Network Mapping

Network Mapping

498.349 Lượt nghe
Network Mapping
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: November 9, 2010 Length of Class: 51 Minutes Tracks Networking Hacking Computer Security /Integrity Prerequisites Introduction to Networking Purpose of Class This class teaches students how to map a local network. Chapters Introduction (00:00) How Network Mapping Works (03:12) DOS Tools (11:44) Network Mapping Software (34:54) Security Considerations (44:14) Final Thoughts (48:21) Class Notes How it Works ICMP -- Internet Control Message Protocol -- part of Internet Protocol Echo request Used by OS's to send error messages Ports Scanning All network applications require specific ports to be open SMB Shares Server Message Block is used for Windows File and Print Sharing SNMP Simple Network Management Protocol Part of IP Allows communication of alerts for numerous types of problems on a system from applications, the operating systems or even the hardware Uses Agents,Traps and Network Management System Agents are pieces of software installed on the monitored systems Traps are alerts that are set for the Agent (CPU goes over 90% for 5 minutes) Network Management System receives alert messages from Traps. SNMP Service must be running Uses UDP Ports 161, 162 Basic DOS Commands IPCONFIG Ipconfig /all -- Shows current IP information fro system Ipconfig /release -- Releases DHCP IP Address Ipconfig /renew - Acquires a new IP Address from DHCP Server Ping i. IP Protocol Ping 10.1.10.1 -- Pings either an IP Address or a Domain Name Ping /? -- Shows arguments fro Ping command Ping 10.1.10.1 --n 6 -- -n argument changes the number of pings sent Ping xxx --i 200 -- -i argument changes the Time To Live for a Ping Tracert IP Protocol tracert www.everymanit.com -- Shows all of the routers on the path to the destination Network Mapping Software Description Network Mapping Software Discovers Devises and Systems on Your Network Can be free or very expensive There are numerous types of software that find different information Security Security Good vs. Bad Turn off SNMP services? -- SNMP can be very useful if you use it. Use firewalls -- Firewalls can block Network Mapping Software from discovering devices on the network Turn off Ping Echo -- You can turn off Ping Echo using security software. Ping is a very useful diagnostic tool, and can cause confusion for technicians if standard systems cannot be pinged. Final Thoughts Network Mapping can be used for Good and Bad purposes. You must weigh utility vs. security when deciding to allow or block the ability to map a netwrk. Resources Spiceworks PortScan