Network Security. Network Scanning
|
|
|
- Alvin Wilkinson
- 10 years ago
- Views:
Transcription
1 Network Security Network Scanning Module 2 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1
2 Network Scanning Definition: Sending packets configured to evoke a response from the target system; the result or lack of result is used to infer the configuration of the target. 2
3 Overview Scanning What, Why and Where Considerations nmap and other tools nmap features host discovery port states scan types output Exercises 3
4 Why scan? Network scanning is useful in determining the devices that exist in a network: Desktops, servers, laptops Routers, managed switches, firewalls Wireless access points Network monitoring and log collection systems Network printers and print servers IP-accessible CD-ROM drive arrays ipod Touch, iphone, Zune devices Apple Time Capsules and Airport Expresses Roku, Tivo, MythTV, Wii, Xbox, PlayStation Building and Access Management, IP cameras 4
5 Why scan? Network scanning is useful to determine what services exist on a network: File services (CIFS, SMB, Appletalk, NFS, FTP) Infrastructure (DHCP, DNS, Bootp, TFTP, SNMP) Authentication (AD services, LDAP, Kerberos) Remote Access (VPN, SSH, Remote Desktop) Printer and Scanner Sharing Web-based interfaces (printers, firewalls, WAPs) Peer-to-Peer file sharing Network game servers Backdoors 5
6 What do we scan? Specific systems Examine new systems placed on the network Verify network service configuration Re-check network service configuration Examine existing systems for changes in config Network segments Scan all systems on specific networks (lab, classroom, admin, test networks, DMZ) Scan the entire network space to look for rogue systems 6
7 From where do we scan? The position from which you scan can change the results Firewalls From inside, you will see more information From outside, you should see very little Routers w/acls If you are not scanning across ACLs, you will see more Scanning from multiple positions in the network will give you a better picture of the network security configuration 7
8 Things to Consider Network scanning can harm your network At least temporarily... Older systems may crash or hang Building management systems may do weird stuff The network performance may be impacted Network devices may drop packets Systems may generate significant amounts of log messages ID systems should be alerting when scans occur You probably shouldn t be scanning at peak times of network operation 8
9 Tools Available nmap, version 5 ipod Touch / iphone tools Net Scan ($0.99) inet ($3.99) Network Utility (Pro version: $0.99) iportscan PRO ($0.99) Portscan ($1.99) Mac: Network Utility application hping3 BackTrack bundled tools 9
10 nmap features multiple host discovery methods multiple scan methods service and version detection OS detection intrusion detection evasion techniques setting source port (20, 53, 67, 88), randomization performance tuning scripting engine runtime feedback multiple output types (txt, XML, l33t, grep) 10
11 nmap interfaces Command line nmap is designed to be used from the CLI all options and modes can be specified Graphical User Interface Zenmap is a GUI interface for nmap There are others but they are older, may not work 11
12 nmap target selection Targets can be IP addresses, hostnames, FQDNs, networks Listed as the last parameters on CLI Examples poly-server.cerias.purdue.edu purdue.edu/ , , / Use -il <file> to read targets from a <file> Use --exclude <host1>[,<host2>,...<hostn>] to exclude specific targets 12
13 nmap host discovery Host discovery is the process of determining what systems are on the network What s the traditional method for determining if a system is on the network? Ping (ICMP, Echo Request) nmap has additional methods 13
14 Ping Example Source Target ICMP Echo Request ICMP Echo Reply 14
15 nmap host discovery Host discovery is necessary to avoid scanning dead IP addresses where no system is responding for that address Proper host discovery can shorten large address range scans Using a UDP echo request (ping) may not be effective if the system s firewall blocks them Other nmap host discovery methods may be necessary 15
