Penetration Testing mailing list archives

Re: Port Scanning.


From: Faisal Khan <faisal () netxs com pk>
Date: Mon, 13 Dec 2004 21:50:59 +0500


Miguel,

Thanks for the detailed post. I was just reaffirming my own gut feeling. Only bummer is doing a good scan on a Class C - takes up a few hours. Besides the client has lots of security gear, the funny thing is sometimes the firewalls sense that someone is doing a port scan, other times - it does not. But the main reason to do it a few times is

(a) To be sure about it - rather than basing an entire pen-test on a single report of port scan.
(b) Client will most likely ask for multiple scan reports
(c) The IPS devices in their network sometimes will block the port scanner and sometimes allow it to function based on the originating IP. This is why we have to resort to multiple IPs from various (read: different) Class C addresses - in the hope that the IPS devices do not temporarily blacklist our IPs from where the scan is taking place.

Faisal



At 09:24 PM 12/13/2004, miguel.dilaj () pharma novartis com wrote:
Hi Faisal,

I found that using nmap alone is usually enough, provided you use the
proper settings. An exception is when you're dealing with a firewall
trying to assess how exactly things interconnect, in such cases you can
try hping2/3 or firewalk.
A short time ago I posted an answer somewhere about the most useful nmap
settings to scan a "normal" network. IMHO:
* use a very comon source port, like 80 (-g 80)
* fragment, and be sure that nothing on YOUR side is trying to defragment
(-f)
* use paranoid timing, to avoid overreaction from an eventual IDS (-T0)
* use SYN scan (-sS)
* use decoys if overreacting IDS are a concern, and if allowed by your
contract! (-D {decoy1},{decoy2},...)

Then go for any advanced techniques, as required (for example ACK or
Window scan).
You can combine OS detection to the above, scan UDP ports, etc., this will
depend exactly on the setup of the network you're checking, and what are
you looking for.
If you don't know what to expect, scan the entire port range, sometimes I
found interesting things in high ports (for example a proxy, or a Java
application server), that were not supposed to be open to the world.
Lastly, don't forget some of the most esoteric and advanced techniques,
that are used once every solsctice, like IPID scan from probably trusted
machines, etc.

Because some times you need to use advanced techniques, very often you
need to scan more than once, but I also recommend (if possible) to scan
from a completely different source IP address (example: scanning a certain
system in Spain from my country showed 2 open ports of a proxy installed
by the ISP, but these ports were not shown when scanned from the same
ISP's network).

IMHO nmap is simply the best port scanner out there. But of course other
people can have different preferences, so no flame wars on port scanners
please ;-)
I like it on Linux more than on Windows, *somehow* I found it more
reliable ;-)

IIRC, Fyodor is a member of this list, so perhaps he can enlighten us all
(or send us to RTFM ;-)

Cheers,

Miguel Dilaj (Nekromancer)
Vice-President of IT Security Research, OISSG






Faisal Khan <faisal () netxs com pk>
13/12/2004 14:46


        To:     pen-test () securityfocus com
        cc:     (bcc: Miguel Dilaj/PH/Novartis)
        Subject:        Port Scanning.




What's a good industry practise whilst doing port-scanning during a
pen-test.

Do you rely on the results of a single vendor's software or do you use
multiple softwares?

Also, with each OEM/vendor - do you scan once or twice?

I need to do a scan on a Class C Address if that matters in any way.

Faisal



Faisal Khan,  CEO
Net Access Communication
Systems (Private) Limited
________________________________

Network Security - Secure Web Hosting
Managed Internet Services - Secure Email
Dedicated Servers - Reseller Hosting

Visit www.netxs.com.pk for more information.



Current thread: