Voip Troubleshooting Guide

Total Page:16

File Type:pdf, Size:1020Kb

Voip Troubleshooting Guide VoIP troubleshooting guide Document Reference: Volker Schüppel 16.03.2010 1 CONTENT 1 CONTENT ................................................................................................................................................. 2 2 SCOPE...................................................................................................................................................... 3 3 TCP/UDP PORT USAGE.......................................................................................................................... 4 4 VOIP STATISTIC WINDOW...................................................................................................................... 5 4.1 Statistic configuration 6 4.2 Most important values 6 5 UTILITYS .................................................................................................................................................. 9 5.1 Ping 9 5.2 SuperScan 9 6 PROBLEM: NO CONNECTION.............................................................................................................. 11 6.1 Check configuration 11 6.2 Check IP conflicts 11 6.3 Check Ethernet connection 11 6.4 Ping 12 6.5 Roundtrip delay 12 6.6 Packet loss 12 6.7 Jitter 13 6.8 Scan UDP and TCP ports 13 7 PROBLEM: CONNETION UNSTABLE .................................................................................................. 14 7.1 Check Ethernet connection 14 7.2 Roundtrip delay 14 7.3 Packet loss 15 7.4 Jitter 15 Page 2/15 2 SCOPE This document is written for all users who are going to install and service Artist VoIP products. The product range includes VoIP-008, VoIP-108, ConnectIP x2, Connect IP x8 and the VCP-1004. This document does not cover the product “Connect IP”. In difference to other audio connections like AIO or AES, VoIP relies on an IP network, which is is much more complex than a simple cable. This document helps finding network problems. Readers of this document must have good knowledge of IP networks. Page 3/15 3 TCP/UDP PORT USAGE The following example shows the TCP- and UDP-Port usage of two interconnected VoIP-108 cards. Connect IP x8 uses exactly the same ports. Connect IP x2 uses the same port for signalling, but has two audio channels only. VCP-1004 is only using one channel. VoIP-108 VoIP-108 TCP 5060 Signaling Signaling UDP 5004, 5005 Audio ch. #1 Audio ch. #1 Audio ch. #2 UDP 5006, 5007 Audio ch. #2 Audio ch. #3 UDP 5008, 5009 Audio ch. #3 UDP 5010, 5011 Audio ch. #4 Audio ch. #4 UDP 5012, 5013 Audio ch. #5 Audio ch. #5 UDP 5014, 5015 Audio ch. #6 Audio ch. #6 UDP 5016, 5017 Audio ch. #7 Audio ch. #7 Audio ch. #8 UDP 5018, 5019 Audio ch. #8 Page 4/15 4 VOIP STATISTIC WINDOW Most of the network problems can be found using the VoIP statistic window. Just click on the symbol in Director software and it opens the window. The window is divided into three parts. • The configuration tree displays the VoIP-108 cards of the system configuration. You can select the whole network, a node or a card. • Depending on the selection in the configuration tree, the port statistic displays all values of the whole net, a node or a card. If you only select a card, the display automatically refreshes every 10 seconds. If you select the network or a node, you must press to refresh. The list contains all ports, even if they are not configured. If you want to reduce the list to the ports of the configuration tick . • The logging window displays various VoIP specfifc information received from the cards. Page 5/15 Sometimes it makes sense to write the stastic into the Director logfile in order to pass it to someone else. You can also copy the data from the logfile and import it into an excel sheet. Tick and the statistic will be written with every refresh. 4.1 Statistic configuration The columns of the port statistic can be adjusted to those data which is interresting for you. You can also change the order. Pressing will open the window configuration dialog. Use the tick boxes and the arrows to adjust the statistic window. 4.2 Most important values Value Description Ethernet Link Link status of the ethernet connection. Becomes “connected” when the ethernet cable is connected to another device, e.g. a network switch. SIP connection Connection status to the other VoIP device, e.g another status VoIP-108 card. If it’s “connected” it can talk with the Page 6/15 remote side. A channel has a green background colour when connected, otherwise red. Audio Packets : Audio packets that were lost on the network. If there is a value other than 0, your network drops packets. RxErrorOrLostCount This counter will only work, if you you have a SIP TxErrorOrLostCout connection and transmit audio. If you don’t have audio on the channel, the counter will always stay 0. Audio Packets : Jitter is technically the measure of the variability over time of the latency across a network. The Jitter acceptence