CHAPTER 3 GATHERING NETWORK AND HOST INFORMATION

Get Started. It's Free
or sign up with your email address
Rocket clouds
CHAPTER 3 GATHERING NETWORK AND HOST INFORMATION by Mind Map: CHAPTER 3    GATHERING NETWORK AND HOST INFORMATION

1. Define enumeration and the purpose.

1.1. set of related constants that define a value type

1.2. Machine names

1.3. Network resources

1.4. Services

2. Null sessions. SNMP enumeration. Enumeration tool

2.1. Port scanning

2.2. Network scanning

2.3. Vulnerability scanning

2.4. Significance of enumeration

2.4.1. often considered as a critical phase in Penetration testing as the outcome of enumeration can be used directly for exploiting the system.

2.5. What is SNMP?

2.5.1. SNMP stands for Simple Network Management Protocol is an application-layer protocol that runs on User Datagram Protocol (UDP).

2.5.2. used for managing network devices which run on IP layer like routers

3. Types of scanning

3.1. Port scanning

3.1.1. To find open ports and services on target

3.2. Network scanning

3.2.1. Find IP address in the network of the target

3.3. Vulnerability scanning

3.3.1. Find weakness or vulnerabilities on the target

4. Scanning methodology

4.1. Check for live system

4.1.1. Ping send out an ICMP Echo Request packet and awaits an

4.1.2. ICMP Echo Reply message from an active machine

4.2. Check for open ports

4.2.1. A potential target computer runs many 'services' that listen at ‘well-known’ 'ports'.

4.2.2. By scanning which ports are available on the victim, the hacker finds potential vulnerabilities that can be exploited

4.3. . Service identification

4.3.1. Example Services IPTV vs. Multimedia Gaming vs. Voice Chat Config vs. Pager messaging

4.3.2. Uses of Service ID App Invocation in UA App Invocation in network Network QoS Auth Accounting and Billing Service Negotiation Dispatch to Devices

4.4. Banner grabbing/OS fingerprinting

4.4.1. Is the technique to find the Operating System of the target

4.4.2. it is very important to know the target Operating System as based on the OS

4.4.3. the hacker can look for vulnerabilities in the OS and accordingly plan the attack

4.5. Vulnerability scanning

4.5.1. This is done by using a very popular tool called Nessus

4.5.2. It is the most popular tool and gives all information about the vulnerability on the target

4.6. Draw network diagrams of vulnerable hosts

4.6.1. Tools like Solar Winds LAN Surveyor can be helpful to make a network diagram of the network

4.6.2. These diagrams can then be moved to Visio for documenting it