39
Scanning Scanning Scanning Goals Useful Tools The Basics NMAP Google Hacking 1 / 39

Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Scanning

Scanning

Scanning

Goals

Useful Tools

The Basics

NMAP

Google Hacking

1 / 39

Page 2: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Scanning

Scanning

Scanning

Goals

Useful Tools

The Basics

NMAP

Google Hacking

2 / 39

■ Suppose you’re an attacker■ You want to attack a site■ How do you proceed?

Page 3: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Goals

Scanning

Scanning

Goals

Useful Tools

The Basics

NMAP

Google Hacking

3 / 39

■ Find an interesting (or vulnerable) machine■ Find a vulnerable service■ Attack. . .

Page 4: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Useful Tools

Scanning

Scanning

Goals

Useful Tools

The Basics

NMAP

Google Hacking

4 / 39

■ Ping■ Arp■ Dig■ Nmap■ rpcinfo; showmount■ Tcpdump■ Others, for special purposes

Page 5: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

The Basics

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

5 / 39

Page 6: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Getting Started

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

6 / 39

■ What’s the first thing we know about thetarget?

■ The domain name!■ Your probably know at least one host, too:

www.domainname■ There’s more in the DNS

Page 7: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

What are the Hosts?

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

7 / 39

■ Most hosts have DNS entries — can we listthem?

■ First try — do “zone transfer”■ Use dig ns cs.columbia.edu to learn the

name servers■ Pick one, then

$ dig axfr cs.columbia.edu @dns2.itd.umich.edu

; <<>> DiG 9.3.2 <<>> axfr cs.columbia.edu @dns2.itd.umich.edu.

; (1 server found)

;; global options: printcmd

; Transfer failed.

■ But a different name server worked. . .

Page 8: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

What Happened?

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

8 / 39

■ It’s possible to configure a name server toreject unauthorized zone transfer requests

■ But most sites have multiple name servers;frequently, some are under differentmanagement (including 3 of 5 cs.columbia.eduname servers)

■ Not everyone has the same policy. . .

Page 9: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Enumerating Hosts

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

9 / 39

■ Learn the IP address of one host:www.cs.columbia.edu is 128.59.18.180

■ Use dig -x on other IP addresses in the range:

for i in ‘seq 1 254‘

do

dig -x 128.59.18.$i

done

■ Some sites give useless answers; 135.207.23.32is H-135-207-23-32.research.att.com

■ Another caveat: watch out for smaller or largernets

Page 10: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Other Information in the DNS

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

10 / 39

■ HINFO:

$ dig hinfo play.cs.columbia.edu.

m83.cs.columbia.edu. 3600 IN HINFO "AMD Athlon"

"Ubuntu5.10"

■ More: see WKS records, TXT records,NAPTR records, etc.

$ dig wks cs.columbia.edu

cs.columbia.edu. 3600 IN WKS

128.59.16.20 6 13 17 21 23 25 37 42 53 79

111 119 67 69 161 162

■ Of course, those might be wrong. . .

Page 11: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

What Hosts Really Exist?

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

11 / 39

■ The DNS lists what you think you have■ What do you really have?■ You can ping IP addresses

for i in ‘seq 1 254‘

do

ping 128.59.23.$i

done

Page 12: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

How About a Broadcast ping?

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

12 / 39

# ping -L -r -w 100 128.59.23.255

PING 23-net.cs.columbia.edu (128.59.23.255): 56 data

64 bytes from 128.59.18.102: icmp_seq=0 ttl=255 time=3.848

64 bytes from 128.59.20.155: icmp_seq=0 DUP! ttl=64

64 bytes from 128.59.22.252: icmp_seq=0 DUP! ttl=64

64 bytes from 128.59.18.133: icmp_seq=0 DUP! ttl=64

64 bytes from 128.59.18.134: icmp_seq=0 DUP! ttl=64

64 bytes from 128.59.22.7: icmp_seq=0 DUP! ttl=64 time=6.505

Page 13: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Off-LAN Broadcasts

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

13 / 39

# ping -L -r -w 100 128.59.23.255

PING 23-net.cs.columbia.edu (128.59.23.255): 56 data

ping: sendto: Network is unreachable

■ “Directed broadcasts” are blocked to preventSmurf attacks

■ Smurf attack: send a ping packet to abroadcast address, with the (forged) sourceaddress of your victim

■ Many hosts will send back to it, using up lotsof the victim’s bandwidth

Page 14: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

ARP

Scanning

The Basics

Getting Started

What are the Hosts?

What Happened?

Enumerating Hosts

Other Information inthe DNSWhat Hosts ReallyExist?How About aBroadcast ping?

Off-LAN Broadcasts

ARP

NMAP

Google Hacking

14 / 39

■ If we’re on the same LAN, we can learn morevia ARP:

# arp -a

mudd-edge-1.net.columbia.edu (128.59.16.1) at 00:d0:06:26:9c:00

dynasty.cs.columbia.edu (128.59.16.5) at 00:03:ba:14:a3:68

disco.cs.columbia.edu (128.59.16.7) at 08:00:20:9f:5a:cc

razor.cs.columbia.edu (128.59.16.8) at 00:01:02:82:77:2f

■ Note that the first three bytes of the MACaddress tell who manufactured the card:00:d0:06 is Cisco, 00:03:ba and 08:00:20 areSun, etc.

Page 15: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

NMAP

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

15 / 39

Page 16: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

The Network Map Tool

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

16 / 39

■ General-purpose scanner■ Does everything I’ve described and more■ Practically point-and-click scanning (but it’s

command-line)

Page 17: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Finding Hosts

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

17 / 39

# nmap -sP 128.59.23.0/21

Host mudd-edge-1.net.columbia.edu (128.59.16.1) appears

Host dynasty.cs.columbia.edu (128.59.16.5) appears to

Host mailswitch.cs.columbia.edu (128.59.16.6) appears

Host disco.cs.columbia.edu (128.59.16.7) appears to

Host razor.cs.columbia.edu (128.59.16.8) appears to

...

Page 18: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Finding Hosts on a LAN

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

18 / 39

# nmap -sP 128.59.23.0/21

Host mudd-edge-1.net.columbia.edu (128.59.16.1) appears

MAC Address: 00:D0:06:26:9C:00 (Cisco Systems)

Host dynasty.cs.columbia.edu (128.59.16.5) appears to

MAC Address: 00:03:BA:14:A3:68 (Sun Microsystems)

Host mailswitch.cs.columbia.edu (128.59.16.6) appears

MAC Address: 00:17:08:B5:41:00 (Hewlett Packard)

...

Page 19: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Port-Scanning

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

19 / 39

■ Find out what ports are open on a machine■ Better yet, find out what applications are

behind those ports■ Extras: avoid detection, detect firewalls,

bypass some firewalls, etc.

Page 20: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

The Real Truth About CS.. . .

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

20 / 39

# nmap -p 1-200 cs.columbia.edu

Not shown: 195 closed ports

PORT STATE SERVICE

22/tcp open ssh

25/tcp open smtp

53/tcp open domain

111/tcp open rpcbind

139/tcp open netbios-ssn

MAC Address: 00:03:BA:62:6A:39 (Sun Microsystems)

Nmap finished: 1 IP address (1 host up) scanned in 6.249

Many fewer ports than in the WKS record. . .

Page 21: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Trying it From Home

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

21 / 39

7/tcp filtered echo

9/tcp filtered discard

19/tcp filtered chargen

22/tcp open ssh

25/tcp open smtp

53/tcp open domain

111/tcp open rpcbind

135/tcp filtered msrpc

136/tcp filtered profile

137/tcp filtered netbios-ns

138/tcp filtered netbios-dgm

139/tcp filtered netbios-ssn

Page 22: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

From CU Wireless

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

22 / 39

# nmap -sA -p 1-200 www.cs.columbia.edu

PORT STATE SERVICE

135/tcp filtered msrpc

Page 23: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Sometimes It’s Like This

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

23 / 39

3/tcp filtered compressnet

7/tcp filtered echo

36/tcp filtered unknown

116/tcp filtered ansanotify

132/tcp filtered cisco-sys

135/tcp filtered msrpc

147/tcp filtered iso-ip

157/tcp filtered knet-cmp

177/tcp filtered xdmcp

Different paths? Or a scan failure? Unclear.

Page 24: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Detecting Filtered Ports

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

24 / 39

■ How does nmap detect a filtered service?■ A TCP SYN is normally answered with a

SYN+ACK or a RST

■ A filtered port generally returns nothing

Page 25: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

ACK Scans

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

25 / 39

■ Send a packet with the ACK bit set■ Gets through packet filters!■ Can’t distinguish between open and closed

services; can be used to map firewall rules

Page 26: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Avoiding Detection

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

26 / 39

■ If a program does a connect() call, the usual3-way TCP handshake will occur

■ The application can log the fact and source ofthe connection

■ Nmap hand-crafts SYN packets, and responds toany SYN+ACK with RST

■ The TCP open never completes, so theapplication never notices and can’t log

Page 27: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

UDP Ports

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

27 / 39

■ Send a UDP packet■ Watch for a response or an ICMP Port

Unreachable■ No answer at all may indicate a filtered port

Page 28: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Mapping Versions

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

28 / 39

■ Why do we want to?■ Particular applications may have (security)

bugs■ Particular versions of particular applications

may have (security) bugs

Page 29: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Local Software

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

29 / 39

# nmap -A -p 1-200 www.cs.columbia.edu

Starting Nmap 4.11 ( http://www.insecure.org/nmap/ )

Interesting ports on shadow.cs.columbia.edu (128.59.23.100):

Not shown: 196 closed ports

PORT STATE SERVICE VERSION

22/tcp open ssh OpenSSH 3.9p1 (protocol 1.99)