Jitter depends on the receive buffer setting for this channel. Please see the document “VoIP_Network_Planning_Guide”. Receive buffer 80ms : max Jitter 20ms Receive buffer 160ms: max Jitter 40ms Receive buffer 320ms: max Jitter 80ms If the Jitter excceds these limits, it will cause packet loss. Jitter measuremnet will only work, if you have a SIP connection and transmit audio. If you don’t have audio on the channel, the value will always stay 0. Audio Packets : This is the delay of your network measured from the local port to the remote port and back to the local port RoundTripTime (roundtrip). The roundtrip delay must not exceed 5000 ms. This counter will only work, if you you have a SIP connection and transmit audio. If you don’t have audio on the channel, the counter will always stay 0. Panel Signalling : Panel Signalling (Control) packets that were lost on the network. If there is a value other than 0, the panel RxErrorOrLostCount connection will not work reliable. TxErrorOrLostCout This value only makes sense if you have a panel configured on this channel. For 4-wire connections the counter will always be 0. Page 7/15 Acceptable networks have the following values for the most important statistics: Ethernet Link Always “connected” SIP connection status Always “connected” Audio Packets : RxErrorOrLostCount 0 Audio Packets : TxErrorOrLostCount 0 Audio Packets : Jitter Always less than 80 ms Audio Packets : Round Trip Time Always less than 2000 ms Panel Signalling : RxErrorOrLostCount 0 Panel Signalling: TxErrorOrLostCount 0 If your network is not within these limits, something is wrong and must be fixed. Page 8/15 5 UTILITYS This chapter describes common utilities which can be used for network analysis. 5.1 Ping Ping is a tool to test whether an IP device is reachable across the network. It works by sending ICMP echo requests which are answered by the remote side. Additionally ping measures the round trip delay a statistic about packet loss. Microsoft Windows comes with a default ping application and it’s not necessary install it. It can only be used from a console. The default usage is “ping IPaddress ” in order to send 4 pings. With the optional parameter –t it will send pings unless the user interrupts with CTRL-C. For further options, please have a look into the Microsoft documentation “ping /?”. 5.2 SuperScan SuperScan is free software tool developed by Foundstone, http://www.foundstone.com/us/index.asp . It can be dowloaded from their or other websides. SuperScan is a tool to test whether a network filters UDP or TCP ports. It also contains other functionality, but for VoIP troubleshooting the focus is on detecting port blocker, i.e. firewalls. Page 9/15 The screenshot displays the required settings for scanning the Artist VoIP audio and signalling ports. Page 10/15 6 PROBLEM: NO CONNECTION This is probably the most common problem. The VoIP ports of two devices cannot connect at all. The intention of the following checklist is that the user goes through it step by step. When a check fails, the user should fix it and proceed with the next step until the VoIP ports are able to connect. 6.1 Check configuration Make sure your configuration is correct. Check all IP releated settings in Director software and on the Connect IP x2 / x8 webpage. VoIP-108: The local IP address, network mask and default gateway are configured in the card property window. The remote IP address (the port you want to connect to) and SIP-ID is configured in the port property window. Connect IP x2 / x8: The local IP address, network mask, default gateway and SIP- IDs are configured on the webpage. It’s not necessary to configure remote ports. VCP-1004: Go to the options page and verify that SIP-username and IP-address of the local interface are set correctly. 6.2 Check IP conflicts Make sure you haven’t got dublicate IP addresses in your network. Make sure that you haven’t got dublicate SIP-IDs on the same device. 6.3 Check Ethernet connection There are several possibilities to check the Ethernet Link. VoIP-108: • Rear card LED at the ethernet connector • LED on the switch/hub/router • EthernetLink in Director VoIP statistic window Connect IP x2 / x8: • LED at the ethernet connector • LED on the switch/hub/router Page 11/15 VCP-1004: • LED of the PC network card • Network interface state in Windows If you haven’t got an ethernet link, swap the cable, swap broken switch, swap broken VoIP card, swap broken VoIP rear card etc. Swap hardware one by one. Do not change multiple things at the same time. 6.4 Ping Ping the other side. Connect a PC to local network and ping the remote IP device. Connect a PC to the remote network and ping the local IP device. If you cannot ping the devices, there’s a problem in the network. It could be an IP routing issue or a broken network switch / hub / router. Some firewalls filter ICMP echo requests (ping). VCP-1004: If you cannot ping the PC, make sure that Pings are not disabled in the windows firewall.
