SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Network Security 2 assignment 			Presentation  By 					Sarah deori UtkarshVerma Vandan Joshi 				             Vijay Shukla RowinChineah
TCP connect scan
TCP connect() Scanning Theconnect() system call provided by your operating system is used to open a connection to every interesting port on the machine. If the port is listening, connect() will succeed, otherwise the port isn't reachable. Advantage Don’t need Special Privileges Speed Disadvantage Easily detectable and filterable
SYN scan
Advantages of syn scan The TCP SYN scan never actually creates a TCP session, so isn't logged by the destination host's applications Since an application session is never opened, the SYN scan is also less stressful to the application service. Disadvantages of syn scan ,[object Object],[object Object]
Xmas scan
Null scan
Least traffic scan Steath Scanning - The FIN Scan (-sF), Xmas Tree Scan (-sX), and Null Scan (-sN) Requires Privileged Access: YESIdentifies TCP Ports: YESIdentifies UDP Ports: NO These are called "stealth" scans because they send a single frame to a TCP port without any TCP handshaking or additional packet transfers NMAP response for These SCAN Closed Open|Filtered The open|filtered result is combined because firewalls often drop these frames without a response
Undetectable scan The XMAS scan determines which ports are open by sending packets with invalid flag settings to a target device. It is considered a stealth scan because it may be able to bypass some firewalls and IDSes more easily than the SYN scans. The Nmap XMAS scan sends packets with the Finish (FIN), Push (PSH), and Urgent (URG) flags set. Because this flag combination is invalid and should never occur in normal traffic, there is no established convention for dealing with these types of packets. Different TCP stacks will respond in different ways. Typically, closed ports will respond with a RST/ACK, and open ports will drop the packet and not respond. However, some TCP stacks will respond with RST packets from all ports, even open ports, and some systems will not respond to any packets. Personal firewalls and packet filters will also alter responses to this scan
XMAS Scan
why vulnerability scan Although network scanning identiïŹes active hosts, ports, services, and applications, vulnerability scanning goes one step further to identify weaknesses and vulnerabilities on a system that may be exploited by an attacker
Is Nessus ideal open-source vulnerability scanner Its goal to detect Vulnerabilities that allow a remote cracker to control or access sensitive data on a system. Misconfiguration Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
Nessus Operation              In typical operation, Nessus begins by doing a port scan with one of its four internal port scanners to determine which ports are open on the target and then tries various exploits on the open ports. The vulnerability tests, available as subscriptions, are written in NASL (Nessus Attack Scripting Language), a scripting language optimized for custom network interaction.
Difference between nessus professional and home feed  Commercial organizations which use the Nessus vulnerability scanner must purchase a Professional Feed subscription to scan their network, obtain support, updates to their database of vulnerability checks and compliance auditing A 'Home Feed' is available for free to home users, but can not be used professionally. There are more features of Proffessional Feed than home feed
Features of Professional feed Nessus The newest Nessusplugins as soon as they are released  Policy Compliance Checks - to make sure every host on your network complies with your local security policy.  Perform an unlimited amount of complete PCI-DSS audits  Conduct operating system, application and SQL database configuration audits against CERT, CIS, DISA STIGs, GLBA, HIPAA, NIST SCAP FDCC, NSA and PCI standards.  Conduct content audits such as adult content, personally identifiable information (credit cards, SSN, etc.) corporate spreadsheets, and much more.  Perform web application audits of custom and embedded applications to test for cross site scripting, SQL injection and much more.  SCADA checks to detect and audit SCADA devices  Virtual Appliance - access to a download of the Tenable Appliance which includes Nessus 4 and works with VMware ESX, Server, Workstation and Fusion.  Access to operational and technical assistance from Tenable's experienced support staff with regards to the deployment and use of their scanners, as well as the writing of audit policies for the compliance checks or content checks.
Network Security Nmap N Nessus
Network Security Nmap N Nessus

Weitere Àhnliche Inhalte

Was ist angesagt?

malware analysis
malware  analysismalware  analysis
malware analysis20CS201AkashR
 
Nessus-Vulnerability Tester
Nessus-Vulnerability TesterNessus-Vulnerability Tester
Nessus-Vulnerability TesterAditya Jain
 
