An Integrated Network Scanning Tool for Attack Graph Construction
|
|
|
- Alicia Haynes
- 10 years ago
- Views:
Transcription
1 published as: Feng Cheng, Sebastian Roschke, Christoph Meinel: An Integrated Network Scanning Tool for Attack Graph Construction In Proceedings of the 6th International Conference on Advances in Grid and Pervasive Computing (GPC 2011), Oulu, Finland, May 2011 An Integrated Network Scanning Tool for Attack Graph Construction Feng Cheng, Sebastian Roschke, and Christoph Meinel Hasso Plattner Institute (HPI), University of Potsdam, 14482, Potsdam, Germany Abstract. Scanning is essential for gathering information about the actual state of computer systems or networks. Therefore, it is always taken as the first step of potential attacks against targets. In certain cases, scanning itself is categorized as an attack. Scanning can on the other hand be used for the right purposes, for example, checking the system configurations, verifying firewall rules, proofing security polices, as well as monitoring the large scale network environment. From this point of view, scanning is an effective method for system or network management, security measurement and auditing. To visualize, analyze, and finally evaluate the data gathered by scanners, Attack Graph plays an important role. High quality information about the target system or network is the prerequisite for constructing the attack graph. However, different implementations of scanners have different capabilities and always result in different kinds of outputs. These outputs are usually heterogeneous and not machine-readable, which makes the further analysis a challenging task. In this paper, we examine common types of scanners and demonstrate how to combine multiple types of scanners. The results of all the involved scanners are integrated into a well-designed and consistent data structure, which can not only be well interpreted by human security specialists but also be directly fed into an attack graph construction tool. 1 Introduction Scanning is always the first step towards successful exploits of the target system [1], [2]. Normally, hackers are not able to know anything about the targets without scanning. Gathering information about the adversary is the unique start point. Most complex attacks are practically impossible without continuous scanning on the final target. On the other hand, the scanning techniques have also been adopted as an important approach for security experts or network administrators to check the weaknesses of target systems or networks [3], [4]. Modern IT infrastructures become more and more sophisticated. Failures due to both technical and human factors, might take place in the processes of design, implementation, deployment, configuration, and execution. Carrying out black-box mode tests is always required for detecting such failures, especially the security vulnerabilities. Scanning is, in most cases, an effective tool for such tests [5]. Along with the increased requirements from both attackers and defenders, a large number of scanning techniques have emerged in recent years, e.g., J. Riekki, M. Ylianttila, and M. Guo (Eds.): GPC 2011, LNCS 6646, pp , c Springer-Verlag Berlin Heidelberg 2011
2 An Integrated Network Scanning Tool for Attack Graph Construction 139 nmap 1, amap 2, netcat 3, P0f 4, XProbe 5, X-Scan 6, etc. Different types of scanning techniques have different competencies and therefore result in different kinds of implementations. The outputs of those scanners are usually heterogeneous and not machine-readable. Combining multiple types of scanning techniques to get comprehensive but easy to interpret scanning results is expected. Attack Graph offers a formal method to represent the ways in which an attacker can exploit vulnerabilities and break into a system [6], [7]. To construct an attack graph, the accurate information about the target system or network is required. Scanning techniques play important roles in this context. How to integrate scanning tools into the automatic attack graph construction platform is a challenging task for creating high quality attack graphs. In this paper, we propose an integrated network scanning tool by combining multiple types of scanners. The results of all the involved scanners are integrated into a well-designed and consistent data model, which can not only be well interpreted by human security specialists but also be directly fed and matched with the vulnerability representation within the attack graph tools [8]. This paper is organized as follows. Section 2 introduces some related works, i.e., the workflow of the Attack Graph construction and some popular scanning techniques. Section 3 proposes our integrated scanner. An practical scanning example is shown as proof-of-concept in Section 4. We conclude the paper in Section 5. 2 Related Work 2.1 Attack Graphs Attack Graphs have been proposed for years as a formal way to simplify the modeling of complex attacking scenarios [9]. An attack graph describes not only one possible attack, but also many potential ways for an attacker to reach a goal. The workflow of an attack graph construction tool consists of three independent phases: Information Gathering, Attack Graph Construction, as well as Visualization and Analysis. In the information gathering phase, all necessary information to construct attack graphs is collected and unified, such as information on network structure, connected hosts, and running services. In the attack graph construction phase, a graph is computed based on the gathered system information and existing vulnerability descriptions. Finally, the attack graph is processed in the visualization and analysis phase. Attack graphs always require a certain set of input information. For one, a database of existing vulnerabilities has to be available, as without it, it would not be possible to identify or evaluate the effects of host-specific weaknesses. Also, the network structure must be