Recommended publications
  • TV Superscan 2 Enhanced Users Guide
    TV Superscan 2 Enhanced Users Guide To Reset the TV SuperScan Unit: 1. Unplug Power from Unit 2. Press & Hold “Select” and “Zoom” buttons at the same time. 3. While holding buttons, plug in power. When red lights on, release the two buttons. 4. If you get some output on the screen press the “Zoom” button once more to complete the reset procedure. © 1998 ADS Technologies. All Rights Reserved First Edition: Revision 1.0 April, 1998 Microsoft, MS-DOS, Windows, and Windows 95 and Windows 98 are registered trademarks of Microsoft Corporation. IBM is a registered trade- mark of International Business Machines, Inc. ADS is a registered trademark of ADS Technologies Inc. ADS Technologies (ADS) makes no warranty of any kind with regard to this material, including but not limited to, the implied warranties of mer- chantability and fitness for a particular purpose. The information furnished within this written document is for information purposes only and is sub- ject to change without notice. ADS Technologies assumes no responsi- bility or liability for any errors or inaccuracies that may appear herein. ADS makes no commitment to update or to keep current information contained within this document. Table of Contents A Letter from the President of ADS . 6 Introduction . 7 System Requirements . 7 Package Contents . 8 Chapter 1 Installation Guide . 9 Installing the Hardware . 11 Connecting to a Desktop Computer . 11 Connecting to a Laptop Computer . 14 Connection Diagrams. 16 Desktop Connection Diagram . 16 Laptop Connection Diagram . 16 Chapter 2 TV Superscan 2 Enhanced . 17 Overview . 19 Menu/Enter Button . 19 Select .
    [Show full text]
  • Know Your Network
    Know Your Network Network Security Assessment Chris McNab CHAPTERChapter 4 4 IP Network Scanning This chapter focuses on the technical execution of IP network scanning. After under- taking initial reconnaissance to identify IP address spaces of interest, network scan- ning builds a clearer picture of accessible hosts and their network services. Network scanning and reconnaissance is the real data gathering exercise of an Internet-based security assessment. The rationale behind IP network scanning is to gain insight into the following elements of a given network: • ICMP message types that generate responses from target hosts • Accessible TCP and UDP network services running on the target hosts • Operating platforms of target hosts and their configuration • Areas of vulnerability within target host IP stack implementations (including sequence number predictability for TCP spoofing and session hijacking) • Configuration of filtering and security systems (including firewalls, border rout- ers, switches, and IDS sensors) Performing both network scanning and reconnaissance tasks paints a clear picture of the network topology and its security mechanisms. Before penetrating the target net- work, further assessment steps involve gathering specific information about the TCP and UDP network services that are running, including their versions and enabled options. ICMP Probing The Internet Control Message Protocol (ICMP) identifies potentially weak and poorly protected networks. ICMP is a short messaging protocol that’s used by sys- tems administrators and end users for continuity testing of networks (e.g., using the ping or traceroute commands). From a network scanning and probing perspective, the following types of ICMP messages are useful: 36 This is the Title of the Book, eMatter Edition Copyright © 2004 O’Reilly & Associates, Inc.
