Preview

Case Study #1

Satisfactory Essays
Open Document
Open Document
549 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study #1
Case Study #1
09/07/2014
Principles Info Sys Security
Ping sweeps and port scans are used for hackers and intruders to find a way into a network and is a problem for all companies. These are two ways that are used to try and hack into networks to steal information. Port scans and ping sweeps are two very common ways that hackers use to gain access into a network.
A ping sweep is a kind of network probe to try and gain access by pinging a machine (computer) to see if it is on. During a ping sweep, the intruder sends a set of ICMP ECHO packets to a network of machines to see which ones respond. The whole point of doing the ping sweep is to determine which machines are left on and which are turned off. Once the hacker knows which machines are on, he can focus on the machines to attack. Hackers usually send ICMP ECHO packets to an IP range to see which machines reply back.
They may also use what is called fping, which can be used for conducting ping sweeps. Fping takes the list of IP addresses and sends them ping packets. Unlike the normal ping, fping sends one ping packet to one IP address, and then proceeds immediately to the next IP address in a rotation.
The port scan is a method used by intruders/hackers to discover the services running on a target machine (computer). The hacker can use the information he finds to then plan an attack on any service they find. If the hacker finds a port that is open, they may proceed to find out what process is running on that computer or machine. If the process version is vulnerable, the hacker may be able to gain super user access. Port scanning can also cause a slowdown on the machine or the network, because of all of the traffic.
Running a port scan is a very simple task to perform these days. All that needs to be done is to connect to a series of ports on a machine and find out which ports respond and which don't. A simple port scanner program can be written usually under 15 minutes by a programmer in a language such

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 1 Lab 3

    • 82 Words
    • 1 Page

    f. ping –c3 IP where IP is the IP address of a remote system such as the router…

    • 82 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    According to S. Branch (2012), in his article What is a Ping Sweep he says “A ping sweep, also called an Internet Control Message Protocol (ICMP) sweep, is a diagnostic technique used in computing to see what range of (IP) addresses are in use by live host, which are usually computers”. Ping sweeps are not unusual, they are often used by administrators in diagnosing network issues; however, hackers also use ping sweeps to find active computers so they will know where to concentrate their attacks. This can become a serious security breach for an unprepared network. Hackers send not one ping but many packets at the same time. This tends to slow down a network. When the hackers ping sweep finds an active computer it can send request for confidential information.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Case Study 1

    • 539 Words
    • 2 Pages

    The Piagetian concept used in the brownie incident is conservation. Young children seem to think that have a greater number of something always means more. Like for example with the brownie incident all the kids had the same…

    • 539 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    First we must understand what these two things do before we can understand how they are used to impact a network. I’ll start with ping sweeps. A ping sweep is a signal that is sent to a range of machines on a network to simply see if there is a reply back. This is done via an ICMP Echo request that is sent to each machine.…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT 2580

    • 520 Words
    • 3 Pages

    b. The different scans all work hand and hand with each other. Ping will give you all the machines on the network while all the other scans give you more specific details of the scan depending on what you want to check or identify as far as vulnerabilities.…

    • 520 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A ping sweep is simply “an ICMP echo request to a target machine.” (Conklin 12) By doing this ping sweep we can see which machines or people are actually active. The ICMP packets get sent and they will return an echo back when the address it is active. This just lets the person know that there is a real person at the end of the ping. This is similar to how a submarine would detect a body in the water. The submarine would send out a sound packet and it can detect that something is there by responding with a pinging sound. (Branch, 2012) Once the address is actually found from the ping sweep we would then move on to the port scan.…

    • 434 Words
    • 2 Pages
    Good Essays
  • Good Essays

    3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source?…

    • 1091 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Webdriver

    • 427 Words
    • 2 Pages

    1. Identify the port number - this is the port number written in code (and it can be any 4 digit number).…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ports are points of convergence between two domains of freight circulation, land and maritime domains. The term port came from the Latin word “portus”, which means gate or gateway. Ports are bound by the need to serve ships, and so access to navigable water has been historically the most important site consideration.…

    • 25288 Words
    • 102 Pages
    Good Essays
  • Better Essays

    Wace burgess

    • 1376 Words
    • 6 Pages

    port is a deep water port. ,consisting of inland, estuary and coastal harbors .It has a total of 280 kilometers of deep-water lines, among which over 160 kilometers are under 10-meter depth. Until now, few ports in China, even in the world, can be compared with Ningbo-Zhoushan Port in water depth.…

    • 1376 Words
    • 6 Pages
    Better Essays