25/tcp open smtp Sendmail 8.12.10/8.12.10

80/tcp open http Apache httpd 1.3.33 ((Unix) mod_ssl/2.8.22

111/tcp open rpcbind 2-4 (rpc #100000)

MAC Address: 00:03:BA:C5:A0:DD (Sun Microsystems)

Device type: general purpose

Running: Sun Solaris 8

OS details: Sun Solaris 8

Uptime 13.412 days (since Thu Oct 19 15:52:13 2006)

Service Info: OS: Unix

Page 30: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Learning Versions

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

30 / 39

■ How does nmap get that data?■ Many services announce it right away:

# telnet www.cs.columbia.edu 80

Trying 128.59.23.100...

Connected to shadow.cs.columbia.edu.

Escape character is ’^]’.

GET / HTTP/1.0

HTTP/1.1 200 OK

Date: Thu, 02 Nov 2006 05:49:38 GMT

Server: Apache/1.3.33 (Unix) mod_ssl/2.8.22 OpenSSL/0.9.7e

X-Powered-By: PHP/4.3.11

■ In other cases, it uses heuristics

Page 31: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

To Tell the Truth?

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

31 / 39

$ dig version.bind txt chaos @kedu.cc.columbia.edu

version.bind. 0 CH TXT "9.2.6-P1"

$ dig version.bind txt chaos @cs.columbia.edu

VERSION.BIND. 0 CH TXT "surely you must be joking"

Hiding the version helps less than you might think

Page 32: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Fingerprinting

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

32 / 39

■ Various heuristics can be used to identify OSand version

■ Example: look at initial sequence numberpatterns, support for TCP options, initialwindow size, etc.

■ Get uptime from TCP timestamp option■ Evaluate sequence number and IPid field

predictability■ But good guys need version numbers for site

management■ Net result: hiding version numbers tends to

hurt the good guys more than the bad guys

Page 33: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Evasive Action

Scanning

The Basics

NMAPThe Network MapTool

Finding Hosts

Finding Hosts on aLAN

Port-Scanning

The Real TruthAbout CS.. . .Trying it FromHome

From CU WirelessSometimes It’s LikeThisDetecting FilteredPorts

ACK Scans

Avoiding Detection

UDP Ports

Mapping Versions

Local Software

Learning Versions

To Tell the Truth?

Fingerprinting

Evasive Action

Google Hacking

33 / 39

■ Nmap has many techniques to avoid detection■ Example: randomized scan orders, decoy hosts,

zombies, bounce attacks, etc.■ Nasty example: --badsum■ Send packet with a bad TCP checksum■ Hosts will drop such packets — but some IDS

won’t. . .

Page 34: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Google Hacking

Scanning

The Basics

NMAP

Google Hacking

Google Hacking

The Santy Worm

Picking Out Versions

Interesting Files

Conclusions

34 / 39

Page 35: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Google Hacking

Scanning

The Basics

NMAP

Google Hacking

Google Hacking

The Santy Worm

Picking Out Versions

Interesting Files

Conclusions

35 / 39

■ Many web sites are insecure■ Probable insecurity is often detectable just by

seeing what files are on the site, i.e.,known-bad scripts

■ Google knows all. . .

Page 36: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

The Santy Worm

Scanning

The Basics

NMAP

Google Hacking

Google Hacking

The Santy Worm

Picking Out Versions

Interesting Files

Conclusions

36 / 39

■ Use Google to find sites running the PHPBulletin Board (phpBB)

■ Take over the site via flaws in (some versionsof) phpBB

■ Repeat. . .

Page 37: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Picking Out Versions

Scanning

The Basics

NMAP

Google Hacking

Google Hacking

The Santy Worm

Picking Out Versions

Interesting Files

Conclusions

37 / 39

■ Sometimes, only a particular version of code isvulnerable

■ Include the version in the search string■ Example: "Powered by Gallery v1.4.4"

Page 38: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Interesting Files

Scanning

The Basics

NMAP

Google Hacking

Google Hacking

The Santy Worm

Picking Out Versions

Interesting Files

Conclusions

38 / 39

■ filetype:lit lit (books|ebooks) willfind Ebooks

■ Database passwords inside PHP scripts:filetype:inc intext:mysql connect

■ Your favorite company’s name for closely-helddocuments: filetype:doc "XXXX company

confidential"

■ Other queries will find password files, creditcard numbers, etc.

Page 39: Scanning - Columbia Universitysmb/classes/s09/l21.pdf · NMAP Scanning The Basics NMAP The Network Map Tool Finding Hosts Finding Hosts on a LAN Port-Scanning The Real Truth About

Conclusions

Scanning

The Basics

NMAP

Google Hacking

Google Hacking

The Santy Worm

Picking Out Versions

Interesting Files

Conclusions

39 / 39

■ Scanning is a very powerful attack technique■ It’s very hard to hide from a clever scanning

program