SlideShare une entreprise Scribd logo
1  sur  39
-Sandeep Kr. Mehto
-Mohit Chandra Belwal
C.S.E 4th
Yr.
Contents
Networking and it’s security
Creating Networking Lab
Penetration Testing
Phases of Penetration Testing
Tools:-
i. Cisco Packet Tracer
ii.Backtrack
iii.Metasploit
iv.Wireshark
Network security-
 In 2009, the computer Security institute (CSI)
produce a report for the 2009 c0mputer crime and
security survey that provided an updated look at the
impact of computer crime in the united states.
 company loses due to computer crime have double
over the past year, so the cost of poor
security is increasing
Need for network security-
 The network infrastructure, services, and data are
crucial personal and business as sets.
 The protection of sensitive data.
 Secure an organization’s network
Close networks-
Attack from inside the network remain a threat.
There is no outside connectivity.
Does not allow a connection to public networks.
The 60 t0 80 % of network misuse comes from inside
the enterprise.
Open networks-
Security open network is important.
Open network are also included –
1. Public and
2. Private network.
 O to 20 % network is open network.
 Maximum par of open network is wire less networks.
 Packet are send point to point connection.
Common threats-
Physical installations –
1. Hardware threats.
2.Environmental threats.
3. Electrical threats.
 Maintenance threats-
1. Poor handling of key electronic components
2.Poor cabling .
3. Poor labeling and etc
Used equipments in a lab-
Hub-
Hub multiple ports.
Repeater broad cast signals
Simplifies signal.
Switch learn MAC address (flooding)
Equal speed to all port.
Multiple collection
Bridge-
Bridge less speed to switch.
Router learn best path.
Used cables-
state cables- also connected PC to switch and
switch to router.
Cross cable-
cross cable are also connected PC to PC.
Switch to switch
Serial cable-
also connected router to router.
Rollover cable –
also connected to a PC to router. And
PC to Switch
IP address-
Class A IP address
Class B IP address
Class C IP address
Class D IP address
Class E IP address
Class A IP address-
 Any add. Start with the value between 1 to
126.
 First octet is network add. Another is host
add.
 The first octet of the 32-bit number is a class
A add.
 0 and 127 is also reserved.
Class B IP address-
IP range 128 to 191
2 network and 2 host octets.
Class C IP address-
Range 192 to 223
3 network and 1 host octet.
3 network and only one host add.
Class D IP address-
Range 224 to 239
Multicast – one to many.
Class E IP address-
Range 240 to 255
Remaining all are reserved
Security in network-
Three types most important security in a networking.
Router.
Switch and
Port security.
Router Security-
 Enable Password- (user mode/priv. mode).
 Secret Password- (user mode).
 Console Password- (before user mode).
 Telnet Password- (for remote login).
Switch Security-
 Secure switch access :
a.Secure physical access of the switch.
b.Set system password.
c. Secure remote access.
d.Use SSH when possible.
• Secure access by telnet.
• Disable HTTP, enable HTTPS.
 Disable unneeded services.
Port security-
 Port security restricts port access by MAC add-
o Dynamic (limit number of add.).
o Static (static configuration of add.).
o Combination (static + dynamic).
o Sticky.
What is penetration testing?
Penetration Testing or Pen Testing:
The practice of testing a computer system, network or
web application to find vulnerabilities that an attacker
could exploit by simulating attacks from both internal
and external threats
Goals
Determine the adequacy of security measures
Identify security deficiencies
Recommend training
Why penetration test?
 To find poorly configured machines.
 Verify that security mechanisms are working.
 Help organizations to tighten the Security system.
FACT!!!!
99.9% secure = 100%vulnerable!
Penetration Testing is NOT Hacking
Hacking Pen Testing
No time limit
No limitations
Unknown objectives
Illegal
Limited time
Well defined scope
Clearly defined goals
Legal
Performing a penetration test
Phases of a penetration test:
Profiling
Research phase
Passive Reconnaissance
Strategy
 Obtain publicly available information on target
Tactics
 Query publicly accessible data sources
 Observe physical defenses
 Covertly survey company and employees
Enumeration
Discovery Phase
Active Reconnaissance
Strategy
 Find detailed information
 Find possibly vulnerable points of entry
Tactics
 Map the network
 Analyze and identify each individual host
 Survey physical security mechanisms
 Compile list of possible entry points for an attacker
Vulnerability Analysis
Systematic examination of vulnerabilities
Procedure
 Using all the information gathered in the previous phases,
identify vulnerabilities in the system
Tactics
 Prioritize analysis of commonly misconfigured services
 Use automated tools if applicable/available
Exploitation
Gaining access
Procedure
 Verify previously identified vulnerabilities by attempting to
exploit them
 Show what access can be gain and what assets can be affected
Reporting
The important part
Procedure
 Compile findings into a complete report
 Include methods as well
 Make suggestions to fix vulnerabilities
Styles of Penetration Testing
Blue Team
Tested as a trusted insider with complete
access
Perform a through survey of systems with
complete access to systems to determine any
vulnerabilities or misconfigurations.
Attempts to provide an exhaustive listing of
potential vulnerabilities
Styles of Penetration Testing
Red Team
Test done as an external hacker
Attempt to penetrate defenses any way
possible
Only attempts to find single point of
entry
Pen Testing Tools
Backtrack
Custom Linux Distribution
Pen Testing Tools
Metasploit
Exploitation framework
Pen Testing Tools
Wireshark
Network traffic monitoring tool
Questions?

