SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Birla Vishwakarma Mahavidyalaya
ET Department
Under the Guidance :
Prof. Ghanshyam Rathod
ET Department
Prepared By:-
Kashyap Mandaliya (140083112008)
CYBER SECURITY
1www.facebook.com/km5058
My topics.
# Overview of vulnerability scanning.
# Open port service identification.
# Version check
# Traffic probe
# Vulnerability probe
# Examples of vulnerability
2www.facebook.com/km5058
OVERVIEW OF VULNERABILITY SCANNING
• WHAT IS A VULNERABILITY SCANNER?
3www.facebook.com/km5058
The pictures
below show
the speed of
spread of
this worm
-please note
the times in
the lower left
corner.
http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html
4www.facebook.com/km5058
5www.facebook.com/km5058
TYPES OF VULNERABILITY SCANNER
1. Network-based scanners
1.1. Port scanners
(Nmap : http://insecure.org/nmap)
1.2. Network vulnerability scanners
(Nessus http://www.nessus.org/nessus/)
1.3. Web server scanners
(Nikto : http://www.cirt.net/code/nikto.html)
1.4. Web application vulnerability scanners
(Paros :- http://parosproxy.org/index.html)
(Acunetix :- http://www.acunetix.com/Acunetix)
6www.facebook.com/km5058
2. Host-based scanners
2.1. Host vulnerability scanners
- Microsoft Baseline Security Analyser (MBSA)
(http://www.microsoft.com/technet/security/tools/mbsahome)
- Altiris SecurityExpressions (commercial) :
(http://www.altiris.com/Products/SecurityExpressions.aspx)
3. Database scanners
- Scuba by Imperva Database Vulnerability Scanner:
(http://www.imperva.com/application_defense_center/scuba/default.a
sp)
- Shadow Database Scanner
(http://www.safety-lab.com/en/products/6.html)
7www.facebook.com/km5058
1. Updating Frequency and Method of Plug-in Updates
2. Quality versus Quantity of Vulnerabilities Detected
3. Quality of Scanning Reports
→ CHOOSING A VULNERABILITY SCANNER
→ CONS
1. It allows early detection and handling of known
security problems.
2. A new device or even a new system may be
connected to the network without
authorisation.
3. A vulnerability scanner helps to verify the
inventory of all devices on the network.
→PROS
1. Snapshot only.
2. Human judgement is needed. 8www.facebook.com/km5058
OPEN PORT SERVICE IDENTIFICATION
For example a scanner could connect to:
port 1 - to see if tcpmux is running.
port 7 - to see if echo is running.
port 22 - to see if openssh is available.
port 25 - to see if smtp is available.
• If you're interesting in identifying which services use a given port you can look
at the file /etc/services - this has a port number, and an associated service
name.
• nmap also allows you to do more than simply list open ports though.
• Where possible it will identify the version of each identified service which is
running.
• It can also be used to identify the operating system the remote host is running,
by examining the variations the way different network packets are handled.
9www.facebook.com/km5058
VERSION CHECK
1) -sV (Version detection)
2) -allports (Don't exclude any ports from
version detection)
3) -version-intensity <intensity> (Set version
scan intensity)
4) -version-all (Try every single probe)
5)- version-trace (Trace version scan activity)
10www.facebook.com/km5058
Percentage wise vulnerabilty affection :-
11www.facebook.com/km5058
12www.facebook.com/km5058
Overall vulnerabilty population
discovered
13www.facebook.com/km5058
14www.facebook.com/km5058
So as can be seen, there has been on average, approximately 150
security vulnerabilities recorded per month over the last 2 years and
there is nothing to indicate that this trend will reduce in the future.
15www.facebook.com/km5058
TRAFFIC PROBE
1) High-Speed Traffic Processing
2) Network Traffic Measurement
3) Network Intrusion Detection
16www.facebook.com/km5058
High-Speed Traffic Processing
LAN and MAN have evolved over a considerable time span (the last 30
years) and encompass wired and wireless physical links and speeds from 1
Mb/s to 100 Gb/s.
According to DAG project (Wakaito) :- The total amount of data created
or replicated on the planet in 2010 was over 1 zettabyte (1 zettabyte is
1021 bytes) - that’s 143 GB for each of the 7 billion people on the planet.
This volume of information requires high-speed links between server
farms, cloud storage, and end users to make sure that it can be processed
in a timely and reliable fashion.” It will not be possible to analyse such
huge traffic volumes in the coming 100 GbE network installations with the
current generation of network measurement tools.
FPGA cards (intel 82599, Myri-10G Lanai Z8ES) are still used in
applications which perform in-depth analysis, patter matching, and low-
latency operations, and in 40/100 Gb/s networks.
17www.facebook.com/km5058
Network Traffic Measurement
1) Full packet traces.
2) Flow statistics provide information from
Internet Protocol (IP).
3) Volume statistics are provided by most
network appliances for network
management.
18www.facebook.com/km5058
Network Intrusion Detection
• The signature-based approach inspects
the evaluated content.
• Anomaly-based detection.
• Stateful protocol analysis.
19www.facebook.com/km5058
20www.facebook.com/km5058
VULNERABILTY PROBE
• Some security bugs can’t be identified without sending a payload
that exploits a suspected vulnerability.
• An easy-to-understand example of a vulnerability probe is an HTML
injection check for a web application. Imagine a web app that has a
search box for users to find text within its pages.
HTML EXAMPLE :-
<div id="search"><span class="results">Results for '<xss>'...</span>
21www.facebook.com/km5058
EXAMPLE OF VULNERABILTY
#include <string.h>
int main(int argc, char *argv[])
{
char buffer[512];
if (argc > 1)
strcpy(buffer,argv[1]) };
Minimalist vulnerable program.
Compile the program with the following command :
$ gcc -o vulnerable main.c
22www.facebook.com/km5058
Czech National Research and Education Network
(CESNET) habilitation thesis presents research on :-
(i) Hardware-accelerated traffic processing
in high-speed networks.
(ii) Flow-based traffic measurement and analysis in large-
scale net-works
(iii) Network behavior analysis and anomaly detection
(iv) Traffic analysis of embedded network devices.
23www.facebook.com/km5058
Important Note : please carefully review the
relevant terms and conditions before registering on
any website, as well as downloading and installing any
software. In addition, please note that running a
scanner tool can carry its own inherent risks (e.g. in the
case of denial of service scans, you may crash a
vulnerable server). It is necessary to plan and perform
the scanning carefully. Prior arrangement or
notification, such as management approval and/or
legal clearance has to be obtained. For obvious
reasons, never scan any network that is not your own.
24www.facebook.com/km5058
REFERENCES
1.“Cyberpunk: Outlaws and hackers on the computer frontier”, published
by Simon & Schuster, (1991)
2. The spread of SQL Slammer -
(http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html)
3. Script Kiddie tools http://www.landfield.com/isn/mail- archive/2001/Feb/0131.html
4. Examples of Malicious URL’s -http://www.theorygroup.com/Archive/Unisog/2002/msg00851.html
5. Example of a site offering Security Vulnerability notification service.
http://securitytracker.com/server/info?1245+learn/endusers.html
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
6. Site that provides information on numbers of vulnerabilities released.
http://www.securitystats.com/reports/Symantec-
Internet_Security_Threat_Report_vIII.20030201.pdf
7. Example of a company providing policy compliance tools. www.symantec.com
8. Examples of companies providing Vulnerability Scanners. www.nessus.org &
• http://www.saintcorporation.com/products/saint_engine.html
9. Example of a patch released by Microsoft.
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/sec urity/bulletin/ms03-007.asp)
10. Examples of Nessus reports http://www.nessus.org/report/10_163_155_6/index.html
11. SANS / FBI top 20 list of vulnerabilities http://www.sans.org/top20/
12. RFC 2518 http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc2518.html
13. Where to find port numbers defined http://www.iana.org/assignments/port-numbers
14.Auditors Guide to CyberSecurity Vulnerabilty and Penetration Testing.
Edgescan-Stats-Report
ibm_cyber_security_intelligenc_20450
25www.facebook.com/km5058
THANK YOU
26www.facebook.com/km5058