    [Show full text]
  • Surveying Port Scans and Their Detection Methodologies
    Surveying Port Scans and Their Detection Methodologies Monowar H Bhuyan1, D K Bhattacharyya1 and J K Kalita2 1Department of Computer Science & Engineering Tezpur University Napaam, Tezpur, Assam, India 2Department of Computer Science University of Colorado at Colorado Springs CO 80933-7150, USA Email: mhb,dkb @tezu.ernet.in, [email protected] { } Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of IP addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is a very difficult task to recognize instances of malicious port scanning. In general, a port scan may be an instance of a scan by attackers or an instance of a scan by network defenders. In this survey, we present research and development trends in this area. Our presentation includes a discussion of common port scan attacks. We provide a comparison of port scan methods based on type, mode of detection, mechanism used for detection, and other characteristics. This survey also reports on the available datasets and evaluation criteria for port scan detection approaches. Keywords: TCP/IP, UDP, OS fingerprinting, coordinated scanning Received 21 May 2010; revised 23 August 2010 1. INTRODUCTION similar, except that a positive response from the target results in further communication to determine whether The Internet is a complex entity comprised of diverse the target is vulnerable to a particular exploit. As can networks, users, and resources. Most users are oblivious be found in [3], most attacks are preceded by some form to the design of the Internet and its components and of scanning activity, particularly vulnerability scanning.
    [Show full text]
  • Evaluation of Network Port Scanning Tools
    Evaluation of Network Port Scanning Tools Nazar El-Nazeer and Kevin Daimi Department of Mathematics, Computer Science and Software Engineering University of Detroit Mercy, 4001 McNichols Road, Detroit, MI 48221 {elnazen, daimikj}@udmercy.edu ABSTRACT implies protecting data and information from attacks during their transmission from the source to destination. Attackers can detect the vulnerabilities in networks and Neglecting network port scans could result in possibly pose enormous threats in these situations. To unavoidable consequences. Network attackers prevent problems, cryptology provides the most continuously monitor and check communication ports promising measures to deter, prevent, detect, and correct looking for any open port. To protect computers and security violations. networks, computers need to be safeguarded against applications that aren't required by any function To protect computer networks, a number of protection currently in use. To accomplish this, the available ports tasks need to be implemented. These tasks are needed and the applications utilizing them should be to enforce the security for wireless network, electronic determined. This paper attempts to evaluate eight port mail, IP, and at the transport level. Furthermore, these scanning tools based on fifteen criterions. The criteria tasks should efficiently deal with intruders and were reached after fully testing each tool. The malicious software [23]. outcomes of the evaluation process are discussed. Internet and web are tremendously vulnerable to various Keywords attacks. Therefore securing web services is a critical requirement. In particular, security at the transport layer Network Security, Evaluation Criteria, Network must never be overlooked. The subdivision of the Security Tools, Network Port Scanning Internet by the transport layer presents ample outcomes both in the way in which business is performed on the network and with regard to the vulnerability caused by I.