Contenu connexe

Tendances

Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
Rand W. Hirt
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
Utkarsh Verma
 

Tendances (20)

WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
NMAP
NMAPNMAP
NMAP
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Network security
Network securityNetwork security
Network security
 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Network Security
Network SecurityNetwork Security
Network Security
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Dmz
Dmz Dmz
Dmz
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 

En vedette

Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testing
Imaginea
 
18646089 tipos-y-clases-de-auditorias-informaticas
18646089 tipos-y-clases-de-auditorias-informaticas18646089 tipos-y-clases-de-auditorias-informaticas
18646089 tipos-y-clases-de-auditorias-informaticas
yomito_2
 
Importancia de la Auditoria en Seguridad Informática
Importancia de la Auditoria en Seguridad InformáticaImportancia de la Auditoria en Seguridad Informática
Importancia de la Auditoria en Seguridad Informática
Meztli Valeriano Orozco
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
Rand W. Hirt
 
Control interno y auditoria informática
Control interno y auditoria informáticaControl interno y auditoria informática
Control interno y auditoria informática
Roberto Porozo
 

En vedette (20)

Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?
 
Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testing
 
18646089 tipos-y-clases-de-auditorias-informaticas
18646089 tipos-y-clases-de-auditorias-informaticas18646089 tipos-y-clases-de-auditorias-informaticas
18646089 tipos-y-clases-de-auditorias-informaticas
 
Importancia de la Auditoria en Seguridad Informática
Importancia de la Auditoria en Seguridad InformáticaImportancia de la Auditoria en Seguridad Informática
Importancia de la Auditoria en Seguridad Informática
 
Pruebas de penetración
Pruebas de penetraciónPruebas de penetración
Pruebas de penetración
 
Desmitificando el pentest share
Desmitificando el pentest shareDesmitificando el pentest share
Desmitificando el pentest share
 
What is pentest
What is pentestWhat is pentest
What is pentest
 
J2EE Struts with Hibernate Framework
J2EE Struts with Hibernate FrameworkJ2EE Struts with Hibernate Framework
J2EE Struts with Hibernate Framework
 
Pentesting
PentestingPentesting
Pentesting
 
Testing and troubleshooting networks
Testing and troubleshooting networksTesting and troubleshooting networks
Testing and troubleshooting networks
 
Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015Physical Penetration Testing - RootedCON 2015
Physical Penetration Testing - RootedCON 2015
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Review of Enterprise Security Risk Management
Review of Enterprise Security Risk ManagementReview of Enterprise Security Risk Management
Review of Enterprise Security Risk Management
 
Tipos de Pentest
Tipos de PentestTipos de Pentest
Tipos de Pentest
 
Metasploit
MetasploitMetasploit
Metasploit
 
Java & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate FrameworkJava & J2EE Struts with Hibernate Framework
Java & J2EE Struts with Hibernate Framework
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Control interno y auditoria informática
Control interno y auditoria informáticaControl interno y auditoria informática
Control interno y auditoria informática
 

Similaire à Networking and penetration testing

ME Information Security
ME Information SecurityME Information Security
ME Information Security
Mohamed Monsef
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Editor IJCATR
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
tahirnaquash2
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
Harish Chaudhary
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
webhostingguy
 

Similaire à Networking and penetration testing (20)

compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
An overview of network penetration testing
An overview of network penetration testingAn overview of network penetration testing
An overview of network penetration testing
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
 
hacker culture
hacker culturehacker culture
hacker culture
 
Cyber Attack Methodologies
Cyber Attack MethodologiesCyber Attack Methodologies
Cyber Attack Methodologies
 
International Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics EngineeringInternational Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics Engineering
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.pptIntro-2013.ppt
Intro-2013.pptIntro-2013.pptIntro-2013.ppt
 
Network security
Network securityNetwork security
Network security
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
Denial of Service Attack Defense Techniques
Denial of Service Attack Defense TechniquesDenial of Service Attack Defense Techniques
Denial of Service Attack Defense Techniques
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Survey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIPSurvey on Security Aspects Related to DOIP
Survey on Security Aspects Related to DOIP
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Unit v
Unit vUnit v
Unit v
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 

Dernier

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Dernier (20)

