Preview

Ping Sweeps and Port Scans

Good Essays
Open Document
Open Document
703 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ping Sweeps and Port Scans
Ping Sweeps and Port Scans
January 11, 2013
Freddie Jackson
DeVry University

This report is to provide insight on nefarious computer activities called ping sweeps and port scans as a request from management. I will identify them, explain what they are use for, how they are used and how to stop them from attacking a network. Finally I will discuss how they can be eliminated as security risk. The information in this report is designed to increase the understanding and knowledge of these two activities so that this company’s IT department will be in a better position to recognize them and block potential attacks from their use.
According to S. Branch (2012), in his article What is a Ping Sweep he says “A ping sweep, also called an Internet Control Message Protocol (ICMP) sweep, is a diagnostic technique used in computing to see what range of (IP) addresses are in use by live host, which are usually computers”. Ping sweeps are not unusual, they are often used by administrators in diagnosing network issues; however, hackers also use ping sweeps to find active computers so they will know where to concentrate their attacks. This can become a serious security breach for an unprepared network. Hackers send not one ping but many packets at the same time. This tends to slow down a network. When the hackers ping sweep finds an active computer it can send request for confidential information.
There is no reason to be alarmed by ping sweeps because the solution for stopping them is very simple. The system administrator only need to disable ICMP packets and if the system administrator wants to do a ping sweep, just enable the ICMP packets temporarily. According to S. Branch (2012), “ping sweeps are older and slower technology, and are not in use as much as in the past”.
A port scan attack is a popular reconnaissance technique that attackers use to discover services they can break into according to Yahoo Answers (2007), Author unknown. Yahoo Answers states that “All



References: Author unknown. (2007). What is a Port Scan Attack? : Yahoo Answers http://answers.yahoo.com/question/index?qid=20061105020422AAtre1p Branch S. (2012). What is a Ping Sweep? : © 2003-2013 Conjecture Corporation http://www.wisegeek.com/what-is-a-ping-sweep.htm

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    SQL Slammer worm caused a denial of service on Internet host and slowed down general internet traffic. On January 25, 2003 it spread rapidly and infected 75,000 victims in ten minutes. The worm exploited the buffer overflow and would generate random IP addresses, send itself out to those addresses. If one of those addresses happens to belong to a host that is running an unpatched copy of Microsoft SQL Server Resolution Service, the host becomes infected and sprays the Internet with more copies of the worm.…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    Applications that use the Internet can have weaknesses when it comes to updates. Usually vendors will release patches to address some of these weaknesses when they are discovered. For some reason the full patch is not installed this now makes the application vulnerable. When the user downloads a document, media file, or even just a HTML page on this un-patched system the system can be compromised. With this happening this can cause more malware to be downloaded making the overall system worse. With the IPS in place the patches with the vulnerable application can be scanned by network traffic for patterns with the IPS it will help you will data about the network on a regular basis to see what is going on. With the IPS in place we will have the control to set it up with all the policy’s that are needed to help fight against any…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    To avoid detection a good hacker will always cover their tracks. This is done by purging any information in the system that could even minutely show the trace that someone was their. You must be careful when doing this because sometimes its not whats there that gets the hacker busted but what wasn’t.…

    • 592 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    A layered security strategy will encompass Rouge protocols such as Bit mining and P2P, Unauthorized network scanning and probing, and unauthorized access to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    School

    • 629 Words
    • 3 Pages

    Hackers typically follow a five-step approach to seek out and destroy targeted hosts. The first step in performing an attack is to plan the attack by identifying the target and learning as much as possible about it. Hackers usually perform an initial reconnaissance and probing scan to identify IP hosts, open ports, and services enabled on servers and workstations. In this lab, you planned an attack on 172.30.0.0/24 where the VM server farm resides, and used the Zenmap GUI to perform an “Intense Scan” on the targeted IP subnetwork.…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to improving information security is to reduce the attack surface of a system or software. By turning off unnecessary functionality, there are fewer security risks. By having less code available to unauthorized actors, there will tend to be fewer failures. Although attack surface reduction helps prevent security failures, it does not mitigate the amount of damage an attacker could inflict once a vulnerability is found.[3]…

    • 348 Words
    • 2 Pages
    Satisfactory Essays