Tải bản đầy đủ
Type Port 21 Blocked in die Name field, and click Finish

Type Port 21 Blocked in die Name field, and click Finish

Tải bản đầy đủ

Module 03 - Scanning Networks

FIGURE 14.18: Windows Firewall assigning a name to Port

36. The new rule Port 21 Blocked is created as shown in die following figure.
1- 1 “1 * :

Windows Firewall with Advanced Security
F ie

A c tio n

V iew

H dp

W in d o w s Firew all w ith Adv;
C

nfcound Rules

C

Outbound Rules

[O ^Port 21 Blockcd

C o n n e c b o n Security Rul
t

A» tio r o
Na

O u tb o u n d Rules

M o n ito rin g

H T T Port doesn't really
care for the proxy as such:
it works perfectly with
firewalls, transparent
accelerators, N ATs and
basically anything that lets
the H T T P protocol
through.
^

N e w Rule...

© B r a n c h C a c h e C on ten t R c t r c v t l ( H T T P -0 ..

B ran ch C ach e • C o n te n t Retr..

Al

©

B i. n c h ( m h r • H o tte d C a c h

:1

V

© B ta n ch C a c h e H osted C ach e $erv* 1(HTTP... B ran ch C ach e • H o tte d C a c h

Al

V

F liter by State

© B r a n c h C a c h e Peer Oise every //SD C u t)

B ran ch C ach e • Peer D isco ve ..

A l

V

Filter by G io u p

© C o r e N e tw o rk in g ‫ ־‬O N S (U O P-O u tJ

C o re N e tw orkin g

Al

© C o i e N e tw o r k in g - D y n am ic H o d C o n fig ..

C o re N e tw orkin g

Al

© C o r e N e tw o rk in g - D y n a m ic H o s t Config...

C o re N e tw orkin g

A l

Q

Refresh

© C o r e N e tw o rk in g - G ro u p Pcfccy CLSAS S --

C o re N e tw orkin g

D o m a in

[a »

Export List...

Li

H elp

B r a n c h ( * ! h e H o tte d C a c h e C lie n t ( H IT .

Filter by Profit•

V iew

@ P C o re N e tw o rk in g - G ro up P c E c y (fJP -O u t)

C ore N etw orking

D o m a in

© C o r e N e tw o rk in g - G ro up P o ic y (T C P -O -.

C o re N e tw orkin g

D o m ain

© C o r e N e tw o rk in g - internet G ro up M ana...

C o re N e tw orkin g

A l

© C o r e N e tw o r k in g - lP H T T P 5 (T C P -O u tJ

C o te N e tw orkin g

Al

*

D isable Rule

© C o t e N e tw o rk in g - Pv 6 (Pw 6 -0 ut)

C o te N e tw orkin g

A l

4

cut

C o re N e tw orkin g

Al

C o re N e tw orkin g

Al

© C o i e K iel w o rt m g • M u l 1 < «U Ik te n e t Rep.

C o re N e tw orkin g

Al

© C o r « N e tw o rk in g • V u h cast -K ten er Rep.

C o r • N e tw orkin g

Al

rfcig nfccf D isco ve ry A... C o re N e tw orkin g

Al

© C o r e N e tw o rk in g

V u h cast Listener Do‫״‬

© C o r e N e tw o rk in g

M u h
© C o r e N e tw o rk in g

C o re N e tw orkin g

Al

©Coie Networking - F«.h&Tv. Big K M P .. CortNttwQiking

A l

© C o r . 1N e tw o rk m g • N e ig h b o r D iscovery 5 ,

C o re N e tw orkin g

A l

© C o r e N e tw o rk in g ‫ ־‬R ou te r A d .e rtc e m e n t... C o re N e tw orkin g

Al

© C o r e N e tw o rk in g - R ou te r S oK ck ation (1C... C o re N e tw orkin g

Al

© C o r e N e tw o rk in g - Param eter P ro b le m (I..

