Retina Network Security Scanner

Slides:



Advertisements
Similar presentations
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Essential NetTools Pranay Kumar. Essential NetTools  This tool is a set of network tools useful in diagnosing networks and monitoring your computer's.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System Security Scanning and Discovery Chapter 14.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
How’s My Network (HMN)? A Java approach to Home Network Measurement Alan Ritacco, Craig Wills, and Mark Claypool Computer Science Department Worcester.
Vulnerability Analysis Borrowed from the CLICS group.
Network Security Testing Techniques Presented By:- Sachin Vador.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Nessus – A Vulnerability Scanning Tool SUNY Technology Conference June 2003.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Computer Security and Penetration Testing
Lesson 19: Configuring Windows Firewall
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
1 Presentation ISS Security Scanner & Retina by Adnan Khairi
COEN 252: Computer Forensics Router Investigation.
MICROSOFT ASSESSMENT AND PLANNING (MAP) TOOLKIT LAB Dev Chaudhari zevenseas India.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Port Scanning.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Project 2. Introduction Network Vulnerability Assessment “A review of a system of systems to identify weaknesses or errors in design, implementation,
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Shadow Security Scanner Li,Guorui. Introduction Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built.
Honeypot and Intrusion Detection System
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Linux Networking and Security
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
A powerful network monitoring system
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Introduction A security scanner is a software which will audit remotely a given network and determine whether bad guys may break into it,or misuse it.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
IT 463 – Scanning Assignment Shane Knisley Erik Bennett.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Jen Beveridge and Joe Kolenda. Developed by Gordon Lyon Features –Host discovery –Port scanning –Version detecting –OS detection –Scriptable interaction.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
CITA 352 Chapter 6 Enumeration.
Jen Beveridge and Joe Kolenda
Nessus Vulnerability Scan
CSCE 548 Student Presentation By Manasa Suthram
Port Scanning James Tate II
Enumeration.
Configuring ALSMS Remote Navigation
CITA 352 Chapter 5 Port Scanning.
Calvin Wilson Craig Delzangle
Technology Envioronment
– Chapter 3 – Device Security (B)
Computer Networks Protocols
6. Application Software Security
Presentation transcript:

Retina Network Security Scanner By Ajith U Kamath 60-564 Project Frequently, presenters must deliver material of a technical nature to an audience unfamiliar with the topic or vocabulary. The material may be complex or heavy with detail. To present technical material effectively, use the following guidelines from Dale Carnegie Training®.   Consider the amount of time available and prepare to organize your material. Narrow your topic. Divide your presentation into clear segments. Follow a logical progression. Maintain your focus throughout. Close the presentation with a summary, repetition of the key steps, or a logical conclusion. Keep your audience in mind at all times. For example, be sure data is clear and information is relevant. Keep the level of detail and vocabulary appropriate for the audience. Use visuals to support key points or steps. Keep alert to the needs of your listeners, and you will have a more receptive audience.

AGENDA Introduction Installation procedure Features Test cases and results Points noted during testing Conclusion In your opening, establish the relevancy of the topic to the audience. Give a brief preview of the presentation and establish value for the listeners. Take into account your audience’s interest and expertise in the topic when choosing your vocabulary, examples, and illustrations. Focus on the importance of the topic to your audience, and you will have more attentive listeners.

INTRODUCTION Importance of Network Security Scanner Retina Network Security Scanner If you have several points, steps, or key ideas use multiple slides. Determine if your audience is to understand a new idea, learn a process, or receive greater depth to a familiar concept. Back up each point with adequate explanation. As appropriate, supplement your presentation with technical support data in hard copy or on disc, e-mail, or the Internet. Develop each point adequately to communicate with your audience.

INSTALLATION System Requirements Download from Install http://www.eeye.com/html/products/retina/download/index.html Install

FEATURES – Retina Session

FEATURES (Cont…) Discover Tab Discover network machines Customizable TCP, UDP, and ICMP discovery, OS detection, and general machine information Retina can also be configured to discover active wireless devices Additional IP’s with Retina licenses on the network

FEATURES (Cont…) Target Types

FEATURES (Cont…) Audit Tab

FEATURES (Cont…) Modifying the Port Groups All Ports Discovery Ports HTTP Ports NetBIOS Ports Custom Ports added

FEATURES (Cont…) Modifying Audit Groups All Audits SANS20 [All] SANS20 [Unix] SANS20 [Windows] Custom Audit Groups

FEATURES (Cont…) Remediate Tab Generate reports used in remediation management Create customized reports

FEATURES (Cont…) Configurations pane Scan Jobs Results

FEATURES (Cont…) Report Tab Detailed information gathered by the scanner Customized reports Report can be opened in MS Word or Internet Explorer

TEST CASES AND RESULTS Network Configuration

TEST CASES AND RESULTS Test Case One Aim: To scan the ports on the windows server. Description: To run the complete scan of all the ports on the windows server. Test Result: Passed

TEST CASES AND RESULTS

TEST CASES AND RESULTS Test Case Two Aim: To scan the Red Hat Linux server and match the result with other security tool. Description: By comparing the result with other network security tool like GFI LANguard we can actually check whether the result produced by Retina Scanner is proper or it lacks in giving some information. Test Result: Failed.

TEST CASES AND RESULTS The result obtained from Retina

TEST CASES AND RESULTS The result obtained from GFI LANguard

TEST CASES AND RESULTS Test Case Three Aim: To test whether retina network scanner will detect the users weak passwords Description: The user account in question could have a password that is exactly the same as the account name except for it is backwards. Therefore an attacker could easily guess this password and gain access to your system via this account and then further their access into your network. Test Condition: Created a user account ‘kamath’ with password as ‘htamak’ i.e. opposite to the user login name on 137.207.234.151 machine. Test Result: Passed

TEST CASES AND RESULTS

TEST CASES AND RESULTS Test Case Four Aim: To test the windows server 2003 for CVE-2000-1200. Description: Windows NT allows remote attackers to list all users in a domain by obtaining the domain security identifier (SID) with the LsaQueryInformationPolicy policy function via a null session and using the SID to list the users. Test Result: Passed

TEST CASES AND RESULTS

POINTS NOTED DURING TESTING The results were not consistent in few test cases. The following diagrams shows while the network is discovered using the software.

POINTS NOTED DURING TESTING In the following diagram, the Mac address for machine 137.207.234.151 is not displayed.

POINTS NOTED DURING TESTING When the same machine is discovered again, Mac address is displayed.

POINTS NOTED DURING TESTING The software was unstable during testing. When the link connecting to the destination went down while the retina was still scanning the machine, scanner hanged. The scanner was not responding for any commands. But the problem could not be reproduced when tested under the same conditions again.

Conclusion The 2004 Readers' Choice Best Security Scanner award User friendly interface Many features included Could not scan medium risk vulnerabilities when compared to other tools. Determine the best close for your audience and your presentation. Close with a summary; offer options; recommend a strategy; suggest a plan; set a goal. Keep your focus throughout your presentation, and you will more likely achieve your purpose.