16 nmap host discovery Disable ping (-PN) Skips host discovery entirely List scan (-sl) Performs reverse DNS lookup Gets a target list Ping scan (-sp) Reports responding hosts only Uses ping, TCP SYN to port 443, TCP ACK to port 80, ICMP timestamp request to find hosts 16
17 nmap host discovery TCP SYN ping (-PS <portlist>) SYN sent to specified ports (default: 80) Host is up if SYN/ACK or RST received TCP ACK ping (-PA <portlist>) ACK sent to specified ports (default: 80) Host is up if RST received UDP ping (-PU <portlist>) Empty UDP packet sent to specified ports (default: 40125) Host is up if ICMP port unreachable received 17
18 TCP Connection Establishment Source Target SYN SYN+ACK ACK 18
19 SYN Ping Source Target SYN SYN+ACK Target is Up! 19
20 SYN Ping Source Target SYN RST Target is Up! 20
21 SYN Ping Source Target SYN Target is Down 21
22 nmap host discovery SCTP INIT ping (-PY <portlist>) Sends SCTP INIT packet to specified ports (default: 80) Host is up if any response received ICMP ping types (-PE, -PP, -PM) -PE is an echo request -PP is a timestamp request -PM is a address mask request Host is up if any ICMP reply received 22
23 nmap host discovery IP Protocol ping (-PO <protocollist>) Sends a packet with the specified protocol number in the header (default: send packets for ICMP, IGMP, IP-in-IP) Host is up if any response received ARP ping (-PR) Sends an ARP request on the local ethernet network Host is up if any response received Other ping methods are not used 23
24 nmap host discovery Common ports to use in host discovery Windows: TCP/135, UDP/137, UDP/138, TCP/139, TCP&UDP/445, TCP&UDP/ , TCP/3389 UNIX: TCP/21, TCP/22, TCP/23, TCP/25, UDP/53, TCP/80, TCP&UDP/111, UDP/161, UDP/514 Network devices: TCP/22, TCP/23, UDP/53, UDP/ 67-68, TCP/80, TCP/443, UDP/161 Bottom line: Unless your host is blocking standard ICMP pings, you can stick to the default host discovery methods 24
25 nmap port states open Accepts TCP, UDP, SCTP connections closed Responds but no application is listening filtered Little info available to determine actual state Firewalls may be dropping probes unfiltered Port accessible, but state cannot be determined Reported by ACK; other scans needed 25
26 nmap port states open filtered Unable to determine if port is open or filtered Reported by UDP, IP Protocol, FIN, NULL, Xmas closed filtered Unable to determine if port is closed or filtered Reported by IP ID idle 26
27 nmap scan modes TCP SYN scan (-ss) Starts TCP three-way handshake Open if a SYN/ACK received Closed if RST received Filtered if ICMP error or no response received TCP connect scan (-st) Opens TCP connection, sends no data Uses OS libraries to determine state 27
28 nmap scan modes UDP scan (-su) Sends empty UDP packet Closed if ICMP port unreachable received Filtered if other ICMP received Open filtered if there is no response Scan can be very slow, due to timeout periods SCTP INIT scan (-sy) Sends an empty SCTP INIT chunk Open if INIT-ACK received Closed if ABORT received Filtered if ICMP error or no response received 28
29 nmap scan modes NULL scan (-sn) Sends TCP packet with no header bits set FIN scan (-sf) Sends TCP packet with FIN set Xmas scan (-sx) Sends TCP packet with FIN, PSH, URG set Responses to NULL, FIN, Xmas: Closed is RST received Filtered is ICMP error received Open Filtered with no response 29
30 nmap scan modes TCP Window (-sw) and Maimon (-sm) scans Rely on implementation details in specific systems IP Protocol scans (-so) Determines what IP protocols are supported FTP Bounce scans (-b <ftprelay>) Old FTP server bug Idle scan (-si <zombie>) Can map out trust relationships between systems Custom TCP scan (--scanflags) Generate packets with specific headers flags 30
31 nmap port specification Port numbers are associated with specific network services or applications ( ) Most port number assignments are fixed Assigned by IANA Without specifying ports, nmap choose the 1000 most common ports to scan for each protocol 31
32 nmap port specification Specify additional ports with -p option -p- or -p p U:53,137,161,T:21,22,25,80,443,8080 Fast scan (-F) Scans only 100 common ports Avoid port randomization (-r) Scan port numbers in order 32