Port 21 Blocked

G fe C o p y

X

‫♦ז »ו » ם‬

(£ |

P ro p e itie *

U

H elp

FIGURE 14.19: Windows Firewall New rule

37. Right-click die newly created rule and select Properties
*

Windows Firewall with Advanced Security

File

A c t io n

V iew

* ‫►י‬

^

H dp

q

!
I Actions

g f W in d o w s Firew all w ith Adv;
C l in b o u n d Rules
O

O u tb o u n d Rulea
Co n n e c tio n S e c u rity Rul

X/

S

H T T Port then
intercepts that connection
and runs it through a
tunnel through the proxy.

M o n ito rin g

Nam e

G ro up

*

O .P 0 rt 2 1 B lo c k c d

P ro fie

Enal

Outbound Rules

-

N e w Rule...

D isable Rule

^ B r a n c h C a c h e C on ten t Retrieval (H T T P -O ‫ ״‬. Bra nc hCac he ‫ ־‬C o r
© B r a n c h C a c h e H osted C a ch e C ie m (H T T ‫ ״‬.

Bran ch C ach e - Hos

Cut

V

F ilter b y Profile



© B r a n c h C a c h e H osted C a ch e S aver(H T T P _

Bran ch C ach e ‫ ־‬H o:

Copy

V

Filter b y State



© B r a n c h C a c h e P ee t D is c c v a y (WSO‫־‬OulJ

Bran ch C ach e - Pee

Delete

V

© C o i e N etw ork ing - D f 5 (U 0 P - 0 u t )

Core N e tw o rk in g

© C o r e N etw ork ing

L o re N e tw orkin g

D >n anvc H c it C c n f ig ..

F liter b y G ro up



Properties

V iew



Hdp

Refresh

Most C onfig...

Core N e tw o rk in g

© C o r e N e tw o r b n g • G roup P olicy (ISA SS-...

Core N e tw o rk in g

Dom *n

Vet

© C o r e N etw ork ing

G roup P olic y (NP-O ut)

Core N e tw orkin g

Do»n*n

Ves

© C o r e N etw ork ing

© C o r e N e tw o r b n g • D >nrn»

^

Export List...

Q

H elp

G roup P olic y ( TCP0 ‫־‬-

Core N e tw orkin g

D o m ain

Ye*

© C o r e N e tw o r b n g • Intern*! G iou p M ana..

Core N e tw o rk in g

Al

Vet

Port 21 Blocked

© C o r e N etw ork ing



D isable Rule
c ‫״‬t

Core N e tw orkin g

Al

Yes

© C o r e N e tw o r b n g - IPv6 (1P»‫׳‬$‫<־‬XjtJ

Core N e tw orkin g

Al

Yes

© C o r e N e tw o r b n g - M ufticest Listener Do...

Core N e tw orkin g

Al

Yes

4

© C o r e N e tw o r b n g - M J c c a s t Listener Qu...

Core N e tw orkin g

Al

Yes

•41 C o p y

© C o r e N e r w c r b n g - M J b c s s t Listener Rep... Core N e tw orkin g

Al

Yes

X

Delete

© C o r e N e tw o r b n g - M u lb ce si Listener Rep... Core N e tw orkin g

Al

Yes

© C o r e N e tw o r b n g - N eig h b o r D iscovery A ‫״‬.

Core N e tw orkin g

Al

Yes

© C o r e N e tw o r b n g

N eig h b o r D iscovery S...

Core N e tw orkin g

Al

Yes

0

H elp

IPHTTPSfTCP-Out)

l© C c r e N e tw o r b n g ■ P acket T oo Big (ICMP...

Core N e tw orkin g

Al

Yb

© C o r e N e tw o r b n g • P aiam eter P rob lem (1-‫״‬

Core N e tw o rk in g

Al

Yes

© C o r e N e tw o r b n g

R euter A d v c n sc m c n t...

