TCOM 59901 Information Assurance Management Casing the Establishment.

Slides:



Advertisements
Similar presentations
Module II Footprinting
Advertisements

TWNIC RMS Update 16 th APNIC NIR SIG TWNIC Sheng Wei Kuo Aug, 2003.
Internet Applications INTERNET APPLICATIONS. Internet Applications Domain Name Service Proxy Service Mail Service Web Service.
Chapter 16. Windows Internet Name Service(WINS) Network Basic Input/Output System (NetBIOS) N etBIOS over TCP/IP (NetBT) provides commands and support.
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
This module will familiarize you with the following:  Overview of the Reconnaissance Phase  Footprinting: An Introduction  Information Gathering Methodology.
.| The Trusted Channel Centric Marketplace Domain Name Transfers & Domain Delegation.
Registration Services Mark Kosters 9 June Mark Kosters 9 June 1998 NANOG Meeting Dearborn, Michigan Outline l Current InterNIC Statistics l Customer.
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
Footprinting February 16, 2010 MIS 4600 – MBA © Abdou Illia.
Week 2 -1 Week 2: Footprinting What is Footprinting? –Systematic collection of information on an intended target with the goal to create a complete profile.
Hands-On Microsoft Windows Server 2003 Administration Chapter 9 Administering DNS.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Domain Name Server © N. Ganesan, Ph.D.. Reference.
Course 6425A Module 2: Configuring Domain Name Service for Active Directory® Domain Services Presentation: 50 minutes Lab: 45 minutes This module helps.
Domain Name Services Oakton Community College CIS 238.
Windows Server 2008 Chapter 8 Last Update
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
 Find out initial information ◦ Open Source ◦ Whois ◦ Nslookup  Find out address range of the network ◦ ARIN (American registry for internet numbers)
Information Gathering Lesson 4. Steps for Gathering Information Find out initial information Open Source Whois Nslookup Find out address range of the.
Footprinting Richard Newman “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the.
Name Resolution Domain Name System.
Network Tools TCP/IP interface configuration query - MAC (HW) address and IP address – Linux - /sbin/ifconfig – MS Windows – ipconfig/all 1.
Dynamic and Secure DNS Tianyi Xing.  Establish a dynamic and secure DNS service in the mobicloud system.
Zone Properties. Zone Properties Continued Aging allows zone to remove “stale” or “old” records for clients who have not updated within a certain period.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Courier Tracking System. Small Courier Operations Small courier services collect Letters and parcels from customers and issues its own POD number Then.
CIS 450 – Network Security Chapter 3 – Information Gathering.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Fully Qualified Domain Names FQDNs. DNS Database A distributed, hierarchical database Resolves Fully Qualified Domain Names (FQDNs) to IP addresses –
1 CUSTOMER BACKROOM. 2 OUTLINE Accessing the Backrooms Administrative Interface Order Wizards Reseller Resources Retail Administrative Interface Order.
11 MANAGING AND MONITORING DHCP Chapter 2. Chapter 2: MANAGING AND MONITORING DHCP2 MANAGING DHCP: COMMON DHCP ADMINISTRATIVE TASKS  Configure or modify.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Kenya Network Information Centre (KENIC). Introduction KENIC is the registry for the.KE ccTLD. Local and non-profit organization Mandate is to Manage.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Engineering Essential Characteristics Security Engineering Process Overview.
Translate tech terms into plain English. ?
ISOC-NSRC ccTLD WORKSHOP SHORT INTRODUCTORY PRESENTATION BY TELONE ZIMBABWE Sternford Gapu Sternford Gapu Khulekani Khupe Khulekani Khupe September 2005.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
* Agenda  What is the DNS ?  Poisoning the cache  Short term solution  Long term solution.
Registration Services Mark Kosters 10 November 1998.
Footprinting and Scanning
CS3695 – Network Vulnerability Assessment & Risk Mitigation – Supplemental Slides to Module #2 Footprinting and Reconnaissance Intelligence Gathering CEH.
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Footprinting. Traditional Hacking The traditional way to hack into a system the steps include: Footprint: Get a big picture of what the network is Scan.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Universal Acceptance: APNIC system readiness Byron Ellacott Senior Software Architect.
(An Anti-Abuse Perspective)
WHAT IS FOOTPRINTING?. FOOTPRINTING  Active  Passive - Passive footprinting is a method in which the attacker never makes any contact with the target.
The Importance of Whois Accuracy Leslie Nobile
Online Canon Printer Support & Customer Services
Footprinting and Scanning
Implementation of ARIN's Lame DNS Delegation Policy
Typical Life Cycle of a Domain Name
Footprinting and Scanning
Typical Life Cycle of a Domain Name
FootPrinting CS391.
Learning objectives By the end of this unit you should: Explain
Passive Research Section 2 11/29/2018.
Presentation transcript:

TCOM Information Assurance Management Casing the Establishment

TCOM Target Acquisition Systematic Footprinting -building a profile of your security posture Focused on information relating to Internet, intranet, remote access and extranet…of your system

TCOM Internet Footprinting Determine the Scope of Your Activities –Open Source –SEC EDGAR DB –Countermeasure: Public Database Security...

TCOM Internet Footprinting Network Enumeration –InterNIC DB –Organizational Query -”Whois” All information related to a particular organization May be hundreds or thousands of entries

TCOM Internet Footprinting –Domain Query The registrant The domain name The admin contact When the record was created and updated The DNS servers

TCOM Internet Footprinting –Network Query American Registry of Internet Numbers Other Domains the DNS server is authoritative Backbone provider, network class Confirm network belongs to target

TCOM Internet Footprinting –POC Query All addresses of POCs Complete help reference

TCOM Internet Footprinting Countermeasure: Public Database Security –Update admin, tech, and billing information –Fictitious contact as tripwire

TCOM Internet Footprinting DNS Interrogation –Serious misconfiguration –Internet Zone Transfers –Can provide a complete roadmap of an organizations internal network

TCOM Internet Footprinting Countermeasure: DNS Security –Reduce the available information –External servers must never be configured to reveal internal network information

TCOM Internet Footprinting Network Reconnaissance –Tracerouting –Build an access path diagram Countermeasure: IDS –RotoRouter - logs traceroute requests and generates false responses