Computer Security and Penetration Testing

Slides:



Advertisements
Similar presentations
Overview The TCP/IP Stack. The Link Layer (L2). The Network Layer (L3). The Transport Layer (L4). Port scanning & OS/App detection techniques. Evasion.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
TCP/IP Fundamentals A quick and easy way to understand TCP/IP v4.
Review For Exam 2 March 9, 2010 MIS 4600 – MBA © Abdou Illia.
NMAP Scanning Options. EC-Council NMAP  Nmap is the most popular scanning tool used on the Internet.  Cretead by Fyodar ( it.
Network Security of Labnet ******. Introduction Test the network security of the servers on our Labnet domain Find Potential Weaknesses Find Security.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
IP Network Scanning.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Scanning Determining if the system is alive IP Scanning Port Scanning War Dialing.
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 2 Scanning 1.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
System Security Scanning and Discovery Chapter 14.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Network Security Testing Techniques Presented By:- Sachin Vador.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Port Scanning Yiqian Zhang CS 265 Project. What is Port Scanning? port scanning is equivalent to knocking on the walls to find all the doors and windows.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Deff Arnaldy
Penetration Testing.
Port Scanning.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Ana Chanaba Robert Huylo
SCSC 555 Frank Li.  Port scanning  Port-scanning tools  Ping sweeps 2.
 Find out initial information ◦ Open Source ◦ Whois ◦ Nslookup  Find out address range of the network ◦ ARIN (American registry for internet numbers)
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
EECS 354 Network Security Metasploit Features. Hacking on the Internet Vulnerabilities are always being discovered 0day vulnerabilities Every server or.
Honeypot and Intrusion Detection System
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
CIS 450 – Network Security Chapter 3 – Information Gathering.
COEN 350 Security Threats. Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks.
--Harish Reddy Vemula Distributed Denial of Service.
FORESEC Academy FORESEC Academy Security Essentials (III)
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Chapter 2 Scanning Last modified Determining If The System Is Alive.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Retina Network Security Scanner
DoS/DDoS attack and defense
Hands-On Ethical Hacking and Network Defense
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
Scanning.
Network and Port Scanning Chien-Chung Shen
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Penetration Testing Scanning
Port Scanning James Tate II
CITA 352 Chapter 5 Port Scanning.
Port Scanning (based on nmap tool)
Information Gathering
CIT 480: Securing Computer Systems
Module 18 (More Network Discovery)
Traffic Analysis– Wireshark Simple Example
EVAPI - Enumeration Auburn Hacking club
Presentation transcript:

Computer Security and Penetration Testing Chapter 3 Scanning Tools

Objectives Comprehend the functioning of scanners Trace the development of scanners Identify various types of scanning Identify different scanners Computer Security and Penetration Testing

Scanning Tools Scanners Port scanner Find and fix vulnerabilities in remote machines on a network Software tool that examines and reports about vulnerabilities on local and remote hosts Port scanner Examines and reports the condition (open or closed) of a port And the application listening on that port, if possible Computer Security and Penetration Testing

Evolution of Scanners Scanners first appeared even before ARPANET To monitor connections between mainframes and dumb terminals The Internet was launched in the 1970s The early UNIX-like languages had no security at all Legitimate network users would connect to remote UNIX servers By having their modem dial specific telephone numbers Led to the invention of a new tool, the war dialer Computer Security and Penetration Testing

Evolution of Scanners (continued) War dialer Script that tells the modem to dial a range of phone numbers defined by the user And then identifies those numbers that connect to remote computers A form of automated scanner In the early 1980s, the majority of servers ran on UNIX platforms System administrators created shell scripts that let them check security weaknesses of their networks And avoid hacking activities Computer Security and Penetration Testing

Evolution of Scanners (continued) As the Internet increased in availability and popularity More computers and networks became connected Today, scanners are available for several popular platforms Computer Security and Penetration Testing

