Ping Sweeps and Port Scans

In: Computers and Technology

Submitted By msladona
Words 814
Pages 4
Ping Sweeps and Port Scans Ping sweeps and ports scans are a common ways for hackers to probe a network and attempt to break into it. Although network probes are technically not intrusions themselves, they should not be taken lightly—they may lead to actual intrusions in the future. In the information that follows, I will provide a standard definition of a ping sweep and port scan, the possible uses of the two, and the prevention methods which are in place in our company to combat ping sweeps and port scans of our network by would be attackers. According to Whatis.com, a ping sweep is a basic networking scanning technique used to determine which range of IP addresses are mapped to active computers. During a ping sweep, Internet Control Message Protocol (ICMP) Echo requests are sent to many computers, which determines which are active and which are not ("What is ping sweep (ICMP sweep)? - Definition from Whatis.com," n.d.). If a given address is active, it will return an ICMP Echo reply and the attacker will then focus on those machines. Hackers are not the only ones who perform ping sweeps. I use ping sweeps to find out which machines are active on the network for diagnostics reasons and our ISP (Internet Service Provider) uses automated ping operations to monitor their connection. Disabling the ICMP protocol is one option to prevent ping sweeps; however, doing so may cause problems with our ISP leading them to think that the connection is not functioning because their monitoring software tells them that the connection is down. Another consideration is that some of our software makes use of ping operations for their normal functioning as well, and these may believe that our computers are no longer responding if the ICMP is disabled. The solution to this situation is permitting ICMP only to a given computer or IP range. For example, we contacted our ISP…...

Similar Documents

Ping Sweeps and Port Scans

...Ping Sweeps and Port Scans James A. Fort SEC 280 Professor Dau July 15, 2012 Ping Sweeps and Port Scans With computer networks becoming larger hackers are looking more and more for ways to illegally gain access to our networks and procure information about our customers that they can use for their gain. Some tools that hackers are using are called ping sweeps and port scans. Now in the hands of Network Administrators these tools are not something to be afraid of, but in the hands of hackers they are something to be aware of because they have the ability to provide relevant information to a potential attacker. Ping sweeps and port scans will probably be the first steps of the attack because they provide the potential attacker a lot about our network as well as services, and open ports, on a computer system or our network. Ping sweep would be the first tool an attacker would take when he chooses to target our company’s computer systems. It is made up of a series of ICMP echo requests sent to a range of IP addresses to determine which IPs are in use by a host. A ping sweep is a valuable tool that can provide an attacker with a network map of all devices on the network, including hosts, routers, and other networked devices. With this information an attacker can establish an attack plan on network servers and hosts or can be used just to clog up the network. With the appropriate firewall in place protecting the network from pings outside of the LAN, then we can......

Words: 562 - Pages: 3

Ping Sweeps and Port Scans

...Ping Sweeps & Port Scans: Potential Dangers and Defense Strategies THIS IS MY ORIGINAL WORK, PLEASE DO NOT SUBMIT IT AS YOUR OWN, BUT USE IT AS A GUIDE WHILE WRITING YOUR OWN… I REQUEST YOU TO GIVE ME AN “A” RATING ON THIS PAPER; THANK YOU!!! Insert Your Name Name of University SEC 280 Week 1 Insert Tutor’s Name 1st, October, 2012 Outline 1) Introduction (pg.3) 2) Ping Sweeps & Port Scans (pg.3) a) Ping Sweeps (pg.3) b) Port Scans (pg.4) 3) Recommendations & Conclusion (pg.5) 4) References (pg.7) Ping Sweeps & Port Scans While running businesses, owners must be aware of crucial security threats that their organizations are exposed to in order to formulate effective strategies of mitigating potential risks. Statistics show that there are numerous computer threats that can put an organization’s success in jeopardy especially if they are never detected and controlled beforehand. Examples of such threats are ping sweeps and port scans, which are actually nefarious computer activities that can be used by hackers and crackers to access sensitive business information (Teo, 2000; Wild Packet, 2002). Ping sweeps and port scans can possibly go unnoticed if security measures to detect and block them are not put in place and can have dangerous repercussions on a business. Fortunately, there are many ways through which organizations can detect and eliminate potential damages associated with the activities...