Core N e tw orkin g

Al

YCS

© C o r e N e tw o r b n g * R cu le t Solicitation (IC~

Core N e tw o rk in g
r . . . *■------- 11—

Al

Yes

-

Properties

1 th e p rop erties d ia lo g box for th e current s e le a jo n

FIGURE 14.20: Windows Firewall new rule properties

£ 7 Enables you to bypass
your H T T P proxy in case it
blocks you from the
Internet

C E H L ab M an u al P ag e 232

38. Select die Protocols and Ports tab. Change die R em ote Port option to
Specific Ports and enter die Port number as 21
39. Leave die other settings as dieir defaults and click Apply dien click OK.
E th ica l H a c k in g an d C o u n term easu res Copyright O by E C ‫־‬Counc11
All Rights Reserved. Reproduction is Strictly Prohibited

Module 03 - Scanning Networks

* ‫ד‬

Port 21 Blocked Properties
jerteral_________Pngams and Services
Protocolt and F o re

|

Sco pe

|

Ad vance c

Remote Conpjtefs
j

Local P rin cp ab

FVwocob and po*s
Prctocdtype:
P rcto cd ru n b e r

Loco port

All Potto

Exam pb. 80. 443.5003-5010
Remote p3rt:

S pecifc Pats

[21
Example. 80. 443.5003-5010
hten‫־‬e t Gortnd M essage Protocol
( C M P ) « tin g * :

I Custonizo.

i— ‘ W ith H TTPort, you
can use various Internet
software from behind the
proxy, e.g., e-mail, instant
messengers, P2P file
sharing, IC Q , News, FTP,
IRC etc. The basic idea is
that you set up your
Internet software

FIGURE 14.21: Firewall Port 21 Blocked Properties

40. Type ftp ftp.certifiedhacker.com in the command prompt and press
Enter. The connection is blocked in W indows Server 2008 by firewall

£ 3 H T T P ort does neither
freeze n or hang. W hat you
are experiencing is known
as ‫״‬blocking operations”

FIGURE 14.22: ftp connection is blocked

41. N ow open die command prompt 011 die W indows Server 2012 host
machine and type ftp 127.0.0.1 and press Enter

7 ^ H T TPort makes it
possible to open a client
side o f a T C P /IP
connection and provide it
to any software. The
keywords here are: "client"
and "any software".

C E H L ab M an u al P ag e 233

E th ica l H a c k in g an d C o u n term easu res Copyright © by E C ‫־‬C oundl
All Rights Reserved. Reproduction is Strictly Prohibited

Module 03 - Scanning Networks

FIGURE 14.23: Executing ftp command

Lab Analysis
Document all die IP addresses, open ports and running applications, and protocols
you discovered during die lab.
Tool/Utility

Information Collected/Objectives Achieved

Proxy server U sed: 10.0.0.4
H T T P o rt

P o rt scan n ed : 80
R esult: ftp 127.0.0.1 connected to 127.0.0.1

P L E A S E TALK T O YO U R I N S T R U C T O R IF YOU H A V E Q U E S T I O N S
R E L A T E D T O T H I S L AB.

Questions
1. How do you set up an HTTPort to use an email client (Oudook,
Messenger, etc.)?
2. Examine if software does not allow editing die address to connect to.
Internet Connection Required

0 Y es

□ No

P latform S u p p o rted
0 C lassroom

C E H L ab M an u al P ag e 234

□ iLabs

E th ica l H a c k in g an d C o u n term easu res Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Module 03 - Scanning Networks

Basic Network Troubleshooting
Using MegaPing
MegaPing is an ultimate toolkit thatprovides complete essential utilitiesfor
information system administrator and IT solutionproviders.
icon key

Lab Scenario

/

/ Valuable
information

s

Test your
knowledge

You have learned in the previous lab that H TTP tunneling is a technique where
communications within network protocols are captured using the H TTP
protocol. For any companies to exist 011 the Internet, they require a web server.
These web servers prove to be a high data value target for attackers. Tlie
attacker usually exploits die WWW server running IIS and gains command line
access to the system. O nce a connection has been established, the attacker
uploads a precompiled version o f the H TTP tunnel server (lits). W ith the lits
server set up the attacker then starts a client 011 his 01‫ ־‬her system and directs its
traffic to the SRC port o f the system running the lits server. This lits process
listens 011 port 80 o f the host WW W and redirects traffic. Tlie lits process
captures the traffic in H TTP headers and forwards it to the WWW server port
80, after which the attacker tries to log in to the system; once access is gained he
or she sets up additional tools to further exploit the network.