    [Show full text]
  • Scanning and Enumeration Tools
    SCANNING AND ENUMERATION TOOLS Barbagallo Valerio Da Lozzo Valerio Mellini Giampiero UNIX Windows Host Port OS Anonimity Tool TCP scan UDP scan DOS discovery scanner fingerprinting level x SATAN x x x x Medium x SARA x x x Medium x Nessus x x x x Medium Advanced IP x x x Medium scanner Advanced port x x x Medium scanner x Strobe x x x Medium x Udp_scan x x x Low x Netcat x x x x Low x Xprobe x x x Low SoftPerfect x Network x x x Low Scanner Angry IP x x x x Low Scanner GFI LANGuard x x x x x Low Network Scanner x Superscan x x x x Medium Scanmetender x x x x x Medium Standard There are many software able to scan networks and used for different aims. They are used by white hat hackers to test the network security, but they can also be used by black hat hackers whose intention is to penetrate the target machine/organization. In this paper we describe some of these tools. Strobe Strobe was the port scanner that Fyodor preferred, before he developed Nmap. This dated tool permit to optimize the use of the systems' resources and networks, so to make the system's scan in efficient way. It's a TCP scanner, but it doesn’t own any UDP scan functionality. This is the output of a test with Strobe. giampiero@mellini:~/Desktop/strobe$ ./strobe localhost strobe 1.03 (c) 1995 Julian Assange ([email protected]). localhost http 80/tcp www www-http World Wide Web HTTP localhost www 80/tcp World Wide Web HTTP [TXL] localhost unknown 631/tcp unassigned localhost unknown 2207/tcp unassigned localhost unknown 2208/tcp unassigned localhost unknown 5900/tcp unassigned localhost unknown 7144/tcp unassigned localhost unknown 7145/tcp unassigned localhost unknown 62343/tcp unassigned Udp_scan Since Strobe is limited to TCP scanner, another tool very useful is Udp_scan, which allows you to perform the scanner through UDP protocol.
    [Show full text]
  • Netcat, Superscan, Winscan
    IEEE Globecom 2011 Information Warfare Tom Chen Swansea University Wales, UK [email protected] Outline • Background - Definitions; actors; targets; historical cases • Attack techniques - Reconnaissance; intrusions; stealth; persistent control; DDoS • Defense techniques - Deterrence; prevention; detection; attribution; intrusion tolerance; self healing • Open research issues • Conclusions and future directions TC/Globecom2011/12-9-11 p. 2 Background TC/Globecom2011/12-9-11 p. 3 Section Outline • Definitions • Actors • Targets • Historical cases TC/Globecom2011/12-9-11 p. 4 Definitions • Info. warfare (or cyber warfare): military or political conflicts between nations carried out through computer networks - Actions to adversely affect enemy’s info. and info. systems while defending own - Information is both target and means for gaining advantage (in support of military/political goals) - Definitions vary, e.g., U.S. DoD defines broadly: “operations directed against information in any form, transmitted over any media, including operations against information content, its supporting systems and software, the physical hardware device that stores the data or instructions, and also human practices and perceptions” TC/Globecom2011/12-9-11 p. 5 DoD Definitions Info. Operations Broad (info. warfare) definition Psychological Military Operations Computer Electronic operations deception security network warfare Propaganda Weapon hiding, Classified operations Radio Examples: leaflets target decoys info. (CNO) jamming *Definition here Computer Computer Computer network network network exploitation/ attack (CNA) defense (CND) espionage (CNE) DDoS, Firewalls, Backdoors, malware IDS data theft TC/Globecom2011/12-9-11 p. 6 Recognition as Warfare Domain • U.S. DoD Strategy for Operating in Cyberspace (July 2011) recognizes cyberspace as 5th operational domain (with sea, air, land, space) “Potential U.S.
    [Show full text]
  • A Descriptive Study of Active Scanning & Reconnaissance Tools
    IARJSET ISSN (Online) 2393-8021 ISSN (Print) 2394-1588 International Advanced Research Journal in Science, Engineering and Technology Vol. 3, Issue 4, April 2016 A Descriptive study of Active Scanning & Reconnaissance tools Manjit Kaur1, Gurpreet Kaur2, Er. Gurjot Singh3 Post Graduate, P.G. Department of Computer Science & Applications, K.M.V., Jalandhar, Punjab, India 1,2 Asstt. Prof., P.G. Department of Computer Science & Applications, K.M.V., Jalandhar, Punjab, India 3 Abstract: Scanning is a skilled of pinpointing active and communicable system via internet. It makes use of assorted approaches such as operating system identification and port scanning to be aware of various services which are solicited by the system. It offers us information concerning the TCP/UDP services which are active on each discovered system, architecture of the system, type of operating system etc. Today, there is a constant increase in the number of automated scanners which further provides a path for the successful set up of attacks. A part scanner is a piece of software framed to rummage a network for open ports. This is commonly used by administrators to keep an eye on the security of their networks and by hackers to compromise it. Programs make use of ports to see and acknowledge the out of doors world. Viruses now have inbuilt port scanners that rummage the internet searching for unsuspecting computers with open ports, when they discover them, they cripple our software or worse, stay hidden and report our secret activity and subject matter to another system. In this paper, we have studied the detailing of ports, relative services running on particular ports and also extend the critical subject matter concerning port scanning tools.
