ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ Александр Юрьевич Каргин кандидат физико-математических наук, Microsoft Certified Systems Engineer (MCSE), Microsoft Certified.

Slides:



Advertisements
Similar presentations
Overview The TCP/IP Stack. The Link Layer (L2). The Network Layer (L3). The Transport Layer (L4). Port scanning & OS/App detection techniques. Evasion.
Advertisements

F4-analyzing Network-based evidence for a windows intrusion Dr. John P. Abraham Professor UTPA.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
TCP/IP Fundamentals A quick and easy way to understand TCP/IP v4.
NMAP Scanning Options. EC-Council NMAP  Nmap is the most popular scanning tool used on the Internet.  Cretead by Fyodar ( it.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Scanning Determining if the system is alive IP Scanning Port Scanning War Dialing.
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 2 Scanning 1.
System Security Scanning and Discovery Chapter 14.
CCNA 1 v3.1 Module 11 Review.
Firewalls and Intrusion Detection Systems
ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ Александр Юрьевич Каргин кандидат физико-математических наук, Microsoft Certified Systems Engineer (MCSE), Microsoft Certified.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Communication Protocols III Tenth Meeting. Connections in TCP A wants to send to B. What is the packet next move? A travels through hub and bridge to.
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Deff Arnaldy
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Port Scanning Prabhaker Mateti. Mateti, Port Scanning2 Port scanning Attackers wish to discover services they can break into. Attackers wish to discover.
Port Scanning.
Ana Chanaba Robert Huylo
 Find out initial information ◦ Open Source ◦ Whois ◦ Nslookup  Find out address range of the network ◦ ARIN (American registry for internet numbers)
Information Gathering Lesson 4. Steps for Gathering Information Find out initial information Open Source Whois Nslookup Find out address range of the.
FIREWALL Mạng máy tính nâng cao-V1.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
CS391 Computer & Network Security
CIS 450 – Network Security Chapter 3 – Information Gathering.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Chapter 2 Scanning Last modified Determining If The System Is Alive.
1 Lab 1: Reconnaissance, Network Mapping, and Vulnerability Assessment Reconnaissance Scanning Network Mapping Port Scanning OS detection Vulnerability.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Enumeration After scanning for live systems and services, hackers will probe the services more carefully looking for weaknesses This involves active connections!
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Retina Network Security Scanner
Footprinting and Scanning
Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense
1 DETAILS OF PROTOCOLS The Zoo Protocol - TCP - IP.
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
CITA 352 Chapter 2 TCP/IP Concepts Review. Overview of TCP/IP Protocol –Language used by computers –Transmission Control Protocol/Internet Protocol (TCP/IP)
Network and Port Scanning Chien-Chung Shen
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Mitchell Adair Computer Security Group Feb. 10th, 2010 Enumerating Windows Users.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Protection (tools).
Port Scanning James Tate II
Enumeration.
Footprinting and Scanning
CITA 352 Chapter 5 Port Scanning.
Port Scanning (based on nmap tool)
Information Gathering
Footprinting and Scanning
Overview of Networking & Operating System Security
The Siphon Project An Implementation of Stealth Target Acquisition & Information Gathering Methodologies Introduction: Introduce self, Chris introduce.
Figure 3-23: Transmission Control Protocol (TCP) (Study Figure)
EVAPI - Enumeration Auburn Hacking club
Presentation transcript:

ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ Александр Юрьевич Каргин кандидат физико-математических наук, Microsoft Certified Systems Engineer (MCSE), Microsoft Certified Database Administrator (MCDBA), Certified Information Systems Auditor (CISA) Тема: Методика сетевой разведки (часть 2)

Сетевая разведка включает в себя внешнее или внутреннее сканирование сети без авторизации в ней. [Involves network scanning either external or internal without authorization.] Этап: 1. Сканирование (Scanning)

Методика сетевой разведки Задача: Извлечь первоначальную информацию [Unearth initial information.] Задача: Определить сетевой диапазон [Locate the network range.] Задача: Установить, которые из компьютеров активны. [Ascertain active machines.] Задача: Обнаружить открытые порты и точки входа [Discover open ports / access points.] Задача: Обнаружить операционные системы [Detect operating systems.] Задача: Раскрыть сервисы на портах [Uncover services on ports.] Задача: Составить карту сети. [Map the Network.] Этап: 1. Рекогносцировка [Reconnaissanse]. Атака: 1.1. Получение отпечатка [Footprinting] Этап: 2. Сканирование [Scanning]. Атака: 2.1. Сканирование [Scanning] Атака: 2.2. Составление реестра для нападения [Enumeration]

Этап: 2. Сканирование [Scanning] Атака: 2.1. Атака: 2.1. Сканирование [Scanning] a)Detecting 'live' systems on target network. b)Discovering services running/ listening on target systems. c)Understanding port scanning techniques. d)Identifying TCP and UDP services running on target network. e)Discovering the operating system f)Understanding active and passive fingerprinting. g)Automated discovery tools.

