Sec 280 Week 1

Submitted by: Submitted by

Views: 75

Words: 576

Pages: 3

Category: Business and Industry

Date Submitted: 12/13/2014 10:11 PM

Report This Essay

Dear. John Doe,

You recently contacted me, concerning ping sweeps and port scans. A ping sweep is where a hacker sends ICMP ECHO packets to a group of computers and awaits for a response. They are looking to see what computers are vulnerable. When, the hacker knows which computers are vulnerable. They can pick those machines to attack.. There are some good reasons for performing ping sweeps; for diagnostic reasons, a network administrator may be looking for which machines are working on the network.

One of tool that can be used to conduct a ping sweep is fping. Fping sends a ping to a a list of IP addresses. Fping sends one ping packet to each IP address. An fping is a tool that can be used for distribute a ping sweep. Fping takes a list of IP addresses and sends ping packets to them. Unlike normal ping, fping sends one ping packet to several IP address. . A Perl script is used to gather a list of IP addresses. A Perl script can be used in alone side with fping to uncover which machines in that IP address range are working on set of computers..

Ippl is an IP protocol logger that can log TCP, UDP and ICMP packets. It is similar to scanlogd, it sits in the background and listens for packets there are other ping detection tools available besides ippl. Pingd handles ICMP traffic at the host level. One feature of pingd is that it integrates with TCP Wrappers to allow you to specify who can ping you and who can't.

The other type of network probe you asked about, is the port scan. A port scan is used by hackers to find the services running on a target device. The hacker can then plan an attack on any vulnerable service that they discover. A port scanner connect to a series of ports on the device and finds out what ports respond and the ones that don’t.

The best type of port scanner is nmap. Nmap (Network Mapper) Nmap was originally written by Gordon Lyon. It is used to detect hosts and services on a computer network. It creates a map of the network....