Penetration Testing A - Z: Vulnerability Security and Tools by Walter V. Ayres
Author:Walter V. Ayres [V. Ayres, Walter]
Language: eng
Format: azw3
Publisher: UNKNOWN
Published: 2020-10-20T00:00:00+00:00
Normally, we begin our Nmap port scans with a SYN stealth scan looking for selected ports and using OS identification option. By using the stealth scan feature and confining our scan to a few choice ports, we obtain valuable information while significantly improving the chances of remaining undetected. We begin by scanning for ports that support services that we know provide valuable information or that we may be able to exploit. We have
developed a list of some of these ports (seeTable 13-1 ). You should add and delete ports from this list based on what you find to be
successful and the type of systems you are targeting.
The syntax for this stealth scan can be confusing at first. Here is the command you could use to execute the SYN stealth scan we just described (remember, UNIX is case sensitive):
#nmap â sS â O â P0 â f â p 7,9,13,21,25,135-139,5800,etc. outputfile.txt 10.10.10.10-10.10.10.100
Table 13-1. Sample Ports to Scan
Port Service
7 Echo
9 Discard
13 Daytime
19 Character generator
21 FTP
22 SSH
23 telnet
25 SMTP
37 Time
42 Wins hostname server
53 DNS
69 TFTP
79 Finger
80 HTTP
110 POP
111 SUN RPC
135â139 NT services NetBIOS
143 IMAP
161â162 SNMP
256â258 Check Point Firewall
443 SSL
512â515 r services
2049 NFS
2301 Compaq
5800 VNC
5900 VNC
6000â6023 X Windows
12345 Netbus
32760â32785 RPC services
65301 pcAnywhere
There are several options included in this command.-sS specifies a SYN stealth scan.-O enables OS
identification.-P0 indicates that Nmap should not attempt to ping the target.-P0 is a very important option; if this option is not used, Nmap will attempt to ping the target, and if the target does not respond to ping, Nmap will not scan it.
Therefore, if you want to scan only hosts that respond to ping do not use-P0 , but be aware that you may miss hosts that have disabled or filtered ping. Using-P0 will enable you to scan hosts that do not
respond to ping. The scan will take longer since Nmap will attempt to scan the specified ports on every address even if the host is not active.-f indicates that the scan should be fragmented into small packets to help avoid detection.-p specifies the ports to be scanned. Follow the-p with your list of ports, as demonstrated in the example on page 232. Note that in our example we used âetcâ to signify that you could continue to add specific ports. If you do not specify the-p option Nmap will scan its default list of ports.-v indicates the verbose setting, which will display all output on the screen. We recommend using the verbose option so that you can examine the output as it is produced and catch problems early.-o allows you to specify an output file so that you can analyze the results later. Finally, enter the IP address range of the systems to be scanned. In our example, we are scanning
10.10.10.10 through 10.10.10.100. We could have easily added another range or individual hosts by adding a comma after each range or host.
Nmap offers some more advanced options that increase the functionality of the tool. Before we start
discussing these options and
providing examples, one word of warning. The decoy option,-D
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Digital Forensics and Incident Response - Second Edition by Gerard Johansen(1468)
Network Security Strategies by Aditya Mukherjee(1370)
Modern Cryptography for Cybersecurity Professionals by Lisa Bock(1339)
Practical Cybersecurity Architecture by Diana Kelley Ed Moyle(1330)
Web Penetration Testing with Kali Linux - Third Edition by Gilberto Nájera-Gutiérrez(785)
Web Application Obfuscation by Mario Heiderich & Eduardo Alberto Vela Nava & Gareth Heyes & David Lindsay(584)
Cybersecurity - Attack and Defense Strategies by Erdal Ozkaya & Yuri Diogenes(581)
GCIH GIAC Certified Incident Handler All-in-One Exam Guide by Nick Mitropoulos(471)
Kali Linux Penetration Testing Bible by Gus Khawaja(428)
Cybercrime Investigations by John Bandler(412)
The Hardware Hacking Handbook by Colin O'Flynn(391)
Computer Hacking Forensic Investigator Exam Workbook: 500+ Questions & Answers for ECCouncil 312-49: Updated 2020 by Aries+ Centre(357)
Kali Linux: Testing Your Network: How to Test Infrastructure Security with Security Testing and Penetration Testing by Eltrinos Frank(352)
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks by Purackal Rachel Sebastian(324)
Security in Computing, 5e by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies(322)
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites by Rob Kowalski(316)
8 Steps to Better Security by Crawley Kim;(311)
Security, Privacy and User Interaction by Unknown(287)
Cybersecurity: A Self-Teaching Introduction by C.P. Gupta & K.K. Goyal(279)