University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

Networking and penetration testing

  • 1. -Sandeep Kr. Mehto -Mohit Chandra Belwal C.S.E 4th Yr.
  • 2. Contents Networking and it’s security Creating Networking Lab Penetration Testing Phases of Penetration Testing Tools:- i. Cisco Packet Tracer ii.Backtrack iii.Metasploit iv.Wireshark
  • 3. Network security-  In 2009, the computer Security institute (CSI) produce a report for the 2009 c0mputer crime and security survey that provided an updated look at the impact of computer crime in the united states.  company loses due to computer crime have double over the past year, so the cost of poor security is increasing
  • 4. Need for network security-  The network infrastructure, services, and data are crucial personal and business as sets.  The protection of sensitive data.  Secure an organization’s network
  • 5. Close networks- Attack from inside the network remain a threat. There is no outside connectivity. Does not allow a connection to public networks. The 60 t0 80 % of network misuse comes from inside the enterprise.
  • 6. Open networks- Security open network is important. Open network are also included – 1. Public and 2. Private network.  O to 20 % network is open network.  Maximum par of open network is wire less networks.  Packet are send point to point connection.
  • 7. Common threats- Physical installations – 1. Hardware threats. 2.Environmental threats. 3. Electrical threats.  Maintenance threats- 1. Poor handling of key electronic components 2.Poor cabling . 3. Poor labeling and etc
  • 9. Hub- Hub multiple ports. Repeater broad cast signals Simplifies signal. Switch learn MAC address (flooding) Equal speed to all port. Multiple collection
  • 10. Bridge- Bridge less speed to switch. Router learn best path.
  • 11. Used cables- state cables- also connected PC to switch and switch to router.
  • 12. Cross cable- cross cable are also connected PC to PC. Switch to switch
  • 13. Serial cable- also connected router to router.
  • 14. Rollover cable – also connected to a PC to router. And PC to Switch
  • 15. IP address- Class A IP address Class B IP address Class C IP address Class D IP address Class E IP address
  • 16. Class A IP address-  Any add. Start with the value between 1 to 126.  First octet is network add. Another is host add.  The first octet of the 32-bit number is a class A add.  0 and 127 is also reserved.
  • 17. Class B IP address- IP range 128 to 191 2 network and 2 host octets.
  • 18. Class C IP address- Range 192 to 223 3 network and 1 host octet. 3 network and only one host add.
  • 19. Class D IP address- Range 224 to 239 Multicast – one to many.
  • 20. Class E IP address- Range 240 to 255 Remaining all are reserved
  • 21. Security in network- Three types most important security in a networking. Router. Switch and Port security.
  • 22. Router Security-  Enable Password- (user mode/priv. mode).  Secret Password- (user mode).  Console Password- (before user mode).  Telnet Password- (for remote login).
  • 23. Switch Security-  Secure switch access : a.Secure physical access of the switch. b.Set system password. c. Secure remote access. d.Use SSH when possible. • Secure access by telnet. • Disable HTTP, enable HTTPS.  Disable unneeded services.
  • 24. Port security-  Port security restricts port access by MAC add- o Dynamic (limit number of add.). o Static (static configuration of add.). o Combination (static + dynamic). o Sticky.
  • 25. What is penetration testing? Penetration Testing or Pen Testing: The practice of testing a computer system, network or web application to find vulnerabilities that an attacker could exploit by simulating attacks from both internal and external threats Goals Determine the adequacy of security measures Identify security deficiencies Recommend training
  • 26. Why penetration test?  To find poorly configured machines.  Verify that security mechanisms are working.  Help organizations to tighten the Security system. FACT!!!! 99.9% secure = 100%vulnerable!
  • 27. Penetration Testing is NOT Hacking Hacking Pen Testing No time limit No limitations Unknown objectives Illegal Limited time Well defined scope Clearly defined goals Legal
  • 28. Performing a penetration test Phases of a penetration test:
  • 29. Profiling Research phase Passive Reconnaissance Strategy  Obtain publicly available information on target Tactics  Query publicly accessible data sources  Observe physical defenses  Covertly survey company and employees
  • 30. Enumeration Discovery Phase Active Reconnaissance Strategy  Find detailed information  Find possibly vulnerable points of entry Tactics  Map the network  Analyze and identify each individual host  Survey physical security mechanisms  Compile list of possible entry points for an attacker
  • 31. Vulnerability Analysis Systematic examination of vulnerabilities Procedure  Using all the information gathered in the previous phases, identify vulnerabilities in the system Tactics  Prioritize analysis of commonly misconfigured services  Use automated tools if applicable/available
  • 32. Exploitation Gaining access Procedure  Verify previously identified vulnerabilities by attempting to exploit them  Show what access can be gain and what assets can be affected
  • 33. Reporting The important part Procedure  Compile findings into a complete report  Include methods as well  Make suggestions to fix vulnerabilities
  • 34. Styles of Penetration Testing Blue Team Tested as a trusted insider with complete access Perform a through survey of systems with complete access to systems to determine any vulnerabilities or misconfigurations. Attempts to provide an exhaustive listing of potential vulnerabilities
  • 35. Styles of Penetration Testing Red Team Test done as an external hacker Attempt to penetrate defenses any way possible Only attempts to find single point of entry
  • 38. Pen Testing Tools Wireshark Network traffic monitoring tool

Notes de l'éditeur

  1. Clarke was the counter/Anti-terrorism advisor during the Clinton/Bush administrations