Presentation is loading. Please wait.

Presentation is loading. Please wait.

Retina Network Security Scanner

Similar presentations


Presentation on theme: "Retina Network Security Scanner"— Presentation transcript:

1 Retina Network Security Scanner
By Ajith U Kamath Project Frequently, presenters must deliver material of a technical nature to an audience unfamiliar with the topic or vocabulary. The material may be complex or heavy with detail. To present technical material effectively, use the following guidelines from Dale Carnegie Training®. Consider the amount of time available and prepare to organize your material. Narrow your topic. Divide your presentation into clear segments. Follow a logical progression. Maintain your focus throughout. Close the presentation with a summary, repetition of the key steps, or a logical conclusion. Keep your audience in mind at all times. For example, be sure data is clear and information is relevant. Keep the level of detail and vocabulary appropriate for the audience. Use visuals to support key points or steps. Keep alert to the needs of your listeners, and you will have a more receptive audience.

2 AGENDA Introduction Installation procedure Features
Test cases and results Points noted during testing Conclusion In your opening, establish the relevancy of the topic to the audience. Give a brief preview of the presentation and establish value for the listeners. Take into account your audience’s interest and expertise in the topic when choosing your vocabulary, examples, and illustrations. Focus on the importance of the topic to your audience, and you will have more attentive listeners.

3 INTRODUCTION Importance of Network Security Scanner
Retina Network Security Scanner If you have several points, steps, or key ideas use multiple slides. Determine if your audience is to understand a new idea, learn a process, or receive greater depth to a familiar concept. Back up each point with adequate explanation. As appropriate, supplement your presentation with technical support data in hard copy or on disc, , or the Internet. Develop each point adequately to communicate with your audience.

4 INSTALLATION System Requirements Download from Install
Install

5 FEATURES – Retina Session

6 FEATURES (Cont…) Discover Tab Discover network machines
Customizable TCP, UDP, and ICMP discovery, OS detection, and general machine information Retina can also be configured to discover active wireless devices Additional IP’s with Retina licenses on the network

7 FEATURES (Cont…) Target Types

8 FEATURES (Cont…) Audit Tab

9 FEATURES (Cont…) Modifying the Port Groups All Ports Discovery Ports
HTTP Ports NetBIOS Ports Custom Ports added

10 FEATURES (Cont…) Modifying Audit Groups All Audits SANS20 [All]
SANS20 [Unix] SANS20 [Windows] Custom Audit Groups

11 FEATURES (Cont…) Remediate Tab
Generate reports used in remediation management Create customized reports

12 FEATURES (Cont…) Configurations pane Scan Jobs Results

13 FEATURES (Cont…) Report Tab
Detailed information gathered by the scanner Customized reports Report can be opened in MS Word or Internet Explorer

14 TEST CASES AND RESULTS Network Configuration

15 TEST CASES AND RESULTS Test Case One
Aim: To scan the ports on the windows server. Description: To run the complete scan of all the ports on the windows server. Test Result: Passed

16 TEST CASES AND RESULTS

17 TEST CASES AND RESULTS Test Case Two
Aim: To scan the Red Hat Linux server and match the result with other security tool. Description: By comparing the result with other network security tool like GFI LANguard we can actually check whether the result produced by Retina Scanner is proper or it lacks in giving some information. Test Result: Failed.

18 TEST CASES AND RESULTS The result obtained from Retina

19 TEST CASES AND RESULTS The result obtained from GFI LANguard

20 TEST CASES AND RESULTS Test Case Three
Aim: To test whether retina network scanner will detect the users weak passwords Description: The user account in question could have a password that is exactly the same as the account name except for it is backwards. Therefore an attacker could easily guess this password and gain access to your system via this account and then further their access into your network. Test Condition: Created a user account ‘kamath’ with password as ‘htamak’ i.e. opposite to the user login name on machine. Test Result: Passed

21 TEST CASES AND RESULTS

22 TEST CASES AND RESULTS Test Case Four
Aim: To test the windows server 2003 for CVE Description: Windows NT allows remote attackers to list all users in a domain by obtaining the domain security identifier (SID) with the LsaQueryInformationPolicy policy function via a null session and using the SID to list the users. Test Result: Passed

23 TEST CASES AND RESULTS

24 POINTS NOTED DURING TESTING
The results were not consistent in few test cases. The following diagrams shows while the network is discovered using the software.

25 POINTS NOTED DURING TESTING
In the following diagram, the Mac address for machine is not displayed.

26 POINTS NOTED DURING TESTING
When the same machine is discovered again, Mac address is displayed.

27 POINTS NOTED DURING TESTING
The software was unstable during testing. When the link connecting to the destination went down while the retina was still scanning the machine, scanner hanged. The scanner was not responding for any commands. But the problem could not be reproduced when tested under the same conditions again.

28 Conclusion The 2004 Readers' Choice Best Security Scanner award
User friendly interface Many features included Could not scan medium risk vulnerabilities when compared to other tools. Determine the best close for your audience and your presentation. Close with a summary; offer options; recommend a strategy; suggest a plan; set a goal. Keep your focus throughout your presentation, and you will more likely achieve your purpose.


Download ppt "Retina Network Security Scanner"

Similar presentations


Ads by Google