20.1. What Can Network Scanning Reveal?

The extent of the information a hacker can learn about your network depends on several factors, including how many devices, of what types, and using which operating systems, are on the network; whether you use a NAT router; whether your computers are running firewall software and, if so, how the firewalls are configured; and whether the scan is being performed from inside your network or from the outside. However, in general, the following pieces of data about each device on your network — computers, routers, printers, iPhones, and so on — are potentially up for grabs:

  • The device's (private and/or public) IP address

  • The MAC address and manufacturer of the device

  • Whether the device supports IPv4, IPv6, or both

  • The date and time the device was last restarted

  • The device's operating system (type and version)

  • Which ports are open on the device and which are being filtered or blocked

  • Which application is listening on each open port

For example, as I type this paragraph, I'm sitting in a library, using its Wi-Fi network, and a few moments ago, I performed a network scan as I describe ahead. I can see a half-dozen other patrons with laptops open, and I can tell just by looking which models some of them are. By cross-referencing what my eyes tell me with what my network scan tells me, I know that the guy over there with the beard and the headphones, with a white MacBook in front of him, has SMB file sharing turned on and is still using last week's version ...

Get Mac® Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.