Calvin Wilson Craig Delzangle

Slides:



Advertisements
Similar presentations
Network Mapping  Identify Live Hosts  Determine running Services TCP Port Scanning UDP Port Scanning Banner Grabbing ARP Discovery  Identify Perimeter.
Advertisements

Nmap Experiment.
Network Security of Labnet ******. Introduction Test the network security of the servers on our Labnet domain Find Potential Weaknesses Find Security.
Essential NetTools Pranay Kumar. Essential NetTools  This tool is a set of network tools useful in diagnosing networks and monitoring your computer's.
Vulnerability Analysis Borrowed from the CLICS group.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Port Scanners.
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
Computer Security and Penetration Testing
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
Networking in a Linux Environment Pete Eby Dan Thomas Robert Zurawski.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Team BAM! Scott Amack, Everett Bloch, Maxine Major.
Mohan Kumar Puttasiddaiah
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Shadow Security Scanner Li,Guorui. Introduction Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built.
Honeypot and Intrusion Detection System
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
The Microsoft Baseline Security Analyzer A practical look….
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
CIS 450 – Network Security Chapter 3 – Information Gathering.
MIS Week 4 Site:
Port Scanning and Enumeration (NMAP)
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Port Scanners.
Android Mobile Security Krystal Salerno. Introductions.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
ITEC400 Assignment 14-1 Prof: D’Andrea By Alex Doh OPEN SOURCE PAPER (ANGRY IP SCANNER)
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Mastering Windows Network Forensics and Investigation Chapter 10: Tool Analysis.
Security with Honeyd By Ryan Olsen. What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored.
TCOM Information Assurance Management System Hacking.
Retina Network Security Scanner
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Footprinting and Scanning
IT 463 – Scanning Assignment Shane Knisley Erik Bennett.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Who’s On My WiFi Mohan Kumar Puttasiddaiah. Who’s On My WiFi Shows Piggy backer on home or business network. Scans the entire network for every 5 to 10.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
SECURITY ANALYSIS TOOLS FOR INFORMATION MANAGEMENT Alicia Coon.
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Jen Beveridge and Joe Kolenda
Enumeration The First Step.
Footprinting and Scanning
CompTIA Security+ SY0-401 Real Exam Question Answer
Backdoor Attacks.
Penetration Testing Karen Miller.
Footprinting and Scanning
Security Boot Camp Intro
Digital Pacman: Firewall Edition
Nessus Vulnerability Scanning
FootPrinting CS391.
Nessus Vulnerability Scan
Metasploit Analysis Report Overview
Analyzing OS Sample Windows 7 image provided by different class
Metasploit assignment – Arkadiy Kantor – Mis-5212
Hacking Windows Damian Gordon.
EVAPI - Enumeration Auburn Hacking club
Presentation transcript:

Calvin Wilson Craig Delzangle SuperScan 4.0 Calvin Wilson Craig Delzangle

Roadmap What is SuperScan? What can you do with SuperScan? How can this help with network security? Conclusion

What is SuperScan SuperScan is a network analyzer and port scanner. Very easy to use, but extemely effective. Created by Adobe Windows Tool No installation required

Interface

What can you do with SuperScan? Scan local machines or a website domain Find all active hosts Discovers the hostnames. Discovers open UDP and TCP ports Has a build in Traceroute Has enumeration Can find the services running on a machine

Tools

How can this tool can help security? You can use this to find almost all of the security vulnerabilities. You can look at the traceroute. You can discover any unwanted hosts. Can be used for preventative hacking.

Conclusion Windows Network Tool Scan local or network machines for vulnerabilities. Can be used for white-hat hacking.