Preview

Ping Sweeps

Good Essays
Open Document
Open Document
685 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ping Sweeps
Ping sweeps and ports scans are a common ways for hackers to attempt to break a network. As a system administrator this is a concern and for the boss this should not be a worry for him. The system administrator has a lot of steps to stop attempts from hackers to get any information by using the ping sweeps and ports scans. Once, the hackers are discourage they should move on to another site. A ping sweep is a basic networking scanning technique used to determine which range of IP addresses map to live hosts. A single ping will tell you whether one specified host computer exists on the network. A ping sweep consists of Internet Control Message Protocol (ICMP) Echo requests sent to multiple hosts, this is done to determine which machines are alive and which ones aren’t. If a given address is live, it will return an ICMP Echo reply. Once the hacker knows which machines are alive, he or they can focus on which machines to attack and work from there. Not only hackers perform ping sweeps, system administrator may be trying to find out which machines are alive on a network for diagnostics reasons. Pings sweeps should be detected by a Intrusion Detection System, but to avoid potential DoS attacks, or intrusions, system adminstrators need to use other methods to test connectivity. Since using ping sweep can help hacker you can have the ping sweep turned on only when someone is testing the network connectivity. Port scanning is one of the most popular techniques attackers use to discover services they can break into. All machines connected to a Local Area Network or Internet run many services that listen at well-known and not so well known ports. A port scan helps the attacker find which ports are available. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed further for weakness. Typical ports scans can show up in system logs. A

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    provides the names and IP addresses of all intermediate systems. That can be used for an attack by…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Port scanning is the act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    The attack performed on the network had the intention of making the online services provided to students unusable during a critical time of need for those systems. The attack was first performed by acquiring the Administrator password for the systems and using each system to perform a large quantity of requests for service to the web servers. By dissecting what occurred steps can be put in place to prevent such an attack in the future. This attack can be summarized in a few bullets:…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Large numbers of packets caught by your router or firewall's egress filters. Recall that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network has been compromised. Unscheduled reboots of server machines may sometimes indicate their compromise. You should be already be watching the event logs of your servers for failed logons and other security-related events.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Port scanner is the software program created and designed to probe a server or host for open ports. This is often run and used by administrators to acknowledge security policies of their networks and for attackers to identify running services on a host with the view to compromise it.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.(1)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Many network devices and computer hosts startup network services by default, each of these services could represent an opportunity for attackers, worms and Trojans. Very often all of these default services are not needed. Doing port lockdown by turning off services reduces this exposure.…

    • 1578 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Hacking into a computer is not allowed as it can disrupt the business as personal information can be stolen and also be used in crime, this can cause a problem in the businesses finance sector.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Regarding your recent request about more information on ping sweeps and port scans, I am going to provide you with some information to help you with any confusing that you may have. Port scans and ping sweeps are networking tools that admins use to perform normal and common functions such as, checking server to see if it is running correct or to determine with services are open so they can receive important updates. Hackers use the same function which can provide a hacker with information.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Also large numbers of packets caught by your router or firewall's egress filters. Remember that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network have been compromised. Unscheduled reboots of server machines may sometimes signify that they are compromised as well. You should already be watching the event logs of your servers for failed logons and other security-related events.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork.…

    • 1091 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Advanced Topologies, Inc. needs to look at its Human Resources department and how they train their new employees. Right now the threat will mostly come from Matthias because he has been working without the knowledge needed to look for security threats. Without the right training for your employees, you run the risk of being your own threat. To remove the risk that Matthias may bring to ATI, he should have been properly trained before starting. All administrators should have the information security training before working on ATI’s network. Alfonso should be aware of what security concern will affect ATI, but as the superior, he did not seem overly concerned about the security of the network. Ensuring that personnel have the right skills to administer your network is a plus for a superior. Alfonso should not have not allowed Matthias to work on the network, without first informing him of all of his responsibilities. Once the inside threat has been removed we can now move on to looking at other users. Network monitoring is just important as knowing how your network runs. With the right training, you will know what threats to be aware of.…

    • 621 Words
    • 2 Pages
    Good Essays
  • Good Essays

    When it comes to human threats you have to worry about your staff who is working for the company that you are security. What kind of staff do you have? Can they be trusted? Some staff member may use your security system to block up other things that don’t pertain to your security business. By using the computer to look at other sites you are leaving your sites open to other websites that don’t pertain to your job. They may be able to log in to your security system to find out about it. If your staff member don’t do this, they may be asked by a member of the working company staff to do it. They may offer to pay them a lot of money or to do favors to get what they want from the security staff.…

    • 1473 Words
    • 6 Pages
    Good Essays