RE: Scanning Class A network

From: Talisker (lists@securitywizardry.com)
Date: Tue Oct 25 2005 - 14:40:35 EDT


Tarun
I have been following this thread trapping any missing network enumerators
these can be found here http://securitywizardry.com/enum.htm

However, the size of network would suggest a distributed scanner especially
given the constraint of a monthly renewal. I have these listed here,
http://securitywizardry.com/enum.htm though the majority are better suited
for vulnerability assessment rather than just enumeration and the list needs
an update.

I would suggest a hybrid approach where active enumeration is complemented
with passive fingerprinting at the network boundaries. The problem with
active scanning is that it is only true for the moment an IP address is
scanned. However, passive fingerprinting will also detect any emerging
hosts or hosts that aren't up for long. Furthermore, there is no bandwidth
hit from their use. I have them all listed here
http://securitywizardry.com/osfp.htm

The website is vendor neutral and lists all products good and bad. It has
been neglected just lately but with the help of some extremely capable folks
is almost back to it's old self. As always, please let us know if we are
missing any products.

Cheers

Andy Cuff
Chief Technology Officer
Computer Network Defence Ltd
http://www.securitywizardry.com

07010 709014
 
> -----Original Message-----
> From: tarunthenut@gmail.com [mailto:tarunthenut@gmail.com]
> Sent: 24 October 2005 13:33
> To: pen-test@securityfocus.com
> Subject: Scanning Class A network
>
> Hello All,
> Recently I was given a task to carry out a port scan of an entire valid
> Class A range (Dont ask me what the huge pool of valid IP's was for :)
> ).
> The scan needed to be carried out externally, and not from within the
> network to identify hosts and ports exposed to the Internet.
> The problem compounded cause of the following limitations :
> 1. ICMP was not allowed in the network
> 2. The IP range was to be scanned every month for the entire port range
> fro=
> m
> 1-65535 for TCP & UDP
> After searching for a suitable scanner which could scan such a large
> range
> in reasonable time, I could think of only nmap, nessus, superscan and ISS.
> But because of the limitations stated above,all the tools took a huge
> amount of time (ran into month).
> I have struggled with options within the tools, tried configurable
> parameters (host time out, parallelism, RTT etc) and divided into smaller
> class C networks and scanned.but still the scan seems to take ages even if
> it is
> Any advise would be welcome :)
>
> Cheers
> tarunthenut
>
> --------------------------------------------------------------------------
> ----
> Audit your website security with Acunetix Web Vulnerability Scanner:
>
> Hackers are concentrating their efforts on attacking applications on your
> website. Up to 75% of cyber attacks are launched on shopping carts, forms,
> login pages, dynamic content etc. Firewalls, SSL and locked-down servers
> are
> futile against web application hacking. Check your website for
> vulnerabilities
> to SQL injection, Cross site scripting and other web attacks before
> hackers do!
> Download Trial at:
>
> http://www.securityfocus.com/sponsor/pen-test_050831
> --------------------------------------------------------------------------
> -----

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:05 EDT