Network Security Testing Techniques Presented By:- Sachin Vador.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Separate Domains of IT Infrastructure
System Security Scanning and Discovery Chapter 14.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Information Security Policies and Standards
Case Studies for Projects. Network Audit A brief description of the systems (via fingerprinting, if black box is used) Network perimeter should be described.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Security and Penetration Testing
Lesson 19: Configuring Windows Firewall
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
COEN 252: Computer Forensics Router Investigation.
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Information Systems Security Computer System Life Cycle Security.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 4 Finding Network Vulnerabilities By Whitman, Mattord, & Austin© 2008 Course Technology.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 14: Configuring Server Security Compliance
Software Security Testing Vinay Srinivasan cell:
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
CIS 450 – Network Security Chapter 3 – Information Gathering.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Information Systems Security Operations Security Domain #9.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Linux Networking and Security
Engineering Essential Characteristics Security Engineering Process Overview.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Wireless Intrusion Prevention System
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
TCOM Information Assurance Management System Hacking.
Retina Network Security Scanner
Module 10: Windows Firewall and Caching Fundamentals.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Role Of Network IDS in Network Perimeter Defense.
Computer Security Sample security policy Dr Alexei Vernitski.
Filip Chytrý Everyone of you in here can help us improve online security....
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Port Scanning James Tate II
WSU IT Risk Assessment Process
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
FIREWALL configuration in linux
Secure Software Confidentiality Integrity Data Security Authentication
Lesson Objectives Aims You should be able to:
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Security of a Local Area Network
Unauthorized Access Risk Mitigation Techniques
Security in Networking
Unit 27: Network Operating Systems
Digital Pacman: Firewall Edition
IS4680 Security Auditing for Compliance
Operating System Security
Network hardening Chapter 14.
6. Application Software Security
Presentation transcript:

Network Security Testing Techniques Presented By:- Sachin Vador

System Development Life Cycle

 1. Initiation – the system is described in terms of its purpose, mission, and configuration.  2. Development and Acquisition – the system is possibly contracted and constructed according to documented procedures and requirements.  3. Implementation and Installation – the system is installed and integrated with other applications, usually on a network.  4. Operational and Maintenance – the system is operated and maintained according to its mission requirements.  5. Disposal – the system’s lifecycle is complete and it is deactivated and removed from the network and active use.

When is the Network Security Testing done?  It is done after system has been developed, installed and integrated during Implementation and Operational stages.

Tools and Techniques for Network Security  Network Scanning  Vulnerability Scanning  Password Cracking  Log Reviews  War Dialing  Wireless LAN Testing (War Driving)  Penetration Testing

Network Scanning  Scan for connected hosts  Scan for services running on the host  Scan for which applications are running those services  How Scanning takes place? Ping the hosts using ICMP ECHO and Reply. Look for open TCP/UDP ports.  Operating system fingerprinting. Not reliable as firewalls can be configured to camouflage the operating system.

Network Scanning  Vulnerabilities of IIS different from Apache.  Listen on the remote port.  Banner Grabbing.  Need human to interpret the results.  Preparation for Penetration Testing.

Network Scanning Results  Investigate and disconnect unauthorized hosts  Disable or remove unnecessary and vulnerable services  Modify vulnerable hosts to restrict access to vulnerable services to a limited number of required hosts (e.g., host level firewall or TCP wrappers), and  Modify enterprise firewalls to restrict outside access to known vulnerable services.

Vulnerability Scanning  Takes Network Scanning 1 step ahead.  Maintains database of vulnerabilities in operating systems.  They generate more traffic that port scanners.  Network based Scanners.  Host based Scanners.

Log Reviews  Dynamic picture of system activities.  Conformance with the security policies.  IDS sensors placed behind firewall.  Change Firewall Policies.

War Dialing  Unauthorized modems.  Dialing software can dial hundreds of numbers in short time  Block the inbound calls to the identified number if it is not possible to remove them

War Driving  Wireless Default Configuration is insecure.  Drive Test  Just need wireless network card and testing tools  Frequency of testing

Penetration Testing  It is a method of getting into the system by using the techniques used by the attacker.  Specific IP addresses/ranges to be tested  Any restricted hosts (i.e., hosts, systems, subnets, not to be tested)  A list of acceptable testing techniques (e.g. social engineering, DoS, etc.) and tools (password crackers, network sniffers, etc.)  Times when testing is to be conducted (e.g., during business hours, after business hours, etc.)  Identification of a finite period for testing  IP addresses of the machines from which penetration testing will be conducted so that administrators can differentiate the legitimate penetration testing attacks from actual malicious attacks  Points of contact for the penetration testing team, the targeted systems, and the networks  Measures to prevent law enforcement being called with false alarms (created by the testing)  Handling of information collected by penetration testing team.

Penetration Testing  Blue Teaming  Red Teaming

Phases of Penetration Testing

 Planning Phase Goals are set. Permission is taken. No testing.  Discovery Phase Testing starts. Port scanning is used to identify the vulnerabilities.  Executing the attack Exploit the vulnerabilities.

Conclusion  Acceptable use guidelines (e.g., what is acceptable use of organization computing and network resources)  Roles and responsibilities (for users, administrators, management)  Authentication (e.g., passwords, biometrics)  Availability of resources (redundancy, recovery, backups)  Compliance (infractions, consequences and penalties).

Questions ?