Roberto Nogueda ITACS 5211: Introduction to Ethical Hacking

Slides:



Advertisements
Similar presentations
Getting Your Web Site Found. Meta Tags Description Tag This allows you to influence the description of your page with the web crawlers.
Advertisements

SecurityCenter Reporting Nessus Scan Report. SecurityCenter Reports For customers who use Nessus for vulnerability scanning and then move to SecurityCenter,
Comparative study between MyAUP, MyWU, MyUW and MyUSF.
Securing your IP based Phone System By Kevin Moroz VP Technology Snom Inc.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
BTS330 More on Documenting Use Cases. Use Case Descriptions Sample mock up for a scenario: Add Private Owner Client Add Client -X Last name: Address:
Presented by Teererai Marange. Background Open SSL Hearbeat extension Heartbleed vulnerability Description of work Methodology Summary of results Vulnerable.
Digital Literacy Concepts and basic vocabulary. Digital Literacy Knowledge, skills, and behaviors used in digital devices (computers, tablets, smartphones)
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
MM Clements Adding Value to IOS Configs. Introduction IOS configs need you to add information Basic IP and subnet mask Clock rates for serial links Routing.
Who’s On My WiFi Mohan Kumar Puttasiddaiah. Who’s On My WiFi Shows Piggy backer on home or business network. Scans the entire network for every 5 to 10.
Module 5: Network Policies and Access Protection
Gmail Password Recovery Process Find Gmail technical support for Gmail password recovery, recover Gmail password, reset Gmail password, change Gmail password,
Android S Health App By Joseph Willett. Tracks many of your lifestyle behaviors Allows you to input specific goals to make it more personal Has programs.
CCS Information and Support Center Introduction. What is the information center for? Not only does our web-based.
AANTS Update: New Tools, New Features Dave Plonka Charles Thomas DoIT Network Services.
Welcome to Excel Math Basics!
Jen Beveridge and Joe Kolenda
Using Kuder Navigator for Researching Careers
Nessus Scan exercise Arkadiy Kantor MIS5211.
Ethical Hacking By: Erin Noonan.
Print Management Solution in Education
Common Methods Used to Commit Computer Crimes
Food Recall Application
Backdoor Attacks.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Secure Software Confidentiality Integrity Data Security Authentication
Nessus Vulnerability Scan
Nessus Vulnerability Scan Report
Gmail Password Recovery Process
Jill Sullivan Senior Marketing Manager Infront Webworks
Security Student Name :Ala’a Ahmad Mohammad qwassmeh
A Website dedicated entirely to Selling Your Home!
E-commerce Application Security
AdWords Sitelinks. Increasing choice and relevancy in your Search ads.
Introduction to Networking
Adding new printers since April IP address update
Fix AOL Mail Error Code 554 Call for Help
Introduction to Computers
How to Install and Use Malwarebytes Antivirus How to Install and Use Malwarebytes Antivirus Designed to supplement your antivirus software, Malwarebytes.
Risk of the Internet At Home
Step 1: Design for a Computer Medium
6 /30 Meeting and Deliverables
Nessus Vulnerability Scanning
Introduction to computer networks
6. Operating Systems Finger printing & Scanning
Intro to Ethical Hacking
Intro to Ethical Hacking
Untapped Potentials of ‘Console’
ETS Stock Tacking Data Entry Support for Mobile App
How to complete a Referral Form via “Student” tab
Introduction to computer networks
Nessus Vulnerability Assessment
Nessus Vulnerability Scan
Metasploit Analysis Report Overview
Info-Point A Brief Introduction
Analyzing OS Sample Windows 7 image provided by different class
Roberto Nogueda Introductions to Ethical Hacking
OnCourse Connect is simple to use and can be accessed from any online computer, smartphone or tablet device. This secure website will allow you real-time.
How to Navigate MSA-U Need help?
Marion Kelt, Research and Open Access Librarian
DELIGHT WITH UX DESIGN RACHEL KORPELLA
Marion Kelt, Research and Open Access Librarian
Presentation Structures
Training 101 : Accessing iBoomerang Tools
Metasploit assignment – Arkadiy Kantor – Mis-5212
Using a Nessus Scanner on a
NESSUS SCANNING By: Vaibhav Shukla.
Kanban Task Manager SharePoint Editions ‒ Introduction
Presentation transcript:

Roberto Nogueda ITACS 5211: Introduction to Ethical Hacking Professor: Wade Mackey Nessus Vulnerability Scan exercise Temple University

Host and host IP address Basic Network Scan The results displayed in this page provide important information on my private home network with the following descriptions: Host and host IP address Vulnerability Medium Low Info This information can come in handy because patches and fixes can be done to those devices that need the updates individually, and not to the whole network.

Vulnerability Scan break down In this scenario, the type of vulnerability is display in descending order from Medium to Info, and color coded for easy identification, which means that the most important vulnerabilities should be prioritized or looked after first. A simple Google search could found the fix or patch for each vulnerability found here. Since they are all SSL certificate related, it makes it easy to find the patches on those plugin issues detected. For the Info type of vulnerabilities, I would make sure to keep an eye on them before they become a bigger issue or tread.

Conclusion and Lessons Learned Nessus is a great application for vulnerabilities detections in a private or public network. A comprehensive report can be exported and printed to present in a meeting or for technical analysis purposes. A network scan should be launched in a weekly basis if critical or important vulnerabilities are discovered, then switch to twice a month if vulnerabilities are low or less important. Network scans are very important because it may be the only way users discover vulnerabilities before it’s too late. Thank you