HHS_en05_System_Identification.pdf

(242 KB) Pobierz
HHS - Lesson 5 - System Identification
LESSON 5
SYSTEM IDENTIFICATION
4782124.286.png
LESSON 5 – SYSTEM IDENTIFICATION
“License for Use” Information
The following lessons and workbooks are open and publicly available under the following
terms and conditions of ISECOM:
All works in the Hacker Highschool project are provided for non-commercial use with
elementary school students, junior high school students, and high school students whether in a
public institution, private institution, or a part of home-schooling. These materials may not be
reproduced for sale in any form. The provision of any class, course, training, or camp with
these materials for which a fee is charged is expressly forbidden without a license including
college classes, university classes, trade-school classes, summer or computer camps, and
similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at
www.hackerhighschool.org/license .
The HHS Project is a learning tool and as with any learning tool, the instruction is the influence
of the instructor and not the tool. ISECOM cannot accept responsibility for how any
information herein is applied or abused.
The HHS Project is an open community effort and if you find value in this project, we do ask
you support us through the purchase of a license, a donation, or sponsorship.
All works copyright ISECOM, 2004.
2
4782124.297.png 4782124.308.png 4782124.319.png 4782124.001.png 4782124.012.png 4782124.023.png 4782124.034.png 4782124.045.png 4782124.056.png 4782124.067.png 4782124.078.png 4782124.089.png 4782124.100.png 4782124.111.png 4782124.122.png 4782124.133.png 4782124.144.png 4782124.155.png 4782124.166.png 4782124.177.png 4782124.188.png 4782124.199.png 4782124.210.png 4782124.221.png 4782124.232.png 4782124.243.png 4782124.254.png 4782124.260.png 4782124.261.png 4782124.262.png 4782124.263.png 4782124.264.png 4782124.265.png 4782124.266.png 4782124.267.png 4782124.268.png 4782124.269.png 4782124.270.png 4782124.271.png 4782124.272.png 4782124.273.png 4782124.274.png 4782124.275.png 4782124.276.png 4782124.277.png 4782124.278.png 4782124.279.png 4782124.280.png 4782124.281.png 4782124.282.png 4782124.283.png 4782124.284.png 4782124.285.png 4782124.287.png 4782124.288.png 4782124.289.png 4782124.290.png 4782124.291.png 4782124.292.png 4782124.293.png 4782124.294.png 4782124.295.png 4782124.296.png 4782124.298.png 4782124.299.png 4782124.300.png 4782124.301.png 4782124.302.png 4782124.303.png 4782124.304.png 4782124.305.png 4782124.306.png 4782124.307.png 4782124.309.png 4782124.310.png 4782124.311.png 4782124.312.png 4782124.313.png 4782124.314.png 4782124.315.png 4782124.316.png
LESSON 5 – SYSTEM IDENTIFICATION
Table of Contents
“License for Use” Information.................................................................................................................2
Contributors...............................................................................................................................................4
5.0 Introduction.........................................................................................................................................5
5.1 Identifying a Server.............................................................................................................................6
5.1.1 Identifying the Owner of a Domain..........................................................................................6
5.1.2 Identifying the IP address of a Domain....................................................................................6
5.2 Identifying Services.............................................................................................................................6
5.2.1 Ping and TraceRoute..................................................................................................................6
5.2.2 Banner Grabbing........................................................................................................................7
5.2.3 Identifying Services from Ports and Protocols..........................................................................7
5.3 System Fingerprinting.........................................................................................................................9
5.3.1 Scanning Remote Computers...................................................................................................9
Further Reading.......................................................................................................................................12
3
