Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.

Slides:



Advertisements
Similar presentations
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Network Mapping  Identify Live Hosts  Determine running Services TCP Port Scanning UDP Port Scanning Banner Grabbing ARP Discovery  Identify Perimeter.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Scanning CS391. Overview  The TCP protocol: quick overview  Scanning  Fingerprinting  OS Detection.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
System Security Scanning and Discovery Chapter 14.
Forces that Have Brought the world to it’s knees over the centuries.
Network Security Testing Techniques Presented By:- Sachin Vador.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Computer Security and Penetration Testing
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
1 Presentation ISS Security Scanner & Retina by Adnan Khairi
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Networking in a Linux Environment Pete Eby Dan Thomas Robert Zurawski.
Penetration Testing.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
 Find out initial information ◦ Open Source ◦ Whois ◦ Nslookup  Find out address range of the network ◦ ARIN (American registry for internet numbers)
Information Gathering Lesson 4. Steps for Gathering Information Find out initial information Open Source Whois Nslookup Find out address range of the.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
CS391 Computer & Network Security
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Honeypot and Intrusion Detection System
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CIS 450 – Network Security Chapter 3 – Information Gathering.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
CIT 380: Securing Computer Systems
MIS Week 4 Site:
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
1 Lab 1: Reconnaissance, Network Mapping, and Vulnerability Assessment Reconnaissance Scanning Network Mapping Port Scanning OS detection Vulnerability.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Module 11: Designing Security for Network Perimeters.
© Mike D. Schiffman. Synopsis  Introduction  Overview  Impetus  Internals  Implementation  Risk Mitigation  Futures.
Retina Network Security Scanner
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
Footprinting and Scanning
Hands-On Ethical Hacking and Network Defense
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Footprinting. Traditional Hacking The traditional way to hack into a system the steps include: Footprint: Get a big picture of what the network is Scan.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 4 Network Security Tools and Techniques.
Enumeration March 2, 2010 MIS 4600 – MBA © Abdou Illia.
Network Devices and Firewalls Lesson 14. It applies to our class…
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Jen Beveridge and Joe Kolenda
Footprinting and Scanning
Calvin Wilson Craig Delzangle
Footprinting and Scanning
The Siphon Project An Implementation of Stealth Target Acquisition & Information Gathering Methodologies Introduction: Introduce self, Chris introduce.
FootPrinting CS391.
Firewalls Routers, Switches, Hubs VPNs
Firewalls Jiang Long Spring 2002.
EVAPI - Enumeration Auburn Hacking club
Presentation transcript:

Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications and purpose Network mapping Legal issues

Network Monitoring General Purpose Functions Applications Design NIDS – Network Intrusion Detection IPS – Intrusion Prevention System

Network and System Scanning What application versions are running? What services are running? What ports/services are open? What does the network look like? What can the external world see? Have any of these changed?

Network Assessment What do the other systems look like? What does my system look like to outsiders? Remote system characterization LAN topology Tools nmap nessus

Network Assessment Planning Initial reconnaissance System enumeration Service enumeration Vulnerability discovery

Planning Appropriate time You will probably crash operational systems You will need admin support Approximate possible risks Determine costs – man hours Management written approval Make sure every one buys into what you are doing

Initial Reconnaissance Corporate structure Web surfing » Web browser » whois host NetScanTools Pro » DNS information nslookup » DNS information » Should return minimal info if well configured

System Enumeration Using information from initial reconn phase Discover more hosts and servers Perimeter defense may block some scans Directly probe target network Combine discovery and analysis techniques Structure of network Perimeter design

Tools traceroute The important info for this phase » Target routers and DNS servers » What is the route form a server to the Internet » Often server names give geographic or organizational info

Tools Network scanners ICMP – fping and pinger » Looks for systems that return ICMP messages TCP, UDP – nmap » Searches the entire range of IP addresses allocated to a network

Service Enumeration Now find out what is available on each system Services Ports open, ports filtered, OS Application versions System policies Password policy Users, domains, system names

Tools nmap LANGuard ww.gfisoftware.com/languard/lanscan.htm Used as a LAN audit tool, $249 Telnet and banner retrieval :\:\>telent sou.edu 22 SSH-1.99-OpenSSH_3.1p1 :\:\>telent 80www.sou.edu HEAD / HTTP/1.0 HTTP/1.1 50` Method not implemented Date: Sun, 02 Mar :46:44 GMT Server: Apache/ (Unix) (Red Hat/Linux mod_ssl/ OpenSSL/0.9.6 DAV/1.0.2 PHP/4.1.2 mod_perl/1.24

Vulnerability Discovery Vulnerability scanners Work at the application layer Most of these scanners also do network and port scanning Best to start from the beginning » Network enumeration, System enumeration, Vulnerability discovery

Vulnerability Discovery Tools Nessus – open sourced, very complete ISS Internet Scanner – Windows, $$ Retina – Windows, good GUI, $$

Summary Network assessment CAREFUL This is ILLEGAL