Words: 1200 - Pages: 5

Ping Sweeps

...Ping Sweeps and Port Scans Devry University SEC-280-13755 Principles Info Sys Security 9/9/2012 Ping Sweeps and Port Scans There are various problems that organizations will face as a cost of doing business. Ping sweeps and port scans are noteworthy because they can affect normal operations. As technology advances, so do the inevitable threats to our cyber security. Ping sweeps and port scans are examples of the threats that most organizations are likely to face. These two probes are the two major and fundamental ways through which hackers and crackers will assess the vulnerabilities of our infrastructure and design a plan to break in (Baskin, 2008). It is important that our organization understands the two primary attacks and their approach so that we can prevent them from taking place and proactively mitigate our risk of attack. Our competitive world and fast-paced market dictates that we effectively decrease our exposure to cyber attacks to protect the integrity of our data and infrastructure due to attack resulting from port scans or ping sweeps. The term “ping sweep” is a process that involves the attacker learning more about the functioning of our existing systems. For instance, if an attacker attempts to breach our servers, he or she will be able to detect if the system is active by performing a ping sweep. This will likely be an attacker’s first step in their attempts to probe our organization for vulnerabilities. The results of the ping sweep...

Words: 774 - Pages: 4

Understanding Port Scans and Ping Sweeps

...Understanding port scans and ping sweeps You tried to log in on your work computer only to realize that either your system doesn’t accept your passwords or some valuable files are missing on the hard drive. If you have ever been hacked, this scenario sounds familiar to you. Today, more and more businesses utilize the internet to do business. Needless to say, the computer use popularity has been steadily increasing over recent years. At the same time, the security has become one of the major concerns in any company since there are a lot of techniques used by hackers to gain control of a PC system or a network. Furthermore, understanding of network computer activities such as port scans and ping sweeps not only helps to prevent any unauthorized accessed to the company system, but also helps to reduce the chance of being hacked. Generally speaking, ping sweep is a technique of sending multiple ICMP (Internet Control Message Protocol) packets to a target network by an attacker to identify any possible alive IP addresses on a particular network. An attacker is usually using an automated ping sweep tools such as fping and nmap to determine which IP addresses don’t have any network block on them (Preetham, 2002). In other words, by using ping sweep the attacker can not only to obtain an active IP address but also initiate a possible attack on that IP address and gain access to the valuable information. Needless to say that an IT administrator needs to be able to detect pings......

Words: 577 - Pages: 3

Ping Sweeps and Port Scans

...Port Scans and Ping Sweeps Port scans and ping sweeps are just some of the methods used by hackers to break in and attack vulnerable systems on a targeted network. There are various levels of these probes where some are very easy to detect and stop while others can be a little more difficult to find and require special tools and knowledge. The purpose of this report is to help one gain a more clear understanding of what port scans and ping sweeps are, what they do, and whether they are something to worry about or not. Port scans are a simple method used to help discover ports that are available and running on a particular target network. Once a vulnerable port is found, a hacker could then gather information and plan an attack on that service. All you have to do is write a port scan up using a programming language such as Java or Perl, connect it to a series of ports and wait to see what responds and what doesn’t. There are different levels of port scans. Some are very simple and easy to detect and because of that are not used as often as some of the more stealthy versions. In order to detect a stealth port scan, you need special tools such as software or a firewall. One tool made by Solar Designer has developed such a tool called scanlogd which listens in on the networks background for interference of port scans (Lawrence, Teo, 2000). Another common method to negate these scans is to shutdown ports that aren’t in use or necessary. Ping sweeps are another type of......

Words: 674 - Pages: 3

Ping Sweeps and Port Scans in Development

...Ping Sweeps and Port Scans in Development   In this paper we will be going through all the processes which will show how dealing with security. An example would be the ping sweeps and port scans recently. This will show a complete example to how certain techniques can affect our work environment.   To start with, it should be known that either of these two methods could have malicious issues in order to also achieve certain goals. They can be used in order for a hacker to take advantage of our system or the host within it, but on the same page, network administrators also use these methods in order to make certain checks. I will explain first what each of these methods are and could do and also then have a simple option of how it can be dealt with if you would prefer. Ping sweeps are when is a manner to see if you can establish the IP addresses in order to map out to a live host (our computers). There are different tools that can be used for them depending on the OS that is being used. We have the option if using Mac, Windows, or Unix. There are many reasons why an administrator would use this technique though. One of the reasons would be to see what is being active on the network and what is not. This can be of help if we are in the process of figuring out if there is a network issue and being able to diagnose it. When we ping it has a packet being sent out to a certain IP address and if that address is being used in an active manner, we will then receive a...

