Cybersecurity Computer Science Innovations, LLC. Fingerprinting So, we have a file at the top level of a Web site. It is called robots.txt It specifies.

Slides:



Advertisements
Similar presentations
What is an IP Address An IP Address (or Internet Protocol address) is an address used to uniquely identify a device on an IP network. The address is made.
Advertisements

SYSTEM ADMINISTRATION Chapter 19
Linux network troubleshooting If your network connection is not working..
Operating Systems Concepts 1/e Ruth Watson Chapter 11 Chapter 11 Network Maintenance Ruth Watson.
Nassau Community College
Linux Networking TCP/IP stack kernel controls the TCP/IP protocol Ethernet adapter is hooked to the kernel in with the ipconfig command ifconfig sets the.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
The Internet Useful Definitions and Concepts About the Internet.
Basic TCP/IP Networking
Network Management And Debugging
ISP – 8 th Recitation 3 rd exercise review Computer networks - Introduction.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
IIS and PWS. What is IIS and PWS? Microsoft Internet Information Server (IIS) and Peer Web Services (PWS) enable Windows NT servers with the ability to.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Linux Networking Commands
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
Layering and the TCP/IP protocol Suite  The TCP/IP Protocol only contains 5 Layers in its networking Model  The Layers Are 1.Physical -> 1 in OSI 2.Network.
IP-adresses and subnet masks. Figure 19.9 Dotted-decimal notation.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
4: Addressing Working At A Small-to-Medium Business or ISP.
Terralite Solutions.  TCP/IP setting for communications  Subscription  Unicast  Multicast  UDP  Communications troubleshooting.
Ethical Hacking Computer Science Innovations, LLC.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Chapter 8 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Describe the structure of an IPv4 address.  Describe.
Managing Network connections. Network Cabling Ethernet Topology Bus topology – Connects each node in a line – Has no central connection point Star topology.
HALP! Something is in my tubes! Part I by Jason Testart, IST.
ITS CSS Desktop Support Introduction to networking concepts Last updated: 9/30/2008 by pxahelp.
 Ping - Transmits four 32 byte packets to target computer ◦ Measures response time ◦ Returns IP address of target computer ◦ Example: ping uottawa.ca.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
Examining TCP/IP.
1 IP: putting it all together Part 1 G53ACC Chris Greenhalgh.
Copyright © Lopamudra Roychoudhuri
Connecting to a Network Lesson 5. Objectives Understand the OSI Reference Model and its relationship to Windows 7 networking Install and configure networking.
Networking Colin Alworth May 26, Quick Review IP address: four octets Broadcast addresses –IP addresses use all 1’s for the host bits, and whatever.
Links and LANs Link between two computers via cross cable The most simple way to connect two hosts is to link the two hosts with a cross cable.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 2: Configuring Network Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
NETWORKING IN LINUX. WHAT IS LINUX..? Freely implemention of UNIX-like Kernel. Free & Open source Software. Developed by Linus Torvalds in 1991.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Delivery, Forwarding, and Routing of IP Packets
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
2010 paro, bhutan IP Basics IP/ISP Services Workshop July, 2010 Paro, Bhutan.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
How to connect to the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
TCP/IP Network Essentials
1 Kyung Hee University Chapter 6 Delivery Forwarding, and Routing of IP Packets.
Chapter 5.  Upon completion of this chapter, you should be able to:  Configure IP addresses  Identify & select valid IP addresses for networks  Configure.
Linux Operations and Administration Chapter Eight Network Communications.
ERICSON BRANDON M. BASCUG Alternate - REGIONAL NETWORK ADMINISTRATOR HOW TO TROUBLESHOOT TCP/IP CONNECTIVITY.
workshop eugene, oregon IP Basics Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
Fall 2011 Nassau Community College ITE153 – Operating Systems 1 Session 9 Networking & Operating Systems (part 2)
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
Windows Vista Configuration MCTS : Advanced Networking.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Linux network troubleshooting
Click to edit Master subtitle style
Introduction to Networking
Delivery, Forwarding, and Routing of IP Packets
Module 12 Network Configuration
Presentation transcript:

Cybersecurity Computer Science Innovations, LLC

Fingerprinting So, we have a file at the top level of a Web site. It is called robots.txt It specifies where to find content and What content to avoid. What can this tell us from a fingerprinting perspective? Tells us the stuff we wish to protect.

