BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
5-Network Defenses Dr. John P. Abraham Professor UTPA.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Module 5: Configuring Access for Remote Clients and Networks.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System Security Scanning and Discovery Chapter 14.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Guide to Computer Network Security
Computer Networks IGCSE ICT Section 4.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Honeypot and Intrusion Detection System
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Security at NCAR David Mitchell February 20th, 2007.
Protecting Students on the School Computer Network Enfield High School.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
Topic 5: Basic Security.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Ethical Hacking: Hacking GMail. Teaching Hacking.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
CSI 3125, Preliminaries, page 1 Networking. CSI 3125, Preliminaries, page 2 Networking A network represents interconnection of computers that is capable.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Role Of Network IDS in Network Perimeter Defense.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Windows Tutorial 5 Protecting Your Computer
Backdoor Attacks.
Computer Data Security & Privacy
Introduction to Networking
Socket Programming Cal Poly Pomona Young CS380.
6.6 Firewalls Packet Filter (=filtering router)
Digital Pacman: Firewall Edition
Guide to Computer Network Security
* Essential Network Security Book Slides.
A Distributed DoS in Action
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Firewalls Jiang Long Spring 2002.
Computer Security.
Lecture 3: Secure Network Architecture
AbbottLink™ - IP Address Overview
Presentation transcript:

BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!

Overview What is Shields Up Services Conclusion References

Shields Up??? Shields Up is an online port scanning service created by Steve Gibson of Gibson Research Corporation and hosted at grc.com. Shields Up scans the most common file sharing ports. The best way to determine if your computer's (or router's) firewall is working and optimized is to effectively try to penetrate it.

Purpose The purpose of this utility is to alert the users of any ports that have been opened through their firewalls or through their NAT routers.(process of modifying IP address info) Browser-based utility Shields UP! tests your firewall for vulnerabilities and kinks in your computer's defense.

Welcome to ShieldsUp!

Services After you give ShieldsUP! permission to run tests on your computer and choose a test type, it looks for weaknesses and openings that hackers and intruders can use to attack your machine.

Services Shields up allows you to test in 5 different categories:  File Sharing  Common Ports  All Service Ports  Messenger Spam  Browser Headers

Services-File Sharing Shields Up attempts to contact the hidden Internet Server within your PC. According to Shields Up your own computer may be functioning as an internet server without your permission or you knowing.

Services-Common Ports This is where the common ports probe “attempts to establish standard TCP internet connections with a collection of standard, well known, and often vulnerable or troublesome internet ports on your computer.”

Services-All Service Ports The internet service ports “grid scan” determines the status of your system’s first 1056 TCP ports.  According to the site, by tradition, ports are generally reserved for the acceptance of incoming connections by services running on the receiving system.  Internet services listen on various standard low numbered ports found.  Due to the insecure behavior of Microsoft’s windows OS, Shields up added an additional 33 ports which brings the total to 1056.

Services-Messenger Spam It will send four small UDP-protocol Internet packets to port 135 of your computer, currently located at your IP address. Four packets are sent in case one or more are lost along the way.

Services-Browser Headers A web browser's request to a remote server may contain information about the user and the computer system running the browser. A web browser's request headers might also be modified by the request's passage through some other agent such as a privacy filter which deliberately removes potentially revealing information, or a proxy server which might add headers to identify the client on whose behalf the proxy's request is being made.

Downsides The only downside to this tool is the fact that there really isn’t a permission page to let you know exactly what you are getting into. You computer is looked at as soon as you get onto the website. Once you click on the link the scanning of your firewall will start. Also when scanning the ports, you as the user don’t know if your ports are completely protected since they are open during the scanning process.

Conclusion Even though its not really asking for your permission its still ok to figure out how a hacker will hack your computer so that you can prevent it. Shields Up help you figure that out by hacking your computer through its 5 services. The purpose of this utility; to alert the users of any ports that have been opened through their firewalls or through their NAT routers.

References Lifehacker.com en.wikipedia.org/wiki/Shields_Up grc.com/su-explain.htm

Questions ????????????????????????????