    [Show full text]
  • Certified Ethical Hacker Module 3
    Determines the Remote Host OS Diferent Vendors implement TCP diferently Based Upon Reply determines OS Special crafted packets sent Active Stack Fingerprinting NMap uses 8 tests And look at the responses Rather than send packets to the host Captures trafc coming from the host Types of Fingerprinting Fingerprinting What is the TTL on the outbound packet? TTL What is the TCP Window Size? Window Size Passive Fingerprinting Mainly four areas Does the OS set the Don't Fragment bit? DF If so, what is it? Is a Type of Service set? TOS If ICMP is blocked To determine live hosts Next step after ICMP discovery fails To identify potential ports for These ports are the basis of the next attack stages furthering the attacks Why? To understand what applications are running on the ports To discover the OS Sent from client SYN Sent from server SYN/ACK TCP Three Way Handshake Sent from client ACK Not UDP ONLY TCP Discovers services Most popular Potential targets run many services reconnaissance technique Finds potential vulnerabilities Also known as a TCP Connect Scan Also known as a Vanilla scan Full connection is opened to the target SYN SYN/ACK Uses three way handshake ACK Open scan Easy to detect Easy to block Problems Cannot be spoofed Provides great information Best scan for Benefits determining port state Difers from the full connect scan SYN SYN/ACK Three way handshake is not completed Motivation and Study Techniques to help RST is sent to tear down the connection Cisco RST you learn, remember, and pass your CISSP Connection is never established technical exams! Half-open scan CEH Sophisticated IDS and Firewalls can now detect these More coming soon..
    [Show full text]
  • Chapter Gathering Target Information: Reconnaissance, Footprinting, And
    Chapter Gathering Target Information: 2 Reconnaissance, Footprinting, and Social Engineering CEH EXAM OBJectiVes COVereD IN This CHAPter: ÛÛDefine the term footprinting ÛÛDescribe information-gathering methodology ÛÛDescribe competitive intelligence ÛÛUnderstand DNS enumeration ÛÛUnderstand Whois, ARIN lookup ÛÛIdentify different types of DNS records ÛÛUnderstand how traceroute is used in footprinting ÛÛUnderstand how email tracking works ÛÛUnderstand how web spiders work ÛÛWhat is social engineering? ÛÛWhat are the common types of attacks? ÛÛUnderstand dumpster diving ÛÛUnderstand reverse social engineering 525203c02.indd 31 3/18/10 6:48:05 AM ÛÛUnderstand insider attacks ÛÛUnderstand identity theft ÛÛDescribe phishing attacks ÛÛUnderstand online scams ÛÛUnderstand URL obfuscation ÛÛSocial-engineering countermeasures 525203c02.indd 32 3/18/10 6:48:06 AM The first step of the hacking process is gathering informa- tion on a target. Information gathering, also known as foot- printing, is the process of gathering all available information about an organization. In the age of the Internet, information is available in bits and pieces from many different sources. Seemingly insignificant bits of information can be enlightening when pieced together—which is the purpose of information gathering. Footprinting can be effective in identifying high- value targets, which is what hackers will be looking for to focus their efforts. A hacker uses information-gathering techniques to determine organizations’ high-value targets, where the most valuable information resides. Not only does information gathering help identify where the information is located, but it also helps determine the best way to gain access to the targets. This information can then be used to identify and eventually hack target systems. Many people jump right into running hacking tools, but information gather- ing is critical in minimizing the chance of detection and assessing where to spend the most time and effort.
