ETI Microproject 1 by Campusify
ETI Microproject 1 by Campusify
Network Hacking
INDEX
1 Rationale 5
3 Course Outcomes 6
4 Literature review 6
8 Skills Developed 23
9 Applications 23
Networking Hacking
1.0 Rational: -
Network hacking refers to the act of gaining unauthorized access to a
computer network and its infrastructure resources, such as devices, servers,
software, and other services. Network hacking involves gathering
information about a target network, identifying vulnerabilities, and exploiting
them to gain access. A variety of tools and techniques are used to identify
potential security threats in computer networks.
Network Hacking is gathering an information from network and computers
over the internet.
Information:
1) Network Infrastructure :-
To have secure operating systems and applications, you need a secure
network. Devices such as routers, firewalls, and even generic network hosts
(including servers and workstations) must be assessed as part of the security
testing process.
There are thousands of possible network vulnerabilities, equally as many
tools, and even more testing techniques. You probably don't have the time or
resources available to test your network infrastructure systems for all possible
vulnerabilities, using every tool and method imaginable. Instead, you need to
focus on tests that will produce a good overall assessment of your network
and the tests I describe in this chapter produce exactly that.
When you assess your company's network infrastructure security, you need
to look at the following:
Emerging Trends in Computer and Information Technology
10
3) Scanning-Ports: -
A port scanner shows you what's what on your network by scanning the
network to see what's alive and working. Port scanners provide basic views
of how the network is laid out. They can help identify unauthorized hosts or
applications and network host configuration errors that can cause serious
security vulnerabilities.
The big-picture view from port scanners often uncovers security issues that
might otherwise go unnoticed. Port scanners are easy to use and can test
network hosts regardless of what operating systems and applications they're
running. The tests are usually performed relatively quickly without having to
touch individual network hosts, which would be a real pain otherwise.
The trick to assessing your overall network security is interpreting the results
you get from a port scan. You can get false positives on open ports, and you
might have to dig deeper. For example, User Datagram Protocol (UDP) scans
like the protocol itself are less reliable than Transmission Control Protocol
(TCP) scans and often produce false positives because many applications
don't know how to respond to random incoming UDP requests.
Emerging Trends in Computer and Information Technology
12
If your results don't match after you run the tests using different tools, you
might want to explore the issue further. If something doesn't look right such
as a strange set of open ports it probably isn't. Test again; if you’re in doubt,
use another tool for a different perspective.
4) Ping Sweep: -
5) Scanning SNMP: -
Simple Network Management Protocol (SNMP) is built in to virtually every
network device. Network management programs (such as HP Open View and
LANDesk) use SNMP for remote network host management. Unfortunately.
SNMP also presents security vulnerabilities.
Emerging Trends in Computer and Information Technology
15
1. Vulnerabilities
The problem is that most network hosts run SNMP enabled with the default
read/write community strings of public/private. The majority of network
devices I come across have SNMP enabled and don't even need it.
If SNMP is compromised, a hacker may be able to gather such network
information as ARP tables, usernames, and TCP connections to attack your
systems further.
If SNMP shows up in port scans, you can bet that a malicious attacker will
try to compromise the system. Here are some utilities for SNMP enumeration:
o The commercial tools NetScan Tools Pro and Essential NetTools
o Free Windows GUI-based Getif o Free Windows text-based
SNMPUTIL
6) Grabbing Banners: -
Banners are the welcome screens that divulge software version numbers
and other system information on network hosts.
This banner information might identify the operating system, the version
number, and the specific service packs to give the bad guys a leg up on
attacking the network.
You can grab banners by using either good old telnet or some of the tools
I mention, such as Nmap and Super Scan.
1. Telnet
You can telnet to hosts on the default telnet port (TCP port 23) to see
whether you' represented with a login prompt or any other information. Just
enter the following line at the command prompt in Windows or UNIX:
telnet ip_address.
You can telnet to other commonly used ports with these commands:
Emerging Trends in Computer and Information Technology
17
The following steps can reduce the chance of banner- grabbing attacks:
o If there isn't a business need for services that offer banner information,
disable those unused services on the network host. o If there isn't a
business need for the default banners, or if you can customize the banners.
configure the network host's application or operating system to either
disable the banners or remove information from the banners that could give
an attacker a leg up. Check with your specific vendor for information on
how to do this. TCP Wrappers in Linux is another solution.
Emerging Trends in Computer and Information Technology
18
A network analyser is a tool that allows you to look into a network and
analyse data going across the wire for network optimization, security, and/or
troubleshooting purposes. Like a microscope for a lab scientist, a network
analyser is a must-have tool for any security professional.
You can use one of the following programs for network analysis:
1. ARP spoofing:
Cain and Abel (www.oxid.it/cain.html), can change the ARP tables- the tables
that store IP addresses to media access control (MAC) address mappings on
network hosts. This causes the victim computers to think they need to send
traffic to the attacker's computer rather than to the true destination computer
when communicating on the network. ARP spoofing is used during man-in-
the-middle (MITM) attacks.
Spoofed ARP replies can be sent to a switch, which reverts the switch to
broadcast mode and essentially turns it into a hub. When this occurs, an
attacker can sniff every packet going through the switch and capture anything
and everything from the network.
Here's a typical ARP spoofing attack with a hacker's computer (Hacky) and
two legitimate network users' computers (Joe and Bob):
Emerging Trends in Computer and Information Technology
21
1. Hacky poisons the ARP caches of victims Joe and Bob by using dsniff,
ettercap, or a utility he wrote.
4. Joe's traffic and Bob's traffic are sent to Hacky's IP address first.
You can perform ARP poisoning on your switched Ethernet network to test
your IPS or to see how easy it is to turn a switch into a hub and capture
anything and everything with a network analyzer. Perform the following steps
to use Cain & Abel for ARP poisoning:
1. Load Cain and Abel and then click the Sniffer tab to enter the network
analyzer mode.
2. Click the Start/Stop APR icon (the yellow and black circle).
The ARP poison routing (how Cain and Abel refer to ARP poisoning) process starts
and enables the built-in sniffer.
3. If prompted, select the network adapter in the window that appears and then
click OK.
4. Click the blue + icon to add hosts to perform ARP poisoning on.
5. In the MAC Address Scanner window that appears, ensure the All Hosts in
My Subnet option is selected and then click OK.
Emerging Trends in Computer and Information Technology
22
6. Click the APR tab (the one with the yellow-and- black circle icon) to load
the APR page.
7. Click the white space under the uppermost Status column heading (just
under the Sniffer tab). This re-enables the blue + icon.
8. Click the blue + icon and the New ARP Poison Routing window shows the
hosts discovered int Step 3.
9. Select your default route (in my case, 10.11.12.1). The right-hand column
fills with all the remaining. hosts.
10. CTRL click all the hosts in the right column that you want to poison.
This process can take anywhere from a few seconds to few minutes depending on your
network hardware and each hosts' local TCP/IP stack.
12. You can use Cain and Abel's built-in passwords feature to capture
passwords traversing the network to and from various hosts simply by
clicking the Password tab.
Emerging Trends in Computer and Information Technology
23
24
10.0 Conclusion:
11.0 Reference: -
https://www.networkencyclopedia.com
https://www.campusify.co.in