After a Port Scan

What's the best way to setup a home network? Why should I care about BGP?

After a Port Scan

Post by Da_Costa on Tue Mar 11, 2014 10:24 am
([msg=79850]see After a Port Scan[/msg])

Before my question, i want to thanks for all the responses.

What to do after a port scan?

I run a port scanner on my network and i saw some open ports... I know that exists an overflow vulnerability, but i can't discover this remotely!
I know about vulnerability scanners tools, but i want to know how they perform this scans and i want to develop a vulnerability scanner...

That are some suggestions??

Thanks for the attention!
Da_Costa
New User
New User
 
Posts: 5
Joined: Thu Feb 20, 2014 6:19 pm
Blog: View Blog (0)


Re: After a Port Scan

Post by Adrasteia the Inescapable on Tue Mar 11, 2014 4:40 pm
([msg=79860]see Re: After a Port Scan[/msg])

I'm not sure I quite understand, is this correct? You're running a server of some sort, which you know has a certain buffer overflow vulnerability. You want to know how easy it is to detect that vulnerability.
Adrasteia the Inescapable
New User
New User
 
Posts: 33
Joined: Sun Mar 09, 2014 12:02 am
Blog: View Blog (0)


Re: After a Port Scan

Post by Goatboy on Tue Mar 11, 2014 5:42 pm
([msg=79867]see Re: After a Port Scan[/msg])

An open port does not mean there is a buffer overflow, and I do not know where you got that idea.

All an open port means is that there is a service listening for traffic on that port. That's all.

Vulnerability scanners use known collections of vulnerable software versions and exploits to determine if a given service/program is vulnerable. If it is a match, it might even go so far as to test some exploit against it for a confirmation, though this can cause an unintentional DoS so it is usually something you have to tell it do do specifically.

Scanners don't just magically know that software is vulnerable or employ some super crazy advanced AI to auto-hack everything within a 50-mile radius. It's just a really fast way of checking for a needle in a haystack.
Assume that everything I say is or could be a lie.
1UHQ15HqBRZFykqx7mKHpYroxanLjJcUk
User avatar
Goatboy
Expert
Expert
 
Posts: 2823
Joined: Mon Jul 07, 2008 9:35 pm
Blog: View Blog (0)


Re: After a Port Scan

Post by Da_Costa on Wed Mar 12, 2014 8:58 am
([msg=79878]see Re: After a Port Scan[/msg])

Adrasteia, yes, you are correct, but i want to know how to discover the vulnerability remotely...

Goatboy, i know that port scanner can't do all the hardwork, and about the overflow, i create a server in another machine and i set the overflow there!
If i understand you, for discover a vulnerability remotely, i have to test all possible exploits for that known vulnerability service?
Da_Costa
New User
New User
 
Posts: 5
Joined: Thu Feb 20, 2014 6:19 pm
Blog: View Blog (0)


Re: After a Port Scan

Post by cyberdrain on Wed Mar 12, 2014 10:52 am
([msg=79881]see Re: After a Port Scan[/msg])

Da_Costa wrote:If i understand you, for discover a vulnerability remotely, i have to test all possible exploits for that known vulnerability service?


Not if you can find out which version is running: sometimes you can because it's advertised by the service, sometimes because of a certain feature only available in a new version, etc. Otherwise, detection can be based on trying a certain combination/input that will return an error for vulnerable applications (like adding a quote to a URL to check for SQL injection). And lastly, yes, of course you can go in guns blazing and hope one of the attacks hit. Be careful of not getting locked out because of firewalls, intrusion detection systems or by performing a unforeseen DoS when doing that in real life though.
Free your mind / Think clearly
User avatar
cyberdrain
Addict
Addict
 
Posts: 1204
Joined: Sun Nov 27, 2011 1:58 pm
Blog: View Blog (0)


Re: After a Port Scan

Post by Da_Costa on Wed Mar 12, 2014 11:49 am
([msg=79883]see Re: After a Port Scan[/msg])

Right... So i can conclude that a vulnerability scanner works like that... Find out the version of service running on that port and if match with an exploit in a database, so you can use this...
Da_Costa
New User
New User
 
Posts: 5
Joined: Thu Feb 20, 2014 6:19 pm
Blog: View Blog (0)



Return to Networking

Who is online

Users browsing this forum: No registered users and 0 guests