33 nmap fingerprint modes nmap attempts to detect the OS version based on fingerprinting the TCP stack Quirks and implementation details can be evaluated and compared against a database of known TCP stack implementations OS detection (-O) 33
34 Other options/features Service and Version detection (-sv) Attempts to determine the versions of software Timing and Performance options Retries, timeouts, delays, rate limiting, scan rates Scripting Engine Includes library of scan functions Write your own scripts Firewall/IDS Evasion and Spoofing Attempts bypass firewalls Attempts to avoid intrusion detection systems 34
35 nmap output example 1 golgafrincham:~ admin$ sudo nmap -sp dis Starting Nmap 5.00 ( ) at :34 EST Host is up ( s latency). MAC Address: 00:11:43:A0:98:42 (Dell) Nmap done: 1 IP address (1 host up) scanned in seconds 35
36 nmap output example 2 golgafrincham:~ admin$ sudo nmap -ss dis Starting Nmap 5.00 ( ) at :23 EST Interesting ports on : Not shown: 998 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http MAC Address: 00:11:43:A0:98:42 (Dell) Nmap done: 1 IP address (1 host up) scanned in seconds 36
37 nmap output example 3 golgafrincham:~ admin$ sudo nmap -O milliways Starting Nmap 5.00 ( ) at :38 EST Interesting ports on : Not shown: 996 filtered ports PORT 22/tcp STATE SERVICE open ssh 9101/tcp open jetdirect 9102/tcp open jetdirect 9103/tcp open jetdirect MAC Address: 00:B0:D0:DB:A5:56 (Dell Computer) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: FreeBSD 7.X OS details: FreeBSD 7.0-RELEASE-p1-7.1-RELEASE Network Distance: 1 hop 37
38 saving nmap output nmap output can be saved as Text (default): -on <file> XML: -ox <file> l33t: -os <file> Grepable: -og <file> All at once: -oa <basename> Verbose output (-v) Debugging (-d <level>) many others too... 38
39 nmap output differencing Differencing provides a method to see changes over time golgafrincham:~ admin$ ndiff yesterday.xml today.xml -Nmap 5.00 at :59 +Nmap 5.00 at : , 00:B0:D0:DB:A5:56: -Not shown: 999 filtered ports +Not shown: 998 filtered ports PORT STATE SERVICE VERSION +23/tcp open telnet 39
40 I hate command lines... nmap includes a GUI tool called Zenmap It is a simple interface for constructing the command line options for nmap Notice that as you choose options, the command line listed changes The Zenmap output is the same as nmap It s a learning tool for nmap parameters For our exercises you can use which ever tool you are comfortable with 40
41 Let s get started... Boot up BackTrack if you haven t already OR Install nmap on your machine Connect to the exercise network 41
42 Exercise 1 Using Zenmap or nmap do a SYN scan on What ports are open? 42
43 Exercise 2 Use Zenmap or nmap to do an OS detection scan against What operating system does this machine have? 43
44 Exercise 3 Scan targets in the range of Choose any scan method What OSs are used? What services are available? With everyone scanning at once watch for and note network side effects? 44
45 Exercise 4 Experiment with Zenmap and nmap Any IP on is a target Attempt different scan modes and attempt to determine the OS and ports open/closed 45
46 End of Module 2 Questions? 46
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie
An Introduction to Nmap with a Focus on Information Gathering Ionuț Ambrosie January 12, 2015 During the information gathering phase of a penetration test, tools such as Nmap can be helpful in allowing
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Nmap Cookbook The fat-free guide to network scanning
Nmap Cookbook The fat-free guide to network scanning 2 Nmap Cookbook The Fat-free Guide to Network Scanning Copyright 2010 Nicholas Marsh All rights reserved. ISBN: 1449902529 EAN-13: 9781449902520 www.nmapcookbook.com
Network Host Discovery and Service Detection Tools
UNIVERSITY OF ZAGREB FACULTY OF ELECTRICAL ENGINEERING AND COMPUTING MASTER S THESIS no. 608 Network Host Discovery and Service Detection Tools Marin Maržić Zagreb, Croatia July 2013. iii CONTENTS 1. Introduction
Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.
