CS391 Computer & Network Security

Slides:



Advertisements
Similar presentations
Ethical Hacking Module IV Enumeration.
Advertisements

Hacking Exposed 7 Network Security Secrets & Solutions
METEOROLOGICAL TELECOMMUNICATION AND METCAP A GLANCE TO NETWORK BRIEFLY Ömer Hüdai ALBAYRAK 2010ALANYA.
System Security Scanning and Discovery Chapter 14.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
How does it differ from footprinting and scanning? – Footprinting did not necessarily attempt to access the target system(s) directly – Scanning involved.
Enumerating slides (c) 2012 by Richard Newman based on Hacking Exposed 7 by McClure, Scambray, and Kurtz.
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Guide to MCSE , Second Edition, Enhanced1 Windows XP Network Overview Most versatile Windows operating system Supports local area network (LAN) connections.
Hands-On Ethical Hacking and Network Defense
Chapter 3 Enumeration Last modified
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
1 Version 3.0 Module 11 TCP Application and Transport.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 Welcome to CSC 301 Web Programming Charles Frank.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Chapter 3 Enumeration Last modified Definition Scanning identifies live hosts and running services Enumeration probes the identified services.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Hacking Windows What to do first?  Patch : of course the first thing to do is apply SP3 and the critical updates. More will come …critical updates.
Week 4-1 Week 4: Enumeration What is Enumeration? –Now that you have a live target the next step is find what services are running and what version.
Enumeration After scanning for live systems and services, hackers will probe the services more carefully looking for weaknesses This involves active connections!
SMTP / MIME Florin Zidaru.
TCOM Information Assurance Management System Hacking.
Department of Computer Science Southern Illinois University Edwardsville Spring, 2008 Dr. Hiroshi Fujinoki FTP Protocol Programming.
Footprinting and Scanning
CS3695/M6-109 – Network Vulnerability Assessment & Risk Mitigation–
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Cisco I Introduction to Networks Semester 1 Chapter 10 JEOPADY.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
Mitchell Adair Computer Security Group Feb. 10th, 2010 Enumerating Windows Users.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
CITA 352 Chapter 6 Enumeration.
CompTIA Security+ Study Guide (SY0-401)
Enumeration.
Instructor Materials Chapter 10: Application Layer
Footprinting and Scanning
Backdoor Attacks.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Footprinting and Scanning
Chapter 10: Application Layer
CompTIA Security+ Study Guide (SY0-401)
FootPrinting CS391.
Applications Layer Functionality & Protocols
Computer Networks Protocols
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

CS391 Computer & Network Security enumeration CS391 Computer & Network Security

What is enumeration? Enumeration Techniques.

What is Enumeration? Having identified live hosts and running services, enumeration is the task of probing the identified services for known weaknesses. The main difference between enumeration and the previous techniques is the level of intrusiveness. Enumeration involves active connections to systems and directed queries, and accordingly will be logged by target systems.

Banner Grabbing We have seen examples of banner grabbing in the previous lecture. In addition, telenet and netcat may be used.

Banner Grabbing telnet example

Smtp enumeration Tcp port 25 Two commands: vrfy and expn Use telenet

Zone transfers Dns server port 53 Nslookup Ls –d server name

Null session enumeration Server Message Block (SMB) Protocol. Forms the basis for file and printer sharing. First step: connect to the protocol using the null session command: Net use \\IP address\IPC$ “” /u:” Enumaerate file shares on a host Net view \\host

Use DumpSec One can use Dumpsec tool to enumerate file shares. Another tool is legion Another attack is to dump the Windows registry. A number of tools can be used, e.g. regdmp

Trusted Domains Enumerating trusted domains: Once a null session is established, nltest and /server:server_name and /trusted_domains may be used to learn about further domains related to the current domians

Users Enumerating users: Use dumpsec