SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
http://www.nsauditor.com
Nsasoft llc.
Network Scanner
Network Scanner is a tool to scan large networks or a single host. This tool uses raw IP
packets to determine available hosts, what ports they are offering , what operating
systems they are running and other important characteristics.
You can specify the scan mode by selecting the appropriate mode.
Here are the supported scan mode types :
Connect – this is the basic mode of scanning. The connect() system call is used to open
a connection to every listening port on the host . If the port is not listening the call of
connect() will fail.
This scan type is easily detectable because of target host logs .


SYN Scan – this scan type doesn’t open a full TCP connection. Instead of opening a
real connection you can send a SYN packet and wait for a response. An indicative of
listening port is SYN/ACK and RST is an indicative of non-listener. In case of receiving
SYN/ACK, RST is send to close the connection. Not all privileges you have allow you to
build this packet. Note that fewer sites will log this scanning mode.
FIN Scan – in some cases SYN scan isn’t stealthy enough because some programs can
detect this scans. The FIN scan uses an RST packet for the closed ports to reply to your
probe( for the probe is used a FIN packet. ). This scan type doesn’t work against systems
running Windows95/NT.
Ping Sweep – ping is used to know which hosts on the network are accessible. One of the
ways to check the host availability is sending ICMP echo request packet to every
specified IP address. Hosts that respond are available. This method will work only for
sites that haven’t blocked the echo requests. In such cases TCP ACK packet is used.
UDP Scan – UDP scan is used to determine the opened UDP ports.To each port is sent a
zero byte UDP packet . For the closed ports ICMP port unreachable message is
received. Otherwise the port is marked as an open. Note that sometimes UDP scanning is
slow, because the ICMP error message rate is limited. .
Null Scan – this type of scanning turns off all flags.
Xmas Tree – this scan type turns on only FIN, URG and PUSH flags. This types of
packets can be used for a probe while the closed ports should reply with en RST.
IP Protocol Scan - this scan type is used to determine which IP protocols are supported
on a specific host. To each specified protocol on the target host is send an IP packet. If
the protocol is not in use the ICMP protocol unreachable message will be send as a reply.
Note that some hosts may not send protocol unreachable message. So all the protocols
will be assumed as “open”.
ACK Scan – this scan type sends an ACK packet to specified ports. The port is assumed
as “unfiltered ” if an RST message is returned. If there is no reply than the port is
assumed as “filtered”.

 Here are the supported scan level types :
Aggressive Scan – aggressive mode adds a five minute timeout for each host and for
each probe response waits not more than 1.25 seconds.
Normal Scan - this is the default scan type. It tries to run quickly without overloading
the network and scanning all hosts.
Polite Scan – this scan type reduces the chances of crashing machine. It waits at least
0.4 seconds between the probes.

You can click on the browse button and select the Port Range in the scan options part.
Clicking on the Local Interface button the Available Network Interfaces dialog.
Clicking on the Target Host button opens the Host Range and Credentals Selection
dialog.
You can set Port Scan Delay, Response Timeout, Port Scan Attempts, Parallel Scan
Ports manually.The values of these fields depend on scan level . The scan results will
be shown depending on the enabled/disabled state of each option ( Show Firewalled
Ports , Show Closed Ports, Show Port Banners ).
 If the option Ping Before Scan is enabled appropriate packets ( see Ping Sweep )will
be sent before scanning .
Operating System Detection/ Fingerprinting part contains:
 TCP Options ( prefix:length: description ):
        W:3:Window Scale Option,
        N:1:No Operation,
        M:4:Maximum Segment Size,
        T:10:Timestamps Option,
        E:1:Endoptions List,
        O:2:Selective ACK Permitted,
        S:10:Selective ACK Option,
        C:6:Tcp Echo Option,
        A:6:Tcp Echo ACK Option,
        K:2:POC Permitted Option,
        P:3:POC Service Option,
        X:6:TCP CC Options,
        Y:6:TCP CC New Options,
        Z:6:TCP CC Echo Options,
        U:3:TCP Alternate CheckSum.
You can select the options you want .The default option that is used by the program is
WNMTE.
Detect Operating Systems - enabling this option allows to create a fingerprint and to
compare it with its own database of known OS fingerprints and thus to decide what type
of system you are scanning.The fingerprint is created automatically.
Enable TTL Fingerprint - To add a TTL field in the fingerprint you should enable the
TTL fingerprint. In this case it uses TTL during OS detection.


Note that if the scanner can not find the appropriate OS fingerprint in the XML database
( the program will create new XML OS fingerprint entry in XML database and will set
the system name , OS family and IP address. For the example bellow “Windows
192.168.0.2” will be set in case of operating system Windows or “Unknown
192.168.0.2” in case of uknown OS family ).
User can find the OS fingerprint in the XML Database and can set the valid OS name.
Later during scanning similar operating systems the tool can find the OS family using
the fingerprint ( if for ex. the OS that is scanning is “WindowsXP” and in XML database
there isn’t such name ,then the name “Windows 192.168.0.2” will be used instead of
“WindowsXP”. This means that the OS of scanning host is similar to OS of the host
192.168.0.2 ).
Right-clicking on the reslts window brings up a menu with the following commands:

Save As – saves the data to the text file.
Copy All - copies all rows.
Close - closes the selected connection.

