Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology



Similar documents
Chapter 6 Phase 2: Scanning

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CIT 380: Securing Computer Systems

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Lecture 5: Network Attacks I. Course Admin

Network Scanning. What is a Network scanner? Why are scanners needed? How do scanners do? Which scanner does the market provide?

Network Mapper and Vulnerability Scanning

Network and Services Discovery

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie

Attacks and Defense. Phase 1: Reconnaissance

Penetration Testing. What Is a Penetration Testing?

Host Fingerprinting and Firewalking With hping

Installing and Configuring Nessus by Nitesh Dhanjani

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

Lab 3: Recon and Firewalls

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Penetration Testing. Security Testing

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Divide and Conquer Real World Distributed Port Scanning


Denial Of Service. Types of attacks

SCP - Strategic Infrastructure Security

Linux Network Security

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Looking for Trouble: ICMP and IP Statistics to Watch

Learn Ethical Hacking, Become a Pentester

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Payment Card Industry (PCI) Executive Report. Pukka Software

Chapter 8 Security Pt 2

Security: Attack and Defense

Host Discovery with nmap

Stop that Big Hack Attack Protecting Your Network from Hackers.

Network Security CS 192

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

CS5008: Internet Computing

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.

Vulnerability Assessment and Penetration Testing

Firewalls Netasq. Security Management by NETASQ

CSCE 465 Computer & Network Security

The Nexpose Expert System

Web App Security Audit Services

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

How To Hack A Nmap Port Scan With A 10 Second Delay On A Network With A Network On A Windows Server (For A Freebie) On A Linux Computer (For Freebie). For A Free Download) On An Ipnet (For

Algorithms and Techniques Used for Auto-discovery of Network Topology, Assets and Services

IxLoad-Attack: Network Security Testing

Remote Network Analysis

A Very Incomplete Diagram of Network Attacks

nmap, nessus, and snort Vulnerability Analysis & Intrusion Detection

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Windows Insecurity. Penetrated. v0.11

Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.

Firewall implementation and testing

Computer forensics

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

HW/Lab 2: Network Mapping and Attacks. CS 336/536: Computer Network Security DUE at 10/19/2015 (11am)

Course Title: Penetration Testing: Security Analysis

Attack Lab: Attacks on TCP/IP Protocols

7. Firewall - Concept

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Abstract. Introduction. Section I. What is Denial of Service Attack?

Chapter 8 Network Security

Introduction. Nmap from an Ethical Hacker's View Part 1. By Kirby Tucker

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

AC : TEACHING NETWORK SECURITY THROUGH SIGNA- TURE ANALYSIS OF COMPUTER NETWORK ATTACKS

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca

1.0 Introduction. 2.0 Data Gathering

Introduction of Intrusion Detection Systems

Phase 2: Scanning Detec0ng informa0on useful for break- in Live machines Network topology Firewall configura0on Applica0ons and OS types Vulnerabili0es

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Penetration Testing Workshop

Introduction to Network Security Lab 2 - NMap

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

Payment Card Industry (PCI) Executive Report 10/27/2015

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Assessing Network Security

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

Firewall Firewall August, 2003

My FreeScan Vulnerabilities Report

Web Application Vulnerability Testing with Nessus

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

General Network Security

A Selection of Network Penetration Test Tools

Development of a Network Intrusion Detection System

Attack and Defense Techniques

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Blended Security Assessments

Part I - Gathering WHOIS Information

Andreas Dittrich, Philipp Reinecke Testing of Network and System Security. example.

Transcription:

Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology

Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment

Reconnaissance Internet Network Information Center who-is database www.internic.net/whois.html Registrar s database i.e. www.networksolutions.com American Registry for Internet Numbers (ARIN) http://ww2.arin.net/whois/ Domain Name System (DNS) nslookup

Scanning: Network Mapping Ping and traceroute Cheops network mapping tool

Cheops-ng Created by Mark Spencer for Linux systems, available at http://www.marko.net/cheops/ Purpose: To provide system administrators and users with a simple interface to managing and accessing their networks. Cheops aims to do for the network what the file manager did for the filesystem. This tool automates ping and traceroute.