Scanning Tools The goal of the scanning phase is to learn more information about the target environment and discover openings by interacting with that target environment. This paper will look at some of
Lecture 5: Network Attacks I. Course Admin
Lecture 5: Network Attacks I CS 336/536: Computer Network Security Fall 2013 Nitesh Saxena Adopted from previous lectures by Keith Ross Course Admin HW/Lab 1 Due Coming Monday 11am Lab sessions are active
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
Nmap: Scanning the Internet
Nmap: Scanning the Internet by Fyodor Black Hat Briefings USA August 6, 2008; 10AM Defcon 16 August 8, 2008; 4PM Abstract The Nmap Security Scanner was built to efficiently scan large networks, but Nmap's
Stop that Big Hack Attack Protecting Your Network from Hackers. www.lauraknapp.com
Stop that Big Hack Attack Protecting Your Network from Hackers Laura Jeanne Knapp Technical Evangelist 1-919-224-2205 [email protected] www.lauraknapp.com NetSec_ 010 Agenda Components of security threats
Network and Services Discovery
A quick theorical introduction to network scanning January 8, 2016 Disclaimer/Intro Disclaimer/Intro Network scanning is not exact science When an information system is able to interact over the network
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Introduction. Nmap from an Ethical Hacker's View Part 1. By Kirby Tucker
Nmap from an Ethical Hacker's View Part 1 By Kirby Tucker Editor's Note: Kirby is a long time contributor and supporter of EH-Net. So when he came to me with the idea to do a more approachable tutorial
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
NETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Penetration Testing. What Is a Penetration Testing?
Penetration Testing 1 What Is a Penetration Testing? Testing the security of systems and architectures from the point of view of an attacker (hacker, cracker ) A simulated attack with a predetermined goal
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005
Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract Writing a custom firewall is a complex task, and is something that requires a significant amount of
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
Chapter 6 Phase 2: Scanning
Chapter 6 Phase 2: Scanning War Dialer Tool used to automate dialing of large pools of telephone numbers in an effort to find unprotected THC-Scan 2.0 Full-featured, free war dialing tool Runs on Win9x,
Advanced Network Scanning
American Journal of Engineering Research (AJER) 2016 American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-6, pp-38-42 www.ajer.org Research Paper Advanced
Attacks and Defense. Phase 1: Reconnaissance
Attacks and Defense Phase 1: Reconnaissance Phase 2: Port Scanning Phase 3: Gaining Access Using Application and Operating System Using Networks Phase 1: Reconnaissance Known as information gathering.
Practical Network Forensics
BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe [email protected] www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.
Remote Network Analysis
Remote Network Analysis Torsten Hoefler [email protected] (DMZ), mostly between two packet filters and application gateways. The different possibilities to connect DMZ-hosts are also shown in Figure
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Looking for Trouble: ICMP and IP Statistics to Watch
Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [[email protected]] www.packet-level.com www.podbooks.com HTCIA Member,
Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services
Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services CS4983 Senior Technical Report Brian Chown 0254624 Faculty of Computer Science University of New Brunswick Canada
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging
SonicOS 5.9 / 6.0.5 / 6.2 Log Events Reference Guide with Enhanced Logging 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION:
Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.
Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Network
Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall
Figure 5-1: Border s Chapter 5 Revised March 2004 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Border 1. (Not Trusted) Attacker 1 1. Corporate Network (Trusted) 2 Figure
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security ICMP, TCP, DNS, Scanning Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Agenda A couple of examples of network protocols that
During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions
Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions Gigi Joseph, Computer Division,BARC. [email protected] Intranet Security Components Network Admission Control (NAC)
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Intrusion Detection & SNORT. Fakrul Alam [email protected]
Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through
Configure a Microsoft Windows Workstation Internal IP Stateful Firewall
70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Network Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
Network Scanning. What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide?
