<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: scan in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916374#M285380</link>
    <description>The thing is because of the way unix is, each individual service may be turned on or off, so it's perfectly possible in extreme cases to have a box running no telnet, ssh or ftp, and only running a "custom app" e.g. oracle - tcpwrappers etc can further stop and checks.  The best you can do is telnet to lots of ports and look for clues, e.g. telnet banners, ftp banners etc.  Or work in reverse.  e.g. deduce it's NOT a windows machine by checking that you can't eg run "nbtstat -A" on it, so it's "more than likely" a UNIX/Linux device.&lt;BR /&gt;&lt;BR /&gt;But ultimately if someone is being "rogue" on your network and wants to be undetectable, they can just lock down their incoming traffic and you'll pick up no clues.</description>
    <pubDate>Thu, 21 Dec 2006 08:16:53 GMT</pubDate>
    <dc:creator>Simon Hargrave</dc:creator>
    <dc:date>2006-12-21T08:16:53Z</dc:date>
    <item>
      <title>scan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916373#M285379</link>
      <description>When scanning for rogue devices on the network its easy to identify a windows machine because they all use a specific port.&lt;BR /&gt;&lt;BR /&gt;Is there anyway to easily identify a UNIX system on the network while scanning?&lt;BR /&gt;&lt;BR /&gt;Thanks.</description>
      <pubDate>Thu, 21 Dec 2006 08:12:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916373#M285379</guid>
      <dc:creator>Nobody's Hero</dc:creator>
      <dc:date>2006-12-21T08:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: scan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916374#M285380</link>
      <description>The thing is because of the way unix is, each individual service may be turned on or off, so it's perfectly possible in extreme cases to have a box running no telnet, ssh or ftp, and only running a "custom app" e.g. oracle - tcpwrappers etc can further stop and checks.  The best you can do is telnet to lots of ports and look for clues, e.g. telnet banners, ftp banners etc.  Or work in reverse.  e.g. deduce it's NOT a windows machine by checking that you can't eg run "nbtstat -A" on it, so it's "more than likely" a UNIX/Linux device.&lt;BR /&gt;&lt;BR /&gt;But ultimately if someone is being "rogue" on your network and wants to be undetectable, they can just lock down their incoming traffic and you'll pick up no clues.</description>
      <pubDate>Thu, 21 Dec 2006 08:16:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916374#M285380</guid>
      <dc:creator>Simon Hargrave</dc:creator>
      <dc:date>2006-12-21T08:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: scan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916375#M285381</link>
      <description>Yes, the gov't locks down ftp, telnet and all other non-secure methods of transmission. very tight.&lt;BR /&gt;&lt;BR /&gt;still trying to figure how I can identify without using conventional connection commands. thanks for the reply, it helps.</description>
      <pubDate>Thu, 21 Dec 2006 08:19:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916375#M285381</guid>
      <dc:creator>Nobody's Hero</dc:creator>
      <dc:date>2006-12-21T08:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: scan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916376#M285382</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;When scanning for rogue devices on the network its easy to identify a windows machine because they all use a specific port.&lt;BR /&gt;&lt;BR /&gt;Not true. Windows boxes are almost as flexible and an use any port or service the network permits.&lt;BR /&gt;&lt;BR /&gt;In a high scurity environment you may wish to limit what ports your routers permit traffic on.&lt;BR /&gt;&lt;BR /&gt;Note that the linux port scanner nmap will identify machines on any port on the network if the service is open. In combination with tcpdump, you can spot any mac address that does not belong.&lt;BR /&gt;&lt;BR /&gt;Linux is pretty handy for security, though nmap is available for HP-UX.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 21 Dec 2006 08:22:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916376#M285382</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2006-12-21T08:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: scan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916377#M285383</link>
      <description>Good point about MAC addresses.  One thing you can do, if you have the mac address of a "suspect" device (eg in your arp cache), then you can run it through a MAC-address decoder such as this: -&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.techzoom.net/nettools-macdecode.asp" target="_blank"&gt;http://www.techzoom.net/nettools-macdecode.asp&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This will show you the manufacturer of the card (the first few digits of a mac address are specific to manufacturers).  From this you may be able to determine the machine, for example if it's Sun it's pretty certain to be UNIX, if it's Compaq it's likely to be either Windows or Linux (which you can determine by elimination).  If it's eg Cisco, Belkin etc you'll see it's a network device.&lt;BR /&gt;&lt;BR /&gt;Not conclusive, but another piece of information - you need to use many such pieces of information to build a picture of what you're dealing with.</description>
      <pubDate>Thu, 21 Dec 2006 08:31:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916377#M285383</guid>
      <dc:creator>Simon Hargrave</dc:creator>
      <dc:date>2006-12-21T08:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: scan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916378#M285384</link>
      <description>Not reliably. A good system administrator will shutoff all network ports except those required for system operation -- which might be a single ssh port, and even then, that same sysadmin will use a non-standard port for ssh.&lt;BR /&gt; &lt;BR /&gt;On the other hand, out of the box, most Unix systems have dozens of ports activated. Those unique to Unix systems would be (archaic) ports for:&lt;BR /&gt; &lt;BR /&gt;echo           7/tcp&lt;BR /&gt;echo           7/udp &lt;BR /&gt;discard        9/tcp &lt;BR /&gt;discard        9/udp &lt;BR /&gt;daytime       13/tcp&lt;BR /&gt;daytime       13/udp &lt;BR /&gt;chargen       19/tcp &lt;BR /&gt;chargen       19/udp &lt;BR /&gt;time          37/tcp&lt;BR /&gt;finger        79/tcp&lt;BR /&gt;who          513/udp&lt;BR /&gt;talk         517/udp&lt;BR /&gt;ntalk        518/udp &lt;BR /&gt; &lt;BR /&gt;Depending on whether the rogue machine is just an experiment or a possible stealth attack on your network, these services may or may not be running. Looking for telnet (port 23) is also a possibility -- PCs usually don't listen on that port.</description>
      <pubDate>Thu, 21 Dec 2006 08:35:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916378#M285384</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2006-12-21T08:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: scan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916379#M285385</link>
      <description>At this time, almost every OS has firewall enabled in default and shouldn't allow the remote scan as old days. Even can't scan XP to get the OS information. &lt;BR /&gt;&lt;BR /&gt;Of cause you can still try nmap -O option to activate remote host identification via tcp/tp fingerprinting.</description>
      <pubDate>Thu, 21 Dec 2006 08:59:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916379#M285385</guid>
      <dc:creator>George Liu_4</dc:creator>
      <dc:date>2006-12-21T08:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: scan</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916380#M285386</link>
      <description>Instead of looking at ports, look at the packets the machines send. &lt;BR /&gt;&lt;BR /&gt;If you are scanning, nmap should have an active finger print detection.&lt;BR /&gt;&lt;BR /&gt;If you are quietly monitoring the network, check out p0f, passive finger printing.  Most operating systems have signatures on how they craft ip packets. SAN.org has a paper on this at &lt;A href="http://www.sans.org/resources/idfaq/p0f.php." target="_blank"&gt;http://www.sans.org/resources/idfaq/p0f.php.&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 23 Aug 2007 09:31:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/scan/m-p/3916380#M285386</guid>
      <dc:creator>Fred K. Abell Jr._1</dc:creator>
      <dc:date>2007-08-23T09:31:20Z</dc:date>
    </item>
  </channel>
</rss>

