Guest blogger, Niklas Goude, discusses using Windows PowerShell to perform ping sweeps and port scans on a connected network.
Ping Sweeps and Port Scans Ping sweeps and port scans are computer activities that unethical people could use to gain access to personal or company networks. In this article, I will explain what ping sweeps and port scans are, what they are used for, and how we can protect ourselves.
I believe with the proper education software and support, we can take the first steps to preventing any malicious type of activities in our network.
Ping sweeps and port scans can be dangerous, but can also be prevented. The machines that are not on or available do not send a signal.
The ping sweeps are to determine which machines are alive and which ones are not. This could be for trouble shooting purposes or for licenses issues. Ping sweeps are a good tool unless you have a malicious person out there wanting to do damage. Port scans are the most common probing tool available.
Port scans take ping sweeps to a different level. Once the open port is found, it scans the port to find the service it is running.
Once it finds the service the port is running, it gives the intruder power and knowledge about your system. Protecting ourselves can be very easy. Number one rule to remember at all times is to always assume vulnerability.
No one machine on a network is completely safe from an intruder. The best way to protect yourself is to never expose your important security information on a machine.
Passwords, SSN, financial information and password hints should be kept on an encrypted flash drive. Keeping this information stored on your computer is like have your password to your ATM card in your purse or wallet. It allows the intruder to get your information faster.
Education is key to protecting yourself. Keep up to date with readings about security prevention and download the latest security patches from your operating system or your Internet Security software. If the network does not have a DMZ zone, then your intranet may be vulnerable since intruders are unable to penetrate the DMZ zone.
Lastly, firewalls are a must to keep open ports and machines protected. Remembering that there is no such thing as a intruder proof network will allow you to never take a chance on exposing yourself. Keep your software up to date and hire ethical people to watch the networks will decrease your chances of being hacked.
Ping sweeps and port scans have been around for awhile and intruders are getting smarter. It is possible to have a secure network of machines, but education, software and hiring process has to be up to par everyday.
References Teo, LawrenceDecember 1. Understanding Port Scans and Ping Sweeps. Linux Journal, Retrieved March 8,from http:The cases of the Naval Criminal Investigative Service's Washington, D.C.
Major Case Response Team, led by Special Agent Leroy Jethro Gibbs. Special Agent Leroy Jethro Gibbs is the leader of a team of special agents belonging to the NCIS (Naval Criminal Investigative Service) Major Case Response Team.
The Seven-Step Information Gathering Process Objectives: Define the seven-step information gathering process. Define footprinting. Footprinting is about . Snort is an open-source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats.
This post will share questions and answers for CCNA Security Chapter 1 Test v This questions and answers contributed by some good guys.
Do say thanks to them. Case Study: Ping Sweeps and Port Scans Ping sweeps and port scans are computer activities that unethical people could use to gain access to personal or company networks. In this article, I will explain what ping sweeps and port scans are, what they are used for, .
THE REBEL AND THE PSALMIST Reproduced from The Poverty Bay Herald (New Zealand), February 23, PORT ELIZABETH, Cape Colony. I have been to church—to a church in a little dorp* on the Port Elizabeth-Graaff Reinet line, a white-washed, square-cut kirk and ugly.