2 Discovering network hosts

 

This chapter covers

  • Internet Control Message Protocol (ICMP)
  • Using nmap to sweep IP ranges for live hosts
  • Performance tuning nmap scans
  • Discovering hosts using commonly known ports
  • Additional host discovery methods

As you’ll recall, the first phase in the four-phase network penetration testing methodology is the information-gathering phase. The goals and objectives for this phase are to gather as much information as possible about your target network environment. This phase is further broken up into three main components or sub-phases. Each sub-phase focuses on discovering information or intelligence about network targets within the following separate categories:

  • Hosts: sub-phase A. Host Discovery
  • Services: sub-phase B. Service Discovery
  • Vulnerabilities: sub-phase C. Vulnerability Discovery
Figure 2.1 The Information-gathering phase workflow

In this chapter, you’ll focus on the first sub-phase: Host discovery. The purpose of this sub-phase is to discover as many possible network hosts (or targets) within your given range of IP addresses (your scope).  There are two primary outputs that you’ll want to produce during this component:

  1. A targets.txt file containing IP addresses that you will test throughout the engagement
  2. An ignore.txt file containing IP addresses that you will avoid touching in any way

2.1   Understanding your engagement scope

 
 
 

2.1.1   Black, white, and grey box scoping

 
 
 

2.1.2   The Capsule Corporation

 
 
 
 

2.1.3   Setting up the capsulecorp pentest environment

 

2.2   Internet control message protocol

 
 
 

2.2.1   Using the ping command

 
 
 
 

2.2.2   Using Bash to pingsweep a network range

 
 
 

2.2.3   Limitations of using the ping command

 
 
 

2.3   Discovering hosts with nmap

 
 
 
 

2.3.1   ICMP echo discovery probe

 
 

2.3.2   Primary output formats

 
 
 
 

2.3.3   Using remote management interface ports

 
 
 
 

2.3.4   Increasing nmap scan performance

 

2.4   Additional host discovery methods

 
 
 

2.4.1   DNS brute forcing

 
 

2.4.2   Packet capture and analysis

 
 
 

2.4.3   Hunting for subnets

 
 
 

2.5   Summary

 
 
sitemap

Unable to load book!

The book could not be loaded.

(try again in a couple of minutes)

manning.com homepage
test yourself with a liveTest