Uploaded by MANANK PATEL

Unit 1

advertisement
CYBER SECURITY
1
Outline:
# Overview of vulnerability
scanning. # Open port service
identification.
# Version
check #
Traffic probe
# Vulnerability probe
# Examples of vulnerability
2
•
OVERVIEW OF VULNERABILITY
SCANNING
WHAT IS A VULNERABILITY
SCANNER?
3
TYPES OF VULNERABILITY
SCANNER
1. Network-based scanners
1.
Port scanners
(Nmap : http://insecure.org/nmap)
2.
Network vulnerability scanners
(Nessus http://www.nessus.org/nessus/)
3.
Web server scanners
(Nikto : http://www.cirt.net/code/nikto.html)
4.
Web application vulnerability
scanners (Paros :http://parosproxy.org/index.html) (Acunetix :http://www.acunetix.com/Acunetix)
4
2. Host-based
scanners
1. Host vulnerability scanners
Microsoft Baseline Security Analyser (MBSA)
(http://www.microsoft.com/technet/security/tools/mbsahom
e)
Altiris SecurityExpressions (commercial) :
(http://www.altiris.com/Products/SecurityExpressions.a
spx)
3. Database scanners
Scuba by Imperva Database Vulnerability Scanner:
(http://www.imperva.com/application_defense_center/scuba/defaul
t.a
sp)
5
- Shadow Database Scanner
OPEN PORT SERVICE
IDENTIFICATION
For example
a scanner could connect to:
port 1 - to see if tcpmux is
running. port 7 - to see if echo
is running.
port 22 - to see if openssh is
available. port 25 - to see if smtp
is available.
• If you're interesting in identifying which services use a given port you
can look at the file /etc/services - this has a port number, and an
associated service name.
• nmap also allows you to do more than simply list open ports though.
• Where possible it will identify the version of each identified service
which is running.
• It can also be used to identify the operating system the remote host is
6
running, by examining the variations the way different network packets
VERSION
CHECK
1) -sV (Version detection)
2)-allports (Don't exclude any ports
from version detection)
3)-version-intensity <intensity> (Set
version scan intensity)
4) -version-all (Try every single probe)
5)- version-trace (Trace version scan
activity)
7
Percentage wise vulnerabilty
affection :-
8
TRAFFIC
PROBE
1) High-Speed Traffic
Processing
2) Network Traffic
Measurement
3) Network Intrusion
Detection
9
High-Speed Traffic
Processing
LAN and MAN have evolved over a considerable time span (the last
30 years) and encompass wired and wireless physical links and
speeds from 1 Mb/s to 100 Gb/s.
According to DAG project (Wakaito) :- The total amount of data
created or replicated on the planet in 2010 was over 1 zettabyte (1
102 bytes)
zettabyte
is - that’s 143 GBfor each of the 7 billion people on the
1
This planet.
volume of information requires high-speed links between server
farms, cloud storage, and end users to make sure that it can be
processed in a timely and reliable fashion.” It will not be possible to
analyse such huge traffic volumes in the coming 100 GbE network
installations with the current generation of network measurement
tools.
FPGA cards (intel 82599, Myri-10G Lanai Z8ES) are still used in
applications which perform in-depth analysis, patter matching, and
low- latency operations, and in 40/100 Gb/s networks.
10
Network Traffic
Measurement
1) Full packet traces.
2)Flow statistics provide information
from Internet Protocol (IP).
3)Volume statistics are provided by
most network appliances for
network management.
11
Network Intrusion
Detection
• The signature-based approach
inspects the evaluated content.
• Anomaly-based detection.
• Stateful protocol analysis.
12
•
VULNERABILTY
PROBE
Some security bugs can’t be identified without sending apayload
that exploits a suspected vulnerability.
• An easy-to-understand example of a vulnerability probe is an
HTML injection check for a web application. Imagine a web
app that has a search box for users to find text within its
pages.
HTML EXAMPLE :<div id="search"><span class="results">Results for
'<xss>'...</span>
13
EXAMPLE OF
VULNERABILTY
Minimalist
vulnerable program.
#include <string.h>
int main(int argc, char *argv[])
{
char
buffer[512]; if
(argc > 1)
strcpy(buffer,argv[1]) };
Compile the program with the following
command :
$ gcc -o vulnerable main.c
14
THANK
YOU
26
Download