Thursday, October 3, 2019

Host Discovery with NMAP

Ping Sweep

To perform a scan of hosts on a network and do not port scan after host discovery you would do:

sam@asus:~% nmap -sn 192.168.0.1/24

Starting Nmap 7.01 ( https://nmap.org ) at 2019-10-03 10:06 MDT
Nmap scan report for acme.com (192.168.0.1)
Host is up (0.013s latency).
Nmap scan report for 192.168.0.38
Host is up (0.0022s latency).
Nmap done: 256 IP addresses (2 hosts up) scanned in 2.66 seconds
sam@asus:~% 

nmap only reports host that are alive.

No Ping Scan

To skip host discovery and not issue a ping scan you would issue the nmap command:

sam@asus:~% nmap -Pn 192.168.0.1/24

Starting Nmap 7.01 ( https://nmap.org ) at 2019-10-03 10:07 MDT
Nmap scan report for 192.168.0.0
Host is up (0.000015s latency).
All 1000 scanned ports on 192.168.0.0 are filtered

Nmap scan report for acme.com (192.168.0.1)
Host is up (0.0083s latency).
Not shown: 995 closed ports
PORT      STATE    SERVICE
53/tcp    open     domain
80/tcp    open     http
8080/tcp  filtered http-proxy
49152/tcp open     unknown
49153/tcp open     unknown

Nmap scan report for 192.168.0.2
Host is up (2.8s latency).
All 1000 scanned ports on 192.168.0.2 are filtered
sam@asus:~%

As you can see nmap reported back with hosts up and ports open on the remote hosts. This is good is you have a list of targets that you already know is up and want to skip the host discovery phase of the nmap scan.

TCP SYN Packet

Nmap give you the ability to send an empty tcp SYN packet to the host to try an estbalish a connection on the specified port. Nmap will send the tcp syn packet to port 80 by default. The '-sn' is used to do a ping sweep on the remote host.

sam@asus:~% nmap -sn -PS 48.21.33.124

Starting Nmap 7.01 ( https://nmap.org ) at 2019-10-03 10:34 MDT
Nmap scan report for srv01.acme.com (48.21.33.124)
Host is up (0.00016s latency).
Nmap done: 1 IP address (1 host up) scanned in 0.00 seconds
sam@asus:~% 

NMAP reported back that the host is indeed up.

TCP ACK Packet

The TCP ACK packet is just like the SYN except it sends an ACK packet. Nmap will send the tcp ACK packet to port 80 by default.
sam@asus:~% nmap -sn -PA 48.21.33.124

Starting Nmap 7.01 ( https://nmap.org ) at 2019-10-03 10:38 MDT
Nmap scan report for srv01.acme.com (48.21.33.124)
Host is up (0.00016s latency).
Nmap done: 1 IP address (1 host up) scanned in 0.01 seconds
sam@asus:~%

Here nmap sends an empty ACK packet to the host trying to recive a RST packet acknowledging that the service is existent on the remote host.

UDP Packets

This will send a UDP packet to a given port. By default nmap uses udp port 40 and 125.

root@asus:~% nmap -sn -PU 48.21.33.124

Starting Nmap 7.01 ( https://nmap.org ) at 2019-10-03 13:52 MDT
Nmap scan report for srv01.acme.com (48.21.33.124)
Host is up.
Nmap done: 1 IP address (1 host up) scanned in 0.00 seconds
root@asus:~% 

Here we specify the '-sn' option telling nmap we do not want to do a port scan and just query the ports specified.

ICMP Pings

Nmap can send ping probes just like the ping command line utility. The types of ICMP pings nmap can send are: Echo (type 8),Timestamp (13) and address mask (17).

ICMP Echo

root@asus:~% nmap -sn -PE 48.21.33.124

Starting Nmap 7.01 ( https://nmap.org ) at 2019-10-03 14:51 MDT
Nmap scan report for srv01.acme.com (48.21.33.124)
Host is up.
Nmap done: 1 IP address (1 host up) scanned in 0.00 seconds
root@asus:~%

ICMP Timestamp

root@asus:~% nmap -sn -PP 48.21.33.124

Starting Nmap 7.01 ( https://nmap.org ) at 2019-10-03 14:52 MDT
Nmap scan report for srv01.acme.com (48.21.33.124)
Host is up.
Nmap done: 1 IP address (1 host up) scanned in 0.00 seconds
root@asus:~% 

ICMP Address Mask

root@asus:~% nmap -sn -PM 48.21.33.124

Starting Nmap 7.01 ( https://nmap.org ) at 2019-10-03 14:52 MDT
Nmap scan report for srv01.acme.com (48.21.33.124)
Host is up.
Nmap done: 1 IP address (1 host up) scanned in 0.01 seconds
root@asus:~%

IP Protocol Ping

The IP Protocol Ping sends IP packets with the specified protocol number set in their IP header.

root@asus:~% nmap -sn -PO 48.21.33.124

Starting Nmap 7.01 ( https://nmap.org ) at 2019-10-03 15:03 MDT
Nmap scan report for srv01.acme.com (48.21.33.124)
Host is up.
Nmap done: 1 IP address (1 host up) scanned in 0.01 seconds
root@asus:~% 

No comments:

Post a Comment

Exploiting Weak WEBDAV Configurations

The server we are going to audit has the following fingerprint. 80/tcp open http Apache httpd 2.2.8 ((Ubuntu) DAV/2) Next we need t...