SlideShare ist ein Scribd-Unternehmen logo
1 von 27
NETWORK SECURITY
    TOOLKIT


       Created By
Agenda
 What is network security
 Importance of network security
 Network security toolkits
   Security Tools
   1.Snort
   2.Ettercap
   3.Sam Spade
   4.Backtrack
   5.Hydra
   6.Deepfreeze
What is Network Security ?


          Network security consists of the provisions
and polices adopted by a network administrator to prevent and
monitor unauthorized access, misuse, modification, or denial
of a computer network and network-accessible resources
Importance of Network Security
Network Security Tools
Snort
→ Developed by Sourcefire, Inc. in 2012

→ Snort is lightweight network IDS or IPS which is used to
  detect a variety of attacks and probes

→ Snort have three modes :
   1. sniffer
   2.packet logger
   3.network intrusion detection

→ Snort uses a flexible rule-based language to describe traffic
Features

→ Small ,Portable (Linux, Solaris, *BSD, IRIX, HP-UX)

→ Fast and Open Source Software

→ Configurable (Easy rules
  language, many reporting/
  logging options)
Ettercap
→ Ettercap is a tool for network protocol analysis and security
  auditing

→ Capable of intercepting traffic , capture passwords, and
  conduct active eavesdropping
  against common protocols

→ Supports active and passive
  dissection of many protocols
Features
→ Ettercap offers four modes of operation:
   1.IP-Based
   2.MAC-Based
   3.ARP-Based
   4. PublicARP-based

→ Character injection into an established connection

→ HTTPS support

→ Plug-in support
Features(contd…)
→ Password collectors for

→ Packet filtering/dropping

→ OS fingerprinting

→ Passive scanning of the LAN

→ Hijacking of DNS requests
Sam Spade
→ Sam Spade utility was authored by Steve Atkins in 1997

→ Sam Spade is a network tool suite, with some extra features
  that will enable you to track unsolicited email.

→ The Sam Spade tool acts as a sleuth that finds as much public
 information about an IP address or DNS address

→ It integrates the capabilities found in ping, traceroute, time,
  whois, nslookup, finger, DIG , etc
Features
→ DNS zone transfer
→ SMTP Relay Check
→ Scan Addresses
→ Crawl website
→ Browse web
→ Fast and Slow Traceroute
→ Decode URL
→ Parse email headers
→ Check cancels
Backtrack
→ Linux distribution designed for penetration testing, aka
  "ethical hacking“

→ BackTrack is a Linux distribution that is security focused and
  contains over 300 security tools integrated with a highly
  polished user interface

→ current version is BackTrack 5 R3
Hydra
→ very fast network logon cracker

→ perform rapid dictionary attacks against more then 30
  protocols, including TELNET, FTP, HTTP, HTTPS, MS-SQL,
  MYSQL,SNMP, POP3, IMAP etc
Features
→ IPv6 Support

→ Graphic User Interface

→ Internationalized support (RFC 4013)

→ HTTP proxy support

→ SOCKS proxy support
Deep Freeze
→Developed by Feronics ,Deep Freeze makes computer
 configurations indestructible

→Any changes made to a computer are wiped out at the end of
 the session

→Provides immunity from:

   →Accidental system misconfiguration

   →Malicious software activity

   →Incidental system degradation
Features
→Multiple Thaw Spaces

→Hidden Thaw Spaces

→Improved Console Functionality

   →Remote Desktop Control

   →Remote EXE & MSI execution
    (using PSEXEC)

→New Event Scheduler

   →Multiple, daily events now possible
Conclusion


  No system or network is absolutely secure , as hackers or
many algorithms are there to break passwords and much
valuable information, which leads to a great loss. Hence
network security tools provides the remedy by many ways.
Thank You!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Security Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutesSecurity Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutes
bsidesaugusta
 

Was ist angesagt? (20)

Defensive information warfare on open platforms
Defensive information warfare on open platformsDefensive information warfare on open platforms
Defensive information warfare on open platforms
 
Backtrack
BacktrackBacktrack
Backtrack
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
Security Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutesSecurity Onion: peeling back the layers of your network in minutes
Security Onion: peeling back the layers of your network in minutes
 
Pentesting
PentestingPentesting
Pentesting
 
Snort
SnortSnort
Snort
 
Snort
SnortSnort
Snort
 
SoHo Honeypot (LUGS)
SoHo Honeypot (LUGS)SoHo Honeypot (LUGS)
SoHo Honeypot (LUGS)
 
Acid
AcidAcid
Acid
 
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
Parrot Security OS | Introduction to Parrot Security OS | Cybersecurity Train...
 