Cheops-ng: What does it do? Finds active hosts in a network Determines the names of active hosts Discovers host operating systems Detects open ports Maps the complete network in a graphical format Monitors hosts

Cheops-ng: How does it work? Utilizes ICMP ping packets to search a network for alive hosts Domain Name Transfers (nslookup) are used to list hosts Invalid flags on TCP packets (queso) are used to detect the OS Half-open TCP connections are used to detect ports UDP packets with small TTL values are used to map the network Normal connect sequences are used to conduct monitoring

Scanning:Port scanning (1) Why: To find open ports in order to exploit them. How: TCP Connect -- attempt to complete 3-way handshake, look for SYN-ACK, easy to detect this scan TCP SYN Scan -- half-open scan, look for SYN-ACK, then send RESET, target system will not record connection, also faster than TCP connect scan TCP FIN, Xmas Tree, Null Scans -- scans that violate the protocol, closed ports send RESET, open ports send nothing (Windows does not respond to these scans)

Port scanning (2) How (cont.): TCP ACK Scan -- may be useful to get past packet filters (believes it is a response to a request from inside firewall), if receive RESET, know this port is open through firewall FTP Bounce Scan -- request that server send file to a victim machine inside their network (most servers have disabled this service) UDP Scan -- unreliable, if receive ICMP Port Unreachable, assume closed, otherwise open Ping Sweep-- can use ICMP or TCP packets

Port scanning (3) Additional Info: Decoys -- insert false IP addresses in scan packets Ping Sweeps -- identify active hosts on a target network Find RPCs -- connect to each open port looking for common RPC services (send NULL RPC commands)

OS detection Why: To determine what Operating System is in use in order to exploit known vulnerabilities. Also known as TCP stack fingerprinting. Take advantage of ambiguity of how to handle illegal combinations of TCP code bits that is found in the RFCs. Each OS responds to illegal combinations in different ways. Determine OS by system responses.

Nmap Purpose: To allow system administrators and curious individuals to scan large networks to determine which hosts are up and what services they are offering. Available at: http://www.insecure.org/nmap/

Nmap: What does it do? Port scanning OS detection Ping sweeps

Nmap: How does it work? Use the following Scan techniques : UDP TCP connect() TCP SYN (half open) ftp proxy (bounce attack) Reverse-Identification ICMP (ping sweep) FIN ACK sweep Xmas Tree SYN sweep IP Protocol Null Scan

Nmap: How does it work? (2) Uses the following OS detection techniques TCP/IP fingerprinting stealth scanning dynamic delay and retransmission calculations parallel scanning detection of down hosts via parallel pings decoy scanning port filtering detection direct (non-portmapper) RPC scanning fragmentation scanning flexible target and port specification.

Vulnerability Assessment (1) Vulnerabilities come from: Default configuration weakness Configuration errors Security holes in applications and protocols Failure to implement patches!

Vulnerability Assessment (2) Vulnerability checkers use: Database of known vulnerabilities Configuration tool Scanning engine Knowledge base of current scan Report generation tool

Nessus Purpose: To provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner. Security Scanner: A software which will audit remotely a given network and determine whether bad guys (aka 'crackers') may break into it, or misuse it in some way. Available platforms: UNIX for client and server Windows for client only Available at: http://www.nessus.org/

Nessus: What does it do? Iteratively tests a target system (or systems) for known exploitation vulnerabilities Uses a separate plug-in (written in C or Nessus Attack scripting Language) for each security test Can test multiple hosts concurrently Produces a thorough vulnerability assessment report at the conclusion of the vulnerability scan

What does Nessus check for? Backdoors CGI abuses Denial of Service Finger abuses FTP Gain a shell remotely Gain root remotely Port scanners Remote file access RPC SMTP problems Useless services Windows and more...

Summary Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Cheops, Nmap, Nessus