NMAP Learning
NMAP Learning
NMAP Learning
But the VMs in NAT mode and not in Host only mode.
Passive vulnerability scans detect network weaknesses without disrupting normal network operations.
Active vulnerability scans look for a weakness rather than wait for the weakness to appear. Therefore, active scanning is more effective at finding vulnerabilities than
passive scanning. Active vulnerability scans can also be used to simulate a network attack or to help assess how a hacker penetrated the network after a breach has
occurred.
Xmas scans derive their name from the set of flags that are turned on within a packet. These scans are designed to manipulate the PSH, URG and FIN flags of the TCP header.
-X = Xmas scan
First check the response time on www.owaspbwa.com using ping and HTTP access browsing through pages.
By default if the destination port is not mentioned, NMAP will scan top 1000 ports (note: top not the first 1000)
One of the NMAP's best known features is remote OS detection using TCP IP stack fingerprinting.
NMAP sends a series of TCP and UDP packets to the remote host and examines practically every bit of the responses after performing dozens of tests such as TCP ISN sampling,
TCP option support and ordering IPID sampling and the initial window size check.
NMAP compares the results to its NMAP OS db database of more than 2600 known OS fingerprints and prints out the OS details if there's a match.
Each fingerprint includes a free-form textual description of the OS and a classification which provides the vendor name, OS generation, and device type
• Nmap sends TCP and UDP packets to a remote host and examines the responses to detect the operating system (OS)
• Nmap compares the results to its database of over 2600 known OS fingerprints
• Each fingerprint includes a free-form textual description of the OS and a classification with vendor name, OS generation, and device type
• Using the --os-scan-guess parameter with OS detection can provide more accurate results
This option tells Nmap not to do a port scan after host discovery, and only print out the available hosts that responded to t he host discovery probes. This is often known as a “ping scan”
This option skips the host discovery stage altogether. Normally, Nmap uses this stage to determine active machines for heavier scanning and to gauge the speed of the network.
Timing Templates
• Nmap offers six timing templates: paranoid, sneaky, polite, normal, aggressive, and insane
• Templates can be specified with the uppercase T option and a number (0-5) or name
• Each template has a different impact on scan speed and accuracy
Host Timeout
• Used to give up on slow targets and prevent scan time waste
• Specifies a maximum amount of time to wait for a host (e.g., 30 minutes)
Parallel Scanning
• Nmap utilizes parallelism and advanced algorithms to accelerate scans
• Can be closed using certain timing templates (paranoid, sneaky, or polite)
• Scan delay option can be used to wait between each probe sent to a host
An advanced scan method that allows for a truly blind TCP port scan of a target
No packets are sent to the target from the attacker's real IP address
Exploits predictable IP fragmentation ID sequence generation on a zombie host to gather information about open ports on the target
Use Nmap idle scan query with the IP address of the zombie system
Example results:
Ports 23 and 80 are open
Port 443 is closed or filtered (cannot be distinguished)
Vulnerability Definitions
ISO 27005: A weakness of an asset or group of assets that can be exploited by one or more threats.
NIST: A flaw or weakness in a system, security procedures, design, implementation, or internal controls
that could be exercised, accidentally triggered, or intentionally exploited, resulting in a security breach
or violation of the system's security policy.
Looking at an application's banner information or obtaining version information to know about potential
weaknesses.
Using vulnerability databases to identify weaknesses in certain versions of applications.
Examining protocols used by the application in communication with a client for vulnerabilities.
Sending different types of packets over the network to examine the behavior of the service against
these packets.
Vulnerability Scanners
Software programs designed to assess computers, computer systems, networks, or applications for
known weaknesses.
Examples: Nmap, Nessus, Microsoft Baseline Security Analyzer, Nexpose, OpenVAS, Saint, GFI LanGuard,
Qualys Guard, Secunia PSI.
Vulnerability Databases