected by IDS too. But sometimes it can be problematic because the server might not handle such handshake.
UDP scan -sU
Since UDP is stateless, hence three way handshake is not required before establishing the communication. Hence UDP port scanning is different from TCP port scanning.
Here, we send empty UDP packet to a port, the port, if open send the packet further to the application layer of OSI model and the response is crafted according to the application, but sometimes there is no response as well. But if the port is closed, we get ICMP Port Unreachable response.
UDP port scanning using
nc -nv -w 1 -u -z 10.11.1.115 160-162
NULL -sN, FIN -sF and Xmas -sX scan
These three are stealthier scans.
NULL sends requests with no flag set and expects RST if is closed.
Similarly, FIN sends requests FIN flag set which is used for closing active connection and expects RST if port is closed and Xmas sends malformed TCP packet with same expectation. These are very good for firewall evasion.
Measuring inbound and outbound traffic
We can measure the inbound and outbound traffic to and from a machine using
sudo iptables -I INPUT 1 -s <source-IP> -j ACCEPT
sudo iptables -I OUTPUT 1 -d 10.11.1.220 -j ACCEPT
Zero the packet and byte counter before testing, by:
sudo iptables -Z
After doings tests (you can generate traffic using Nmap as well) you can check the statistics by:
sudo iptables -vn -L
(-n to enable numeric output, and -
L to list the rules present in all chains)
Network Sweeping is used to scan entire network for available machines. Use
-sn flag in nmap.
nmap does host discovery using:
- TCP SYN packet to 443
- TCP ACK to 80
- ICMP timestamp
nmap -sn 192.168.0.1-254
- For “greppable” nmap output use
- Use top twenty TCP ports with the –top-ports option and enable OS version detection, script scanning, and traceroute with -A
- OS fingerprinting is guessing the OS of a machine by matching it’s returned packets with set of OS patterns. Use
- Identify services running on specific ports by inspecting service banners ( -sV ) and
running various OS and service enumeration scripts ( –A ) against the target.
- Nmap Scripting Engine (NSE) can launch user-created scripts in order to automate
various scanning tasks, using
- TryHackMe link
- PWK PDF