Security Onion Conference - 2015
Security Onion Conference - 2015Security Onion Conference - 2015
Security Onion Conference - 2015
 
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
 
Security tools
Security toolsSecurity tools
Security tools
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
 
Sguil
SguilSguil
Sguil
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
Aircrack
AircrackAircrack
Aircrack
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
 
Security Onion Conference - 2016
Security Onion Conference - 2016Security Onion Conference - 2016
Security Onion Conference - 2016
 
Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)Suricata: A Decade Under the Influence (of packet sniffing)
Suricata: A Decade Under the Influence (of packet sniffing)
 

Andere mochten auch (8)

What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Ähnlich wie Network ssecurity toolkit

Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
nkrafacyberclub
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
leminhvuong
 

Ähnlich wie Network ssecurity toolkit (20)

Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMP
 
Logs, Logs, Every Where, Nor Any Byte to Grok
Logs, Logs, Every Where, Nor Any Byte to GrokLogs, Logs, Every Where, Nor Any Byte to Grok
Logs, Logs, Every Where, Nor Any Byte to Grok
 
Free net
Free netFree net
Free net
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testing
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linux
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guys
 

Mehr von أحلام انصارى

Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
أحلام انصارى
 

Mehr von أحلام انصارى (20)

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Cryptography
Cryptography Cryptography
Cryptography
 

Network ssecurity toolkit

  • 1. NETWORK SECURITY TOOLKIT Created By
  • 2. Agenda  What is network security  Importance of network security  Network security toolkits Security Tools 1.Snort 2.Ettercap 3.Sam Spade 4.Backtrack 5.Hydra 6.Deepfreeze
  • 3. What is Network Security ? Network security consists of the provisions and polices adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources
  • 6.
  • 7. Snort → Developed by Sourcefire, Inc. in 2012 → Snort is lightweight network IDS or IPS which is used to detect a variety of attacks and probes → Snort have three modes : 1. sniffer 2.packet logger 3.network intrusion detection → Snort uses a flexible rule-based language to describe traffic
  • 8. Features → Small ,Portable (Linux, Solaris, *BSD, IRIX, HP-UX) → Fast and Open Source Software → Configurable (Easy rules language, many reporting/ logging options)
  • 9.
  • 10.
  • 11. Ettercap → Ettercap is a tool for network protocol analysis and security auditing → Capable of intercepting traffic , capture passwords, and conduct active eavesdropping against common protocols → Supports active and passive dissection of many protocols
  • 12. Features → Ettercap offers four modes of operation: 1.IP-Based 2.MAC-Based 3.ARP-Based 4. PublicARP-based → Character injection into an established connection → HTTPS support → Plug-in support
  • 13. Features(contd…) → Password collectors for → Packet filtering/dropping → OS fingerprinting → Passive scanning of the LAN → Hijacking of DNS requests
  • 14.
  • 15. Sam Spade → Sam Spade utility was authored by Steve Atkins in 1997 → Sam Spade is a network tool suite, with some extra features that will enable you to track unsolicited email. → The Sam Spade tool acts as a sleuth that finds as much public information about an IP address or DNS address → It integrates the capabilities found in ping, traceroute, time, whois, nslookup, finger, DIG , etc
  • 16. Features → DNS zone transfer → SMTP Relay Check → Scan Addresses → Crawl website → Browse web → Fast and Slow Traceroute → Decode URL → Parse email headers → Check cancels
  • 17.
  • 18. Backtrack → Linux distribution designed for penetration testing, aka "ethical hacking“ → BackTrack is a Linux distribution that is security focused and contains over 300 security tools integrated with a highly polished user interface → current version is BackTrack 5 R3
  • 19.
  • 20. Hydra → very fast network logon cracker → perform rapid dictionary attacks against more then 30 protocols, including TELNET, FTP, HTTP, HTTPS, MS-SQL, MYSQL,SNMP, POP3, IMAP etc
  • 21. Features → IPv6 Support → Graphic User Interface → Internationalized support (RFC 4013) → HTTP proxy support → SOCKS proxy support
  • 22.
  • 23. Deep Freeze →Developed by Feronics ,Deep Freeze makes computer configurations indestructible →Any changes made to a computer are wiped out at the end of the session →Provides immunity from: →Accidental system misconfiguration →Malicious software activity →Incidental system degradation
  • 24. Features →Multiple Thaw Spaces →Hidden Thaw Spaces →Improved Console Functionality →Remote Desktop Control →Remote EXE & MSI execution (using PSEXEC) →New Event Scheduler →Multiple, daily events now possible
  • 25.
  • 26. Conclusion No system or network is absolutely secure , as hackers or many algorithms are there to break passwords and much valuable information, which leads to a great loss. Hence network security tools provides the remedy by many ways.