Nessus Software
Nessus SoftwareNessus Software
Nessus SoftwareMegha Sahu
 
N map presentation
N map presentationN map presentation
N map presentationulirraptor
 
Metasploit
MetasploitMetasploit
MetasploitParth Sahu
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration TestingMohammed Adam
 
20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsxSuman Garai
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Web application security
Web application securityWeb application security
Web application securityKapil Sharma
 

Was ist angesagt? (20)

malware analysis
malware  analysismalware  analysis
malware analysis
 
Nessus-Vulnerability Tester
Nessus-Vulnerability TesterNessus-Vulnerability Tester
Nessus-Vulnerability Tester
 
Nmap
NmapNmap
Nmap
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
 
Nmap
NmapNmap
Nmap
 
N map presentation
N map presentationN map presentation
N map presentation
 
NMAP
NMAPNMAP
NMAP
 
Metasploit
MetasploitMetasploit
Metasploit
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Network Penetration Testing
Network Penetration TestingNetwork Penetration Testing
Network Penetration Testing
 
Nmap tutorial
Nmap tutorialNmap tutorial
Nmap tutorial
 
20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Web application security
Web application securityWeb application security
Web application security
 
Reconnaissance
ReconnaissanceReconnaissance
Reconnaissance
 

Andere mochten auch

Intimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit FrameworkIntimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit FrameworkAnimesh Roy
 
Proprietary vs opensource in cloud
Proprietary vs opensource in cloudProprietary vs opensource in cloud
Proprietary vs opensource in cloudunreasonablemen
 
Tutorial nessus 6.2 versi1
Tutorial nessus 6.2 versi1Tutorial nessus 6.2 versi1
Tutorial nessus 6.2 versi1Tulisan Komputer
 
PresentaciĂłn-nessus
PresentaciĂłn-nessusPresentaciĂłn-nessus
PresentaciĂłn-nessusnana nana
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security ToolsEmanuela Boroș
 
Quality Management
Quality ManagementQuality Management
Quality Managementdouglasruml
 
OpenVAS, lo strumento open source per il vulnerability assessment
OpenVAS, lo strumento open source per il vulnerability assessmentOpenVAS, lo strumento open source per il vulnerability assessment
OpenVAS, lo strumento open source per il vulnerability assessmentBabel
 
Investment Management Mutual Funds and Its Types
Investment Management Mutual Funds and Its TypesInvestment Management Mutual Funds and Its Types
Investment Management Mutual Funds and Its TypesDr. John V. Padua
 
Chapter 2 Money and the Payments System
Chapter 2 Money and the Payments SystemChapter 2 Money and the Payments System
Chapter 2 Money and the Payments SystemDr. John V. Padua
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)SSASIT
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4Sergio Loureiro
 

Andere mochten auch (17)

Intimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit FrameworkIntimacy with MSF - Metasploit Framework
Intimacy with MSF - Metasploit Framework
 
Nessus and Reporting Karma
Nessus and Reporting KarmaNessus and Reporting Karma
Nessus and Reporting Karma
 
Nessus Scanner Vulnerabilidades
Nessus Scanner VulnerabilidadesNessus Scanner Vulnerabilidades
Nessus Scanner Vulnerabilidades
 
NMAP by Shrikant Antre & Shobhit Gautam
NMAP by Shrikant Antre & Shobhit GautamNMAP by Shrikant Antre & Shobhit Gautam
NMAP by Shrikant Antre & Shobhit Gautam
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Proprietary vs opensource in cloud
Proprietary vs opensource in cloudProprietary vs opensource in cloud
Proprietary vs opensource in cloud
 
Linux dasar
Linux dasarLinux dasar
Linux dasar
 
Tutorial nessus 6.2 versi1
Tutorial nessus 6.2 versi1Tutorial nessus 6.2 versi1
Tutorial nessus 6.2 versi1
 
PresentaciĂłn-nessus
PresentaciĂłn-nessusPresentaciĂłn-nessus
PresentaciĂłn-nessus
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 
Quality Management
Quality ManagementQuality Management
Quality Management
 
