MIS 5211.001 Week 7 Site:

Slides:



Advertisements
Similar presentations
Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Advertisements

1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
System Security Scanning and Discovery Chapter 14.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
USC’s Internet-based Time and Attendance Management System.
Computer Security and Penetration Testing
A common error that appears on the copier’s screen is seen here when a scan to Sharpdesk is not sent to the computer successfully. This guide intends to.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
INTRODUCTION TO WEB DATABASE PROGRAMMING
Penetration Testing Training Day Capture the Flag Training.
Agenda  Terminal Handling in Unix File Descriptors Opening/Assigning & Closing Sockets Types of Sockets – Internal(Local) vs. Network(Internet) Programming.
1 Web Server Administration Chapter 9 Extending the Web Environment.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 11.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
MIS Week 5 Site:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
MIS Week 6 Site:
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
Chapter 9 How Do Users Share Computer Files?. What is a File Server A (central) computer which stores files which can be accessed by network users.

Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
MIS Week 4 Site:
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Lab 2: TCP /IP communication Southern Methodist University Bryan Rodriguez.
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
MIS Week 6 Site:
TCP Sockets Reliable Communication. TCP As mentioned before, TCP sits on top of other layers (IP, hardware) and implements Reliability In-order delivery.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Practice 4 – traffic filtering, traffic analysis
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
Computer Communication: An example What happens when I click on
MIS Week 7 Site:
MIS Week 5 Site:
COMP2322 Lab 4 Socket Programming Toby Lam March 2, 2016.
Day 15 Apache. Being a web server Once your system is correctly connected to the network, you could be a web server. –When you go to a web site such as.
Monitoring Dynamic IOC Installations Using the alive Record Dohn Arms Beamline Controls & Data Acquisition Group Advanced Photon Source.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester December 2009.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
COMP2322 Lab 4 Socket Programming
How Do Users Share Computer Files?
Footprinting and Scanning
Network Commands 2 Linux Ubuntu A.S.
Backdoor Attacks.
Remote Control and Advanced Techniques
Networking for Home and Small Businesses – Chapter 6
Intro to Ethical Hacking
Bomgar Remote support software
Networking for Home and Small Businesses – Chapter 6
Intro to Ethical Hacking
A Distributed DoS in Action
Process-to-Process Delivery:
Configuring Internet-related services
Intro to Ethical Hacking
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Applications Layer Functionality & Protocols
Networking for Home and Small Businesses – Chapter 6
Chapter 7 Network Applications
Penetration Testing & Network Defense
Presentation transcript:

MIS Week 7 Site:

 Mid-Term  In the news  NetCat 2MIS

 Submitted  customers-of-data-breach/ customers-of-data-breach/ 3MIS

 What I noted  yahoo-servers-using-shellshock-bug yahoo-servers-using-shellshock-bug  14/10/stromasys-emulates-legacy-hardware-cloud 14/10/stromasys-emulates-legacy-hardware-cloud  spying-users-collecting-data-ebook-libraries/#.VDS- f3l0yUl spying-users-collecting-data-ebook-libraries/#.VDS- f3l0yUl  largest-u-s-bond-insurer/ largest-u-s-bond-insurer/  problem/ problem/ MIS

 Netcat is a utility used by Penetration Tester and Hackers to establish network connections over UDP or TCP.  Takes “Standard In”, and sends it across the network as data  Receives network data and puts it on “Standard Out”  Messages from netcat itself go on “Standard Error” MIS

 These are terms from programming that refer to expected streams in software  As an example  stdin would be the keyboard  Stdout would be the screen  Stderror may be dropped or sent to logging MIS From: eams#Standard_error_.28stderr.29 eams#Standard_error_.28stderr.29

 In Linux netcat is typically installed and can be activate simply by typing “nc” at the command line  In Windows, the file is not installed  A version can be downloaded from:   Once downloaded and extracted type “ncat” at the command line to get started  Note – AV will likely automatically remove it MIS

8

 Basic format is  Send  $nc [Target IP] [Remote Port]  Receive  $nc [flag(s)] [Local Port]  Assumes TCP unless –u flag is set forcing to UDP  Link to SANS Cheat Sheet  URL: resources/sec560/netcat_cheat_sheet_v1.pdfhttp:// resources/sec560/netcat_cheat_sheet_v1.pdf MIS

 So, netcat can send what I type to another machine. So what!  The pipe commands “|”, “>”, and “<“ let you do more interesting things  For example, transfer a file between systems  $nc –l –p [Local Port] > [Out File]  Listen on local port and store result in file  $nc –w3 [TargetIP] [Port] < [In File]  Push file to target IP on port  See SANS Cheat Sheet on previous page for more examples MIS

 You can even use netcat as a simple port scanner  Example  $nc –v –n –z –w1 [Target IP] [Starting Port] – [Ending Port]  Systematically attempts to connect on each port within the defined range  Note:  -v – Verbose  -n – Do not resolve names  -z – Do not send data  -w1 – Wait no more then one second to connect MIS

 2 nd formal assignment  From Syllabus  (student presentations) (student presentations) Scanning exercise targeted against only systems you personally own, develop a profile of the targeted machine or machines. You may work in teams, or separately  One to two page Executive Summary  Short (no more then three slides, no welcome slide) presentation  See “Exercise Analysis” tab for more details MIS

 Readings and Articles as usual  We will be covering  Social Engineering  Encoding  Encryption MIS

? MIS