Intro to Ethical Hacking

Slides:



Advertisements
Similar presentations
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Advertisements

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
System Security Scanning and Discovery Chapter 14.
Vulnerability Analysis Borrowed from the CLICS group.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian
Nessus – A Vulnerability Scanning Tool SUNY Technology Conference June 2003.
Computer Security and Penetration Testing
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Scanning with ISS Security-SIG 15 December 2005 David Taylor & John Lupton ISC Information Security ISC/Information Security.
Installing software on personal computer
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
1 Nessus - NASL Marmagna Desai [592- Project]. 2 Agenda Introduction –Nessus –Nessus Attack Scripting Language [ N A S L] Features –Nessus –NASL Testing.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
MIS Week 6 Site:
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
CIS 450 – Network Security Chapter 3 – Information Gathering.
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
Linux Networking and Security
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
MIS Week 6 Site:
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Retina Network Security Scanner
Footprinting and Scanning
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
By Matt Jennings & David Spano.  History of Nmap  What is Nmap  How Nmap works  The goal of Nmap  What is Zenmap  Advantages of Zenmap  How to.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
ALL THINGS IIS TERRI DONAHUE
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Which is better Avast Free Edition or Avast Pro Version?
Protection (tools).
Intro to Ethical Hacking
Penetration Testing Scanning
Introduction to Network Scanning
Footprinting and Scanning
CITA 352 Chapter 5 Port Scanning.
Ping and traceroute.
Penetration Test Debrief
CompTIA Server+ Certification (Exam SK0-004)
Secure Software Confidentiality Integrity Data Security Authentication
Footprinting (definition 1)
Advanced Penetration testing
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Kennesaw State University
Metasploit a one-stop hack shop
Intro to Ethical Hacking
Footprinting and Scanning
Intro to Ethical Hacking
Nessus Vulnerability Scanning
Intro to Ethical Hacking
Advanced Penetration testing
Intro to Ethical Hacking
Metasploit Analysis Report Overview
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Roberto Nogueda ITACS 5211: Introduction to Ethical Hacking
Lecture 3: Secure Network Architecture
EVAPI - Enumeration Auburn Hacking club
Advanced Penetration testing
Presentation transcript:

Intro to Ethical Hacking MIS 5211.001 Week 5 Site: http://community.mis.temple.edu/mis5211sec001fall17/

Tonight's Plan Questions from last week Nessus Next Week MIS 5211.001

Packet Construction Tools The tool I spoke of last week is SCAPY http://securitytools.wikidot.com/packet-construction MIS 5211.001

IPv6 Scanning IPv6 fingerprinting Nmap has a similar but separate OS detection engine specialized for IPv6 Use the -6 and –O options MIS 5211.001

IPv6 Scanning Nping – Comes with Nmap https://nmap.org/book/nping-man-ip6-options.html From the site Nping is an open-source tool for network packet generation, response analysis and response time measurement. Nping allows users to generate network packets of a wide range of protocols, letting them tune virtually any field of the protocol headers. While Nping can be used as a simple ping utility to detect active hosts, it can also be used as a raw packet generator for network stack stress tests, ARP poisoning, Denial of Service attacks, route tracing, and other purposes. MIS 5211.001

MIS 5211.001

Nessus Started in 1998 as an open source security scanning tool Changed to a close sourced tool in 2005, but has remained “free” for personal use. Surveys by sectools.org indicate Nessus remains the most popular vulnerability scanners Not installed with Kali MIS 5211.001

The Nessus Server Four basic parts to the Nessus server: Nessus-core Nessus-libraries Libnasl Nessus-plugins MIS 5211.001

Plugins Plugins are the scripts that perform the vulnerability tests. NASL – This is the Nessus Attack Scripting Language which can be used to write your own plugins.

Defining Targets Hosts Subnet Address range Server.domain.edu 172.21.1.2 Subnet 192.168.100.0 Address range 192.168.1.1-192.168.1.10

Vulnerability Scanning Scanning methods: Safe Destructive Service recognition – Will determine what service is actually running on a particular port. Handle multiple services – Will test a service if it appears on more then one port. Will test multiple systems at the same time.

Viewing Reports Nessus will indicate the threat level for services or vulnerabilities it detects: Critical High Medium Low Informational Description of vulnerability Risk factor CVE number

Common Vulnerabilities and Exposures CVE created by http://www.cve.mitre.org/ Attempting to standardize the names for vulnerabilities. CVE search engine at http://icat.nist.gov/ SANS Institute Weekly Critical Vulnerability Analysis Report http://www.sans.org, also Reading Room and Internet Storm Center

Options MIS 5211.001

Options http://www.tenable.com/products/nessus/select-your-operating-system MIS 5211.001

Free Training http://www.tenable.com/education/on-demand-courses MIS 5211.001

Certification Options http://www.tenable.com/education/certification MIS 5211.001

Architecture Nessus is built on a classic client/server model. The server portion may reside on a separate machine, or on the same machine as the client The client is the interface that you will interact with to execute scans MIS 5211.001

Getting Nessus Download from Tenable Security http://www.tenable.com/products/nessus/select-your-operating-system Before installing, go to registration page and get the activation code http://www.tenable.com/products/nessus-home Run the MSI package and follow the prompts Install will also install PCAP and then take you to the registration page. Enter activation code and follow the prompts to get updates and plugins MIS 5211.001

Documentation Documentation for Nessus is available here: http://static.tenable.com/documentation/nessus_4.2_user_guide.pdf You will also get a link to this location during the install. MIS 5211.001

AV and Firewalls You will need to turn off Anti-Virus and Firewall in order to get an effective scan or you will see this: Before you do this, disconnect from any and all networks. You will likely still get some blocking as AV doesn’t like to give up. MIS 5211.001

Location Nessus is installed here: MIS 5211.001

Getting Started You should end up looking at web page hosted from your machine. Book mark the page to save time getting back URL will look like this: https://localhost:8834/html5.html MIS 5211.001

SSL Warning When you first go to site, you will need to click on continue to the website.: MIS 5211.001

Logging In Start MIS 5211.001

Policies Scans are based on policies, you will need to create that first. MIS 5211.001

Policies 2 Next MIS 5211.001

Policies 3 MIS 5211.001

There are many more options MIS 5211.001

Creating A Scan MIS 5211.001

Scheduling A Scan MIS 5211.001

Scan Status Once your scan has started you will see a status field like this: MIS 5211.001

Scan Status Once completed you will get the following notification: MIS 5211.001

Output From First Scan MIS 5211.001

Clicking on scan gives details MIS 5211.001

Continuing to drill down MIS 5211.001

Good Information Important to note: Also MIS 5211.001

Criticality Note on criticality The “Critical” risk factor is without any mitigating controls being taken in to account Vulnerabilities need to be evaluated in context MIS 5211.001

More on Results These results were obtained, even though Anti-Virus continued blocking multiple techniques. Consider setting up a scanning machine without any AV or Host Firewall. MIS 5211.001

Organizing Scans In short order you will gather a large collection of scans Use the built in folder system to move scans off of the main page MIS 5211.001

Don’t Forget the Info MIS 5211.001

Info Vulnerabilities The least significant vulnerabilities are classified as “Info” or informational. These are often very useful in understanding details of the asset being scanned. MIS 5211.001

For Instance MIS 5211.001

Next Week NetCat DOS Batch MIS 5211.001

Questions ? MIS 5211.001