Project briefing Arron Martin Zeus Brown. Outline of briefing Current stage Current stage Developments to date Developments to date Future work Future.

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Four Essential Tools for Web Page Authors.
Advertisements

1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
Troubleshooting TCP/IP COSC513 FALL By :Ming Wei.
System Security Scanning and Discovery Chapter 14.
Vulnerability Analysis Borrowed from the CLICS group.
Network Hosts Analyzer Hadas Shumovitch Elad Levi Tal Katz
December 1, 2000Slide #1 Port Scanning Matt Bishop Department of Computer Science University of California, Davis.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Technologies of e-Commerce 2 Unit 8 – e-Commerce LO1 : Know the technologies required for e-commerce Live the dream…
Chapter 6 Security & Privacy Web servers continue to be attractive target for hacker for variety of reasons –Most easy target –Personal satisfaction –Political.
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Ana Chanaba Robert Huylo
5 Copyright © 2008, Oracle. All rights reserved. Configuring the Oracle Network Environment.
5 Copyright © 2007, Oracle. All rights reserved. Configuring the Oracle Network Environment.
Mohan Kumar Puttasiddaiah
1 Web Server Administration Chapter 9 Extending the Web Environment.
12 Copyright © 2004, Oracle. All rights reserved. Oracle Net Services.
11 Copyright © 2005, Oracle. All rights reserved. Configuring the Oracle Network Environment.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Web application architecture
11 Copyright © 2005, Oracle. All rights reserved. Configuring the Oracle Network Environment.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Chapter 13 Microsoft DNS Server n DNS server: A Microsoft service that resolves computer names to IP addresses, such as resolving the computer name Brown.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Security at NCAR David Mitchell February 20th, 2007.
Network Security Management Tools. MCNS—Network Security Management Tools—17-2 Copyright  1998, Cisco Systems, Inc. Objectives Describe security vulnerability.
Test Procedure: ECS (E1/Eth), SAM2, SAM1.5 & Access
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Stuff By Zach and Turtle To designate a default printer, choose Start > Control Panel > Printers and Faxes. Right-click the printer, and then.
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
1 Chapter Overview Understanding the TCP/IP protocol suite Configuring and troubleshooting TCP/IP Installing, configuring, and troubleshooting NWLink Understanding.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
1 Cathay Life Insurance Ltd. (Vietnam) 27/03/ Cathay Life Insurance (VN) Date: 27 March 2009.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Socket Programming.
NetTech Solutions Protecting the Computer Lesson 10.
CITA 310 Section 8 Extending the Web Environment (Textbook Chapter 9)
VPN.BAT Tool to assist with diagnosing VPN problems Les Cottrell.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Machine Learning for Network Anomaly Detection Matt Mahoney.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
4000 Imaje 4020 – Software Imaje 4020 – Content ■ Content of Chapter Software: 1. Flash Up 2. Netcenter 3. FTP 4. Active X 5. XCL commands 6. Exercise.
-SHAMBHAVI PARADKAR TE COMP  PORT SCANNING.  DENIAL OF SERVICE(DoS). - DISTRIBUTED DENIAL OF SERVICE(DDoS). REFER Pg.637 & Pg.638.
Steven Geisel Gabe Owens.  Angry IP Scanner is an open-source and cross-platform network scanner  Features include IP Address scanning, port scanning,
ECMM6018 Enterprise Networking For Electronic Commerce Tutorial 1 Installing A Web Server.
Planning the Addressing Structure
Virtual Private Network Access for Remote Networks
Traffic Analysis– Wireshark Simple Example
Outline Securing your system before the IDS and some tools to help you
Chapter 6 Application Hardening
Troubleshooting Network Communications
File Transfer Protocol
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Traffic Analysis– Wireshark Simple Example
Planning the Addressing Structure
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Chapter 15: Network Monitoring and Tuning
Using Software Restriction Policies
Presentation transcript:

Project briefing Arron Martin Zeus Brown

Outline of briefing Current stage Current stage Developments to date Developments to date Future work Future work PHD un-officially accepted PHD un-officially accepted

Current stage Reading Reading FTP signatures and timing FTP signatures and timing PERL PERL Nmap (network utility tool for PERL) Nmap (network utility tool for PERL) Test tools Test tools Basic port scanner with FTP checking. Basic port scanner with FTP checking. Papers Papers Internet ready ? Internet ready ? Also reading for Helsinki paper “FTP signatures” Also reading for Helsinki paper “FTP signatures”

Developments to date FTP port scanner for C class networks FTP port scanner for C class networks Class Address Range Supports Class Address Range Supports Class A to Supports 16 million hosts on each of 127 networks. Class A to Supports 16 million hosts on each of 127 networks. Class B to Supports 65,000 hosts on each of 16,000 networks. Class B to Supports 65,000 hosts on each of 16,000 networks. Class C to Supports 254 hosts on each of 2 million networks. Class C to Supports 254 hosts on each of 2 million networks. Class D to Reserved for multicast groups. Class D to Reserved for multicast groups. Class E to Reserved. Class E to Reserved. Why use C class network to test agianst? Why use C class network to test agianst? Version 1 simple port scanner Version 1 simple port scanner Version 2 ftp validation on port 21 Version 2 ftp validation on port 21 How it works? How it works? Why do this ? Why do this ? Why not carry on scanning all ports in version 2? Why not carry on scanning all ports in version 2?

Version 2 So how does ftp checking work? So how does ftp checking work? print "listen $host!\n" if($DEBUG); alarm 0; $hostname=gethostbyaddr($iaddr,AF_INET); # create new FTP connection w/5 second timeout $ftp = Net::FTP->new($host, Timeout => 5); if(!$ftp){ print " \n" if($DEBUG); exit(0); } print " FTP on $host [$hostname]\n"; exit(0); print " FTP on $host [$hostname]\n"; exit(0);} print "Anon FTP on $host [$hostname]\n"; $ftp->quit; $ftp->quit;exit(0);

Version 2 Version 2 known bugs and flaws Version 2 known bugs and flaws ftp server may not be on port 21 ftp server may not be on port 21 Only good for ftp server’s with default guest user access. Only good for ftp server’s with default guest user access. Programming bugs such as Function x in Perl does not work in windows so this cause the program to fail or report incorrectly in the Microsoft DOS environment Programming bugs such as Function x in Perl does not work in windows so this cause the program to fail or report incorrectly in the Microsoft DOS environment

The future versions FTP checker with port scanning per address not just port 21, quicker than current algorithm FTP checker with port scanning per address not just port 21, quicker than current algorithm Access the file system for data capture and interrogation Access the file system for data capture and interrogation The next stage after this will be monitoring traffic, all traffic will be monitored both uploads and down loads. The next stage after this will be monitoring traffic, all traffic will be monitored both uploads and down loads.

Future work for the next period More implementation of the ftp scanner and checker More implementation of the ftp scanner and checker More reading on PERL More reading on PERL More reading on FTP More reading on FTP Drafting chapter outline for PHD Drafting chapter outline for PHD Work on “internet ready” paper Work on “internet ready” paper Work on drafting Helsinki paper Work on drafting Helsinki paper