Fingerprinting Perspective Take down the robots.txt Take down the sitemaps Try to take down the disallows Use wget …

Lab Fingerprint Web Server Use wget Use wget Use more robots.txt Use wget Use more Use Try to wget disallowed files.

What Did We Learn? What can we do with robots.txt from a fingerprint perspective. Part of directory structure. Show's you what they do not want to share. Why does wget not pull disallow information? Hint man wget. It adhere's to the robots.txt protocol. How could we get disallowed information? What type of licensing is wget? Open Source. We can get the source. Change it and go after the disallow.

Web Site Fingerprinting Best Practices: 1) Use robots.txt for things you want found by a search engine and disallow for things you do not want found. 2) Use a tool (if you are a penetration tester) to work around the disallow in robots.txt. Remember disallow is a protocol. 3) Use security in the web server to protect sensitive files.

Network 101 Typically three types of networks A, B, C Differ by.... netmask A netmask B netmask C netmask So how does this work.

OSI Networking Model Application - Applications running on top - ssh Presentation --- Map data between representations. Session --- Support conversation. Transport --- Put stuff in order, end to end Network – communicate with routing Data Link --- communicate without routing Physical --- Cable

Data Link Layer Data link – no routing Scott Brian

Command to See Network Ifconfig -a Scott inet addr: Bcast: Mask: Brian … Netmask What does that mean.

Netmask  Class C network.  Only route if you differ by more than the last octet.    No Routing necessary. Only differ by where the Netmask is 0 therefore resolved at the data link layer. MAC/IP. The conversion between MAC and IP is datalink.

More Netmask is a B network only route if differ by left- most two octets Routing? No. Why? The only values that differ are where you have a bit pattern of 1111's is an A network and does it require routing. Only differs by where it is 1.

Netmask Concluded Class C network Netmask What is that in HEX? – FFFF.FFFF.FFFF.0000 What is that in Binary? – So Class C network one computer is and one is Need Routing?

Netmask Lab Class C Network – and Need routing? Yes. Differs by third Class A Network – and need routing? no. – and need routing? yes Question for a router Cisco– who makes it – Dlink Netgear, who makes it?

A Little Further in the Network Find the router.. – Unix – Command netstat -rn ifconfig -a eth0 Link encap:Ethernet HWaddr c8:0a:a9:b5:9d:db inet addr: Bcast: Mask: netstat -rn Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface U eth U eth UG eth0

DHCP Distributed Hosts Configuration Protocol Machine comes up and looks for a DHCP server Gets an IP address, Netmask and DNS. What vulnerability do we have here.

DHCP - Vulnerability Get on Network and put your own DHCP Server up The DNS Server it give or serves up is yours. And it routes to spoofed web sites. Why does this work? Because it looks for the first DHCP sever. The one that responds first will be the one closest to the computer asking. Unless you have an intrusion detection systems, you will get away with this. An intrusion detection system at the network layer would find this. Part of a penetration test.

What About DNS? Domain Name Service. Maps names to IP addresses. It is given to us by DHCP Unix find it? More /etc/resolv.conf more /etc/resolv.conf # Generated by NetworkManager nameserver

On My Network is the DNS Server and the Router Netmask is It is CISCO like???? That is what we found out. To do on Windows ipconfig /all Lab.... Tell me what you have on your Windows box?

Conventions Class C – Generally x.x Class A (bigger network) Generally 10.x.x.x. Gateway … generally. What ever you are working with.1 DHCP Server is generally the Gateway.

