220 likes | 348 Vues
This chapter delves into the essentials of IP address tracing and footprinting, focusing on how to identify source and destination IPs, utilizing tools like Traceroute (Tracert) to analyze connections in messaging services. Additionally, it covers footprinting methods, including service scanning with ping and ICMP, to detect open services and operating systems using Nmap. By mastering these concepts, readers will gain critical skills in network security assessment and information gathering techniques pertinent to both service providers and receivers.
E N D
Chapter 2IP Address Trace Hoon Ko hoon.ko@ujep.cz Office# 460, Department of Informatics, J. E. Purkinje University
IP Address Goals • Understand a IP address trace • All IP have their source and destination address • To catch their destination address • Understand a Traceroute (Tracert)
Chapter 2Footprinting and Scanning Hoon Ko hoon.ko@ujep.cz Office# 460, Department of Informatics, J. E. Purkinje University
Goals • Understand a Footprinting • Understand a Scan • ping, ICMP • Detect OS • nmap
Understand Footprinting • Take a look all footprintings to have the target’s information
SCAN • To catch two services between service providers and service receivers • What services they use
ping / ICMP • to see their availability to all network services • ICMP using in TCP/IP • to see if my targets are in activation • Echo Request / Echo Reply • Timestamp Request / Time Reply • Information Request / Information Reply • ICMP address mask request / ICMP address mask reply
OS detect • Netcraft using: www.netcraft.com
nmap scan • download: http://nmap.org or command using
nmap open scan: nmap –sTwww.ujep.cz • open can using connect() function.
nmap TCP SYN scan: nmap –sSwww.ujep.cz • SYN scan which is not established
nmap FIN scan: nmap –sF –p 21,23 www.ujep.cz • FIN packet using