Basic HTML version of Foils prepared May 19 99

Foil 7 Typical Scenario - data gathering

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


1 IP space, names, mail servers, contact information
  • whois, nslookup
2 management, topology and gateway data
  • (scotty) discover {-smtp | icmp}
  • ping, traceroute
3 information about hosts
  • strobe -b1 -e1024 $host
  • nslookup $host
  • satan (tcp_scan, udp_scan),saint, mscan, scotty, netcat, queso, nmap, dig, etc. etc

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999