Analyzing OS Sample Windows 7 image provided by different class

Slides:



Advertisements
Similar presentations
Part 2 Penetration Testing. Review 2-minute exercise: RECON ONLY Find 3x IP addresses at the U.S. Merchant Marine Academy Google: “U.S. Merchant Marine.
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Network Security of Labnet ******. Introduction Test the network security of the servers on our Labnet domain Find Potential Weaknesses Find Security.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
System Security Scanning and Discovery Chapter 14.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Information Networking Security and Assurance Lab National Chung Cheng University 2004/03/031 A Real World Attack: wu-ftp Cao er kai ( 曹爾凱 )
Computer Security and Penetration Testing
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
Network Security With nmap By *** *****. Installing nmap netlab-2# cd /usr/ports/security/nmap netlab-2# make install all.
Penetration Testing.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
Ana Chanaba Robert Huylo
Mohan Kumar Puttasiddaiah
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
CIS 450 – Network Security Chapter 3 – Information Gathering.
--Harish Reddy Vemula Distributed Denial of Service.
MIS Week 4 Site:
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
A powerful network monitoring system
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module.
Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Mastering Windows Network Forensics and Investigation Chapter 10: Introduction to Malware.
1 Copyright © 2015 Pexus LLC Patriot PS Personal Server Importing Virtual Appliance Image.
Retina Network Security Scanner
Shellcode Development -Femi Oloyede -Pallavi Murudkar.
By Mohammad Alsawwaf. To apply the theory part from my last presentation into the application part (The lab)
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
How To Be nosey on the Interwebz. What you need Linux Laptop Local Wireless Network you want to do sniffing on ettercap Wireshark driftnet nmap.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Protection (tools).
Jen Beveridge and Joe Kolenda
Penetration Testing Scanning
Enumeration The First Step.
Nessus Vulnerability Scan
Nessus Vulnerability Scan
Port Scanning James Tate II
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
CITA 352 Chapter 5 Port Scanning.
The Linux Operating System
Calvin Wilson Craig Delzangle
Nessus Vulnerability Scan
Nessus Vulnerability Scan Report
Penetration Testing Karen Miller.
Metasploit assignment
Everything You Need To Know About Penetration Testing.
Nessus Vulnerability Scanning
6. Operating Systems Finger printing & Scanning
Metasploit Assignment
Nessus Vulnerability Scan
Metasploit Analysis Report Overview
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
TCP XMAS.
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
Metasploit assignment – Arkadiy Kantor – Mis-5212
Using a Nessus Scanner on a
Penetration Testing & Network Defense
Hush Smart Baby Monitor Exploit
NESSUS SCANNING By: Vaibhav Shukla.
Presentation transcript:

Analyzing OS Sample Windows 7 image provided by different class Installed on VMware Used NMAP and Nessus to scan for vulnerabilities Unfortunately no vulnerabilities were found Ahmed Alkaysi

Target machine IP discovery Used NMAP to find the IP Initial scan – ‘192.168.29.0/24’ Only a couple results returned, none being the target machine Decided to use MAC address to find IP MAC address known via VMware – ‘00:0C:29:63:25:76’ 2nd scan ‘-sP -n 192.168.29.0/24’ discovered ‘192.168.29.116’ associated with above MAC Targeted specific IP using ‘-Pn 192.168.29.116’ Message returned saying all 1000 ports filtered Decided to move on to Nessus Ahmed Alkaysi

Nessus and Conclusion Used Basic Network Scan in Nessus Took ~15 minutes to complete No vulnerabilities were discovered Only ‘4’ Info items were found Interesting one of the items were specifying the MAC address and Vendor Overall, it seemed like no services were running Security was tight, couldn’t find any holes to exploit Ahmed Alkaysi