Web exercise
m

W orkbook review

MegaPing security scanner checks your network for potential vulnerabilities that
might be used to attack your network, and saves inform ation in security reports.
111 diis lab you will learn to use MegaPing to check for vulnerabilities and
troubleshoot issues.

Lab Objectives
This lab gives an insight into pinging to a destination address list. It teaches
how to:

C E H L ab M an u al P ag e 235



Ping a destination address list



Traceroute



Perform NetBIOS scanning
E th ica l H a c k in g an d C o u n term easu res Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Module 03 - Scanning Networks

Lab Environment
To cany out die lab, you need:
■ MegaPing is located at D:\CEH-Tools\CEHv8 M odule 03 S can nin g
CD Tools

N etw ork s\S can n in g T ools\M egaPing

dem onstrated in
this lab are
available in
D:\CEH•
Tools\CEHv8
Module 03
Scanning
Netw orks

P IN G stands for
Packet Internet Groper.

■ You can also download the latest version o f M egaping from the link
http: / / www.magnetosoft.com/
■ I f you decide to download the la te s t version , then screenshots shown
in the lab might differ
■ Administrative privileges to run tools
■ TCP/IP settings correcdy configured and an accessible DNS server

■ This lab will work in the C EH lab environment, on W indow s S erver
2 0 1 2 , W indow s 2 0 0 8 , and W indow s 7

Lab Duration
Time: 10 Minutes

Overview of Ping
Tlie ping command sends Internet Control M essa g e Protocol (ICMP) echo request
packets to die target host and waits for an ICMP respon se. During diis requestresponse process, ping measures die time from transmission to reception, known as
die round-trip tim e, and records any loss packets.

Lab Tasks
T A S K

1

IP Scanning

1.

Launch the Start menu by hovering die mouse cursor on the lower-left
corner o f the desktop.

FIGURE 13.1: Windows Server 2012 - Desktop view

2. Click die MegaPing app to open die MegaPing window.

C E H L ab M an u al P ag e 236

E th ica l H a c k in g an d C o u n term easu res Copyright O by E C ‫־‬C oundl
All Rights Reserved. Reproduction is Strictly Prohibited

Module 03 - Scanning Networks

FIGURE 15.2: Windows Server 2012 - Apps

3. TQi^Meg a P in g ma!1^ n n d o w ^ ^ h o ^ M 1^ h ^ b l l o \ n n ^ 1‫־‬g u 1^ ^ ^
55

MegaPing (Unregistered)

F ile

V ie w

T o o ls

-

□ '

x

‫ד‬

H dp

*

DN S Lookup N am e

Q

Fng cr

1S

N e t w o r k T im e

‫&י־‬

D N S L id rto s fe

g g P in g

CQ All Scanners can scan
individual computers, any
range o f IP addresses,
domains, and selected type
o f com puters inside
domains

gg

T r a c e ro u te

W ho 11
^

N e t w o r k R # to u fc # t

<<•> P r o c e s s I n fo
S y s ta m In fo
£

IP S c a n n e r

$

N e tB I O S S c a n n e r

•'4? S h a re S c a n n e r
^

S e c u r it y S c a n n e r

- J ? P o rt S ca n n e r
J i t H o s t M o n it o r

*S L b t H o > ts

Figure 15.3: MegaPing main windows

4. Select any one o f die o p tio n s from the left pane o f the window.
Security scanner
provides the following
information:
NetB IO S names,
Configuration info, open
TC P and U D P ports,
Transports, Shares, Users,
G roups, Services, Drivers,
Local D hves, Sessions,
Remote Time o f Date,
Printers

C E H L ab M an u al P ag e 237

5. Select IP sca n n er, and type in the IP range in die From and To field; in
this lab the IP range is from 10.0.0.1 to 1 0 .0 .0 .2 5 4 . Click Start
6. You can select the IP range depending on your network.