3 140 F. Cheng, S. Roschke, and C. Meinel known beforehand. It is necessary to identify which hosts can be reached by the attacker. Often, a network scanning and host-based vulnerability analysis are performed before the attack graph is constructed [8]. 2.2 Review of Scanning Techniques We can classify the scanning techniques into the following categories: Passive. No packages sent at all. Discovery. Packages are only sent to find hosts and detect the connectivity. Port Scan. Systematic testing of individual ports or ranges. Response packages might be examined for software banners. Probing. Discovered services are checked for versions and vulnerabilities. Exploiting. Vulnerabilities are actively used or verified. Other. It is active but cannot be classified as any value above. Most of emerged scanning techniques are implemented based on this classification. In practice, it includes: Topology Scanner is used to investigate the structure of networks, which encompasses the detection of hosts residing in a network, the network mask, and the gateways. For advanced topology scanners, multiple networks are scanned and then the results can be put together into a complete network diagram for evaluating their interconnections. The participants in a local network can be obtained by broadcasting ping or ARP-request packets. For remote hosts, ordinary ping over a large address range can be performed. Popular implementations include traceroute 7, Nessus 8,etc. Port Scanner aims at finding open and filtered ports on a specified target host. There have been implemented a variety of such scan methods, e.g., Nmap, Nessus, netcat, etc. Most of them are targeted for TCP ports. The easiest and also the most obvious is a connect scan. Stealthier methods are syn or ack scans. UDP scans are used for UDP-based ports. Fingerprint Scanner is to find the name and version of the software or operating system running on the target. The primary method to obtain product information from a service is via banner grabbing. Advanced tools examine the specifics of sent packets and the behavior the network stack. Known examples are amap, P0f, XProbe, etc. Vulnerability Scanner targets at detecting vulnerabilities of services or the operating systems running on a host. Vulnerabilities are usually found by actually trying to exploit a set of possible vulnerabilities. Less aggressive tools infer possible vulnerabilities from the products determined by fingerprinting. Existing vulnerability scanners include Nessus, X-Scan, Nmap, etc. Incremental Scanner usually scans the surrounding network topology by first performing a scan from any of the previously mentioned categories and gain
4 An Integrated Network Scanning Tool for Attack Graph Construction 141 access to vulnerable hosts with exploits. Having access to further hosts, already found networks can be scanned from another viewpoint or completely new networks may become accessible. Doing this incrementally, it sometimes enables the mapping of DMZs (demilitarized zones) between a public and private network or even internal private network. Typical methods to accomplish incremental scanning is to exploit a vulnerability on a host and inject scanning code into the vulnerable service. Some common approaches are syscall proxying[1] and SNAPP[10], Core Impact[1], etc. 3 An Integrated Network Scanning Platform Each scanner delivers a dedicated set of information about the target host or network. To obtain a rather complete picture of a target for more accurate post processing, e.g., constructing attack graphs, it requires the combination of results from multiple scanners. However, the handling of multiple scanners is not easy due to the following two reasons: Configuration. Along with the advanced usability of the modern scanner, the required configuration effort becomes more and more complex. For example, both Nmap and Nessus provide an overwhelming number of configuration options. Consequently, it takes users much more effort to learn how to implement a proper and efficient scanning operation. Output Interpretation. Each scanner outputs its results in a certain format. Unfortunately, this format is not unified. A user needs to familiarize with each format individually. Furthermore, some detailed scan results are only written in a report file which might be even harder to read. To achieve an abstraction from all the sub-scanners, following challenges need to be considered for the implementation of the integrated scanner platform. 1. The integrated sub-scanners should be transparent to the user, which means that the user does not need to know how to use the sub-scanners and even does not actually recognize their involvements. 