The most important privileges of Nsauditor are:
Automatic creation of OS fingerprint.
The XML based format of OS fingerprint.
The user interface that allows TCP options creation.

Más contenido relacionado

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Destacado

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Nsauditor Network Scanner

  • 1. http://www.nsauditor.com Nsasoft llc. Network Scanner Network Scanner is a tool to scan large networks or a single host. This tool uses raw IP packets to determine available hosts, what ports they are offering , what operating systems they are running and other important characteristics. You can specify the scan mode by selecting the appropriate mode. Here are the supported scan mode types :
  • 2. Connect – this is the basic mode of scanning. The connect() system call is used to open a connection to every listening port on the host . If the port is not listening the call of connect() will fail. This scan type is easily detectable because of target host logs . SYN Scan – this scan type doesn’t open a full TCP connection. Instead of opening a real connection you can send a SYN packet and wait for a response. An indicative of listening port is SYN/ACK and RST is an indicative of non-listener. In case of receiving SYN/ACK, RST is send to close the connection. Not all privileges you have allow you to build this packet. Note that fewer sites will log this scanning mode. FIN Scan – in some cases SYN scan isn’t stealthy enough because some programs can detect this scans. The FIN scan uses an RST packet for the closed ports to reply to your probe( for the probe is used a FIN packet. ). This scan type doesn’t work against systems running Windows95/NT. Ping Sweep – ping is used to know which hosts on the network are accessible. One of the ways to check the host availability is sending ICMP echo request packet to every specified IP address. Hosts that respond are available. This method will work only for sites that haven’t blocked the echo requests. In such cases TCP ACK packet is used. UDP Scan – UDP scan is used to determine the opened UDP ports.To each port is sent a zero byte UDP packet . For the closed ports ICMP port unreachable message is received. Otherwise the port is marked as an open. Note that sometimes UDP scanning is slow, because the ICMP error message rate is limited. . Null Scan – this type of scanning turns off all flags. Xmas Tree – this scan type turns on only FIN, URG and PUSH flags. This types of packets can be used for a probe while the closed ports should reply with en RST. IP Protocol Scan - this scan type is used to determine which IP protocols are supported on a specific host. To each specified protocol on the target host is send an IP packet. If the protocol is not in use the ICMP protocol unreachable message will be send as a reply. Note that some hosts may not send protocol unreachable message. So all the protocols will be assumed as “open”. ACK Scan – this scan type sends an ACK packet to specified ports. The port is assumed as “unfiltered ” if an RST message is returned. If there is no reply than the port is assumed as “filtered”. Here are the supported scan level types : Aggressive Scan – aggressive mode adds a five minute timeout for each host and for each probe response waits not more than 1.25 seconds. Normal Scan - this is the default scan type. It tries to run quickly without overloading the network and scanning all hosts. Polite Scan – this scan type reduces the chances of crashing machine. It waits at least 0.4 seconds between the probes. You can click on the browse button and select the Port Range in the scan options part. Clicking on the Local Interface button the Available Network Interfaces dialog.
  • 3. Clicking on the Target Host button opens the Host Range and Credentals Selection dialog. You can set Port Scan Delay, Response Timeout, Port Scan Attempts, Parallel Scan Ports manually.The values of these fields depend on scan level . The scan results will be shown depending on the enabled/disabled state of each option ( Show Firewalled Ports , Show Closed Ports, Show Port Banners ). If the option Ping Before Scan is enabled appropriate packets ( see Ping Sweep )will be sent before scanning . Operating System Detection/ Fingerprinting part contains: TCP Options ( prefix:length: description ): W:3:Window Scale Option, N:1:No Operation, M:4:Maximum Segment Size, T:10:Timestamps Option, E:1:Endoptions List, O:2:Selective ACK Permitted, S:10:Selective ACK Option, C:6:Tcp Echo Option, A:6:Tcp Echo ACK Option, K:2:POC Permitted Option, P:3:POC Service Option, X:6:TCP CC Options, Y:6:TCP CC New Options, Z:6:TCP CC Echo Options, U:3:TCP Alternate CheckSum. You can select the options you want .The default option that is used by the program is WNMTE. Detect Operating Systems - enabling this option allows to create a fingerprint and to compare it with its own database of known OS fingerprints and thus to decide what type of system you are scanning.The fingerprint is created automatically. Enable TTL Fingerprint - To add a TTL field in the fingerprint you should enable the TTL fingerprint. In this case it uses TTL during OS detection. Note that if the scanner can not find the appropriate OS fingerprint in the XML database ( the program will create new XML OS fingerprint entry in XML database and will set the system name , OS family and IP address. For the example bellow “Windows 192.168.0.2” will be set in case of operating system Windows or “Unknown 192.168.0.2” in case of uknown OS family ). User can find the OS fingerprint in the XML Database and can set the valid OS name. Later during scanning similar operating systems the tool can find the OS family using the fingerprint ( if for ex. the OS that is scanning is “WindowsXP” and in XML database there isn’t such name ,then the name “Windows 192.168.0.2” will be used instead of “WindowsXP”. This means that the OS of scanning host is similar to OS of the host 192.168.0.2 ).
  • 4. Right-clicking on the reslts window brings up a menu with the following commands: Save As – saves the data to the text file. Copy All - copies all rows. Close - closes the selected connection. The most important privileges of Nsauditor are: Automatic creation of OS fingerprint. The XML based format of OS fingerprint. The user interface that allows TCP options creation.