4.1 Flashcards
(40 cards)
Network Reconnaissance and Discovery
Networks are like most infrastructure—you never see or care about it until it isn’t working. And when you do want to look, how do you do it? A wide range of tools can be used to permit you to see the inner workings of a network, and they are covered in the sections that follow.
tracert/traceroute
This shows the route taken from a computer to a remote host—for example, a website. It can show any latency traveling through a particular router. It is like traffic going into a city center; the closer the traffic is to the center, the slower it is. It shows information for a maximum of 30 hops.
nslookup/dig
Nslookup is a diagnostic tool for verifying the IP address of a hostname in the DNS server database. We can also use the set type=MX command, which brings back the DNS details on all mail servers in the domain.
Dig is the equivalent of nslookup in a Linux/Unix environment.
ipconfig/ifconfig
These commands show the IP configuration. The Windows version is ipconfig, but Unix/Linux can use ifconfig.
nmap
Nmap is a free and open-source network mapper that can be used to create an inventory of all of the devices on your network and can be used for bannergrabbing.
ping/pathping
Ping is used to test connectivity to another host.
hping
This tool can be used as a TCP/IP packet assembler and analyzer. It allows you to test the security of your network devices, such as firewall rules and open ports, and analyzes network traffic, including packet formats and traceroute.
netstat
Netstat is a native tool that is incorporated into a Windows operating system. It used to see the established connections and the listening ports. It can also let you know what services are running a computer. If you reboot the computer, all established ports will disappear.
netcat
Netcat, or nc, is a utility for showing network connections in a Linux/Unix environment.
IP scanners
It will show IP addresses that are active and responding, those that are active but not responding, and those that are inactive. An attacker could use an inactive IP address to gain access to your network as they know it is not allocated to anyone.
arp
ARP is used to translate the IP address to a MAC address; the arp -a command shows the ARP cache. An attacker could use ARPSpoof, ARPoison, and Ettercap to poison your ARP cache. These tools could be used to create ARP broadcasts by sending unsolicited ARP replies.
route
The route command works in Linux and Windows systems to provide information on current routing parameters and to manipulate these parameters. In addition to listing the current routing table, it has the ability to modify the table.
curl
This is a command-line tool used to transfer data. It can also be used in banner grabbing; this fetches remote banner information from web servers. -s is silent and -I is fetching the HTTP headers.
theHarvester
This is a passive tool that comes with Kali Linux and we can use it to harvest the email addresses of an organization.
sn1per
This is a pen test reconnaissance tool that can be used for automated tests. This tool can be used by pen testers, bug bounty researchers, and security teams. It can look for vulnerabilities in your network, open ports, it can diagnose DNS issues, has Nmap capabilities, and it can find application
scanless
This is a port scanner that can be anonymous so that the scan cannot be traced back to your IP address.
dnsenum
This tool can identify DNS records, such as MX, mail exchange servers, NS, and host A records for a domain. This way, an attacker has an idea of how large your organization is and if it is worth attacking. The internal team can also run it to see what information is available to attackers.
Nessus
This is a remote scanning tool that can highlight vulnerabilities that can be exploited by hackers.
Cuckoo
This tool creates a sandbox that can be used for analyzing files for malwareinspection.
head
Head is a utility designed to return the first lines of a file. A common option is the number of lines one wishes to return. For example, head -5 returns the first five lines of a file.
tail
Tail is a utility designed to return the last lines of a file. A common option is the number of lines one wishes to return. For example, tail -5 returns the last five lines of a file.
cat
Cat is a Linux command, short for concatenate, that can be used to create and manipulate files. It can display the contents of a file, handle multiple files, and can be used to input data from stdin, which is a stream of input, to a file if the file does not exist.
grep
Grep is a Linux utility that can perform pattern-matching searches on file contents.
chmod
Chmod is the Linux command used to change access permissions of a file. The general form of the command is
chmod