Identifying Open Ports in Wireshark, HakTip 137

preview_player
Показать описание
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
Today on HakTip, Shannon explains how to view an attack on your network and how to discover your vulnerable network ports.

If you are working at a business, you may find that an attacker wants to get into your network. The attacker would start by collecting publicly available information- like from your website. They can scan the website's IP address for any open ports or running services, and a way to get in, or 'intrude'. Oftentimes, an attacker can use a TCP SYN (for tcp synchronize) scan to find out what's available to them. If your server was open, it would reply with an ACK acknowledge packet, and they'd have a handshake, but not a completed one since the attacker won't be connecting yet. If a port is closed or if you've got a firewall turned on, they would either get an RST packet or none at all. This info probably sounds familiar if you've watched my series on NMap, a network scanner.
I'm using an example from Chris Sanders Practical Packet Analysis. Buy this book. It's extremely useful and he goes into a lot of details I've just skipped over.
If you look under "Conversations" when an attack like this is going on, you'd see one IPv4 conversation happening, and tons of TCP ones. So let's look at the very first packet, by clicking it, opening the packet header pane right clicking on Destination Port, and choosing Prepare a Filter, Selected. Delete dst from the filter, and press enter. We see that these are both port 443, but the server never replied. So maybe the port is closed.
Now find a port 53 packet, for DNS and do the same thing. The server tries to reach out to the attacker, but the attacker denies a connection, ending the TCP handshake. So it looks like the DNS port is open. Do the same thing for a packet reaching out to port 113, like packet 13. This is used for authentication services. The port is closed, or nothing is running on it. The server replies with RST packets.
Open that conversations window again and sort TCP by packets, from high to low. Hit follow stream at the bottom to view the conversation for that specific conversation. You'll notice that the ones with 5 packets are open, the ones with 2 packets are closed (RST). The rest only had one packet, meaning the ports are probably closed too.

-~-~~-~~~-~~-~-
Please watch: "Bash Bunny Primer - Hak5 2225"
-~-~~-~~~-~~-~-
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Рекомендации по теме
Комментарии
Автор

Thanks Sharron. Glad to know somebody there is still pumping out good info instead of droning on about their drone toy.

Mr.JOG-
Автор

you are absolutely AWESOME and genius Shannon !

steph
Автор

Yes, we were asking for the playlist. Thank you.

KowboyUSA
Автор

"Thank You", thank you very much...

Inquire
Автор

I checked the website, and there is no Wireshark video. They are mostly laying around videos.

tahersadeghi
Автор

A rookie IT guy here. Just clarifying that you can use nmap to scan for open ports. I love wireshark but, it tends to be a little confusing for me. Also if the "Attacker" stated in this video was smart enough couldn't he just encrypt his packets through a 2048 bit ssh tunnel? So that wireshark couldn't pick them up?

thesharpshooter
Автор

another great video. proud to add to my playlist and share to my subscribers

thetechfirm
Автор

how do i know if my udp port is blocked in wireshark

koyyanaramesh
Автор

uhm i got a question, I`m late but I want to learn using wire shark for personal purposes.

do all ports have the same protocol? I mean I have some ports but I don`t know how to see there calls because I don`t know there protocol.

mr.dragonstar
Автор

I am getting 9, 8, 4, 3, 2, 1 packets? what does that mean?

mitpatel
Автор

Does the packet capture look different if someone's scanning your server using Netcat vs NMAP?

gbravy
Автор

How do I know how many packets there are for a port? I'm sorry if I missed that.

chrisgast
Автор

Thank you!! Very helpful for my college hw lol

candy-kpzv
Автор

Based on the diagram above create a filter where you can view all OPEN ports on the server with an IP ending in .5, and all CLOSED ports on the server with an IP ending in .2. This should be done in a single filter.----Looking for a filter pls help ..

mohammadrahman
Автор

Nice Video, but i wish you can provide more advanced WireShark Tutorial. thanks.

yangriver
Автор

I get non stop adds on this video cant watch it

sonfire
Автор

If you put a backlight on her you won't see the green outline.

MichaelCollins
Автор

thx Sharron, you're gorgeous in these

vadlowperminov
Автор

please can you give me your email i want to ask you some questions

TasneemAlghadi