COLIN O’HANLON & NICK CIGANKO Sam Spade: Network Query Tool.

Slides:



Advertisements
Similar presentations
Safer, Speedier and Sexier Surfing with Safari. Which Web Browser?
Advertisements

NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
X10 hosting Sign up for free account. Enter a domain name click continue Then Enter your address Enter a password.
Operating System Customization
Remote Desktop Access Novell at Home. Remote desktop access Works on Broadband Computer at work must.
The Internet Useful Definitions and Concepts About the Internet.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
URL Obscuring COEN 152/252 Computer Forensics  Thomas Schwarz, S.J
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Domain Name Server © N. Ganesan, Ph.D.. Reference.
Invoices On – Line Registration Instructions for Vendors.
Technical Training: DIR-615
By: Van Lam Info Tech 2 Period 10/11 Mr. Holmes Quincy High School.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Branded Websites. Branded Website Training Click the “Edit Pencil” to edit the website Enter in your iBoomerang username and password.
Networking Feb. 6, 2008 by Larry Finger. Networking Hardware Glossary RJ45 – Official name for 8-pin connector Cat 5, 5E or 6 - Cable suitable for “high”-speed.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Barracuda Load Balancer Server Availability and Scalability.
Microsoft Azure Introduction ISYS 512. Microsoft Azure Microsoft Azure is a cloud.
Go to the MTSD Home Page In the URL add “/admin”
Session 10 Windows Platform Eng. Dina Alkhoudari.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
$100 $200 $300 $400 $500 Types of websites Searching on the Internet History and misc Internet Misc Info.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Zscaler New Interface and Reporting From Saturday 8 th June 2013.
Introduction to eChalk For Students. What is eChalk? eChalk’s unique online learning environment provides your school with its own electronic “town square”
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
VAP Data Platform Call Terry Shen, MSPH, PhD Dec 13, 2012.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
Finding The IP Address On Your Work Computer- Windows 7 On Windows 7 follow directions below: Type in “IP Address” in the URL line in your browser Click.
Configure the Server –Login to the Web-Based Server Manager Username “admin” Password – your password –You can change the.
How to Deploy and Configure the Smart Net Total Care CSPC Collector
Mozilla. Why mozilla Main Components Browser features Loads very quickly Personal toolbar with your locations Can turn off pop-up windows good control.
NetTech Solutions Common Connectivity Problems Lesson Eight.
Lecture 12 Windows Firewall and Action Center. Firewalls Protect networks by stopping network traffic from passing through it Implemented as either a.
Footprinting and Scanning
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
How Magento eCommerce Enterprises Works and Manage Zaptech Solutions.
WHAT IS FOOTPRINTING?. FOOTPRINTING  Active  Passive - Passive footprinting is a method in which the attacker never makes any contact with the target.
Tools We Are Going To Use
Chapter 10: Web Basics.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Footprinting and Scanning
Personal spaces.
Using Apps to Get and Share Information
Em4 Ethernet tutorial Remote connection.
Planning and Configuring IPv4
Phishing...or What to Call It?
Troubleshooting IP Communications
Hotmail, undoubtedly known for its best features and a number of customers enjoy this mail service because it’s easy accessibility and user-friendly interface.
Footprinting and Scanning
Steps to Setup and Install McAfee Antivirus
Demo Advanced Threat Protection
Easy Way to Reset WordPress Admin Password on Localhost? Guided By: WPGLOBALSUPPORTWPGLOBALSUPPORT.
 Best SEO Company in Udaipur Web
DHCP, DNS, Client Connection, Assignment 1 1.3
IIS.
Information Security Session October 24, 2005
Welcome! IE 7 Test Drive Presented by the Office of Information Technology.
FootPrinting CS391.
AKAMAI INTELLIGENT PLATFORM™
to … monnigcte.weebly.com
NETWORK SECURITY LAB Lab 8. Firewall and VPN.
SmartWhoIs SmartWhois runs on Windows. Both 32- and 64-bit versions are supported. An evaluation version is available in the Download Area.  SmartWhoIs.
How to Block Ads in Yahoo Mail chrome
Tips for Importing into Another Gmail Account | GMAIL CUSTOMER SERVICE NUMBER
Presentation transcript:

COLIN O’HANLON & NICK CIGANKO Sam Spade: Network Query Tool

What it does Used to identify malicious sites Operates on multiple platforms Basic network query  Ping for service  Finger  Tracert  Whois  Reporting abuse  DNS diagnostics

Why? Block unwanted network contact  Spam mail origins  Adversary working from a specific IP  Malicious host General network curiosity

Other Features Scanning addresses Crawling for info Browsing  Source Blacklist Check Timezone check

Ping Contact a host (local or networked) Number of pings Types to ping IP Ping URL Ping

Finger Retrieves IP address Works on sites, mail hosts

Tracert Network hub diagnostics GUI focus

Whois Network Diagnostics Address Registration Admins

Abuse Reporting Site’s abuse department Finds associtaed complaint center and provides address  Usually ” format

How does this help me now? Scenario: You have a malicious website that wants to access your computer but you cannot exit the browser window, ect.  Finger the URL for the IP  As Windows Admin: Start>Control Panel>System and Security>Windows Firewall>Advanced Settings  Select the INBOUND RULES, then single click the NEW RULE on the right panel  Custom Rule>All Programs>Next> Add (enter the IP as a These remote IP address) > BLOCK CONNECTION > Next>Next>Finish  DEMO

Questions or Concerns?