Network Scanning What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide? Where will our research go? Page : 1 Function - attacker view What hosts
SECURITY TOOLS SOFTWARE IN AN OPEN SOURCE ENVIRONMENT. Napoleon Alexandru SIRETEANU *
ANALELE ŞTIINłIFICE ALE UNIVERSITĂłII ALEXANDRU IOAN CUZA DIN IAŞI Tomul LV ŞtiinŃe Economice 2008 SECURITY TOOLS SOFTWARE IN AN OPEN SOURCE ENVIRONMENT Napoleon Alexandru SIRETEANU * Abstract In a penetration
Network Security CS 192
Network Security CS 192 Network Scanning (Idlescan) Department of Computer Science George Washington University Jonathan Stanton 1 Today s topics Discussion of new DNS flaws Network Scanning (Idlescan)
Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas [email protected]
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas [email protected] 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
Penetration Testing SIP Services
Penetration Testing SIP Services Using Metasploit Framework Writer Version : 0.2 : Fatih Özavcı (fatih.ozavci at viproy.com) Introduction Viproy VoIP Penetration Testing Kit Sayfa 2 Table of Contents 1
Introduction to Network Security Lab 2 - NMap
Introduction to Network Security Lab 2 - NMap 1 Introduction: Nmap as an Offensive Network Security Tool Nmap, short for Network Mapper, is a very versatile security tool that should be included in every
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Configuring a Backup Path Test Using Network Monitoring
6AOSCG0006-29B February 2011 Configuration Guide Configuring a Backup Path Test Using Network Monitoring This configuration guide describes how to configure a demand routing test call to test the availability
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
IxLoad-Attack: Network Security Testing
IxLoad-Attack: Network Security Testing IxLoad-Attack tests network security appliances determining that they effectively and accurately block attacks while delivering high end-user quality of experience
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Best Practices Guide: Vyatta Firewall. SOFTWARE-BASED NETWORKING & SECURITY FROM VYATTA February 2013
Best Practices Guide: Vyatta Firewall SOFTWARE-BASED NETWORKING & SECURITY FROM VYATTA February 2013 INTRODUCTION Vyatta Network OS is a software-based networking and security solution that delivers advanced
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Exam Name: Foundry Networks Certified Layer4-7 Professional Exam Type: Foundry Exam Code: FN0-240 Total Questions: 267
Question: 1 SYN-Guard and SYN-Defense can be configured on: A. ServerIron XL B. ServerIron 100 C. ServerIron 400 D. ServerIron 800 E. ServerIron 450 F. ServerIron 850 G. ServerIron GT-E, C, D, E, F, G
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
ACP ThinManager Tech Notes Troubleshooting Guide
ACP ThinManager Tech Notes Troubleshooting Guide Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit www.thinmanager.com/technotes/ to download the manual, manual
Network Mapper and Vulnerability Scanning
Network Mapper and Vulnerability Scanning Avviso Per la legge italiana questi strumenti sono equivalenti a strumenti per lo scasso Possono essere posseduti solo da chi ha un ruolo professionale che lo
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Lab Objectives & Turn In
Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for
Network Forensics: Detection and Analysis of Stealth Port Scanning Attack
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 33 42 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Network
Computer forensics 2015-12-01
Computer forensics Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Using WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Installing and Configuring Nessus by Nitesh Dhanjani
Unless you've been living under a rock for the past few years, it is quite evident that software vulnerabilities are being found and announced quicker than ever before. Every time a security advisory goes
Chapter 8 Phase3: Gaining Access Using Network Attacks
Chapter 8 Phase3: Gaining Access Using Network Attacks Tools used in Network Attacks Sniffing Spoofing Session hijacking Netcat Sniffer Allows attacker to see everything sent across the network, including
Lab 3: Recon and Firewalls
Lab 3: Recon and Firewalls IP, UDP, TCP and ICMP Before we can create firewall rules, we have to know the basics of network protocols. Here's a quick review... IP ICMP UDP TCP The underlying packet delivery
H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)
H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Web Authentication Proxy on a Wireless LAN Controller Configuration Example
Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on
