Tim Wostradowski, Ian Brophy, John Ang.  Project Conception  Developing the Idea  Refining the Method  Gathering the Data  From Data to Information.

Slides:



Advertisements
Similar presentations
By Bruce Ellis Western Governors University. Demonstrate the need for updating information systems Build security awareness Inform management of the risk.
Advertisements

Mark Clements Program Leader Computer Networking Why Engineering at Medway?
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
Armitage and Metasploit Penetration Testing Lab
Nmap Experiment.
Offensive Security Part 1 Basics of Penetration Testing
'08 Rabat Why are we using FreeBSD? Scaleable Services Workshop AfNOG 2008 Rabat, Morocco slides by Hervey Allen presented by Joe Abley.
Rochester Institute of Technology Secure IT 2007 Security Auditing Course Development Rochester Institute of Technology Yin Pan
Vulnerability Analysis Borrowed from the CLICS group.
Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.
Chapter 9 A Installing Linux. Synopsis What is needed. How to access the BIOS and boot a CD/DVD. How to repartition the hard drive. The Linux installation.
Operating Systems. What is an Operating System? A layer of software between users/applications and the hardware. The first program loaded onto a computer.
Mgt 240 Lecture Exam Review February 1, Homework Three Due Friday 2/4 at 5pm Due Friday 2/4 at 5pm Any questions? Any questions? Posted on course.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
Virtualization A way To Begin with Virtual Reality… - Rahul Khanwani.
WINDOWS 7 AND UBUNTU INSTALLING LINUX WITHIN WINDOWS.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Managing CERN Desktops with Systems Management Server (SMS 2003) Michel Christaller Internet Services Group Department of Information Technology CERN May.
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
StudioSysAdmins 2 nd Annual SIGGRAPH Birds-of-a-Feather John Hickson - 08/09/2011 StudioSysAdmins 2 nd Annual SIGGRAPH Birds-of-a-Feather John Hickson.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Mr C Johnston ICT Teacher
VirtualBox What you need to know to build a Virtual Machine.
Kali Linx Attacks Jim Nasto. Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the.
Multiboot System under Windows XP – Ubuntu – Windows 7 Qiong LIN - 28 April 2012.
Thoughts on Firewalls: Topologies, Application Impact, Network Management, Tech Support and more Deke Kassabian, April 2007.
IBM Software Group ® Overview of SA and RSA Integration John Jessup June 1, 2012 Slides from Kevin Cornell December 2008 Have been reused in this presentation.
Port Scanning and Enumeration (NMAP)
CANVAS REPORT/rvispute 16/4/2016 CANVAS Report for CTF Event at USAFA on 4/25/2007 Subject :Penetration Tools for Front Range Pen Test Exercise By Rajshri.
Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions.
Penetration Testing 101 (Boot-camp)
Thwarting Remote OS Fingerprinting Eric Kluthe. What is OS fingerprinting? Sending packets, usually ICMP and TCP, and recording the responses that come.
LIGO-G Z Transient Reference The Transient Reference Catalog R. Rahkola, M. Ito LSC Meeting, March 20-23, 2002.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Introduction to System Administration. System Administration  System Administration  Duties of System Administrator  Types of Administrators/Users.
Final Project: Advanced Security Blade IPS and DLP blades.
Comparison of VPS Hosting and Cloud Hosting Features.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Patch Management Module 13.
Port Scanning James Tate II
LINUX WINDOWS Vs..
Calvin Wilson Craig Delzangle
Popular Operating System Chapter 8
CompTIA Server+ Certification (Exam SK0-004)
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Network Exploitation Tool
Click to edit Master subtitle style
Identity Provider in a Box
LINUX WINDOWS Vs..
Graduation Project Kick-off presentation - SET
Hands-On Virtualization in the Classroom
IS4550 Security Policies and Implementation
Chapter 6: Alternative Operating Systems
CANVAS Report for CTF Event at USAFA on 4/25/2007
Backtracking Intrusions
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Figure 6-4: Installation and Patching
OPS235: Lab 2 Virtual Machines – Part I
Web Application Penetration Testing ‘17
Analyzing OS Sample Windows 7 image provided by different class
Using Virtual Machines
Hacking Windows Damian Gordon.
Using Software Restriction Policies
Presentation transcript:

Tim Wostradowski, Ian Brophy, John Ang

 Project Conception  Developing the Idea  Refining the Method  Gathering the Data  From Data to Information  Results  Linux  Windows  Overall  The Future of the Project  Final Thoughts  Q & A

 Security Based  Interested in Security Related Matters  Research Based  The Pursuit of Knowledge  Sponsor  Seccuris’ Project Idea

 Open Source  Testing  Backtrack  Storing Data  Database  Viewing Data  Web interface

 Operating Systems  Stock Installations  What Data is Relevant?  Ports, fingerprint, exploits  Default security measures?  Analyze Vulnerabilities

 BackTrack  NMAP  Port Mapping/Scanning  Metasploit Framework  Exploits

 Analysis of Baseline Security  Default Security Measures?  Open ports?  Exploits?  Digging Deeper  Comparisons  Logical Conclusions

 Fedora  Ubuntu  openBSD  freeBSD

 Pre XP  Defenseless  XP  SP2: the dawn of Windows firewalls  Post XP  Solid baseline security measures

 Windows  Firewall  The XP Transition  Defender  Linux  Closed Ports  Windows vs Linux  Equilibrium or landslide?

 Non-default Software  Explore the Adverse Affects  Web Interface  More Features  ie: Comparison Tool  Implement on Real Hardware  Are Virtual Machines Really On Par?

 Windows and Linux  Surprising Equality  Upgrade Your Operating System  ie: Windows XP to Windows 7  Keep It On  Firewall  Application Defender

 Some Ideas:  Did you learn anything from this presentation?  What did we learn from this project?  Does something need clarification?  What was our favorite aspect of the project?