Back to Cptr427Winter2010

=Hacking Exposed Chapter 2: Scanning= Scanning is a method of determining if a determining what system and services are running on a machine

==Determining if the System is Alive= ===Network Ping Sweeps===

Detecting a ping sweep is important to maintain security. Snort can be used to detect ping sweeps, and most commercial network and desktop firewalls can detect ping sweeps. Preventing a ping sweep can be done by evaluating the ICMP traffic that you allow into your network

===ICMP Queries=== ICMP Queries are used as a scanning technique that takes advantage of the expected default replies to different types of ICMP traffic.

To defend against ICMP queries, it is possible to block the ICMP types that give out information at your border routers

==Determining Which Services are Running or Listening== ===Port Scanning=== After finding responsive systems, an attacker will typically attempt to determine which services are running on a machine. One technique used to do so is port scanning.