6. Operating Systems Finger printing & Scanning

Slides:



Advertisements
Similar presentations
Part 2 Penetration Testing. Review 2-minute exercise: RECON ONLY Find 3x IP addresses at the U.S. Merchant Marine Academy Google: “U.S. Merchant Marine.
Advertisements

Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
System Security Scanning and Discovery Chapter 14.
System and Network Security Practices COEN 351 E-Commerce Security.
IS 247 Introduction to Web Application Development Tim Wu.
Network Management 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 16, Thursday 4/19/2007)
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Network Security With nmap By *** *****. Installing nmap netlab-2# cd /usr/ports/security/nmap netlab-2# make install all.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Penetration Testing.
Ana Chanaba Robert Huylo
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
CPMT 1451 IT Essentials: PC Hardware and Software ITCC 1301 Cisco Exploration 1: Network Fundamentals ITCC 1304 Cisco Exploration 2: Routing Protocols.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
CIS 450 – Network Security Chapter 3 – Information Gathering.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
--Harish Reddy Vemula Distributed Denial of Service.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Hands on with BackTrack Information gathering, scanning, simple exploits By Edison Carrick.
Linux Networking and Security
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring and Testing Your Network Network Fundamentals – Chapter.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
By Matt Jennings & David Spano.  History of Nmap  What is Nmap  How Nmap works  The goal of Nmap  What is Zenmap  Advantages of Zenmap  How to.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network Devices and Firewalls Lesson 14. It applies to our class…
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Honeypot as a Service Bedřich Košata • • 26 May 2016.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Pass4itsure Cisco Dumps
Jen Beveridge and Joe Kolenda
Enumeration The First Step.
Introduction to Network Scanning
Chapter 2: Configure a Network Operating System
Footprinting and Scanning
The Linux Operating System
Backdoor Attacks.
Internet and Intranet.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Footprinting and Scanning
Internet and Intranet.
Chapter 2: Configure a Network Operating System
Intro to Ethical Hacking
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
Metasploit Analysis Report Overview
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Analyzing OS Sample Windows 7 image provided by different class
Internet and Intranet.
Hyperlinks and Protocols
Traffic Analysis– Wireshark Simple Example
Network+ Guide to Networks, Fourth Edition
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
Protocol Application TCP/IP Layer Model
Chapter 7 Network Applications
Internet and Intranet.
Presentation transcript:

6. Operating Systems Finger printing & Scanning NETWORK SECURITY LAB Lab 6. Operating Systems Finger printing & Scanning

OS Fingerprinting – Process of determining the Operating System used by a host on a network. • Forensics Wiki – What are the contents of an OS Fingerprint? • Just like human fingerprints have unique characteristics, OS fingerprints are unique too. • These characteristics are reflecting during communication. • By capturing and analyzing certain protocol flags and data packets, we can accurately establish the identity of the OS that relayed it.

How is it different than Scanning? Scanning is done against IP addresses of computers only such as mail servers, web servers or standalone PC’s. OS fingerprinting can be don all network based devices such as Routers, switches, printers, etc.,

Points to ponder about nMap • nMap is a very noisy solution Raises a lot of alerts in IDS/IPS solutions while scanning. The trick is to use nMap with different switches smartly so that the scans remain less frequent yet result effective. – Usage of switches

Hands On – Lab Activity Download and install the nMap Utility

Target To keep the scanning legal and ethical we will use the following url to scan. The url is provided freely by nMap to be scanned and exploited for practice purposes: – http://scanme.nmap.org

Switches to be used in nMap -V : returns the version number of the service you are hosting -A / -O: Enables OS detection, version detection, script scanning - Using the nMap GUI run a scan against scanme.nmap.org

Objective • To intense scan a network (system / server / router) • Run the nMap utility in GUI Mode Scanme.nmap.org

Scanning through nMap • nMap returns with results

Scanning a target for specific ports • Nmap –p <<port number>> 22 <<ssh port>> – target • nMap –p 22 scanme.nmap.org

Aggressive Scanning using nMap • nMap –A <<aggressive>> target – nMap –A scanme.nmap.org Gives the Operating System version of the target. • nMap –F target – Fast scanning (100 ports) of the target • nMap –open target – Runs a fast probe on target and retrieves only open ports on the target.

Report Work: • Using nMap commands and switches provide the result for the following information: – Scan http://www.altoromutual.com using nMap to • identify: The version of the Operating System The Services Running on the target Search for ports 8080, 22 and 443 on the target Use a fast scan on the target Retrieve only the open ports on the target • Provide the answers in the following format: Command with switch Result

Questions