Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.

Slides:



Advertisements
Similar presentations
思科网络技术学院理事会. 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Advertisements

FIREWALLS Chapter 11.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Essential NetTools Pranay Kumar. Essential NetTools  This tool is a set of network tools useful in diagnosing networks and monitoring your computer's.
1 PUNCH PUNCH (Purdue University Network Computing Hubs) is a distributed network-computing infrastructure that allows geographically dispersed users to.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Network Security Testing Techniques Presented By:- Sachin Vador.
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
Lesson 19: Configuring Windows Firewall
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Beyond Security Ltd. Port Knocking Beyond Security Noam Rathaus CTO Sunday, July 11, 2004 Presentation on.
Internet Technologies Networking / Internet Protocols (TCP/IP) Server/Client Software Communication via Ports Web Page Technology Recipe of Web Page Development.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
SSL From Your Smartphone Support for Android Smartphones /
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
TOSIBOX LOCK security options 1 1.
Mohan Kumar Puttasiddaiah
Chapter 9: Novell NetWare
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Chat Application Pratheeba Murugesan Pratheeba Murugesan Tejo Brundavana Tejo Brundavana Zhenhong Zhao Zhenhong Zhao.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Wireless Intrusion Prevention System
Hubs A Hub is a hardware device that connects many computers of other devices to each other. Some information that is sent to the hub can be send to other.
,294,967,296 Q. What are private IP addresses? A. The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
IS 4506 Establishing Microsoft SMTP Service.  Overview Introduction to Microsoft SMTP Service SMTP Service features SMTP administration interface SMTP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Diagnosing Network Problems with Standard Tools Erika Rice & Jonas Lindberg CSE 561, Fall 2004.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
IT ELECTRONIC COMMERCE THEORY NOTES
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 6 Resolving Network Host Names.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
NETWORKING IP ADDRESSING. TYPES OF IP ADDRESS PRIVATE IP ADDRESS PUBLIC IP ADDRESS STATIC IP ADDRESS DYNAMIC IP ADDRESS.
LAN Chat server BY: VIPUL GUPTA VIKESH SINGH SUKHDEEP SINGH.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
Backdoor Attacks.
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Computer Technology Notes #4
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Outline Overview Development Tools
Chapter 27: System Security
FootPrinting CS391.
ISMS Information Security Management System
السلوك التنظيمى المعاصر
Modular Object Scanning Technology (MOST)
Network Hardware and Protocols
Networks and the Internet
Networks and the Internet
Online Learning.
Presentation transcript:

Network Monitor By Zhenhong Zhao

What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating all hosts on the LAN. – This utility allows you to get the names of the hosts in the network and their IP addresses. – It also allows you to get the user list off of any host. – Scanning any computer on the network and reporting all opening ports of this computer.

Why? Authentication Who are you? Authorization Are you allowed access to the information?

How? Microsoft Visual Basic 6.0 Winsock used

Host 1Host 3Host 2 Host 4Host 5 Wsock 32 Enumerated

Host 1Host 3Host 2 Host 4Host 5 Wsock 32 Enumerated

Host 1Host 3Host 2 Host 4Host 5 Wsock 32 IP Address and Users

Host3 Host 1Host 3Host 2 Host 4Host 5 Wsock 32 IP Address and Users

Info Host 1Host 3Host 2 Host 4Host 5 Wsock 32 IP Address and Users

Why the Port Scanner? Each time you send or receive data through the Internet, your mail (or web, chat, or whatever) program must connect to a remote port of a remote host.

response Host 1Host 3Host 2 Host 4Host 5 Wsock 32 Port scanner send

Working Model

Advantages Friendly user interface The modular design Easy administration Enforced security strategy

Future Plans List the user name that logs on each computer, and has ability to communicate with that user. Block unfriendly incoming IP and Ping.