How Scanners Work Scanners automate the process of examining network weaknesses Scanners are not heuristic Functions Connects to a target host(s) Examines the target host for the services running on it Examines each service for any known vulnerability Computer Security and Penetration Testing

Types of Scanning TCP Connect Scanning Half-Open Scanning Attempts to make TCP connections with all of the ports on a remote system Target host transmits connection-succeeded messages for active ports User does not need root privileges to perform TCP connect scanning Almost all IDSs recognize the scanning Half-Open Scanning A TCP connection scanning that does not complete the connections Computer Security and Penetration Testing

Types of Scanning (continued) Half-Open Scanning (continued) Only the SYN message is sent from the scanner Reply signal may be a SYN/ACK, indicating the port is open Attacker replies with an RST flag to avoid detection Some IDSs can be configured to log all network activities Root or system administrator privileges are required to perform half-open scanning Computer Security and Penetration Testing

Types of Scanning (continued) UDP Scanning Examines the status of UDP ports on a target system Scanner sends a 0-byte UDP packet to all the ports on a target host If port is closed, the target host replies with an ICMP unreachable message Most operating systems generate UDP messages very slowly Makes UDP scanning impractical Computer Security and Penetration Testing

Types of Scanning (continued) IP Protocol Scanning Examines a target host for supported IP protocols Scanner transmits IP packets to each protocol on the target host If target host replies with an ICMP unreachable message to the scanner Then the target host does not use that protocol Computer Security and Penetration Testing

Types of Scanning (continued) Ping scanning Demonstrates whether a remote host is active by sending ICMP echo request packets to that host Computer Security and Penetration Testing

Types of Scanning (continued) Computer Security and Penetration Testing

Types of Scanning (continued) Stealth Scanning Lets you examine hosts behind firewalls and packet filters Most stealth scanners do not allow target hosts to log the scanning activities Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Discovery - Nmap: - Unicornscan: An open-source tool designed to identify information related TCP flags and banners. Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Reconnaissance - Fierce: Perl-based tool that focuses on particular targets using pattern matching. - Maltego: Java based tool, offered in both community and commercial versions and is marketed as a forensic tool. - PassiveRecon: A Firefox add-on that allows users to visit a target Web site and gather a variety of publically available information useful in the enumeration or reconnaissance phase of a penetration test. Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Reconnaissane - Tcpdump: An open-source command-line packet analyzer. - Wireshark: Similar to tcpdump but contains a GUI interface. Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Vulnerability Identification - Nessus: A remote security scanner designed to be run on linux, BSD, Solaris, and other versions of Unix. - NeXpose: A commercial enterprise Vulnerability testing tool. - Nipper: A commercial software using C++ that is both open source and sold by license by Titania. - OpenVAS: Open-source version of Nessus. Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Vulnerability Identification - QualysGuard (SaaS): vulnerability tool that is designed to support penetration testing and includes features for discovery and enforcement of policies. - SAINT: Security Administrator’s Integrated Network Tool Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Exploitation - CORE Impact: full-service commercial vulnerability testing and penetration tool. - MetaSploit: network vulnerability tool that, like CORE Impact, offers a wide range of functions. - Live Linux Distros: BackTrack Linux Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Review of Scanner Technology Computer Security and Penetration Testing

Summary Scanning permits hackers to learn the vulnerabilities of the target system The most popular scanners are open source or freeware, made freely available across the Internet In the early days of computing, security vulnerabilities, while abundant, were not well known When hackers wanted to crack a system in the 1970s, they would examine the target system for all known vulnerabilities Computer Security and Penetration Testing

Summary (continued) As students and hobbyists started playing with scanning applications, new vulnerabilities were discovered In the early 1980s, most servers ran on UNIX platforms System administrators created shell scripts that let them check security weaknesses Scanners automate the process of examining network weaknesses, and check only for known vulnerabilities and open ports Computer Security and Penetration Testing

Summary (continued) Scanners can be set to target a single IP address or a range of addresses Scanners are available on UNIX, Windows, and Macintosh platforms Computer Security and Penetration Testing