Thứ Tư, 23 tháng 4, 2014

Scanning Networks - p.8

Lab 7



Scanning a Network Using the NetScan Tools Pro
NetScanT001s Pro is an integrated collection of internet information gathering and netirork troubleshooting utilitiesfor Netirork Professionals.

Lab Scenario

You have already noticed in die previous lab how you can gadier information such as ARP ping scan, MAC address, operating system details, IP ID sequence generation, service info, etc. duough Intense Scan. Xmas Scan. Null Scan and ACK Flag Scan on Nmap. An attacker can simply scan a target without sending a single packet to the target from their own IP address; instead, they use a zombie host to perform the scan remotely and if an intrusion detection report is generated, it will display die IP of die zombie host as an attacker. Attackers can easily know how many packets have been sent since die last probe by checking die IP packet fragment identification number (IP ID).

As an expert penetration tester, you should be able to determine whether a TCP port is open to send a SYN (session establishment) packet to the port. The target machine will respond widi a SYN ACK (session request acknowledgement) packet if die port is open and RST (reset) if die port is closed and be prepared to block any such attacks on the network in this lab you will learn to scan a network using NetScan Tools Pro. You also need to discover network, gadier information about Internet or local LAN network devices, IP addresses, domains, device ports, and many other network specifics.

Lab Objectives

The objective of diis lab is assist to troubleshoot, diagnose, monitor, and discover devices on network.

in this  lab, you need to:

■ Discovers IPv4/IPv6 addresses, hostnames, domain names, email addresses, and URLs
■ Detect local ports

Lab Environment

To perform die lab, you need:
■ NetScaii Tools Pro located at D:\CEH-Tools\CEHv8 Module 03 Scanning Networks\Scanning Tools\NetScanTools Pro
■ You can also download the latest version of NetScan Tools Pro from the link http:/ / www.11etscantools.com/nstpromai11.html
■ If you decide to download die latest version, dien screenshots shown in die lab might differ
■ A computer running Windows Server 2012
■ Administrative privileges to run die NetScan Tools Pro tool

Lab Duration

Time: 10 Minutes

Overview o f N etw ork Scanning

Network scanning is die process of examining die activity on a network, which can include monitoring data flow as well as monitoring die functioning of network devices. Network scanning serves to promote bodi die security and performance of a network. Network scanning may also be employed from outside a network in order to identify potential network vulnerabilities.

NetScan Tool Pro performs the following to network scanning:

■ Monitoring network devices availability
■ Notifies IP address, hostnames, domain names, and port scanning

Lab Tasks

Install NetScan Tool Pro in your Window Server 2012. Follow die wizard-driven installation steps and install NetScan Tool Pro.
1. Launch the Start menu by hovering die mouse cursor in the lower-left corner of the desktop


FIGURE /.l: Windows Server 2012- Desktop view

2. Click the NetScan Tool Pro app to open the NetScan Tool Pro window



FIGURE 7.2 Windows Server 2012 - Apps


3. I f you are using the Demo version o f NetScan Tools Pro, then click Start the DEMO
4. The Open or Create a New Result Database-NetScanTooIs Pro window will appears; enter a new database name in Database Name (enter new name here)
5. Set a default directory results for database file location, click Continue

FIGURE 7.3: setting a new database name for XetScan Tools Pro

6. The NetScan Tools Pro main window will appears as show in die following figure

FIGURE 7.4: Main window of NetScan Tools Pro

7. Select Manual Tools (all) on the left panel and click ARP Ping. A window will appears few information about die ARP Ping Tool.

8. Click OK

FIGURE 7.5: Selecting manual tools option
9. Select the Send Broadcast ARP, then Unicast ARP radio button, enter the IP address in Target IPv4 Address, and click Send Arp

FPuiger 7.6: Result of ARP Ping

10. Click ARP Scan (MAC Scan) in the left panel. A window will appear with information about the ARP scan tool. Click OK

FIGURE 7.7: Selecting ARP Scan (MAC Scan) option

11. Enter the range o f IPv4 address in Starting IPv4 Address and Ending IPv4 Address text boxes

12. Click Do Arp Scan

FIGURE 7.8 Result of ARP Scan (MAC Scan)
13. Click DHCP Server Discovery in the left panel, a window will appear with information about DHCP Server Discovery Tool. Click OK

FIGURE 7.9: Selecting DHCP Server Discovery Tool Option
14. Select all the Discover Options check box and click Discover DHCP Servers

FIGURE 7.10: Result of DHCP Server Drscovery
15. Click Ping scanner in the left panel. A window will appear with information about Ping Scanner tool. Click OK

FIGURE 7.11: selecting Ping scanner Option
16. Select the Use Default System DNS radio button, and enter the range of IP address in Start IP and End IP boxes

17. Click Start

FIGURE 7.12: Result of sail IP address
18. Click Port scanner in the left panel. A window will appear with information about die port scanner tool. Click OK

FIGURE 7.13: selecting Port scanner option

19. Enter the IP Address in the Target Hostname or IP Address field and select the TCP Ports only radio button

20. Click Scan Range of Ports

FIGURE 7.14: Result of Port scanner
Lab Analysis

Document all die IP addresses, open and closed ports, services, and protocols you discovered during die lab.



Questions

1. Does NetScaii Tools Pro support proxy servers or firewalls?


















Không có nhận xét nào:

Đăng nhận xét