What is DHCP? Distributed Hosts Configuration Protocol Turn on a computer, get the IP address, DNS Server, Router, and any Routes. Broadcasts for it. In other words, comes up, says who is my DHCP? First one wins.

What is wrong with our Network, via Conventions? C Network, why netmask IP address starts with 10, which is an A network Should start with ???? Router ends in.254, what does it typically do? –.1

Review Fingerprinting Why do we Fingerprint? To learn about the system. If you are an adversary, you want to find something easy. If you are a security professional, you want to see how hard your systems are. Most common tool is nmap. Nmap can help you work around an IDS. Inspects traffic to tell you about products and ports. Nmap is a TCP/IP expert, Xmas, Stealth, etc.

Network use Netmask Typical network --- cisco … Ip address of the router is C So if I talk to to Do I need to route? No? So if the address differs by the octet with a 0 in the netmask no routing.

Network Route When Addresses differ from where there is a 1. For If we wish to go from to Do we need to route? Yes How do we find our router? Use netstat -rn

Talk About Addresses TCP/IP protocol We agree to not route what addresses: what you get when you do not get a dhcp address x CISCO x DLINK

Network Topology So, I want three networks to be separate and have one external address to the internet. How do I do this? external address internal Network x gtw Internal ( ) Network x gtw Internal ( ) Network x gtw Internal ( )

What Did We Learn 1) Netmask determines your address range.. Route when difference is in the area of 1's on netmask. 2) Router must be on same subnet as network it is routing. 3) How do we find netmask Unix (ifconfig -a) windows ipconfig /all 4) How do we find router – netstat -rn 5) How do we find dns server windows its ipconfig /all Use more /etc/resolv.conf

Tracking Let's say, I sent an to Mo and I wanted assurance that he has read it. itself is a datagram. In the message Tools that do this for you. Put a link that does not require a click and sends that to a server for recordiing.

Tracking This can be a servlet that returns a graphic. When the is read, the servlet it called (it has to show the graphic). While getting the graphic, it denotes the fact that the was read.

Fingerprinting Lab Tell me what I am running nmap thestreits.com By using nmap Tell me what hosts on your subnet are running. By using nmap

Fingerprinting We want to see what is on our network. If you are bad.... then you are looking for easy things. We want to make sure, we are not one of those easy things. So for Bad People, Fingerprinting is a way to find easy systems to crack. For Security Professionals, hardening our systems.

Best Practices Only SSH login and only through a private key. Open Ports 22 (private key only) and 443 This is for externally facing Servers So how do we find out?

How Do We Fingerprint Command - telnet host port Then send it commands Then get what's running by parsing the results of commands. telnet 80 Trying HEAD Apache/ (Ubuntu) Server at localhost Port 80

Instead Of Telnet to a port. Writing a socket level program Ping ping PING ( ) 56(84) bytes of data. 64 bytes from pool bltmmd.fios.verizon.net ( ): icmp_req=1 ttl=52 time=24.7 ms

We Use Nmap What is good about Nmap? Price.... Free Runs on every system. Around a long time – stable. Defacto Standard. Does a lot of things.

nmap We can see what systems are up on a subnet We can see what ports are open We can see what tools are runinng on the open ports. We don't have to fool around with TCP/IP

Two Movies on nmap Let's watch a youtube movie on nmap.

Lab Tell me what is running on my machine. Do it two ways. First telnet port HEAD port 80. Telnet 80www.scottstreit.com – HEAD Then do an nmap on my box. Tell me what is running. Tell me what hosts are up on our 10. subnet.

Let's Simulate nmap telnet 80 Trying Connected to Escape character is '^]'. head 501 Method Not Implemented Method Not Implemented head to /index.html not supported. Apache/ (Ubuntu) Server at localhost Port 80 Connection closed by foreign host.