OpenVAS, lo strumento open source per il vulnerability assessment
OpenVAS, lo strumento open source per il vulnerability assessmentOpenVAS, lo strumento open source per il vulnerability assessment
OpenVAS, lo strumento open source per il vulnerability assessment
 
Investment Management Mutual Funds and Its Types
Investment Management Mutual Funds and Its TypesInvestment Management Mutual Funds and Its Types
Investment Management Mutual Funds and Its Types
 
Chapter 2 Money and the Payments System
Chapter 2 Money and the Payments SystemChapter 2 Money and the Payments System
Chapter 2 Money and the Payments System
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4
 

Ähnlich wie Network Security Nmap N Nessus

Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayKaren Oliver
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contestnkrafacyberclub
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laShainaBoling829
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffingMukul Sahu
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment ReportHarshit Singh Bhatia
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networkingShyam Kumar Singh
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linuxmariuszantal
 
Contents namp
Contents nampContents namp
Contents nampshwetha mk
 
Contents namp
Contents nampContents namp
Contents nampshwetha mk
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
 
Chapter 12
Chapter 12Chapter 12
Chapter 12cclay3
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxMahdiHasanSowrav
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESIRJET Journal
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 

Ähnlich wie Network Security Nmap N Nessus (20)

Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Port scanning
Port scanningPort scanning
Port scanning
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
Security tools
Security  toolsSecurity  tools
Security tools
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffing
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linux
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 

Mehr von Utkarsh Verma

Evolution Of Convergence And Voip
Evolution Of Convergence And VoipEvolution Of Convergence And Voip
Evolution Of Convergence And VoipUtkarsh Verma
 
SAP Point Of Sales
SAP Point Of SalesSAP Point Of Sales
SAP Point Of SalesUtkarsh Verma
 
Unified Communications
Unified CommunicationsUnified Communications
Unified CommunicationsUtkarsh Verma
 
Fddi & Gigabit Ethernet
Fddi & Gigabit EthernetFddi & Gigabit Ethernet
Fddi & Gigabit EthernetUtkarsh Verma
 
ITIL in Telecom part 2
ITIL in Telecom part 2ITIL in Telecom part 2
ITIL in Telecom part 2Utkarsh Verma
 
ITIL Implemetation in Telecom
 ITIL Implemetation in Telecom ITIL Implemetation in Telecom
ITIL Implemetation in TelecomUtkarsh Verma
 
Green Bags Neeraj
Green Bags  NeerajGreen Bags  Neeraj
Green Bags NeerajUtkarsh Verma
 
20090117 Ver 2.0 Community Disaster Incident Response
20090117   Ver 2.0   Community Disaster  Incident Response20090117   Ver 2.0   Community Disaster  Incident Response
20090117 Ver 2.0 Community Disaster Incident ResponseUtkarsh Verma
 
Idea Camp Presentation
Idea Camp PresentationIdea Camp Presentation
Idea Camp PresentationUtkarsh Verma
 
On Demand Service
On Demand ServiceOn Demand Service
On Demand ServiceUtkarsh Verma
 

Mehr von Utkarsh Verma (13)

Evolution Of Convergence And Voip
Evolution Of Convergence And VoipEvolution Of Convergence And Voip
Evolution Of Convergence And Voip
 
SAP Point Of Sales
SAP Point Of SalesSAP Point Of Sales
SAP Point Of Sales
 
Godrej Adhaar
Godrej AdhaarGodrej Adhaar
Godrej Adhaar
 
Unified Communications
Unified CommunicationsUnified Communications
Unified Communications
 
Umts Final
Umts FinalUmts Final
Umts Final
 
Fddi & Gigabit Ethernet
Fddi & Gigabit EthernetFddi & Gigabit Ethernet
Fddi & Gigabit Ethernet
 
ITIL in Telecom part 2
ITIL in Telecom part 2ITIL in Telecom part 2
ITIL in Telecom part 2
 
ITIL Implemetation in Telecom
 ITIL Implemetation in Telecom ITIL Implemetation in Telecom
ITIL Implemetation in Telecom
 
