Port scanner

From Wikipedia, the free encyclopedia - View original article

 
Jump to: navigation, search

A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host with the view to compromise it.

A port scan or portscan can be defined as an attack that sends client requests to a range of server port addresses on a host, with the goal of finding an active port and exploiting a known vulnerability of that service.,[1] although the majority of uses of a port scan are not attacks and are simple probes to determine services available on a remote machine.

To portsweep is to scan multiple hosts for a specific listening port. The latter is typically used in searching for a specific service, for example, an SQL-based computer worm may portsweep looking for hosts listening on TCP port 1433.[2]

Contents

TCP/IP basic knowledge

The design and operation of the Internet is based on the Internet Protocol Suite, commonly also called TCP/IP. In this system, hosts and host services are referenced using two components: an address and a port number. There are 65536 distinct and usable port numbers. Most services use a limited range of numbers.

Some port scanners scan only the most common port numbers, or ports most commonly associated with vulnerable services, on a given host. See: List of TCP and UDP port numbers.

The result of a scan on a port is usually generalized into one of three categories:

  1. Open or Accepted: The host sent a reply indicating that a service is listening on the port.
  2. Closed or Denied or Not Listening: The host sent a reply indicating that connections will be denied to the port.
  3. Filtered, Dropped or Blocked: There was no reply from the host.

Open ports present two vulnerabilities of which administrators must be wary:

  1. Security and stability concerns associated with the program responsible for delivering the service - Open ports.
  2. Security and stability concerns associated with the operating system that is running on the host - Open or Closed ports.

Filtered ports do not tend to present vulnerabilities.

Port scanning assumptions

All forms of port scanning rely on the assumption that the targeted host is compliant with RFC 793 - Transmission Control Protocol. Although it is the case most of the time, there is still a chance a host might send back strange packets or even generate false positives when the TCP/IP stack of the host is non-RFC-compliant or has been altered. This is especially true for less common scan techniques that are OS-dependent (FIN scanning, for example).[3] The TCP/IP stack fingerprinting method also relies on these kind of different network responses from a specific stimulus to guess the type of the operating system the host is running.

Port scanning types

TCP scanning

The simplest port scanners use the operating system's network functions and is generally the next option to go to when SYN is not a feasible option (described next). Nmap calls this mode connect scan, named after the Unix connect() system call. If a port is open, the operating system completes the TCP three-way handshake, and the port scanner immediately closes the connection to avoid performing a kind of Denial-of-service attack.[3] Otherwise an error code is returned. This scan mode has the advantage that the user does not require special privileges. However, using the OS network functions prevents low-level control, so this scan type is less common. This method is "noisy", particularly if it is a "portsweep": the services can log the sender IP address and Intrusion detection systems can raise an alarm.

SYN scanning

SYN scan is another form of TCP scanning. Rather than use the operating system's network functions, the port scanner generates raw IP packets itself, and monitors for responses. This scan type is also known as "half-open scanning", because it never actually opens a full TCP connection. The port scanner generates a SYN packet. If the target port is open, it will respond with a SYN-ACK packet. The scanner host responds with a RST packet, closing the connection before the handshake is completed.[3]

The use of raw networking has several advantages, giving the scanner full control of the packets sent and the timeout for responses, and allowing detailed reporting of the responses. There is debate over which scan is less intrusive on the target host. SYN scan has the advantage that the individual services never actually receive a connection. However, the RST during the handshake can cause problems for some network stacks, in particular simple devices like printers. There are no conclusive arguments either way.

UDP scanning

UDP scanning is also possible, although there are technical challenges. UDP is a connectionless protocol so there is no equivalent to a TCP SYN packet. However, if a UDP packet is sent to a port that is not open, the system will respond with an ICMP port unreachable message. Most UDP port scanners use this scanning method, and use the absence of a response to infer that a port is open. However, if a port is blocked by a firewall, this method will falsely report that the port is open. If the port unreachable message is blocked, all ports will appear open. This method is also affected by ICMP rate limiting.[4]

An alternative approach is to send application-specific UDP packets, hoping to generate an application layer response. For example, sending a DNS query to port 53 will result in a response, if a DNS server is present. This method is much more reliable at identifying open ports. However, it is limited to scanning ports for which an application specific probe packet is available. Some tools (e.g., nmap) generally have probes for less than 20 UDP services, while some commercial tools (e.g., nessus) have as many as 70. In some cases, a service may be listening on the port, but configured not to respond to the particular probe packet.

To cope with the different limitations of each approach, some scanners offer a hybrid method. For example, using nmap with the -sUV option will start by using the ICMP port unreachable method, marking all ports as either "closed" or "open|filtered". The open|filtered ports are then probed for application responses and marked as "open" if one is received.

ACK scanning

ACK scanning is one of the more unique scan types, as it does not exactly determine whether the port is open or closed, but whether the port is filtered or unfiltered. This is especially good when attempting to probe for the existence of a firewall and its rulesets. Simple packet filtering will allow established connections (packets with the ACK bit set), whereas a more sophisticated stateful firewall might not.[5]

Window scanning

Rarely used because of its outdated nature, window scanning is fairly untrustworthy in determining whether a port is opened or closed. It generates the same packet as an ACK scan, but checks whether the window field of the packet has been modified. When the packet reaches its destination, a design flaw attempts to create a window size for the packet if the port is open, flagging the window field of the packet with 1's before it returns to the sender. Using this scanning technique with systems that no longer support this implementation returns 0's for the window field, labeling open ports as closed.[6]

FIN scanning

Since SYN scans are not surreptitious enough, firewalls are, in general, scanning for and blocking packets in the form of SYN packets.[3] FIN packets are able to pass by firewalls with no modification to its purpose. Closed ports reply to a FIN packet with the appropriate RST packet, whereas open ports ignore the packet on hand. This is typical behavior due to the nature of TCP, and is in some ways an inescapable downfall.[7]

Other scan types

Some more unusual scan types exist. These have various limitations and are not widely used. Nmap supports most of these.[5]

Port filtering by ISPs

Many Internet service providers restrict their customers' ability to perform port scans to destinations outside of their home networks. This is usually covered in the terms of service or acceptable use policy to which the customer must agree.[8][9] Some ISPs implement packet filters or transparent proxies that prevent outgoing service requests to certain ports. For example, if an ISP provides a transparent HTTP proxy on port 80, port scans of any address will appear to have port 80 open, regardless of target host's actual configuration.

