70 likes | 236 Views
CIT 380: Securing Computer Systems. Scanning. Vulnerability Scanning. Scan for vulnerabilities in systems Configuration errors Well-known system vulnerabilities Scanning Tools Nessus Attack Tool Kit GFI LANguard Network Security Scanner ISS Internet Scanner.
E N D
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems
Vulnerability Scanning Scan for vulnerabilities in systems • Configuration errors • Well-known system vulnerabilities Scanning Tools • Nessus • Attack Tool Kit • GFI LANguard Network Security Scanner • ISS Internet Scanner CIT 380: Securing Computer Systems
Vulnerability Scanner Architecture User Interface Vulnerability Database Scanning Engine Scan Results Report Generation CIT 380: Securing Computer Systems
Nessus Report CIT 380: Securing Computer Systems
Nessus Examples • http://nst.sourceforge.net/nst/docs/user/ch02s04.html • http://www.nessus.org/nessus/features/nessus-ss-big.png CIT 380: Securing Computer Systems
Scanning Tools Summary CIT 380: Securing Computer Systems
References • William Cheswick, Steven Bellovin, and Avriel Rubin, Firewalls and Internet Security, 2nd edition, 2003. • Fyodor, “The Art of Port Scanning,” http://www.insecure.org/nmap/nmap_doc.html • Fyodor, NMAP man page, http://www.insecure.org/nmap/data/nmap_manpage.html • Fyodor, “Remote OS detection via TCP/IP Stack FingerPrinting,” Phrack 54, http://www.insecure.org/nmap/nmap-fingerprinting-article.html • Simson Garfinkel, Gene Spafford, and Alan Schwartz, Practical UNIX and Internet Security, 3rd edition, O’Reilly & Associates, 2003. • Johnny Long, Google Hacking for Penetration Testers, Snygress, 2004. • Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed, 5th edition, McGraw-Hill, 2003. • Ed Skoudis, Counter Hack Reloaded, Prentice Hall, 2006. CIT 380: Securing Computer Systems