Scanning

Examining Port Scan Methods - Analysing Audible Techniques

Scanning Internet Security Whitepapers

This paper will provide an in-depth analysis of known port scan methods, with exhaustive information for each technique used in the wild today to map and identify open and closed ports on various network servers. Port scanning is one of the most popular techniques used in the wild to discover and map services that are listening on a specified port. Using this method an attacker can then create a list of potential weaknesses and vulnerabilities in the proposed open port leading to exploitation and compromise of a remote host.

Firewalking

Scanning Internet Security Whitepapers

This paper describes Firewalking, a technique that can be used to gather information about a remote network protected by a firewall. The purpose of the paper is to examine the risks that this technique represents. This paper is intended for a technical audience with an advanced understanding of network infrastructure and TCP/IP packet structures. Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway. Also, using this technique, an attacker can map routers behind a packet-filtering device. To fully understand how this technique works, we first need to understand how traceroute works. This paper provides an introduction to traceroute.

Frustrating OS Fingerprinting with Morph

Scanning Internet Security Whitepapers

Morph is a process that allows user to select desired OS to emulate, will handle inbound and outbound packets and change TCP, UDP, ICMP and IP headers to reflect selected OS. Morph is a tool that will currently compile on Linux, and is in development for OpenBSD, FreeBSD, NetBSD. Morph is built on Packet Purgatory library. Wedge between OS kernel and network interface running in userland. Packet Purgatory is built on libpcap and libdnet libraries. Libpcap and libdnet provides interfaces to the kernel.

ICMP Usage in Scanning - The Complete Know-How

Scanning Internet Security Whitepapers

The ICMP Protocol may seem harmless at first glance. Its goals and features were outlined in RFC 792 (and than later cleared in RFCs 1122, 1256, 1349, 1812), as a way to provide a means to send error messages for non-transient error conditions, and to provide a way to probe the network in order to determine general characteristics about the network. In terms of security, ICMP is one of the most controversial protocols in the TCP/IP protocol suite. The risks involved in implementing the ICMP protocol in a network, regarding scanning, are the subject of this research paper. Scanning will usually be the major stage of an information gathering process a malicious computer attacker will launch against a targeted network.

Insightix Discovery and NAC Lite Edition Installation Guide

Scanning Internet Security Whitepapers

This document is provided to assist in the successful installation of the Insightix Discovery & NAC Lite Edition software. The document includes general information about the system, and describes the requirements and procedures for installing the system. The Insightix Dynamic Infrastructure Discovery (DID) technology makes use of a unique, patent-pending combination of various network discovery algorithms, which gather and correlate information from passive, and active network discovery engines, to provide complete and accurate infrastructure discovery in real time.

Insightix Discovery and NAC Lite Edition User Manual

Scanning Internet Security Whitepapers

This chapter introduces the Insightix Dynamic Infrastructure Discovery (DID) technology and describes the key features and deployment of the Insightix solution. Insightix Discovery & NAC Lite Edition includes the Insightix Discovery and Insightix NAC products. The Insightix Dynamic Infrastructure Discovery (DID) technology makes use of a unique, patent-pending combination of various network discovery algorithms, which gather and correlate information from passive and active network discovery engines to provide complete and accurate infrastructure discovery in real time.

Network Scanning Techniques

Scanning Internet Security Whitepapers

Imagine the following scenario: A military target is to be attacked. What’s the first step considered? – Gathering Intelligence, naturally. To do so, a satellite will photo the target zone and a special recon unit will patrol the area with maximum caution to eliminate the possibility of detection. After enough information has been gathered, a wing of stealth bombers will bomb the target – Mission accomplished. Gathering intelligence is extremely important. If the amount of data collected is not sufficient, or alternatively, if the target is tightly defended, no attack will be launched. The same is true of computer hacking. An intelligent hacker will conduct a lot of research before attempting to gain privileged access to your systems. If the intelligence gathered shows a poorly defended computer system, an attack will be launched, and unauthorized access will be gained.

Sandstorm Enterprises - PhoneSweep Gold

Scanning Internet Security Whitepapers

PhoneSweep Gold is an enhancement package for the PhoneSweep telephone system security audit tool. It adds high-end functionality to PhoneSweep that some users have requested as a critical need. By providing these functions as an optional add-on, we can continue evolving PhoneSweep's primary capabilities at the reasonable cost that customers have come to expect from us.

Sandstorm Enterprises PhoneSweep

Scanning Internet Security Whitepapers

PhoneSweep® is a telephone system security audit tool that searches for modems, fax machines, and other devices within a set of phone numbers. PhoneSweep can identify security risks such as unsecured modems and potential vulnerability to toll fraud. Before the introduction of PhoneSweep, there were no reliable tools for conducting security audits of telephone systems. Security professionals who wanted to find unsecured modems had to resort to using "war dialers," publicly available programs written by amateur programmers and designed to commit illegal acts. These tools are generally unsupported, difficult to use, and have limited reporting capabilities. Many, such as ToneLoc, work only under DOS. Furthermore, freeware dialers may contain undocumented "features" such as viruses or "back doors." Do you really want to trust your network security to the product of an anonymous amateur programmer whose intent was toll fraud? PhoneSweep was designed and written specifically as a security audit tool by an experienced team of engineers and security professionals. PhoneSweep is designed to be easy to use, flexible, and powerful.

Sandstorm Enterprises Sandtrap

Scanning Internet Security Whitepapers

Sandtrap™ is a telephone system intrusion detection tool that can detect attempts to access your organization’s computer systems through the telephone network. Sandtrap is designed to detect and identify attackers who are engaged in telephone scanning, also known as “war dialing.” Sandtrap can also be used to audit the activities of commercial telephone scanners such as Sandstorm’s PhoneSweep. Sandtrap is an important threat assessment tool that can alert you if and when your organization is under attack. In many cases, Sandtrap can even help you identify the perpetrators.