Chapter 2. Network Exploration

Note

This chapter shows you how to do some things that in many situations might be illegal, unethical, a violation of the terms of service, or just not a good idea. It is provided here to give you information that may be of use to protect yourself against threats and make your own system more secure. Before following these instructions, be sure you are on the right side of the legal and ethical line... use your powers for good!

In this chapter, we will cover:

  • Discovering hosts with TCP SYN ping scans
  • Discovering hosts with TCP ACK ping scans
  • Discovering hosts with UDP ping scans
  • Discovering hosts with ICMP ping scans
  • Discovering hosts with IP protocol ping scans
  • Discovering hosts with ARP ping scans
  • Discovering hosts using broadcast pings
  • Hiding our traffic with additional random data
  • Forcing DNS resolution
  • Excluding hosts from your scans
  • Scanning IPv6 addresses
  • Gathering network information with broadcast scripts

Introduction

In recent years, Nmap has become the de facto tool for network exploration, leaving all other scanners far behind. Its popularity comes from having a vast number of features that are useful to penetration testers and system administrators. It supports several ping and port scanning techniques applied to host and service discovery, correspondingly.

Hosts protected by packet filtering systems, such as firewalls or intrusion prevention systems sometimes cause incorrect results because of rules that are used to block certain types of traffic. The flexibility provided by Nmap in these cases is invaluable, since we can easily try an alternate host discovery technique (or a combination of them) to overcome these limitations. Nmap also includes a few very interesting features to make our traffic less suspicious. For this reason, learning how to combine these features is essential if you want to perform really comprehensive scans.

System administrators will gain an understanding of the inner workings of different scanning techniques, and hopefully motivate them to harden their traffic filtering rules to make their hosts more secure.

This chapter introduces the supported ping scanning techniques—TCP SYN, TCP ACK, UDP, IP, ICMP, and broadcast. Other useful tricks are also described, including how to force DNS resolution, randomize a host order, append random data, and scan IPv6 addresses.

Don't forget to also visit the reference guide for host discovery, hosted at http://nmap.org/book/man-host-discovery.html.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.106.232