Nmap project presentation : Unlocking Network Secrets: Mastering Port Scanning with Nmap
jadavvineet73
670 views
30 slides
Apr 16, 2024
Slide 1 of 30
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
About This Presentation
Empower yourself to see what's lurking on your network with our Nmap project presentation! This presentation delves into the world of port scanning with Nmap, the industry-standard tool. Explore how Nmap works, uncover different scanning techniques (SYN scan, UDP scan, etc.), and learn to identi...
Empower yourself to see what's lurking on your network with our Nmap project presentation! This presentation delves into the world of port scanning with Nmap, the industry-standard tool. Explore how Nmap works, uncover different scanning techniques (SYN scan, UDP scan, etc.), and learn to identify open ports, potential vulnerabilities, and running services. Whether you're a network administrator, security professional, or simply curious about your network traffic, this presentation equips you with the skills to gain valuable insights into your network health. Visit us for more nmap project presentations, https://bostoninstituteofanalytics.org/cyber-security-and-ethical-hacking/
Size: 2.57 MB
Language: en
Added: Apr 16, 2024
Slides: 30 pages
Slide Content
Based On N-Map Tool
Contents Introduction to Scanning Open Ports Types Of Port Numbers & Their Uses Why It’s Important How it Works ? Types of Scan Threats potential of Nmap Conclusion
Introduction Scanning open ports is a process of identifying which network ports on a system are open and listening for incoming connections
The process of scanning a computer’s port is called port scanning. It provides information on whether a device’s ports are open, closed or filtered. It is mainly performed to identify if a port is sending or receiving any information. Port scanning also involves the sending of data to specific ports and analyzing the responses to identify vulnerabilities. It is also one of the techniques used by attackers to discover devices/services they can break into.
Types Of Port Numbers & Their Uses Ports 20 and 21. FTP is used to transfer files between a client and a server Port 22. Secure Shell is one of several tunneling protocols used to build secure network connections . Port 25. Simple Mail Transfer Protocol ( SMTP ) is commonly used for email . Port 53. Domain name system ( DNS ) is a critical process that matches human-readable domain names to machine-readable IP addresses on the modern internet. It helps users load websites and applications without typing in a long list of IP addresses.
Port 80. HTTP is the protocol that enables the World Wide Web . Port 123. Network Time Protocol helps computer clocks sync with each other. It's a vital process in encryption Port 179. Border Gateway Protocol ( BGP ) helps establish efficient routes between the large networks or autonomous systems that make up the internet. These large networks use BGP to broadcast which IP addresses they control.
Port 443. HTTP Secure ( HTTPS ) is like HTTP but more secure . All HTTPS web traffic goes straight to port 443. Any network service that uses HTTPS for encryption, such as DNS over HTTPS, also connects directly to this port . Port 500. Internet Security Association and Key Management Protocol helps set up secure IP Security Port 3389. Remote Desktop Protocol enables users to connect to their desktop computers from another device remotely.
Why It’s Important Helps in understanding the network architecture . Aids in identifying potential vulnerabilities . Critical for network security assessments and troubleshooting. it is used by security professionals to identify any security vulnerabilities on that particular network. port scanning identifies open ports and services available on a network
How it Works ? Tools like Nmap or Zenmap are commonly used for port scanning . Nmap can be a solution to the problem of identifying activity on a network as it scans the entire system and makes a map of every part of it . A common issue with internet systems is that they are too complicated for the ordinary person to understand. Even a small home-based system is extremely complex.
That complexity grows exponentially when it comes to larger companies and agencies that deal with hundreds or even thousands of computers on the network . Nmap can find information about the operating system running on devices. It can provide detailed information like OS versions, making it easier to plan additional approaches during penetration testing. During security auditing and vulnerability scanning, you can use Nmap to attack systems using existing scripts from the Nmap Scripting Engine Nmap has a graphical user interface called Zenmap . It helps you develop visual mappings of a network for better usability and reporting.