Ethics

The information gathered by a port scan has many legitimate uses including network inventory and the verification of the security of a network. Port scanning can, however, also be used to compromise security. Many exploits rely upon port scans to find open ports and send specific data patterns in an attempt to trigger a condition known as a buffer overflow. Such behavior can compromise the security of a network and the computers therein, resulting in the loss or exposure of sensitive information and the ability to do work.[3]

The threat level caused by a port scan can vary greatly according to the method used to scan, the kind of port scanned, its number, the value of the targeted host and the administrator who monitors the host. But a port scan is often viewed as a first step for an attack, therefore considered seriously because it can disclose much sensitive information about the host[10] Despite this, the probability of a port scan alone followed by a real attack is small. The probability of an attack is much higher when the port scan is associated with a vulnerability scan.[11]

Legal implications

Because of the inherently open and decentralized architecture of the Internet, lawmakers have struggled since its creation to define legal boundaries that permit effective prosecution of cybercriminals. Cases involving port scanning activities are an example of the difficulties encountered in judging violations. Although these cases are rare, most of the time the legal process involves proving that an intent to commit a break-in or unauthorized access existed, rather than just the performance of a port scan:

In 2006, the UK Parliament had voted an amendment to the Computer Misuse Act 1990 that proves guilty a person who "makes, adapts, supplies or offers to supply any article knowing that it is designed or adapted for use in the course of or in connection with an offence under section 1 or 3 [of the CMA]".[15] Nevertheless, the area of effect of this amendment is blurred, and widely criticized by Security experts as such.[16]

Germany, with the Strafgesetzbuch § 202a,b,c has also a similar law, and the Council of the European Union has issued a press release stating they plan to pass a similar one too, albeit more precise.[17]

See also

References

  1. ^ RFC 2828 Internet Security Glossary
  2. ^ http://support.microsoft.com/kb/313418
  3. ^ a b c d e f Erikson, Jon (1977) HACKING the art of exploitation (2nd ed.) San Francisco: NoStarch Press p. 264 ISBN 1-59327-144-1 
  4. ^ Messer, James (2007) Secrets of Network Cartography: A Comprehensive Guide to Nmap (2nd ed.) http://www.networkuptime.com/nmap/page3-10.shtml. Retrieved 2011-12-05 
  5. ^ a b "Port Scanning Techniques". Nmap reference guide. 2001. http://nmap.org/man/man-port-scanning-techniques.html. Retrieved 2009-05-07. 
  6. ^ Messer, James (2007) Secrets of Network Cartography: A Comprehensive Guide to Nmap (2nd ed.) http://www.networkuptime.com/nmap/page3-13.shtml. Retrieved 2011-12-05 
  7. ^ Maimon, Uriel (1996-11-08). "Port Scanning without the SYN flag". Phrack issue 49. http://www.phrack.com/issues.html?issue=49&id=15. Retrieved 2009-05-08. 
  8. ^ "Comcast Acceptable Use Policy". Comcast. 2009-01-01. http://www.comcast.net/terms/use/. Retrieved 2009-05-07. 
  9. ^ "BigPond Customer Terms". Telstra. 2008-11-06. http://www.telstra.com.au/customerterms/docs/bp_part_a.pdf. Retrieved 2009-05-08. [dead link]
  10. ^ .Jamieson, Shaun (2001-10-08). "The Ethics and Legality of Port Scanning". SANS. http://www.sans.org/rr/whitepapers/legal/71.php. Retrieved 2009-05-08. 
  11. ^ Cukier, Michel (2005). "Quantifying Computer Security". University of Maryland. http://www.isr.umd.edu/research/research_briefs/Cukier_QuantCompSecurity.pdf. Retrieved 2009-05-08. 
  12. ^ Hon. Abraham N. Tennenbaum (2004-02-29). "Verdict in the case Avi Mizrahi vs. Israeli Police Department of Prosecution". http://www.law.co.il/media/computer-law/mizrachi_en.pdf. Retrieved 2009-05-08. 
  13. ^ Esa Halmari (2003). "First ruling by the Supreme Court of Finland on attempted break-in". http://insecure.org/stf/fin.html. Retrieved 2009-05-07. 
  14. ^ Poulsen, Kevin (2000-12-18). "Port scans legal, judge says". SecurityFocus. http://www.securityfocus.com/news/126. Retrieved 2009-05-08. 
  15. ^ UK Parliament (2006-01-25). "Police and Justice Bill - Bill 119". UK Parliament. http://www.publications.parliament.uk/pa/cm200506/cmbills/119/06119.27-33.html#j383A. Retrieved 2011-12-05. 
  16. ^ Leyden, John (2008-01-02). "UK gov sets rules for hacker tool ban". The Register. http://www.theregister.co.uk/2008/01/02/hacker_toll_ban_guidance/. Retrieved 2009-05-08. 
  17. ^ "3096th Council meeting Press Release". Council of the European Union. 2011-06-10. http://www.consilium.europa.eu/uedocs/cms_data/docs/pressdata/en/jha/122516.pdf. Retrieved 2011-12-05. 

External links

Port list
Papers