E th ica l H a c k in g an d C o u n term easu res Copyright O by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Module 03 - Scanning Networks

fs r

‫ ־‬°r

MegaPing (Unregistered)

F ile

V « ‫ *׳‬/

Took

H e lp

ft ft
‫׳‬3<_ .

DNS L s t H o sts

* %v

^
r

^

^

a* 3



r « a

P -1 'S W W

* t DNS Lookup N am e
§

F in g e r

I3 Scanner

t

N e tw o r k T im e
8 a8 P in g

IP S ca n n e r S s t n g j

S elect

ir a c c r o u t c
W hoK

I

N e tw o r k R e s o u rc e s

► S c a m • ‫׳׳‬

“ I

|

10

0

0

1

10

0

0

254

| 1

S M

1

<§> P ro c e s s In fo
^

S y s te m Info

■*iiaui.111
■ £ N e tB I O S S ca n n e r
Y * S h a re S c a n n e r
j&

S e c u r ity S c a n n e r

^

P o rt S ca n n e r

^

H o s t M o n it o r

F IG U R E 15.4: MegaPing IP Scanning

It will list down all the IP a d d r e s s e s under that range with their TTL
(Time to Live), S ta tu s (dead or alive), and die s t a t is t ic s o f the dead
and alive hosts.
MegaPing (Unregistered)
P ie

CD N etw o rk utilities:
D N S list host, D N S lookup
name, N etw ork Time
Synchroni2er, Ping,
Traceroute, Wliois, and
Finger.

V ie w

1 1
i ,

g
d

T o o ls

ft

H e lp

A <>

r j ‫ כ‬L .st 1 l o s t i
I P 5 i« n n w

,p , D N S L o o k u p N a m e
Q

F in g e r

a

N e t w o r k T im e

t l P in g

X

IP S a n n a r

$

IP S ca n n e r S a tn g e

Setect-

T r a c e rc u t e
H V hols

|R a rg e

10

1“ 5 N e t w o r k R e so u rc e s

F S ca re

%

ro c e s s Info

Status:

^

S y s t e m Info

N e tB I O S S c a n n e r
y * Share Scanner
$

S e c u r ity S c o n n e r

l . J j ? P o rt Scanner
J S i H o s t M o n it o r

.

0

0

.

1

10

0

0

251

I

Start

Z o ro e te c 25^ adcresees in 15 8ccs
True

TTL

. = 1 10.0.0.1

0

&4

A fiv e

g

1 a 0 .0 4

1

128

Abve

* ddrest

Nam e

S ta tj*

g

10.0.0.6

0

128

A S ve

£

1 a o .o .7

0

128

Afcve

g

1 a 0 .0 .1 0

O a t..

JQ

10.0.0.100

D e s t..

g

1010.0.101

D e s t ._

1 a0 .0 .1 0 2

D est —

£

10.0.0.105

D e « t._

g

10.0.0.104

D est —

g

10.0.0.105

Dest

Show MAC

Addresses
Hosts Stats
T o ld .

254

A ctiv e

4

Paled : 2 5 0

Report

FIG U RE 15.5: MegaPing IP Scanning Report
S

T A S K

2

NetBIOS
Scanning

C E H L ab M an u al P ag e 238

8. Select the NetBIOS S ca n n er from the left pane and type in the IP range
in the From and To fields. 111 this lab, the IP ran ge is from 10.0.0.1 to
1 0 .0 .0 .2 5 4 Click Start

E th ica l H a c k in g an d C o u n term easu res Copyright O by E C ‫־‬Counc11
All Rights Reserved. Reproduction is Strictly Prohibited

Module 03 - Scanning Networks

W

T IP I

f/egaPing (Unregistered)