Words: 635 - Pages: 3

Ping Sweeps and Port Scans

...Ping Sweeps And Port Scans Jerry Carr Devry University Computer security is becoming more of an issue every day. People have a lot of various ways to hack into a computer network, whether it is an inside threat or outside force trying to get vital information or destroy a company network in any way possible. Although there are many ways to get into a network, I will go over ping sweeps and port scans and some actions to take to protect a network from these kinds of threats. A ping sweep is when an intruder sends an ICMP echo request on a network, also known as a ping, to the target computers and find out if they are reachable (Conklin, White 2010). If they get a response from any computer on the network then it is reachable and that is where an intruder can start his or her attack, moving on to the next step of the process (Teo 2005). When the intruder finds a computer or computers that are reachable they can now perform a port scan. Port scans “look” at a computer that is accessible and scans for open ports. When an open port is found, it starts to scan the port to find the service, applications, and the operating system it is running (Conklin, White 2010). When this is done, the attacker will have a list of computers, some specific applications or services......

Words: 564 - Pages: 3

Ping Sweeps and Ports Scans Description

...THESIS STATEMENT Infamous computer activities, such as port scans and ping sweeps, which can lead to intrusion of systems of a company or network, which enables the intruders to gain access to the systems and do changes in the settings or extract important information. These activities can be detected and stopped or prevented using special skills tool set. INTRODUCTION One of the most common disreputable computer activities are ping sweeps and port scans. They lead to breach of systems by intruders which can harm the whole system or network protocols. There are millions of entities around the world that utilize the internet and the problem is that, many are unaware of the threats and vulnerabilities that are lurking around. These probes can be detected and prevented for to be in a safe position rather than compromise. Ping Sweep and Port Scans Events Two methods that are used to attack a network is ping sweep and port scans. These activities can be used with malicious intent against, as well as, in effort to try to protect a network. Ping sweeps and port scans has been a notorious and yet a useful tool for hackers and system administrators. Ping sweeps and port scans at times can be a bother to both system administrators and network managers. Ping sweeps and port scans work together and can be dangerous but it also can be prevented. A ping sweep, also known as an internet control message protocol sweep (ICMP) is a basic network scanning technique used to......

Words: 648 - Pages: 3

Sec 280 Week 1 Case Study Ping Sweeps and Port Scans

...Case Study Ping Sweeps and Port Scans Purchase here http://chosecourses.com/sec-280-week-1-case-study-ping-sweeps-and-port-scans Product Description Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Purchase here http://chosecourses.com/sec-280-week-1-case-study-ping-sweeps-and-port-scans Product Description Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Purchase here http://chosecourses.com/sec-280-week-1-case-study-ping-sweeps-and-port-scans Product Description Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He......

Words: 883 - Pages: 4

Scan

...Scan Report October 12, 2015 Summary This document reports on the results of an automatic security scan. The scan started at Mon Oct 12 18:07:01 2015 UTC and ended at Mon Oct 12 18:33:02 2015 UTC. The report first summarises the results found. Then, for each host, the report describes every issue found. Please consider the advice given in each description, in order to rectify the issue. Contents 1 Result Overview 2 2 Results per Host 2.1 172.30.0.7 . . . . . . . . . . . . . . . . 2.1.1 High ms-wbt-server (3389/tcp) 2.1.2 Low ms-wbt-server (3389/tcp) 2.1.3 Log ms-wbt-server (3389/tcp) . 2.1.4 Log general/CPE-T . . . . . . 2.1.5 Log general/HOST-T . . . . . 2.1.6 Log general/tcp . . . . . . . . . 2.1.7 Log ssh (22/tcp) . . . . . . . . 2.2 172.30.0.11 . . . . . . . . . . . . . . . 2.2.1 High ms-wbt-server (3389/tcp) 2.2.2 Medium general/tcp . . . . . . 2.2.3 Medium http (80/tcp) . . . . . 2.2.4 Low ms-wbt-server (3389/tcp) 2.2.5 Low http (80/tcp) . . . . . . . 2.2.6 Log ms-wbt-server (3389/tcp) . 2.2.7 Log general/tcp . . . . . . . . . 2.2.8 Log http (80/tcp) . . . . . . . 2.2.9 Log general/CPE-T . . . . . . 2.2.10 Log general/HOST-T . . . . . 2.2.11 Log general/icmp . . . . . . .......