Types of Scans: TCP SYN Scan – A TCP SYN scan is a stealth scan used to determine if ports on a target system are open, closed or filtered. Nmap sends a SYN packet to the target and waits for a response. If the target responds with a SYN/ACK packet, the port is considered open and ready to establish a connection . It is also known as Half Open Scan since it is a two-way communication channel and the scanner doesn’t close the open connections . TCP FIN Scan – This scan, mostly used by attackers, has the ability to pass through firewalls and other scan detection programs. When the attacking system sends FIN packets to the targeted system, the closed ports will respond with a reset response while the open ports will ignore the packets.
TCP XMAS Scan – This scan is used to identify the listening ports on the targeted system. TCP Null Scan – An extremely stealthy scam, TCP Null Scam sets all the header fields to null, which means when an attacker sends a packet, instead of turning on the flags in the header that would cause the packet to be received as invalid by the host, the NULL scan turns off the header flags. Vanilla TCP Connect Scan – A vanilla scan is a full connect scan, meaning it sends a SYN flag (request to connect) and upon receiving a SYN-ACK (acknowledgement of connection) response, sends back an ACK flag . Ping Scan – The Ping scan utilizes the “ping” command to scan the computers that are active.
Threats potential of Nmap Port 80 (HTTP): Function: This port is commonly used for HTTP traffic, serving web pages and content. Benefits: Allows users to access the website via a web browser. Potential Threats: Vulnerable to attacks like HTTP floods, DDoS attacks, and web application vulnerabilities.
Port 443 (HTTPS): Function: Secure version of HTTP, using SSL/TLS encryption for secure data transfer. Benefits: Ensures data confidentiality and integrity during communication. Potential Threats: SSL/TLS vulnerabilities, man-in-the-middle attacks, and SSL Stripping
Port 22 (SSH): Function: Secure Shell protocol for secure remote access and control over the server. Benefits: Allows administrators to securely manage the server remotely. Potential Threats: Brute force attacks, SSH key compromise, and man-in-the-middle attacks.
Port 21 (FTP): Function: File Transfer Protocol for transferring files between a client and server. Benefits: Facilitates easy file uploads and downloads. Potential Threats: FTP bounce attacks, plaintext authentication vulnerabilities, and FTP protocol weaknesses.
Port 3306 (MySQL): Function: MySQL database server port for database management and querying. Benefits: Allows web applications to interact with the database for dynamic content. Potential Threats: SQL injection attacks, unauthorized access to the database, and database server vulnerabilities.
Port 25 (SMTP): Function : Port 25 is used for SMTP (Simple Mail Transfer Protocol), which is responsible for sending outgoing mail from an email client to a mail server. Benefits : Facilitates the exchange of email messages between mail servers. Enables organizations to send and receive emails. Potential Threats : SMTP is susceptible to email-related threats such as spamming, phishing, and email spoofing. Open SMTP relays can be exploited by attackers to send unsolicited emails or launch email-based attacks.
Basic Scan : The simplest Nmap command is nmap , followed by the target you want to scan. For example :
Scan a Specific Port Range : You can specify a range of ports to scan using the -p option. For instance, to scan ports 1 to 1000, you can use :
Scan Service Version : To scan service Version ports , you can use the - sV option :
Traceroute : To scan Traceroute, you can use the-- traceroute option:
Operating System Detection : Nmap can attempt to determine the operating system of the target host using various techniques. You can enable OS detection using the -O option :
TCP SYN Scan (- sS ) : This is one of the most common and stealthy scan types. It sends SYN packets to the target ports and listens for SYN-ACK responses to determine open ports
Comprehensive Scan (-A) : This scan type enables aggressive options including OS detection, version detection, script scanning, and traceroute .
--script vuln option in Nmap is used to enable the execution of Nmap NSE (Nmap Scripting Engine) scripts related to vulnerability detection .
Conclusion Port scanning provides valuable insights into the services running on a web server, helping to identify potential vulnerabilities and security risks. By understanding the functions, benefits, and threats associated with each open port, organizations can take appropriate measures to secure their web servers and protect against potential cyber threats .