Vulnerability Scanning at NU Robert Vance NUIT-Telecom & Network Services.

Slides:



Advertisements
Similar presentations
3D Tool Examples Dave Breslin Tenable Discussions Forum)
Advertisements

Nmap Experiment.
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Vulnerability Analysis Borrowed from the CLICS group.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
UNITS meeting September 30, 2004 Network Security Roger Safian
1 Colorado University Guest Lecture: Vulnerability Assessment Chris Triolo Spring 2007.
NetPass and Northwestern By Julian Y. Koh As told by Robert Vance NUIT-Telecom & Network Services.
Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Department of Information Technology NUSA Overview Mike Rykowski IT-TNS.
Greg Williams. IT Security Program  Objective is to maintain integrity of University systems  Minimum Security Standard.
Computer Security and Penetration Testing
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Vulnerability Types And How to Use Them.
1000 Hackers in a Box Problems with modern security scanners.
Scanners Inventory all machines on site; 12,000+ nmap farm All machines usually twice a day Find critical vulnerabilities and issue blocks Nessus Homegrown.
Ana Chanaba Robert Huylo
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Passive Visual Fingerprinting of Network Attack Tools Gregory Conti Kulsoom Abdullah College of Computing Georgia Institute of Technology Passive.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
CIS 450 – Network Security Chapter 3 – Information Gathering.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
MIS Week 4 Site:
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Vulnerability Scan Assessment CS/IT 463 Bryan Dean Jonathan Ammons.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
1 Lab 1: Reconnaissance, Network Mapping, and Vulnerability Assessment Reconnaissance Scanning Network Mapping Port Scanning OS detection Vulnerability.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
VEGA TERRY WELLIVER GREG SYME JUANA WELLS NAVAL POSTGRADUATE SCHOOL.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Ethical Hacking License to hack. OVERVIEW Ethical Hacking ? Why do ethical hackers hack? Ethical Hacking - Process Reporting Keeping It Legal.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Role Of Network IDS in Network Perimeter Defense.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Vulnerability Scanning Michael Overton, Jason Ferris, Erik Brown.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
SECURITY ANALYSIS TOOLS FOR INFORMATION MANAGEMENT Alicia Coon.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Penetration Testing Karen Miller.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Security in Networking
6. Operating Systems Finger printing & Scanning
Computer Security Fundamentals
Metasploit Analysis Report Overview
A Patch A Day Keeps The Malware Away
Presentation transcript:

Vulnerability Scanning at NU Robert Vance NUIT-Telecom & Network Services

Outline Scanning Review Tool Discussion The NU Scanning Service Scanning Limitations Futures

Quick Scanning Overview What is scanning? –System Reconnaissance –Achieved via Observable Protocol and Application Characteristics –Port Scanning vs Vulnerablity Scanning Why is it done? –good: Detect and protect exposed systems –bad: No faster way to spread malware

The Tools Port Scanners –nmap Vulnerability Scanners –Nessus –NeWT –Retina –ISS

The Idea The fundamental idea behind vulnerability scanning is to identify and then fix system weaknesses before miscreants use those weaknesses against us.

Vulnerability Scanning Service Handpicked Nessus Plugins Loop through the NU Address Space Import failed Scan Results into NUSA or NetPass and Repeat

Scanning Limitations Firewalls Other Visibility Limitations False Positives Scanning only gets you so far...

Possible Futures On Demand Scanning Host Based Agents Stateful Firewalls Everywhere