Mais conteúdo relacionado

Mais procurados

Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackAhmed Ghazey
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?btpsec
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 

Mais procurados (20)

Malware
MalwareMalware
Malware
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Network Security
Network SecurityNetwork Security
Network Security
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Network security
Network securityNetwork security
Network security
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Network Security
Network SecurityNetwork Security
Network Security
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Network security
Network securityNetwork security
Network security
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 

Destaque

ITFT - Hardware & software concept
ITFT - Hardware & software conceptITFT - Hardware & software concept
ITFT - Hardware & software conceptNavneet Kaur
 
Introduction to operating system
Introduction to operating systemIntroduction to operating system
Introduction to operating systemAviroop Mandal
 
Operating Systems As a Product
Operating Systems As a ProductOperating Systems As a Product
Operating Systems As a ProductHarshit Srivastava
 
Uses of software packages in different areas
Uses of software packages in different areasUses of software packages in different areas
Uses of software packages in different areasSaba96
 
Operating system
Operating systemOperating system
Operating systemyogitamore3
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Fernando Torres
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardwarenitinmote
 
Computer Software - 7th Grade
Computer Software - 7th GradeComputer Software - 7th Grade
Computer Software - 7th Gradeallsaintstech
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresWayne Jones Jnr
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system pptSantosh Kumar
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer systemmkhisalg
 

Destaque (13)

