-->

  • All About NTP Enumeration

     



    All About NTP Enumeration



    NTP stands for network time protocol design to synchronise clock of networked computers. NTP can achieve accuracy of 200 million seconds or better in local area networks under ideal condition. NTP can maintain time to within 10 milli seconds ( 1/100 ) over the internet. Ntp based on agent server architecture where agent queries the ntp server and it works on user Dataram Protocol (UDP) and well known Port 123.



    NTP Enumeration



    An attacker can eliminate the following information by querying NTP server.

    1) List of hosts connected to the NTP server.
    2) internal client IP addresses, host name and operating systems used.


     

    NTP Enumeration Tools



    The following table shows the list of tools to perform NTP enumeration.

    Name the tools and description/wab links



    1) NTP Trace

    Query to determine from the NTP server update its time and tresses the chain of the NTP server from a sources.


    2) ntpdc

    Where is the ntp deamon about its current state and to request changes in the state.


    3) ntpq

    Monitor NTP daemon ntpd operations and determine performance.


    4) Cisco ntpd packet tracer download

    https://www.computernetworkingnotes.com/ccna-study-guide/download-packet-tracer-for-windows-and-linux.html



    NTP Security Controls



    The following are the security controls to prevent ntp enumeration attack.


    # restrict the uses of NTP and enable the use of NTPsec where possible.

    # filter and the traffic with IPtables.

    # enable logging for the messages and events.




    Disclaimer


     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.
     

  • 0 comments:

    Post a Comment

    For Any Tech Updates, Hacking News, Internet, Computer, Technology and related to IT Field Articles Follow Our Blog.