F ile

V ie w

T o o ls

H dp

rP- A
J* | D N S L is t H o s t s

N c G C S S so n rc r

,5,D N S L o o k u p N a m e

‫ ס‬MegaPing can
sca n your entire
network and
provide
information such
a s open shared
reso u rces, open
ports,
services/drivers
a ctiv e on the
com puter, key
registry entries,
u sers and groups,
trusted dom ains,
printers, and
more.

g

F in g e r

3

Network Time

tS

P1n9
T r a c e ro u t e

&

W h o ls
N e tw o r k R e s o u r c e

<$> P r o c e s s Info
4
^

S y s te m I n fo
IP S c a n n c r

i!\
S h a re S c a n n e r
^

S e c u r ity S c a n n e r

^

P o rt S ca n n e r
H o s t M o n it o r

N etB IO S S c a nn er

FIG U RE 15.6: MegaPing N etB IO S Scanning

9. The NetBIOS scan will list all the hosts with their NetBIOS n am es and
ad ap ter a d d r e s s e s
MegaPing (Unregistered)
M e

V tfA

T o r i?

H e lp

JL JL 4S & *“8 8a &

&r S can results
can be saved in
HTML or TXT
reports, which
can be u sed to
se c u r e your
network ■‫־‬for
exam ple, by
shutting down
u n n ecessa ry
ports, closin g
sh ares, etc.

J J , D N S L is t H o s t s
•j! L DNS Lookup N am
Q

$

K«BIT$ Sc^rrer

^

Net 9 0 $ S c a n r e r

F in g e r

N e t w o r k T im e 3 1 !

Men BIO S S c a r r r a

t i p,n9
g*3 T r a c e ro u t e

] | 10 . 0 . 0 . 1 |

|R e rg 5

W h o le ^
O

N e t w o r k R e s o u rc e s -

aJatLS‫־‬

P r o c e s s Info %

.

0

.2 5 4

Stop

‫ י‬E x p a rd

1Names
Nam e

IP S c a n n e r ^

m g g n n 1$
/‫״‬y

0

Z o r o e e c Q u e m g Net B O S Nam es on

‫ ״ ״‬J ^ S y s t e m In fo

:S h a re S c a n n e r ?

10

N stE JO S S can n er

»

1

1 0 0 .0 .4

W IN -U L Y 8 3 3 K H Q .. A I v «

2 ) N e tB I O S N a m e s

3

Wgf A d o p t e r A d d r e s s

0 0 1 5 -5 D 0 0 -0 7 . .

S e c u r it y S c a n n e r

A

W ORKGROUP

P o rt S ca n n e r

iac.0.6

A D M IN • P C

fr] N e tB IO S N o m e :

6

H o s t M o n it o r 2 1

»

STctus

D o m a in

W B A d a p te r A d d re ss

00-15-50-00-07‫־‬..

4^

W ORKGROUP

D o m a in

1 0 0 .0 .7

W I N - D 3 9 M R S H L ..

j | ] N e tB I O S N a m e s

3

X f A d a p te r A d d re ss

D 4 - B E - D 9 - C 3 - C E ..

Exp and
Summary

M ic r o s o f t ‫״‬

A J iv c

M < ro s o ft ‫״‬

Stats
T o ld .

131

A c tvc

3

=a!od

123

A lv #

Report

N e tB IO S S c a n n e r

FIG U R E 15.7: MegaPing NetB IO S Scanning Report

10. Right-click the IP address. 111 this lab, the selected IP is 10.0.0.4; it will
be different in your network.
5

TA sK

3

11. Then, right-click and select the T racerou te option.

Traceroute

C E H L ab M an u al P ag e 239

E th ica l H a c k in g an d C o u n term easu res Copyright O by E C ‫־‬Counc11
All Rights Reserved. Reproduction is Strictly Prohibited

Module 03 - Scanning Networks

v
V ie w

^

‫ ם‬O ther features include
m ultithreaded design that
allows to process any
num ber o f requests in any
tool at the same time, realtime network connections
status and protocols
statistics, real-time process
inform ation and usage,
real-time network
information, including
netw ork connections, and
open network files, system
tray support, and m ore