ITFT - Hardware & software concept
ITFT - Hardware & software conceptITFT - Hardware & software concept
ITFT - Hardware & software concept
 
Lecture 01 concept of computer system
Lecture 01 concept of computer systemLecture 01 concept of computer system
Lecture 01 concept of computer system
 
Introduction to operating system
Introduction to operating systemIntroduction to operating system
Introduction to operating system
 
Operating Systems As a Product
Operating Systems As a ProductOperating Systems As a Product
Operating Systems As a Product
 
Uses of software packages in different areas
Uses of software packages in different areasUses of software packages in different areas
Uses of software packages in different areas
 
Operating system
Operating systemOperating system
Operating system
 
Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)Powerpoint on Software Concept (ClassXI)
Powerpoint on Software Concept (ClassXI)
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Computer Software - 7th Grade
Computer Software - 7th GradeComputer Software - 7th Grade
Computer Software - 7th Grade
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
Types and components of computer system
Types and components of computer systemTypes and components of computer system
Types and components of computer system
 

Semelhante a VULNERABILITY ( CYBER SECURITY )

For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laShainaBoling829
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far AlleneMcclendon878
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualizationssusercb4686
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESIRJET Journal
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayKaren Oliver
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysisnikitaa25
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools iSyaiful Ahdan
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfJessica Thompson
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoringProgrammer
 

Semelhante a VULNERABILITY ( CYBER SECURITY ) (20)

For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
Computer security
Computer securityComputer security
Computer security
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Netdefender
NetdefenderNetdefender
Netdefender
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysis
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoring
 
Firewall
FirewallFirewall
Firewall
 

Último

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Último (20)

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

VULNERABILITY ( CYBER SECURITY )