Words: 12664 - Pages: 51

Sec 280 Week 1 Case Study Ping Sweeps and Port Scans

...SEC 280 WEEK 1 CASE STUDY PING SWEEPS AND PORT SCANS To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-1-case-study-ping-sweeps-and-port-scans/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 1 CASE STUDY PING SWEEPS AND PORT SCANS SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. Activity mode aims to provide quality study notes and tutorials to the students of SEC 280 Week 1 Case Study Ping Sweeps and Port Scans in order to ace their studies. SEC 280 WEEK 1 CASE STUDY PING SWEEPS AND PORT SCANS To purchase this visit following link: http://www.activitymode.com/product/sec-280-week-1-case-study-ping-sweeps-and-port-scans/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 280 WEEK 1 CASE STUDY PING SWEEPS AND PORT SCANS SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of......

Words: 1128 - Pages: 5

Sec 280 Week 1 Case Study Ping Sweeps and Port Scans

...SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Purchase here http://devrycourse.com/sec-280-week-1-case-study-ping-sweeps-and-port-scans Product Description Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Purchase here http://devrycourse.com/sec-280-week-1-case-study-ping-sweeps-and-port-scans Product Description Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Purchase here http://devrycourse.com/sec-280-week-1-case-study-ping-sweeps-and-port-scans Product Description Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the...

Words: 1275 - Pages: 6

Sec 280 Week 1 Case Study Ping Sweeps and Port Scans

...SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Purchase here http://devrycourse.com/sec-280-week-1-case-study-ping-sweeps-and-port-scans Product Description Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Purchase here http://devrycourse.com/sec-280-week-1-case-study-ping-sweeps-and-port-scans Product Description Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing. SEC 280 Week 1 Case Study Ping Sweeps and Port Scans Purchase here http://devrycourse.com/sec-280-week-1-case-study-ping-sweeps-and-port-scans Product Description Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the...

Words: 1079 - Pages: 5

7 It Scan

...Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-24 09:18 Pacific Daylight Time Nmap scan report for 172.30.0.7 mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers Host is up (0.0021s latency). Not shown: 998 closed ports PORT STATE SERVICE 22/tcp open ssh 3389/tcp open ms-wbt-server MAC Address: 3E:9A:1D:B4:13:EC (Unknown) Nmap scan report for 172.30.0.11 Host is up (0.0014s latency). Not shown: 996 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 3389/tcp open ms-wbt-server MAC Address: 16:E2:17:DC:4A:97 (Unknown) Nmap scan report for 172.30.0.12 Host is up (0.0085s latency). Not shown: 996 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 111/tcp open rpcbind 3389/tcp open ms-wbt-server MAC Address: C6:D4:FE:37:EA:7A (Unknown) Nmap scan report for 172.30.0.15 Host is up (0.014s latency). Not shown: 980 closed ports PORT STATE SERVICE 21/tcp open ftp 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 389/tcp open ldap 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl 3389/tcp open ......

Words: 383 - Pages: 2

Information and Systems Technology - Ping Sweeps

...Ping sweeps and ports scans are common methods for hackers to try to break a network. As a system administrator this is a valid concern and for the boss this should not be a worry for him. The system administrator has a lot of steps to stop efforts from hackers to acquire any data by using ping sweeps and ports scans. If hackers are constantly thwarted and discouraged from penetrating your network they normally move on to another site. With proper instruction, the right software and sufficient support, one can take necessary steps in preventing malicious types of activities in a network. Port scans and ping sweeps may seem dangerous, but they can also be understood and monitored in order to identify and defend against network threats. Port scans (as its name implies) directed to ports and the response received gives the hacker an idea of the systems integrity and to help set them up for a later intrusion. Port scans are the most common probing tool available. Port scans take ping sweeps to a different level. Port scans actually “look” at a machine that is alive and scan for an open port. Once the open port is found, it scans the port to find the service it is running. All machines connected to a Local Area Network or Internet run many services that connects at well-known and not so well known ports. A port scan helps the attacker find which ports are available. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received......

Words: 655 - Pages: 3

Bohemian Rhapsody | Kitchen Knives Accessories | Best Rating