I I M

MegaPing (Unregistered)

F ile

T o o ls

Hdp

D N S L is t H o s t s

NctBICS S c a rr e ‫־‬

;j, DNS Lookup Nam e
g

F in g e r

3

N e t w o r k T im e

$

t®* P in 9
A

M * 3 0 S Scarner
Rom:

T r a c e ro u t e
Range

W h o ls

v |

N e t w o r k R e s o u rc e s

N e tE lO S S e i n e r

P r o c e s s In fo

Satus

^

S y s te m In fo

•‫^־‬

IP S c a n n e r

10

0

B

D

S h a re S ca n n e r
S e c u r it y S c a n n e r

A

P o rt S ca n n e r

-

j j

g l H o s t M o n it o r

Stdft

Names
Nome



3 0 ( jj

A d a p e e rA

M e r g e H o s ts

C c m a in

O p e n S h a re

Hoete Slate
Total:

C o m a in

254

V ie w H o t f ix D e t a b

A ctve

A p p l y H o t F ix es

F ailed251 ‫־‬

N e tB IO S

S ? A d o p te r A
^

Dcpand
* b‫ ?׳‬Summary

E x p o rt T o File

N e tB I O S f■

10.0.0.5

i- J |

B A

254

Oroteted ?M addresses m M secs

0 B
*

0

0

_____

‫׳‬J ^ N e tB I O S S c a n n e r

^

NetBIOS Scanner S9
So eci:

3

C o p y s e le c t e d it e m

10.0.0.7
£

C o p y s e le c t e d r o w

N e tB IG S ‫ף‬

C o p y a ll re s u lt;

■3 A d o p t e r A

S ave A s
T r a c e ro u te
T r a c c r o u t c s t h e s e le c t io n

FIG U RE 15.8: MegaPing Traceroute

12. It will open the T racerou te window, and will trace die IP address
selected.
MegaPing (Unregistered)
F ie

V ie w

T o o ls

H e lp

S. JL 4$ 151 *« 88
J j , D N S L is t H o > b

Trace r 0« *

J!L D N S L o o k u p N a m e

& T ools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 03
Scanning
Netw orks

| J F in g e r
i l l N e t w o r k T im e

**

aa

Trace ro ute S e tth o t

Destrebon:
^
-O

W h o ls

1 0 0 0 .4

N e t w o r k R e s o u rc e s

Z te s tr a w n \Jd rc s 5 J s t



R e so lv e I4an‫־‬s

*■{?> P r o c e s s Info
S y s t e m Info
■^

□ Select Al

IP S c a n n e r
N e tB I O S S c a n n e r

Add

*jp S h a re S c a n n e i
D d c tc

S e c u r it y S c a n n e r
‫>׳‬
y

P o rt S ca n n e r

j t A H o » t M o n it o r
Tim e

hoo

9 >91 ‫י‬
1
‫־‬

m

£

1

0

A'
*

4

N am e

D s ta fc

W I N - U L Y 8 S 8 K H C J I P [ 1 _ C o m p le t e .

1

‫ו‬

10.0.0.4

0 & '2 3 / 1 2 1 0 t 4 4 t f

A D M I N P C [ 1 0 .0 .0 .6 ]

C o m p le t e .

10.0.0.6

0 8 / 2 3 /1 2 1 Q 4 S J 1

Report

|

FIG U R E 15.9: MegaPing Traceroute Report

S

TA sK

4

Port Scanning

13. Select Port Scanner from die left pane and add
w w w .ce rtifie d h a ck er .co m 111 the D estin ation A d d ress List and then
click the S tart button.
14. After clicking the Start button it toggles to Stop
15. It will lists the ports associated with www.certifiedl1 acker.com with die
keyword, risk, and port number.

C E H L ab M an u al P ag e 240

E th ica l H a c k in g an d C o u n term easu res Copyright O by E C ‫־‬Counc11
All Rights Reserved. Reproduction is Strictly Prohibited