    [Show full text]
  • Enumeration Module 04 Enumeration
    CEH Lab Manual Enumeration Module 04 Enumeration E num eration is the process o f extracting usernam es, m achine names, netirork Enum eration is conducted in an־ . resources, shares, and services fro m a system intranet environm ent. ICON KEY Lab Scenario / Valuable Penetration testing is much more than just running exploits against vulnerable information systems like we learned 111 the previous module. 111 fact a penetration test begins .Test your before penetration testers have even made contact with the victim systems ״ y knowledge As an expert ethical hacker and penetration tester you must know how to — Web exercise enumerate target networks and extract lists of computers, user names, user m Workbook review groups, ports, operating systems, machine names, network resources, and services using various enumeration techniques. Lab Objectives The objective of tins lab is to provide expert knowledge 011 network enumeration and other responsibilities that include: ■ User name and user groups ■ Lists of computers, their operating systems, and ports ■ Machine names, network resources, and services ■ Lists of shares 011 individual hosts 011 the network ■ Policies and passwords & Tools Lab Environment demonstrated in :out die lab, you need ־this lab are To earn available in ■ Windows Server 2012 as host machine D:\CEH- Tools\CEHv8 ■ Windows Server 2008, Windows 8 and Windows 7 as virtual machine Module 04 ■ A web browser with an Internet connection Enumeration ■ Administrative privileges to mil tools Lab Duration Time: 60 Minutes Overview of Enumeration Enumeration is the process of extracting user names, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted 111 an intranet environment.
    [Show full text]
  • NIST SP 800-115, Technical Guide to Information Security Testing and Assessment
    Special Publication 800-115 Technical Guide to Information Security Testing and Assessment Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya Amanda Cody Angela Orebaugh NIST Special Publication 800-115 Technical Guide to Information Security Testing and Assessment Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya Amanda Cody Angela Orebaugh C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 September 2008 U.S. Department of Commerce Carlos M. Gutierrez, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Deputy Director TECHNICAL GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology (IT). ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-115 Natl. Inst. Stand. Technol. Spec. Publ. 800-115, 80 pages (Sep.
    [Show full text]
  • Chapter Gathering Network and Host Information: Scanning And
    Chapter Gathering Network and Host Information: 3 Scanning and Enumeration CEH EXAM OBJecTIVes COVERED in This CHAPTER: ÛÛDefine the terms port scanning, network scanning, and vulnerability scanning ÛÛUnderstand the CEH scanning methodology ÛÛUnderstand ping sweep techniques ÛÛUnderstand nmap command switches ÛÛUnderstand SYN, stealth, XMAS, NULL, IDLE, and FIN scans ÛÛList TCP communication flag types ÛÛUnderstand war-dialing techniques ÛÛUnderstand banner grabbing and OS fingerprinting techniques ÛÛUnderstand how proxy servers are used in launching an attack ÛÛHow do anonymizers work? ÛÛUnderstand HTTP tunneling techniques ÛÛUnderstand IP spoofing techniques ÛÛWhat is enumeration? ÛÛWhat is meant by null sessions? ÛÛWhat is SNMP enumeration? ÛÛWhat are the steps involved in performing enumeration? 525203c03.indd 63 3/17/10 6:03:20 PM Scanning is the first phase of active hacking and is used to locate target systems or networks for later attack. Enumeration is the follow-on step once scanning is complete and is used to identify computer names, usernames, and shares. Scanning and enumeration are discussed together in this chapter because many hacking tools perform both steps simultaneously. Scanning After the reconnaissance and information-gathering stages have been completed, scanning is performed. It is important that the information-gathering stage be as complete as possi- ble to identify the best location and targets to scan. During scanning, the hacker continues to gather information regarding the network and its individual host systems. Information such as IP addresses, operating system, services, and installed applications can help the hacker determine which type of exploit to use in hacking a system. Scanning is the process of locating systems that are alive and responding on the network.
    [Show full text]