4782124.317.png 4782124.318.png 4782124.320.png 4782124.321.png 4782124.322.png 4782124.323.png 4782124.324.png 4782124.325.png 4782124.326.png 4782124.327.png 4782124.328.png 4782124.329.png 4782124.002.png 4782124.003.png 4782124.004.png 4782124.005.png 4782124.006.png 4782124.007.png 4782124.008.png 4782124.009.png 4782124.010.png 4782124.011.png 4782124.013.png 4782124.014.png 4782124.015.png 4782124.016.png 4782124.017.png 4782124.018.png 4782124.019.png 4782124.020.png 4782124.021.png 4782124.022.png 4782124.024.png 4782124.025.png 4782124.026.png 4782124.027.png 4782124.028.png 4782124.029.png 4782124.030.png 4782124.031.png 4782124.032.png 4782124.033.png 4782124.035.png 4782124.036.png 4782124.037.png 4782124.038.png 4782124.039.png 4782124.040.png 4782124.041.png 4782124.042.png 4782124.043.png 4782124.044.png 4782124.046.png 4782124.047.png 4782124.048.png 4782124.049.png 4782124.050.png 4782124.051.png 4782124.052.png 4782124.053.png 4782124.054.png 4782124.055.png 4782124.057.png 4782124.058.png 4782124.059.png 4782124.060.png 4782124.061.png 4782124.062.png 4782124.063.png 4782124.064.png 4782124.065.png 4782124.066.png 4782124.068.png 4782124.069.png 4782124.070.png 4782124.071.png 4782124.072.png 4782124.073.png 4782124.074.png 4782124.075.png 4782124.076.png 4782124.077.png
LESSON 5 – SYSTEM IDENTIFICATION
Contributors
Chuck Truett, ISECOM
Marta Barceló, ISECOM
Kim Truett, ISECOM
Pete Herzog, ISECOM
4
4782124.079.png 4782124.080.png 4782124.081.png 4782124.082.png 4782124.083.png 4782124.084.png 4782124.085.png 4782124.086.png 4782124.087.png 4782124.088.png 4782124.090.png 4782124.091.png 4782124.092.png 4782124.093.png 4782124.094.png 4782124.095.png 4782124.096.png 4782124.097.png 4782124.098.png 4782124.099.png 4782124.101.png 4782124.102.png 4782124.103.png 4782124.104.png 4782124.105.png 4782124.106.png 4782124.107.png 4782124.108.png 4782124.109.png 4782124.110.png 4782124.112.png 4782124.113.png 4782124.114.png 4782124.115.png 4782124.116.png 4782124.117.png 4782124.118.png 4782124.119.png 4782124.120.png 4782124.121.png 4782124.123.png 4782124.124.png 4782124.125.png 4782124.126.png 4782124.127.png 4782124.128.png 4782124.129.png 4782124.130.png 4782124.131.png 4782124.132.png 4782124.134.png 4782124.135.png 4782124.136.png 4782124.137.png 4782124.138.png 4782124.139.png 4782124.140.png 4782124.141.png 4782124.142.png 4782124.143.png 4782124.145.png 4782124.146.png 4782124.147.png 4782124.148.png 4782124.149.png 4782124.150.png 4782124.151.png 4782124.152.png 4782124.153.png 4782124.154.png 4782124.156.png 4782124.157.png 4782124.158.png 4782124.159.png 4782124.160.png 4782124.161.png 4782124.162.png 4782124.163.png 4782124.164.png 4782124.165.png 4782124.167.png 4782124.168.png 4782124.169.png
LESSON 5 – SYSTEM IDENTIFICATION
5.0 Introduction
It is obvious that someone who sits down at the keyboard of your computer can gather
information about it, including the operating system and the programs that are running, but it
is also possible for someone to use a network connection to gather information about a
remote computer. This lesson will describe some of the ways in which that information can be
gathered. Knowing how this information is gathered will help you to ensure that your local
computer is safe from these activities.
5
4782124.170.png 4782124.171.png 4782124.172.png 4782124.173.png 4782124.174.png 4782124.175.png 4782124.176.png 4782124.178.png 4782124.179.png 4782124.180.png 4782124.181.png 4782124.182.png 4782124.183.png 4782124.184.png 4782124.185.png 4782124.186.png 4782124.187.png 4782124.189.png 4782124.190.png 4782124.191.png 4782124.192.png 4782124.193.png 4782124.194.png 4782124.195.png 4782124.196.png 4782124.197.png 4782124.198.png 4782124.200.png 4782124.201.png 4782124.202.png 4782124.203.png 4782124.204.png 4782124.205.png 4782124.206.png 4782124.207.png 4782124.208.png 4782124.209.png 4782124.211.png 4782124.212.png 4782124.213.png 4782124.214.png 4782124.215.png 4782124.216.png 4782124.217.png 4782124.218.png 4782124.219.png 4782124.220.png 4782124.222.png 4782124.223.png 4782124.224.png 4782124.225.png 4782124.226.png 4782124.227.png 4782124.228.png 4782124.229.png 4782124.230.png 4782124.231.png 4782124.233.png 4782124.234.png 4782124.235.png 4782124.236.png 4782124.237.png 4782124.238.png 4782124.239.png 4782124.240.png 4782124.241.png 4782124.242.png 4782124.244.png 4782124.245.png 4782124.246.png 4782124.247.png 4782124.248.png 4782124.249.png 4782124.250.png 4782124.251.png 4782124.252.png 4782124.253.png 4782124.255.png 4782124.256.png 4782124.257.png 4782124.258.png 4782124.259.png
Zgłoś jeśli naruszono regulamin