Preview

Case Study #1

Satisfactory Essays
Open Document
Open Document
549 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study #1
Case Study #1
09/07/2014
Principles Info Sys Security
Ping sweeps and port scans are used for hackers and intruders to find a way into a network and is a problem for all companies. These are two ways that are used to try and hack into networks to steal information. Port scans and ping sweeps are two very common ways that hackers use to gain access into a network.
A ping sweep is a kind of network probe to try and gain access by pinging a machine (computer) to see if it is on. During a ping sweep, the intruder sends a set of ICMP ECHO packets to a network of machines to see which ones respond. The whole point of doing the ping sweep is to determine which machines are left on and which are turned off. Once the hacker knows which machines are on, he can focus on the machines to attack. Hackers usually send ICMP ECHO packets to an IP range to see which machines reply back.
They may also use what is called fping, which can be used for conducting ping sweeps. Fping takes the list of IP addresses and sends them ping packets. Unlike the normal ping, fping sends one ping packet to one IP address, and then proceeds immediately to the next IP address in a rotation.
The port scan is a method used by intruders/hackers to discover the services running on a target machine (computer). The hacker can use the information he finds to then plan an attack on any service they find. If the hacker finds a port that is open, they may proceed to find out what process is running on that computer or machine. If the process version is vulnerable, the hacker may be able to gain super user access. Port scanning can also cause a slowdown on the machine or the network, because of all of the traffic.
Running a port scan is a very simple task to perform these days. All that needs to be done is to connect to a series of ports on a machine and find out which ports respond and which don't. A simple port scanner program can be written usually under 15 minutes by a programmer in a language such

You May Also Find These Documents Helpful

  • Good Essays

    Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Case Study 1

    • 539 Words
    • 2 Pages

    The Piagetian concept used in the brownie incident is conservation. Young children seem to think that have a greater number of something always means more. Like for example with the brownie incident all the kids had the same…

    • 539 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Port scanning is the act of systematically scanning a computer's ports. Since a port is a place where information goes into and out of a computer, port scanning identifies open doors to a computer. Port scanning has legitimate uses in managing networks, but port scanning also can be malicious in nature if someone is looking for a weakened access point to break into your computer.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Monitoring traffic will help for see intrusions into the network. Any traffic that is out of the ordinary will…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Case Study 1

    • 449 Words
    • 2 Pages

    The shareholders and supervisor will be raising questions about the credibility of his future projections.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Port scanner is the software program created and designed to probe a server or host for open ports. This is often run and used by administrators to acknowledge security policies of their networks and for attackers to identify running services on a host with the view to compromise it.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Sec 280 Week 1 Case Study

    • 408 Words
    • 2 Pages

    Port scans, like I stated earlier, are used to discover what services are running on a certain machine. Each service offered by our servers makes user of ports by which TCP/IP requests are sent. Hackers use this information to determine what types of vulnerabilities they can use; this is why the only ports that are open are the ones that we are using. By keeping all other ports closed this keeps hackers from opening other unnecessary openings.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source?…

    • 1091 Words
    • 5 Pages
    Good Essays
  • Good Essays

    A port scan attack is a popular reconnaissance technique that attackers use to discover services they can break into according to Yahoo Answers (2007), Author unknown. Yahoo Answers states that “All…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Port scans are a animal that takes ping sweeps to the next level. The goal of a port scan is to actually see a machine on the network by probing for machines. Of course, the machine must be powered on for the port scan to find it. When it does find a…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT 2580

    • 520 Words
    • 3 Pages

    b. The different scans all work hand and hand with each other. Ping will give you all the machines on the network while all the other scans give you more specific details of the scan depending on what you want to check or identify as far as vulnerabilities.…

    • 520 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A port scan is a more specialized attack. This is where the perpetrator can try to enter our system or network where there may be a hole or door not secure and find out confidential information. This would be similar to a burglar trying to enter your home through an unlocked door or an open window, or leaving your keys in the car and a thief comes along and jumps right in to take the car. The port scan will help to identify which ports are open and give indication to what types of programs are running on that particular computer. (Conklin 12) When the wrong people know more about what programs are running they are more likely to be able to find a way in and steal valuable information.…

    • 434 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Webdriver

    • 427 Words
    • 2 Pages

    1. Identify the port number - this is the port number written in code (and it can be any 4 digit number).…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Wace burgess

    • 1376 Words
    • 6 Pages

    port is a deep water port. ,consisting of inland, estuary and coastal harbors .It has a total of 280 kilometers of deep-water lines, among which over 160 kilometers are under 10-meter depth. Until now, few ports in China, even in the world, can be compared with Ningbo-Zhoushan Port in water depth.…

    • 1376 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Ports are points of convergence between two domains of freight circulation, land and maritime domains. The term port came from the Latin word “portus”, which means gate or gateway. Ports are bound by the need to serve ships, and so access to navigable water has been historically the most important site consideration.…

    • 25288 Words
    • 102 Pages
    Good Essays