IT-Sichereitsaspekte in heterognen Netzwerken

Aus xinux.net
Zur Navigation springen Zur Suche springen

T ECHNISCHE G RUNDLAGEN ....................................................SCHACHSTELL...................................................................... 20 WLAN-K OMPONENTEN .............................................................................................................................. 21 WLAN-S ICHERHEIT .................................................................................................................................... 22 KAPITEL 5 NETZWERK-TOOLS....................................................................................................................24 5.1 N ETZWERK -T OOLS UNTER W INDOWS ............................................................................................................. 25 5.1.1 ARP ................................................................................................................................................ 25 5.1.2 Hostname ...................................................................................................................................... 27 5.1.3 Ipconfig .......................................................................................................................................... 27 5.1.4 NBTSTAT ........................................................................................................................................ 30 5.1.5 netstat, .......................................................................................................................................... 31 5.1.6 nslookup ........................................................................................................................................ 33 5.1.7 ping und pathping.......................................................................................................................... 34 5.1.8 traceroute/tracert.......................................................................................................................... 35 5.2 N ETZWERK -T OOLS UNTER L INUX ................................................................................................................... 36 5.2.1 ifconfig. .......................................................................................................................................... 36 5.2.2 route .............................................................................................................................................. 36 5.2.3 ping ................................................................................................................................................ 37 5.2.4 traceroute ...................................................................................................................................... 37 5.2.5 netstat ........................................................................................................................................... 37 5.2.6 telnet .............................................................................................................................................. 38 5.2.7 hping3 ............................................................................................................................................ 39 5.2.8 tcpdump ......................................................................................................................................... 39 P LATTFORM - ÜBERGREIFENDE T OOLS .......................................................................................................................... 39 5.2.9 nmap (zenmap) .............................................................................................................................. 39 5.2.10 wireshark ....................................................................................................................................... 39 Notizen .......................................................................................................................................................... 41 KAPITEL 6 PORTSCANNING (NMAP) ..........................................................................................................43 6.1 W AS IST EIGENTLICH P ORTSCANNING ? ............................................................................................................ 43 6.2 D ER S ICHERHEITSSCANNER N MAP .................................................................................................................. 43 6.2.1 Nmap Grundlagen: Port-Zustände ................................................................................................. 44