CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.

Slides:



Advertisements
Similar presentations
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Advertisements

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Finding Network Vulnerabilities. 2 Objectives Define vulnerabilities Name the common categories of vulnerabilities Discuss common system and network vulnerabilities.
System Security Scanning and Discovery Chapter 14.
Vulnerability Analysis Borrowed from the CLICS group.
Vulnerability Scanning at NU Robert Vance NUIT-Telecom & Network Services.
電腦攻擊與防禦 The Attack and Defense of Computers
1 Colorado University Guest Lecture: Vulnerability Assessment Chris Triolo Spring 2007.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
電腦攻擊與防禦 The Attack and Defense of Computers CEA036許富皓.
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
Computer Security and Penetration Testing
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
Firewall Auditing Sean K. Lowder CISSP / MCSE / CCNA
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Ana Chanaba Robert Huylo
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
CSC 382: Computer SecuritySlide #1 CSC 382: Computer Security Firewalls.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Reconnaissance.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 4 Finding Network Vulnerabilities By Whitman, Mattord, & Austin© 2008 Course Technology.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Securing Operating Systems Rootkits - TAPTI SAHA.
An Introduction to Internet Explorer DLL Vulnerability and Damage Analysis Bo Sun, Dawei Su {sun,
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
CIT 380: Securing Computer Systems
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
CIT 380: Securing Computer Systems
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Firewalls 1.What is a firewall? 2.Types of Firewalls 3.Packet Filtering.
Vulnerability Scan Assessment CS/IT 463 Bryan Dean Jonathan Ammons.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Network Monitoring.
Database as a networked server DB at the centre of the network Network Access Map for DB environment Tracking of tools and apps Remove unnecessary network.
Retina Network Security Scanner
Network Security Audit By David Liu University of Plymouth.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
EECS 4980/6980: Computer SecuritySlide #1 EECS 4980/6980 Phase 1: Reconnaissance Phase 2: Scanning.
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Changes in Computer Security Will You Be Better Off?
Hands-On Ethical Hacking and Network Defense
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
Laboratory Based Courses on Internet Security Prabhaker Mateti Wright State University Dayton, OH NSF DUE
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Rootkits.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Covert Channels.
Project S.N.U.P.E( ) By Patrick D. Cook. Introduction  Background Why this topic and what is S.N.U.P.E ()  Purpose Look for vulnerabilities within a.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
CITA 352 Chapter 5 Port Scanning.
Laboratory Based Courses on Internet Security
CIT 480: Securing Computer Systems
CIT 480: Securing Computer Systems
CIT 480: Securing Computer Systems
CIT 480: Securing Computer Systems
Computer Security Tools.
Intro to Ethical Hacking
Metasploit Analysis Report Overview
CSC 382/582: Computer Security
Hacking Windows Damian Gordon.
Presentation transcript:

CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning

CIT 380: Securing Computer SystemsSlide #2 Vulnerability Scanning Scan for vulnerabilities in systems –Configuration errors –Well-known system vulnerabilities Scanning Tools –Nessus –Attack Tool Kit –GFI LANguard Network Security Scanner –ISS Internet Scanner

CIT 380: Securing Computer SystemsSlide #3 Vulnerability Scanner Architecture User Interface Scanning Engine Scan Results Report Generation Vulnerability Database

CIT 380: Securing Computer SystemsSlide #4 Nessus Report

Nessus Examples s04.htmlhttp://nst.sourceforge.net/nst/docs/user/ch02 s04.html us-ss-big.pnghttp:// us-ss-big.png CIT 380: Securing Computer SystemsSlide #5

CIT 380: Securing Computer SystemsSlide #6 Scanning Tools Summary InformationTool IP addresses of hostsping, nmap -sP Network topologytraceroute Open portsnmap port scans Service versionsnmap -sV OSnmap –O, xprobe VulnerabilitiesNessus, ATK

CIT 380: Securing Computer SystemsSlide #7 References 1.William Cheswick, Steven Bellovin, and Avriel Rubin, Firewalls and Internet Security, 2 nd edition, Fyodor, “The Art of Port Scanning,” Fyodor, NMAP man page, Fyodor, “Remote OS detection via TCP/IP Stack FingerPrinting,” Phrack 54, article.html 5.Simson Garfinkel, Gene Spafford, and Alan Schwartz, Practical UNIX and Internet Security, 3 rd edition, O’Reilly & Associates, Johnny Long, Google Hacking for Penetration Testers, Snygress, Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed, 5 th edition, McGraw-Hill, Ed Skoudis, Counter Hack Reloaded, Prentice Hall, 2006.