Ping Sweeps and Port Scans

829 Words4 Pages
Case Study For any business ping sweeps and port scans could be a huge security threat if they continue unnoticed. Ping sweeps are performed to find end points on a network. Then a port scan is performed to find an open door into that particular end point or end points. After that anyone can find all kinds of utilities on the internet to exploit these open doors on systems and gain access to important and confidential files on the network. It’s imperative that we not only protect against these types of activities on the network, but that we also conduct them ourselves. Ping sweeps are what they sound like. They’re a regular ping that almost anyone in the IT field uses as a basic troubleshooting step but, they are conducted across an entire range of addresses. Whereas a normal administrator would only ping one or two destinations, a malicious user may conduct a ping sweep to find every endpoint on a network that they are allowed a connection to. Most utilities that perform this operation can also perform a DNS lookup on all the IP addresses as well to produce the end points names. When a malicious user has this information, they can review it to find a machine that may seem important, or they may just skip right to a direct attack on a random machine. Either way the attacker now has a basic knowledge of what they need to start forming an attack against. Take a second to think, you’re a robber that wants to rob a home in a neighborhood. You don’t want to just drive to an address in hopes that it is there. As this robber you would want to case the neighborhood to see what is there and what is not. This would also help you to decide what houses would be worth the risk and which would not, all by what is seen on the outside. This is basically what a ping sweep is. It passes through every address on the network, figuring out who’s

More about Ping Sweeps and Port Scans

Open Document