Методика сетевой разведки Задача: Извлечь первоначальную информацию [Unearth initial information.] Задача: Определить сетевой диапазон [Locate the network range.] Задача: Установить, которые из компьютеров активны. [Ascertain active machines.] Задача: Обнаружить открытые порты и точки входа [Discover open ports / access points.] Задача: Обнаружить операционные системы [Detect operating systems.] Задача: Раскрыть сервисы на портах [Uncover services on ports.] Задача: Составить карту сети. [Map the Network.] Этап: 1. Рекогносцировка [Reconnaissanse]. Атака: 1.1. Получение отпечатка [Footprinting] Этап: 2. Сканирование [Scanning]. Атака: 2.1. Сканирование [Scanning] Атака: 2.2. Составление реестра для нападения [Enumeration]

Этап: 2. Сканирование [Scanning] Атака: 2.2. Составление реестра для нападения [Enumeration] a)Understanding Windows Enumeration b)How to Connect via Null Session c)How to disguise NetBIOS Enumeration d)Disguise using SNMP Enumeration e)How to steal Windows DNS information using Zone Transfers f)Learn to enumerate users via CIFS(Common Internet File System) / SMB (Server Message Block) [application-layer network protocol used to provide shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network] g) Active Directory Enumerations

Этап: 2. Сканирование [Scanning] TEST Атака: 2.1. Сканирование (Scanning) Атака: 2.2. Составление реестра для нападения (Enumeration)

1. All the webservers in the DMZ respond to ACK scan on port 80. Why is this happening ? A. They are all Windows based webserver B. They are all Unix based webserver C. The company is not using IDS D. The company is not using a stateful firewall

2. An Nmap scan shows the following open ports, and Nmap also reports that the OS guessing results to match too many signatures hence it cannot reliably be identified: 21 ftp; 23 telnet; 80 http; 443 https What does this suggest ? A. This is a Windows Domain Controller B. The host is not firewalled C. The host is not a Linux or Solaris system D. The host is not properly patched

3. Which is the right sequence of packets sent during the initial TCP three way handshake? A. FIN, FIN-ACK, ACK B. SYN, URG, ACK C. SYN, ACK, SYN-ACK D. SYN, SYN-ACK, ACK

4. What do you conclude from the Nmap results below? Staring nmap V. 3.10ALPHA0 ( (The 1592 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 25/tcp open smtp 80/tcp open http 443/tcp open https Remote operating system guess: Too many signatures match the reliability guess the OS. Nmap run completed - 1 IP address (1 host up) scanned in seconds A. The system is a Windows Domain Controller. B. The system is not firewalled. C. The system is not running Linux or Solaris. D. The system is not properly patched.

5. How does Traceroute map the route that a packet travels from point A to point B? A. It uses a TCP Timestamp packet that will elicit a time exceed in transit message. B. It uses a protocol that will be rejected at the gateways on its way to its destination. C. It manipulates the value of time to live (TTL) parameter packet to elicit a time exceeded in transit message. D. It manipulated flags within packets to force gateways into generating error messages.

6. Ann would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point. Which of the following type of scans would be the most accurate and reliable option? A. A half-scan B. A UDP scan C. A TCP Connect scan D. A FIN scan

7. What is the proper response for a NULL scan if the port is closed? A. RST B. ACK C. FIN D. PSH

8. Which type of Nmap scan is the most reliable, but also the most visible, and likely to be picked up by and IDS? A. SYN scan B. ACK scan C. RST scan D. Connect scan

9. What is the proper response for a NULL scan if the port is open? A. SYN B. ACK C. FIN D. No response

10. What is the proper response for a X-MAS scan if the port is closed? A. SYN B. ACK C. RST D. PSH

11. What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP? (Choose all that apply). A. 110 B. 135 C. 139 D. 445

12. What did the following commands determine? C: user2sid \earth guest S C:sid2user Name is Joe Domain is EARTH A. That the Joe account has a SID of 500 B. These commands demonstrate that the guest account has NOT been disabled C. These commands demonstrate that the guest account has been disabled D. That the true administrator is Joe

13. Which of the following tools are used for enumeration? (Choose all that apply). A. USER2SID B. SolarWinds C. DumpSec D. SID2USER

14. What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP? (Choose all that apply.) A. 110 B. 135 C. 139 D. 445

15. What is the following command used for? net use \targetipc$ "" /u:""]]> A. Grabbing the etc/passwd file B. Grabbing the SAM C. Connecting to a Linux computer through Samba. D This command is used to connect as a null session

16. You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port What is this process known as? A. Footprinting B. Firewalking C. Enumeration D. Idle scanning

17. Sandra has been actively scanning the client network on which she is doing a vulnerability assessment test. While conducting a port scan she notices open ports in the range of 135 to 139. What protocol is most likely to be listening on those ports? A. Finger B. FTP C. Samba D. SMB