MIS 5211.001 Week 6 Site:

Slides:



Advertisements
Similar presentations
Security Administration Tools and Practices Amit Bhan Usable Privacy and Security.
Advertisements

Let’s Talk About Cyber Security
How to download and install Sharpdesk
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
AVG Internet Security 7.5 Product presentation.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Vulnerability Assessments with Nessus 3 Columbia Area LUG January
Vulnerability Analysis Borrowed from the CLICS group.
Server-Side vs. Client-Side Scripting Languages
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
0-1 Team # Status Report (1 of 4) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team #: Team Name.
0-1 Team # Status Report (1 of 4) Client Contact –Status Point 1 –Status Point 2 Team Meetings –Status Point 1 –Status Point 2 Team Organization –Description.
Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian
Nessus – A Vulnerability Scanning Tool SUNY Technology Conference June 2003.
MIS Week 3 Site:
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Maintaining and Updating Windows Server 2008
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
Vulnerability Types And How to Use Them.
Technical Training: DIR-615
MIS Week 7 Site:
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Using Windows Firewall and Windows Defender
MIS Week 5 Site:
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
1 Nessus - NASL Marmagna Desai [592- Project]. 2 Agenda Introduction –Nessus –Nessus Attack Scripting Language [ N A S L] Features –Nessus –NASL Testing.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
IT security By Tilly Gerlack.
E-app Download & Agent Workspace. Laptop Presentation Training When an agent signs on e-app, if there are applications that he/she has completed and saved,
Cognos TM1 Satya Mobile:
Honeypot and Intrusion Detection System
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
MIS Week 6 Site:
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
The Microsoft Baseline Security Analyzer A practical look….
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Introduction A security scanner is a software which will audit remotely a given network and determine whether bad guys may break into it,or misuse it.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Generating Data for Assignment 9. Macro security policies Excel contains a programming language called Visual Basic for Applications that can be used.
Retina Network Security Scanner
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
Footprinting and Scanning
PHP Form Processing * referenced from
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
MIS Week 5 Site:
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Maintaining and Updating Windows Server 2008 Lesson 8.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
How to use Drupal Awdhesh Kumar (Team Leader) Presentation Topic.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Intro to Ethical Hacking
Footprinting and Scanning
CITA 352 Chapter 5 Port Scanning.
CompTIA Server+ Certification (Exam SK0-004)
GCE Applied ICT G053: Lesson 01 Introduction To The Unit
Footprinting and Scanning
Intro to Ethical Hacking
Intro to Ethical Hacking
Intro to Ethical Hacking
CGS 3175: Internet Applications Fall 2009
Presentation transcript:

MIS Week 6 Site:

 In the news  Nessus  Next Week 2MIS

 Started in 1998 as an open source security scanning tool  Changed to a close sourced tool in 2005, but has remained “free” for personal use.  Surveys by sectools.org indicate Nessus remains the most popular vulnerability scanners  Not installed with Kali MIS

 Four basic parts to the Nessus server:  Nessus-core  Nessus-libraries  Libnasl  Nessus-plugins MIS

 Plugins are the scripts that perform the vulnerability tests.  NASL – This is the Nessus Attack Scripting Language which can be used to write your own plugins.

 Hosts  Server.domain.edu   Subnet   Address range 

 Scanning methods:  Safe  Destructive  Service recognition – Will determine what service is actually running on a particular port.  Handle multiple services – Will test a service if it appears on more then one port.  Will test multiple systems at the same time.

 Nessus will indicate the threat level for services or vulnerabilities it detects:  Critical  High  Medium  Low  Informational  Description of vulnerability  Risk factor  CVE number

 CVE created by  Attempting to standardize the names for vulnerabilities.  CVE search engine at

MIS

MIS

MIS

MIS

 Nessus is built on a classic client/server model.  The server portion may reside on a separate machine, or on the same machine as the client  The client is the interface that you will interact with to execute scans MIS

 Download from Tenable Security  your-operating-system your-operating-system  Before installing, go to registration page and get the activation code   Run the MSI package and follow the prompts  Install will also install PCAP and then take you to the registration page.  Enter activation code and follow the prompts to get updates and plugins MIS

 Documentation for Nessus is available here:  2_user_guide.pdf 2_user_guide.pdf  You will also get a link to this location during the install. MIS

 You will need to turn off Anti-Virus and Firewall in order to get an effective scan or you will see this:  Before you do this, disconnect from any and all networks.  You will likely still get some blocking as AV doesn’t like to give up. MIS

 Nessus is installed here: MIS

 You should end up looking at web page hosted from your machine.  Book mark the page to save time getting back  URL will look like this:  MIS

 When you first go to site, you will need to click on continue to the website.: MIS

 Start MIS

 Scans are based on policies, you will need to create that first. MIS

 Next MIS

MIS

MIS

MIS

MIS

 Once your scan has started you will see a status field like this: MIS

 Once completed you will get the following notification: MIS

MIS

MIS

MIS

 Important to note:  Also MIS

 Note on criticality  The “Critical” risk factor is without any mitigating controls being taken in to account  Vulnerabilities need to be evaluated in context MIS

 These results were obtained, even though Anti- Virus continued blocking multiple techniques.  Consider setting up a scanning machine without any AV or Host Firewall. MIS

 In short order you will gather a large collection of scans  Use the built in folder system to move scans off of the main page MIS

MIS

 The least significant vulnerabilities are classified as “Info” or informational.  These are often very useful in understanding details of the asset being scanned. MIS

MIS

 Test 1  Will cover weeks 1-5. Will not include information from tonight  Questions will come from the presentation material  Exam will be multiple choice  NetCat Potentially  Batch Scripting MIS

? MIS