CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning
CIT 380: Securing Computer SystemsSlide #2 Vulnerability Scanning Scan for vulnerabilities in systems –Configuration errors –Well-known system vulnerabilities Scanning Tools –Nessus –Attack Tool Kit –GFI LANguard Network Security Scanner –ISS Internet Scanner
CIT 380: Securing Computer SystemsSlide #3 Vulnerability Scanner Architecture User Interface Scanning Engine Scan Results Report Generation Vulnerability Database
CIT 380: Securing Computer SystemsSlide #4 Nessus Report
Nessus Examples s04.htmlhttp://nst.sourceforge.net/nst/docs/user/ch02 s04.html us-ss-big.pnghttp:// us-ss-big.png CIT 380: Securing Computer SystemsSlide #5
CIT 380: Securing Computer SystemsSlide #6 Scanning Tools Summary InformationTool IP addresses of hostsping, nmap -sP Network topologytraceroute Open portsnmap port scans Service versionsnmap -sV OSnmap –O, xprobe VulnerabilitiesNessus, ATK
CIT 380: Securing Computer SystemsSlide #7 References 1.William Cheswick, Steven Bellovin, and Avriel Rubin, Firewalls and Internet Security, 2 nd edition, Fyodor, “The Art of Port Scanning,” Fyodor, NMAP man page, Fyodor, “Remote OS detection via TCP/IP Stack FingerPrinting,” Phrack 54, article.html 5.Simson Garfinkel, Gene Spafford, and Alan Schwartz, Practical UNIX and Internet Security, 3 rd edition, O’Reilly & Associates, Johnny Long, Google Hacking for Penetration Testers, Snygress, Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed, 5 th edition, McGraw-Hill, Ed Skoudis, Counter Hack Reloaded, Prentice Hall, 2006.