1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
IMS Client Installation Procedures 1. Copy the Voic Pro from the shared folder on the Voic Pro server. Go to Start, Run, and \\ or \\
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
The Cain Tool Presented by: Sagar Chivate CS 685F.
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
Essential NetTools Pranay Kumar. Essential NetTools  This tool is a set of network tools useful in diagnosing networks and monitoring your computer's.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Network Security Testing Techniques Presented By:- Sachin Vador.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Computer Security and Penetration Testing
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Microsoft Networking.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
1 Presentation ISS Security Scanner & Retina by Adnan Khairi
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Installing and running COMSOL on a Windows HPCS2008(R2) cluster
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Chapter Twelve Using TCP/IP on the Network. Objectives Here, we’ll examine how to configure TCP/IP. The concepts of subnetting will be examined in detail.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
Using Windows Firewall and Windows Defender
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
 Ping - Transmits four 32 byte packets to target computer ◦ Measures response time ◦ Returns IP address of target computer ◦ Example: ping uottawa.ca.
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Honeypot and Intrusion Detection System
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
The Microsoft Baseline Security Analyzer A practical look….
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
CIS 450 – Network Security Chapter 3 – Information Gathering.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
MIS Week 4 Site:
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Module 1: Configuring Windows Server Module Overview Describe Windows Server 2008 roles Describe Windows Server 2008 features Describe Windows Server.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
A powerful network monitoring system
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Chapter 4  Configuration: Client/Server Components 1 Chapter 4 Overview  Configure client/server components o Network interface card (NIC) o Windows.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
TCOM Information Assurance Management System Hacking.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Retina Network Security Scanner
IT 463 – Scanning Assignment Shane Knisley Erik Bennett.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Jen Beveridge and Joe Kolenda
Nessus Vulnerability Scan
Seminar On Ethical Hacking Submitted To: Submitted By:
Module 8: Networking Services
CITA 352 Chapter 5 Port Scanning.
Penetration Testing Karen Miller.
Hacking Windows Damian Gordon.
Presentation transcript:

1 GFI LANguard Network Security Scanner

2 Contents Introduction Features Source & Installation Testing environment Results Conclusion

3 Introduction Importance of Network security  Internal Security  External Security Purpose of GFI LANguard  Enable Network admins to perform Security audit Remote system analysis

4 Features Security Audit  Results in a verbose manner  Flexible scanning Scan one computer Scan range of computers Scan list of computers Domain specific scan

5 Features (Cont…) System detection  SNMP, NETBIOS queries, Ping Sweep Configuring ports for port scan

6 Features (Cont..) Enumeration of entry points  SNMP holes  CGI holes  Open shares  Rogue, Backdoor users  Weak network passwords

7 Features (Cont…) Alerts  Well known security problems are clearly identified  Intelligent scanning  Listing of hot-fixes & service packs

8 Features (Contd..) Remote Machine shutdown Exploitation of NetBIOS vulnerability Enabling auditing Sending spoofed messages Scheduling scans & automatic update of scans Gathering information & displaying using report generator

9 Features (Contd..) Scripting Language:  LANS: LANguard Scripting language  GFI LANguard contains its own scripting editor  Allows users to create custom script which will be executed on the remote host as when accessed

10 Features (Contd..) Tools:  SNMP Walk By performing SNMP walk potential hackers or malicious users will get lot of information about the system

11 Features (Contd..) Tools (Contd..)  Trace route  DNS look up

12 Tools (Contd..)  SNMP Audit SNMP audit allows to detect weak community strings.

13 Tools (Contd..)  MS-SQL Audit

14 Tools (Contd..)  Enumerated Computers

15 Source & Installation Downloaded GFILANguard from Minimum requirements as set by vendor  OS: Win 2000/2003/XP  IE  Client for Microsoft networks be installed  No personal firewall settings

16 Testing Environment Setting options:

17 Testing Environment (Contd..)

18 Testing Environment (Contd..)

19 Results Source IP address : CASE -1 :  Destination IP:  Scan parameters: As specified earlier

20

21 Results (Contd..) CASE –II : SunSolaris

22 Results (Contd..) Script execution: hostname = "agardel2" # my desktop computer  // name of the system from which the script is running  ip = dnslookup(hostname)  // using the function dnslookup  if ip <> ""  echo("hostname: " + hostname)  echo("resolved as: " + ip, _color_blue)  # now backwards:)  hostname = ReverseDnsLookup(ip)  if hostname <> ""  echo("back to: " + hostname,)  end if  else  echo("unable to resolve " + hostname + " !", \  _color_red)  end if

23 Conclusion GFI LANguard is a very good tool in  detecting and analysis of vulnerabilities  User – defined Scripting language : LANS  Verbose representation of Data  Generating Reports

24 References