Green Bags Neeraj
Green Bags  NeerajGreen Bags  Neeraj
Green Bags Neeraj
 
20090117 Ver 2.0 Community Disaster Incident Response
20090117   Ver 2.0   Community Disaster  Incident Response20090117   Ver 2.0   Community Disaster  Incident Response
20090117 Ver 2.0 Community Disaster Incident Response
 
Idea Camp Presentation
Idea Camp PresentationIdea Camp Presentation
Idea Camp Presentation
 
Knowledge
KnowledgeKnowledge
Knowledge
 
On Demand Service
On Demand ServiceOn Demand Service
On Demand Service
 

KĂŒrzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

KĂŒrzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Network Security Nmap N Nessus

  • 1. Network Security 2 assignment Presentation By Sarah deori UtkarshVerma Vandan Joshi Vijay Shukla RowinChineah
  • 3. TCP connect() Scanning Theconnect() system call provided by your operating system is used to open a connection to every interesting port on the machine. If the port is listening, connect() will succeed, otherwise the port isn't reachable. Advantage Don’t need Special Privileges Speed Disadvantage Easily detectable and filterable
  • 5.
  • 8. Least traffic scan Steath Scanning - The FIN Scan (-sF), Xmas Tree Scan (-sX), and Null Scan (-sN) Requires Privileged Access: YESIdentifies TCP Ports: YESIdentifies UDP Ports: NO These are called "stealth" scans because they send a single frame to a TCP port without any TCP handshaking or additional packet transfers NMAP response for These SCAN Closed Open|Filtered The open|filtered result is combined because firewalls often drop these frames without a response
  • 9. Undetectable scan The XMAS scan determines which ports are open by sending packets with invalid flag settings to a target device. It is considered a stealth scan because it may be able to bypass some firewalls and IDSes more easily than the SYN scans. The Nmap XMAS scan sends packets with the Finish (FIN), Push (PSH), and Urgent (URG) flags set. Because this flag combination is invalid and should never occur in normal traffic, there is no established convention for dealing with these types of packets. Different TCP stacks will respond in different ways. Typically, closed ports will respond with a RST/ACK, and open ports will drop the packet and not respond. However, some TCP stacks will respond with RST packets from all ports, even open ports, and some systems will not respond to any packets. Personal firewalls and packet filters will also alter responses to this scan
  • 11. why vulnerability scan Although network scanning identiïŹes active hosts, ports, services, and applications, vulnerability scanning goes one step further to identify weaknesses and vulnerabilities on a system that may be exploited by an attacker
  • 12. Is Nessus ideal open-source vulnerability scanner Its goal to detect Vulnerabilities that allow a remote cracker to control or access sensitive data on a system. Misconfiguration Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
  • 13. Nessus Operation In typical operation, Nessus begins by doing a port scan with one of its four internal port scanners to determine which ports are open on the target and then tries various exploits on the open ports. The vulnerability tests, available as subscriptions, are written in NASL (Nessus Attack Scripting Language), a scripting language optimized for custom network interaction.
  • 14. Difference between nessus professional and home feed Commercial organizations which use the Nessus vulnerability scanner must purchase a Professional Feed subscription to scan their network, obtain support, updates to their database of vulnerability checks and compliance auditing A 'Home Feed' is available for free to home users, but can not be used professionally. There are more features of Proffessional Feed than home feed
  • 15. Features of Professional feed Nessus The newest Nessusplugins as soon as they are released Policy Compliance Checks - to make sure every host on your network complies with your local security policy. Perform an unlimited amount of complete PCI-DSS audits Conduct operating system, application and SQL database configuration audits against CERT, CIS, DISA STIGs, GLBA, HIPAA, NIST SCAP FDCC, NSA and PCI standards. Conduct content audits such as adult content, personally identifiable information (credit cards, SSN, etc.) corporate spreadsheets, and much more. Perform web application audits of custom and embedded applications to test for cross site scripting, SQL injection and much more. SCADA checks to detect and audit SCADA devices Virtual Appliance - access to a download of the Tenable Appliance which includes Nessus 4 and works with VMware ESX, Server, Workstation and Fusion. Access to operational and technical assistance from Tenable's experienced support staff with regards to the deployment and use of their scanners, as well as the writing of audit policies for the compliance checks or content checks.