  • 1. Birla Vishwakarma Mahavidyalaya ET Department Under the Guidance : Prof. Ghanshyam Rathod ET Department Prepared By:- Kashyap Mandaliya (140083112008) CYBER SECURITY 1www.facebook.com/km5058
  • 2. My topics. # Overview of vulnerability scanning. # Open port service identification. # Version check # Traffic probe # Vulnerability probe # Examples of vulnerability 2www.facebook.com/km5058
  • 3. OVERVIEW OF VULNERABILITY SCANNING • WHAT IS A VULNERABILITY SCANNER? 3www.facebook.com/km5058
  • 4. The pictures below show the speed of spread of this worm -please note the times in the lower left corner. http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html 4www.facebook.com/km5058
  • 6. TYPES OF VULNERABILITY SCANNER 1. Network-based scanners 1.1. Port scanners (Nmap : http://insecure.org/nmap) 1.2. Network vulnerability scanners (Nessus http://www.nessus.org/nessus/) 1.3. Web server scanners (Nikto : http://www.cirt.net/code/nikto.html) 1.4. Web application vulnerability scanners (Paros :- http://parosproxy.org/index.html) (Acunetix :- http://www.acunetix.com/Acunetix) 6www.facebook.com/km5058
  • 7. 2. Host-based scanners 2.1. Host vulnerability scanners - Microsoft Baseline Security Analyser (MBSA) (http://www.microsoft.com/technet/security/tools/mbsahome) - Altiris SecurityExpressions (commercial) : (http://www.altiris.com/Products/SecurityExpressions.aspx) 3. Database scanners - Scuba by Imperva Database Vulnerability Scanner: (http://www.imperva.com/application_defense_center/scuba/default.a sp) - Shadow Database Scanner (http://www.safety-lab.com/en/products/6.html) 7www.facebook.com/km5058
  • 8. 1. Updating Frequency and Method of Plug-in Updates 2. Quality versus Quantity of Vulnerabilities Detected 3. Quality of Scanning Reports → CHOOSING A VULNERABILITY SCANNER → CONS 1. It allows early detection and handling of known security problems. 2. A new device or even a new system may be connected to the network without authorisation. 3. A vulnerability scanner helps to verify the inventory of all devices on the network. →PROS 1. Snapshot only. 2. Human judgement is needed. 8www.facebook.com/km5058
  • 9. OPEN PORT SERVICE IDENTIFICATION For example a scanner could connect to: port 1 - to see if tcpmux is running. port 7 - to see if echo is running. port 22 - to see if openssh is available. port 25 - to see if smtp is available. • If you're interesting in identifying which services use a given port you can look at the file /etc/services - this has a port number, and an associated service name. • nmap also allows you to do more than simply list open ports though. • Where possible it will identify the version of each identified service which is running. • It can also be used to identify the operating system the remote host is running, by examining the variations the way different network packets are handled. 9www.facebook.com/km5058
  • 10. VERSION CHECK 1) -sV (Version detection) 2) -allports (Don't exclude any ports from version detection) 3) -version-intensity <intensity> (Set version scan intensity) 4) -version-all (Try every single probe) 5)- version-trace (Trace version scan activity) 10www.facebook.com/km5058
  • 11. Percentage wise vulnerabilty affection :- 11www.facebook.com/km5058
  • 15. So as can be seen, there has been on average, approximately 150 security vulnerabilities recorded per month over the last 2 years and there is nothing to indicate that this trend will reduce in the future. 15www.facebook.com/km5058
  • 16. TRAFFIC PROBE 1) High-Speed Traffic Processing 2) Network Traffic Measurement 3) Network Intrusion Detection 16www.facebook.com/km5058
  • 17. High-Speed Traffic Processing LAN and MAN have evolved over a considerable time span (the last 30 years) and encompass wired and wireless physical links and speeds from 1 Mb/s to 100 Gb/s. According to DAG project (Wakaito) :- The total amount of data created or replicated on the planet in 2010 was over 1 zettabyte (1 zettabyte is 1021 bytes) - that’s 143 GB for each of the 7 billion people on the planet. This volume of information requires high-speed links between server farms, cloud storage, and end users to make sure that it can be processed in a timely and reliable fashion.” It will not be possible to analyse such huge traffic volumes in the coming 100 GbE network installations with the current generation of network measurement tools. FPGA cards (intel 82599, Myri-10G Lanai Z8ES) are still used in applications which perform in-depth analysis, patter matching, and low- latency operations, and in 40/100 Gb/s networks. 17www.facebook.com/km5058
  • 18. Network Traffic Measurement 1) Full packet traces. 2) Flow statistics provide information from Internet Protocol (IP). 3) Volume statistics are provided by most network appliances for network management. 18www.facebook.com/km5058
  • 19. Network Intrusion Detection • The signature-based approach inspects the evaluated content. • Anomaly-based detection. • Stateful protocol analysis. 19www.facebook.com/km5058
  • 21. VULNERABILTY PROBE • Some security bugs can’t be identified without sending a payload that exploits a suspected vulnerability. • An easy-to-understand example of a vulnerability probe is an HTML injection check for a web application. Imagine a web app that has a search box for users to find text within its pages. HTML EXAMPLE :- <div id="search"><span class="results">Results for '<xss>'...</span> 21www.facebook.com/km5058
  • 22. EXAMPLE OF VULNERABILTY #include <string.h> int main(int argc, char *argv[]) { char buffer[512]; if (argc > 1) strcpy(buffer,argv[1]) }; Minimalist vulnerable program. Compile the program with the following command : $ gcc -o vulnerable main.c 22www.facebook.com/km5058
  • 23. Czech National Research and Education Network (CESNET) habilitation thesis presents research on :- (i) Hardware-accelerated traffic processing in high-speed networks. (ii) Flow-based traffic measurement and analysis in large- scale net-works (iii) Network behavior analysis and anomaly detection (iv) Traffic analysis of embedded network devices. 23www.facebook.com/km5058
  • 24. Important Note : please carefully review the relevant terms and conditions before registering on any website, as well as downloading and installing any software. In addition, please note that running a scanner tool can carry its own inherent risks (e.g. in the case of denial of service scans, you may crash a vulnerable server). It is necessary to plan and perform the scanning carefully. Prior arrangement or notification, such as management approval and/or legal clearance has to be obtained. For obvious reasons, never scan any network that is not your own. 24www.facebook.com/km5058
  • 25. REFERENCES 1.“Cyberpunk: Outlaws and hackers on the computer frontier”, published by Simon & Schuster, (1991) 2. The spread of SQL Slammer - (http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html) 3. Script Kiddie tools http://www.landfield.com/isn/mail- archive/2001/Feb/0131.html 4. Examples of Malicious URL’s -http://www.theorygroup.com/Archive/Unisog/2002/msg00851.html 5. Example of a site offering Security Vulnerability notification service. http://securitytracker.com/server/info?1245+learn/endusers.html Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 6. Site that provides information on numbers of vulnerabilities released. http://www.securitystats.com/reports/Symantec- Internet_Security_Threat_Report_vIII.20030201.pdf 7. Example of a company providing policy compliance tools. www.symantec.com 8. Examples of companies providing Vulnerability Scanners. www.nessus.org & • http://www.saintcorporation.com/products/saint_engine.html 9. Example of a patch released by Microsoft. http://www.microsoft.com/technet/treeview/default.asp?url=/technet/sec urity/bulletin/ms03-007.asp) 10. Examples of Nessus reports http://www.nessus.org/report/10_163_155_6/index.html 11. SANS / FBI top 20 list of vulnerabilities http://www.sans.org/top20/ 12. RFC 2518 http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc2518.html 13. Where to find port numbers defined http://www.iana.org/assignments/port-numbers 14.Auditors Guide to CyberSecurity Vulnerabilty and Penetration Testing. Edgescan-Stats-Report ibm_cyber_security_intelligenc_20450 25www.facebook.com/km5058