Quantcast
Channel: Pax Pentest » Nmap
Viewing all articles
Browse latest Browse all 47

Detecting Nmap ARP Scan (-PR) in Wireshark

$
0
0

This is the first in a series of posts looking at detecting Nmap scans in Wireshark. I’m being guided by Chapter 31 of Wireshark Network Analysis entitled: “Detect Scanning and Discovery processes“.

The book Nmap Network Scanning has this to say about the ARP Scan:

One of the most common Nmap usage scenarios is to scan an ethernet LAN.

[....]

Nmap issues raw ARP requests and handles retransmission and timeout periods at its own discretion.

And the above Wireshark book:

The disadvantage of uing an ARP scan is that the ARP traffic can’t get through a router or any layer 3 device. The advantage of running and ARP scan is that you can discover local devices that may be hidden from other discovery methods by a firewall. If the firewall blocks ICMP-based pings, you can use an ARP scan to discover the device. You cannot disable ARP responses – that would break the TCP/IP communications system.

Keep in mind that ARP scans will not cross a router. If you detect an ARP scan taking place, the source will be on the same network you are capturing traffic on.

OK, I performed the following Nmap ARP scan on my hacking lab:

~# nmap -PR 192.168.1.79

Starting Nmap 6.25 ( http://nmap.org ) at 2013-08-08 12:15 BST
Nmap scan report for lab.home (192.168.1.79)
Host is up (0.052s latency).
Not shown: 949 closed ports, 41 filtered ports
PORT STATE SERVICE
21/tcp open ftp
25/tcp open smtp
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
912/tcp open apex-mesh
1025/tcp open NFS-or-IIS
1433/tcp open ms-sql-s
MAC Address: 00:0C:76:17:A4:17 (Micro-star International CO.)

Nmap done: 1 IP address (1 host up) scanned in 2.23 seconds

I observed in Wireshark and the only indication of the scan were the ARP requests:

arp_scan

The Wireshark book notes: “Common ARP scan processes send ARP requests to broadcast MAC address 0xff:ff:ff:ff:ff:ff”, this was proved correct on analysing one of the ARP packets:

arp_packet


Viewing all articles
Browse latest Browse all 47

Trending Articles