2. The platform must be able to control the actions of all sub-scanners. As different scanners significantly differ in the functionalities, the configuration can be quite different as well. The challenge is to find a common set of configuration options. 3. The scan results of network scanners are not unified in any form. They might be available as XML files, graphically on a GUI or text on the command line output. In order to provide a consistent scan result, output of different forms must be converted into one common result format. 4. As many sub-scanners are used within the integrated platform, it is highly possible that a certain type of scan result is already available from another scanner. In this case, the duplicate information might exist. We need indicate the same result or, in the worst case, contradicting information.
5 142 F. Cheng, S. Roschke, and C. Meinel Fig. 1. Architecture of the Integrated Network Scanning Platform 3.1 Basic Architecture Figure 1 shows a rough overview of the architecture used for our proposed Integrated Network Scanning Platform. Although the attached scanners do not belong to the platform, they constitute the foundation for all the supported scanning functionalities. Currently, we have focused on online scanning with the popular scanners Nmap and Nessus. The design of the platform is highly flexible and extensible. It consists of several components. The upper part encompasses multiple plug-ins communicating with the integrated scanners. They basically act as adapters between one scanner and the other components of the platform. These adapters are designed as plug-ins, so that other scanners can be added easily. A plug-in has to accomplish two major tasks to enable seamless integration of scanners into the platform: 1. Bind to an interface of the scanning tool. After binding, the plug-in provides an abstract control interface to the scanner usable by the platform. One part of this interface provision is the translation of the platform s abstract scan options into specific scan options interpretable by the scanner. After an initiated scan has been successfully finished, the plug-in has the task to obtain the scan result from the scanner. 2. Convert the specific scan result obtained from the scanner into a scan result with a unified format, so that the platform only needs to handle one abstract scan result format. When the scan results have been provided by the scanner adapters, the result combiner can start its work by combining all single results into one consistent overall result. The management of the adapter plug-ins is performed by a plug-in manager component. It allows to execute plug-ins concurrently as well as pass abstract scan parameters to all adapters. The bridge between the previously mentioned components and the user of the platform is provided by the commandline interpreter. It is currently deployed on the host of the scanning user.
6 An Integrated Network Scanning Tool for Attack Graph Construction Finding a Common Data Model As previously mentioned, a major challenge for creating such an integrated scanner is to find a common data model for containing the results from different scanners. Such a model should be easy to understand as well as easy to interpret by computers. For being fed to the later attack graph construction tools, the data model should fit to the formal representation of the vulnerability information [8]. Nmap offers such a data model for containing its own scanning result. However, it is strictly tailored to the capabilities of Nmap s port scanner and is hard to comprise other types of scanning results. The vulnerability scanner, Nessus also provides a data format for representing the revealed information [11], but it focuses more on the analysis and predictions of the vulnerabilities. Here we propose a custom XML file format as shown in Figure 2. Fig. 2. Top Level Structure of the Data Model This data model has been divided into three top level branches which cover the different aspects of an integrated scan. One branch contains the combined scan result from all scanners. Another branch contains an abstract configuration used for the integrated scan. In order to determine the origin of a certain piece of information in the combined scan result, the last branch keeps a copy of all individual scan results produced by the scanners. These scan results will be called sub-scans in the following. Both the combined result and sub-scan results have a similar format. This format only focuses on one scan result and is very close to Nmap s single result format. A host can be regarded as central element in this format. Each host then has a set of open ports and running services. Beyond that, meta information about the scan can be stored. The sub-scan branch additionally contains detailed information about the scan tool having produced the sub-scan result. This encompasses, for example, tool-specific parameters used as configuration and the original output of the tool. The original output can later be used to obtain information being lost during the conversion to the common data model. The configuration branch stores an abstract view on the parameters being passed to the scanners.
