Ping Sweeps

Topics: Ping, Internet Control Message Protocol, Denial-of-service attack Pages: 2 (685 words) Published: September 6, 2009
Ping sweeps and ports scans are a common ways for hackers to attempt to break a network. As a system administrator this is a concern and for the boss this should not be a worry for him. The system administrator has a lot of steps to stop attempts from hackers to get any information by using the ping sweeps and ports scans. Once, the hackers are discourage they should move on to another site. A ping sweep is a basic networking scanning technique used to determine which range of IP addresses map to live hosts. A single ping will tell you whether one specified host computer exists on the network. A ping sweep consists of Internet Control Message Protocol (ICMP) Echo requests sent to multiple hosts, this is done to determine which machines are alive and which ones aren’t. If a given address is live, it will return an ICMP Echo reply. Once the hacker knows which machines are alive, he or they can focus on which machines to attack and work from there. Not only hackers perform ping sweeps, system administrator may be trying to find out which machines are alive on a network for diagnostics reasons. Pings sweeps should be detected by a Intrusion Detection System, but to avoid potential DoS attacks, or intrusions, system adminstrators need to use other methods to test connectivity. Since using ping sweep can help hacker you can have the ping sweep turned on only when someone is testing the network connectivity. Port scanning is one of the most popular techniques attackers use to discover services they can break into. All machines connected to a Local Area Network or Internet run many services that listen at well-known and not so well known ports. A port scan helps the attacker find which ports are available. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness. Typical ports scans can show up in system logs. A...

References: Gunnewiek, R. K. (2004, August 28). Hacking Unix. Retrieved August 31, 2009, from
Innovation, S. (2004, February). Anatomy of an Attack . Retrieved August 31, 2009, from Security Innovation Security Report:
Kessler, G. C. (2001, May). Port Scanning: It 's Not Just an Offensive Tool Anymore . Retrieved September 2, 2009, from Gary Kessler:
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Ping Sweeps Ports and Scans Essay
  • Essay about Ping Sweeps and Port Scanning
  • Ping Sweeps and Port Scans Essay
  • Ping Sweeps and Port Scans Essay
  • Ping Sweeps and Port Scans Essay
  • Essay about How Does Ping Really Work?
  • Essay about Ngong Ping 360 Management
  • ping pong diplomacy Essay

Become a StudyMode Member

Sign Up - It's Free