Network Security With nmap By *** *****. Installing nmap netlab-2# cd /usr/ports/security/nmap netlab-2# make install all.

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
CS682- Network Management and Security Prof. Katz.
IS 247 Introduction to Web Application Development Tim Wu.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Providing secure open- access networks Oliver Gorwits Oxford University Computing Services.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
December 1, 2000Slide #1 Port Scanning Matt Bishop Department of Computer Science University of California, Davis.
The Internet Ed Lazowska Bill & Melinda Gates Chair in Computer Science & Engineering University of Washington August 2010.
COEN 252: Computer Forensics Router Investigation.
Networking in a Linux Environment Pete Eby Dan Thomas Robert Zurawski.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Module 1: Reviewing the Suite of TCP/IP Protocols.
CBAC L AB. Nmap Port scanner Nmap: the beef, Zenmap: GUI frontend Findings before CBAC firewall c. What services are running and available on R1 from.
Taeho Oh/PLUS 3rd CONCERT Workshop Nov Intrusion demonstration Part I Postech PLUS Taeho Oh (PLUS015)
© 2010 Cisco Systems, Inc. All rights reserved. 1 CREATE Re-Tooling Discovery Server Installing and Using it in the Discovery and Exploration Classes Angel.
CS391 Computer & Network Security
Shadow Security Scanner Li,Guorui. Introduction Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built.
Honeypot and Intrusion Detection System
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Wireless Networks and the NetSentron By: Darren Critchley.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Port Scanning and Enumeration (NMAP)
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Linux Networking and Security
IPv4 Exercices Q1. How many hosts are described with the following prefixes? Q2. Find the Network and the Broadcast addresses for the following.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
1 UDP : User Datagram Protocol Computer Network System Sirak Kaewjamnong.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Kickstart Installation
Linux Networking #1 Dr. Michael L. Collard 1.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Network Programming All networked computers have an IP Address – Unique – In the form of xxx.xxx.xxx.xxx ( ) – 32 bits = ~4 billion possibilities.
Installing a Network Printer. Network printers work much like any other printer except the data flow is through a network. This means the printer must.
High Availability (HA)  Goal : a solution for reliability, availability, and serviceability in Linux.  Focus on the services in the network.  Use the.
BNL PDN Enhancements. Perimeter Load Balancers Scaleable Performance Fault Tolerance Server Maintainability User Convenience Perimeter Security.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
A Next Generation OCS Obstacles to Overcome When Connecting via Ethernet Cscape EnvisionRV EnvisionFX Modbus TCP SRTP EGD Ethernet IP ICMP FTP HTTP.
Purpose Present Drivers and Context for Firewalls Define Firewall Technology Present examples of Firewall Technology Discuss Design Issues Discuss Service.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
© 2001, Cisco Systems, Inc. CSPFA 2.0—6-1 Chapter 6 Configuring Multiple Interfaces.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Lab #2 NET332 By Asma AlOsaimi.
Security+ Simulations
Introduction to Operating Systems
The Linux Operating System
Backdoor Attacks.
Hasil Scan Situs Internet Bank
How data travels through a network The Internet
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
6. Operating Systems Finger printing & Scanning
Maestro Heritage Ethernet
Working at a Small-to-Medium Business or ISP – Chapter 7
Analyzing OS Sample Windows 7 image provided by different class
CSE 451: Operating Systems Autumn 2009 Module in 9 slides
Introduction to Client/Server Computing
CSE 451: Operating Systems Autumn 2010 Module in 9 slides
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Computer Networks Protocols
Hush Smart Baby Monitor Exploit
Introduction to Networking Security
Presentation transcript:

Network Security With nmap By *** *****

Installing nmap netlab-2# cd /usr/ports/security/nmap netlab-2# make install all

Ethernet interface netlab-2# nmap Starting nmap V ( ) Interesting ports on netlab-2.labnet.cse.ucsc.edu ( ): (The 1588 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 111/tcp open sunrpc 587/tcp open submission 1020/tcp open unknown 1021/tcp open unknown 1022/tcp open unknown 1023/tcp open unknown 2049/tcp open nfs 8080/tcp open http-proxy Nmap run completed -- 1 IP address (1 host up) scanned in 8 seconds

Wireless Interface netlab-2# nmap Starting nmap V ( ) Interesting ports on netlab-2.net2.labnet.cse.ucsc.edu ( ): (The 1588 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 111/tcp open sunrpc 587/tcp open submission 1020/tcp open unknown 1021/tcp open unknown 1022/tcp open unknown 1023/tcp open unknown 2049/tcp open nfs 8080/tcp open http-proxy Nmap run completed -- 1 IP address (1 host up) scanned in 8 seconds

Netlab server ethernet interface netlab-2# nmap Starting nmap V ( ) Interesting ports on netlab.labnet.cse.ucsc.edu ( ): (The 1593 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 515/tcp open printer 587/tcp open submission 5999/tcp open ncd-conf Nmap run completed -- 1 IP address (1 host up) scanned in 9 seconds

A possible problem Port 1020 is open A known trojan called VAMPIRE attacks at this port

The solution Close port 1020! In /etc/rc.firewall: ${fwcmd} add reject from any to port 1020 via ${oif}

The security job is never done No matter how secure your firewall is, there are always going to be ways to exploit your computer, server, or LAN Take precautions, but also keep monitoring