7 144 F. Cheng, S. Roschke, and C. Meinel 3.3 Parsing the Scanner Outputs The adapter is the key component to convert the specific output from the scanners to sub-scans of our common data model. For Nmap, this task is rather straightforward as our sub-scan branch is very similar to Nmap s data model. Only some smaller changes needed to be implemented. One example is the standardization and unification of information specified in Nmap s output. Therefore, time and date information needed to be converted to one common date format and product names were unified by means of the Common Platform Enumeration (CPE)[12]. Due to generalization of Nmap s format, we had to omit some information or had to move some specific information into a more general context. As an example for this generalization, the device type for a host had to be inferred from the device types previously specified in the services of hosts. In the case of Nessus, the conversion turned out to be more complex. The problem with its XML-based.nessus.v1 format is plain text which is hard to interpret by a program. In fact, each security issue reported by Nessus is inserted into just one XML data tag. Thus, we need to make the output interpretable by an extensive use of regular expressions. A new output format called.nessus.v2 which addresses this issue of only providing textual data has been introduced by Tenable in late Another issue which makes it more complicated to interpret the Nessus is the organization of Nessus own plug-ins. Each aspect of a scan is handled by a certain plug-in. For example, there is a plug-in to list the open ports, another plug-in provides the host name of the target host, and yet another plug-in checks if a specific vulnerability is available on the target. As a consequence, the information has to be collected from multiple plug-in outputs which do not even have a standardized format. Therefore, it is nearly impossible to include all the results from Nessus into our data model. Even if it is possible to evaluate the output of all current plug-ins, new plug-ins would result in an incomplete processing sooner or later. 3.4 Merging Redundant Information Although the sub-scan provides information about each single scan, a combined scan result is desirable for clarity. Redundant information being produced multiple times must be merged. Such information can be of two types, i.e., matching or contradicting. Matching information can be easily merged by keeping only one instance. We decided to handle contradicting information by plausibility checks and a combination of voting and scoring mechanisms. The different approaches are listed as follows. Voting. A piece of information is considered as right only if it has been reported by the majority of scanners. This mechanism only makes sense if there are more than two integrated scanners. Scoring. A scanner will be assigned scores corresponding to the reliability of the information it produces. Plausibility. For some types of information, it can be inferred logically which information is more likely the right one.
8 An Integrated Network Scanning Tool for Attack Graph Construction 145 As shown in Figure 3, the information about the detected operating systems is an example which might be reported differently among scanners. In many cases, even one scanner alone delivers multiple possible operating systems. Fortunately, these scanners also provide a scoring for the most probable entries. Among scanners, we first use a voting and then perform a scoring on ambiguous results. Here, Nessus results are weighted higher than Nmap s results, as for fingerprint scanning, Nessus is more reliable. Additionally, in the merged result, the accuracy values have a sum of 1, in contrast to the relative accuracy in the individual results. The example in 4 shows how to remove redundant information about port states using plausibility checks. If multiple states are reported, we choose the entry which first appears in the order open, closed, and filtered. A port with state open or closed sends packets to the scanner whereas filtered ports do not send any packet. So a filtered port might be the result of a lost packet. Fig. 3. Merging operating system information from Nessus and Nmap into one consistent overview of the target s operating system Fig. 4. Merging port information from Nessus and Nmap into one port information
9 146 F. Cheng, S. Roschke, and C. Meinel 4 Scanning in the Practice To show how this integrated scanner works in the practice, we set up a highly vulnerable virtual machine and perform an integrated scanning against it. We have selected a very outdated Ubuntu distribution, namely Ubuntu 6.06 Dapper Drake. It has a kernel, which bears a high security risk. Additionally, we have installed a multitude of seriously vulnerable network services on the virtual machine, including ProFTPd 1.2.5, Apache HTTP Server , Bind 9.3.2, Samba3.0.22, Courier IMAP (imapd) 3.0.8, and MySQL Server It is obvious that our integrated scanner can find many open ports and even more vulnerabilities of the installed products. For the practical scan, we have tested two different configurations, i.e., probing and exploiting. The probing mode is used to create static attack graph while exploiting mode can gather information required by dynamic attack graph construction. With the probing configuration, we could find all open ports affiliated with most of the installed products, see Figure 5(a). The operating system could be determined as well. However, the scan only reportrd a Samba vulnerability. The reason for this sparse result is the fact that with probing, vulnerabilities are only inferred from examined product versions. We could gain a better result with the exploiting configuration as shown in the Figure 5(b). It delivered about 30 vulnerabilities of which the most were also reported in vulnerability databases. A significant drawback of the exploiting configuration is its long runtime which is specifically caused by the Nessus subscan. It took nearly half an hour to finish. (a) Probing Mode (b) Exploiting Mode Fig. 5. Information about the exposed ProFTPd service in the scanning results 5 Conclusion Scanning focuses on more or less serious information disclosure and vulnerabilities about the target. It can be accomplished with a variety of scanning tools today. All of them require an individual way of interaction and provide scanning
10 An Integrated Network Scanning Tool for Attack Graph Construction 147 results in different output formats. As a consequence, it is hard for a user to get along with the multiple scanner tools. We have designed and implemented a prototype of the integrated scanning tool allowing to access scan results from multiple scanner tools with just one user interface in a unified output format. As the integrated scanner is configurable for different levels of scan aggressiveness, it is suitable for different types of attack graph construction tools. Acknowledgement The authors would like to thank David Jäger and Arvid Heise for their support on implementation of the proposed tool. References 1. Caceres, M.: Syscall Proxying - Simulating Remote Execution. Technical report, Core Security Technologies (2002) 2. Moore, H., Valsmith: Tactical Exploitation, Version Technical report, Metasploit LLC (2007) 3. Bhatia, A., Lam, B., et al.: Automated Network Security Audit Tool (ANSAT). Technical report, University of Colorado at Boulder (2006) 4. Bishop, M.: About Penetration Testing. IEEE Security & Privacy 5, (2007) 5. Siamwalla, R., Sharma, R., Keshav, S.: Discovering Internet Topology. Technical report, Cornell University (1998) 6. Dawkins, J., Clark, K., Manes, G., Papa, M.: A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks. Journal of Network and Systems Management 13(3), (2005) 7. Schneier, B.: Attack Trees - Modeling Security Threats. Dr. Dobb s Journal 21, (1999) 8. Cheng, F., Roschke, S., Schuppenies, R., Meinel, C.: Remodeling Vulnerability Information. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt LNCS, vol. 6151, pp Springer, Heidelberg (2010) 9. Jajodia, S., Noel, S., O Berry, B.: Topological Analysis of Network Attack Vulnerability. In: Vipin Kumar, J.S., Lazarevic, A. (eds.) Managing Cyber Threats: Issues, Approaches, and Challenges. Massive Computing, vol. 5, pp Springer, Heidelberg (2005) 10. Cheng, F., Wolter, C., Meinel, C.: A Simple, Smart and Extensible Framework for Network Security Measurement. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt LNCS, vol. 4990, pp Springer, Heidelberg (2008) 11. Arboi, M.: The NASL2 Reference Manual. Tenable Network Security (2005) 12. Cheikes, B.A., Waltermire, D.: Common Platform Enumeration: Naming Specification Version 2.3 (DRAFT). Technical Report The MITRE Corporation, National Institute of Standards and Technology, NIST (2010)
NETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
Penetration Testing Workshop
Penetration Testing Workshop Who are we? Carter Poe Nathan Ritchey Mahdi Shapouri Fred Araujo Outline Ethical hacking What is penetration testing? Planning Reconnaissance Footprinting Network Endpoint
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:
PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
Installing and Configuring Nessus by Nitesh Dhanjani
Unless you've been living under a rock for the past few years, it is quite evident that software vulnerabilities are being found and announced quicker than ever before. Every time a security advisory goes
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
How To Build A Vulnerability Chain
Acta Universitatis Sapientiae Electrical and Mechanical Engineering, 6 (2014) xx-yy Identifying Chains of Software Vulnerabilities: A Passive Non-Intrusive Methodology Béla GENGE 1, Călin ENĂCHESCU 1 1
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Armitage. Part 1. Author : r45c4l Mail : [email protected]. http://twitter.com/#!/r45c4l
Armitage H acking Made Easy Part 1 Author : r45c4l Mail : [email protected] http://twitter.com/#!/r45c4l Greetz and shouts to the entire ICW team and every Indian hackers Introduction When I started
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.
Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Network
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Penetration Testing. What Is a Penetration Testing?
Penetration Testing 1 What Is a Penetration Testing? Testing the security of systems and architectures from the point of view of an attacker (hacker, cracker ) A simulated attack with a predetermined goal
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
Blended Security Assessments
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques October 12, 2009 (Revision 9) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Table of Contents
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Remote Network Analysis
Remote Network Analysis Torsten Hoefler [email protected] (DMZ), mostly between two packet filters and application gateways. The different possibilities to connect DMZ-hosts are also shown in Figure
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
1 Scope of Assessment
CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned
EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER
Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 [email protected], [email protected]
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad
Vulnerability Assessment and Penetration Testing CC Faculty ALTTC, Ghaziabad Need Vulnerabilities Vulnerabilities are transpiring in different platforms and applications regularly. Information Security
During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ASV Scan Report Attestation of Scan Compliance
ASV Scan Report Attestation of Scan Compliance Scan Customer Information Company: David S. Marcus, Ph. D Approved Scanning Vendor Information Company: ComplyGuard Networks Contact: Contact: Support Tel:
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Towards Unifying Vulnerability Information for Attack Graph Construction
Towards Unifying Vulnerability Information for Attack Graph Construction Sebastian Roschke Feng Cheng, Robert Schuppenies, Christoph Meinel ISC2009-2009-09-08 Internet-Technologies and -Systems Prof. Dr.
Divide and Conquer Real World Distributed Port Scanning
Divide and Conquer Real World Distributed Port Scanning Ofer Maor CTO Hacktics 16 Feb 2006 Hackers & Threats I, 3:25PM (HT1-302) Introduction Divide and Conquer: Real World Distributed Port Scanning reviews
Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008
Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit
Looking for Trouble: ICMP and IP Statistics to Watch
Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [[email protected]] www.packet-level.com www.podbooks.com HTCIA Member,
Evaluation of Penetration Testing Software. Research
Evaluation of Penetration Testing Software Research Penetration testing is an evaluation of system security by simulating a malicious attack, which, at the most fundamental level, consists of an intellectual
An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie
An Introduction to Nmap with a Focus on Information Gathering Ionuț Ambrosie January 12, 2015 During the information gathering phase of a penetration test, tools such as Nmap can be helpful in allowing
NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER
A C a s e s t u d y o n h o w Z e n Q h a s h e l p e d a L e a d i n g K - 1 2 E d u c a t i o n & L e a r n i n g S o l u t i o n s P r o v i d e r i n U S g a u g e c a p a c i t y o f t h e i r f l
A Study on the Security aspects of Network System Using Penetration Testing
A Study on the Security aspects of Network System Using Penetration Testing 1 Shwetabh Suman, 2 Vedant Rastogi 1,2 Institute of Engineering and Technology, Alwar, India 1 [email protected] 2 [email protected]
Detection of illegal gateways in protected networks
Detection of illegal gateways in protected networks Risto Vaarandi and Kārlis Podiņš Cooperative Cyber Defence Centre of Excellence Tallinn, Estonia [email protected] 1. Introduction In this
Firewall implementation and testing
Firewall implementation and testing Patrik Ragnarsson, Niclas Gustafsson E-mail: [email protected], [email protected] Supervisor: David Byers, [email protected] Project Report for Information
On the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
VULNERABILITY MANAGEMENT
Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
SECURITY TOOLS SOFTWARE IN AN OPEN SOURCE ENVIRONMENT. Napoleon Alexandru SIRETEANU *
ANALELE ŞTIINłIFICE ALE UNIVERSITĂłII ALEXANDRU IOAN CUZA DIN IAŞI Tomul LV ŞtiinŃe Economice 2008 SECURITY TOOLS SOFTWARE IN AN OPEN SOURCE ENVIRONMENT Napoleon Alexandru SIRETEANU * Abstract In a penetration
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
May 11, 2011. (Revision 10)
Blended Security Assessments Combining Active, Passive and Host Assessment Techniques May 11, 2011 (Revision 10) Renaud Deraison Director of Research Ron Gula Chief Technology Officer Copyright 2011. Tenable
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Security Considerations White Paper for Cisco Smart Storage 1
Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Running head: USING NESSUS AND NMAP TOOLS 1
Running head: USING NESSUS AND NMAP TOOLS 1 Nessus and Nmap Overview - Scanning Networks Research Paper On Nessus and Nmap Mike Pergande Ethical Hacking North Iowa Area Community College Running head:
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
A Model Design of Network Security for Private and Public Data Transmission
2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com A Model Design of Network Security for Private and Public Data Transmission Farhan Pervez, Ali
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
040020305-Penetration Testing 2014
Comprehensive Questions/Practical Based :- 040020305-Penetration Testing 2014 1. Demonstrate the installation of BackTrack using Live DVD. Also list all the steps. 2. Demonstrate the installation of BackTrack
Andreas Dittrich, Philipp Reinecke Testing of Network and System Security. example.
Testing of Network and System Security 1 Testing of Network and System Security Introduction The term security when applied to computer networks conveys a plethora of meanings, ranging from network security
Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)
Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using
Lab 3: Recon and Firewalls
Lab 3: Recon and Firewalls IP, UDP, TCP and ICMP Before we can create firewall rules, we have to know the basics of network protocols. Here's a quick review... IP ICMP UDP TCP The underlying packet delivery
WHITE PAPER. An Introduction to Network- Vulnerability Testing
An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and
Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Lab Objectives & Turn In
Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10
Security and Vulnerability Testing How critical it is?
Security and Vulnerability Testing How critical it is? It begins and ends with your willingness and drive to change the way you perform testing today Security and Vulnerability Testing - Challenges and
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk To cite this version: Erwan Godefroy, Eric Totel, Michel Hurfin,
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
Attack Graph Techniques
Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --
Intrusion Detection System (IDS)
Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes
Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. http://bechtsoudis.com abechtsoudis (at) ieee.
Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING Anestis Bechtsoudis http://bechtsoudis.com abechtsoudis (at) ieee.org Athena Summer School 2011 Course Goals Highlight modern
About Effective Penetration Testing Methodology
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing
XPROBE-NG. What s new with upcoming version of the tool. Fyodor Yarochkin Armorize Technologies
XPROBE-NG What s new with upcoming version of the tool Fyodor Yarochkin Armorize Technologies Abstract Attacks trends analysis and network modern discovery requirements lazy scanning, application level
