By Media Awareness Network A media toolkit for youth MAKING YOUR
Network ssecurity toolkit
description
Transcript of Network ssecurity toolkit
![Page 1: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/1.jpg)
NETWORK SECURITY NETWORK SECURITY
TOOLKITTOOLKIT
NETWORK SECURITY NETWORK SECURITY
TOOLKITTOOLKIT
Created By
![Page 2: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/2.jpg)
Agenda
What is network security Importance of network security Network security toolkits
Security Tools
1.Snort
2.Ettercap
3.Sam Spade
4.Backtrack
5.Hydra
6.Deepfreeze
![Page 3: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/3.jpg)
What is Network Security ?
Network security consists of the provisions and polices adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources
![Page 4: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/4.jpg)
Importance of Network Security
![Page 5: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/5.jpg)
Network Security Tools
![Page 6: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/6.jpg)
![Page 7: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/7.jpg)
Snort
→Developed by Sourcefire, Inc. in 2012
→Snort is lightweight network IDS or IPS which is used to detect a variety of attacks and probes
→Snort have three modes :
1. sniffer
2.packet logger
3.network intrusion detection
→Snort uses a flexible rule-based language to describe traffic
![Page 8: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/8.jpg)
Features
→Small ,Portable (Linux, Solaris, *BSD, IRIX, HP-UX)
→Fast and Open Source Software
→Configurable (Easy rules
language, many reporting/
logging options)
![Page 9: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/9.jpg)
![Page 10: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/10.jpg)
![Page 11: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/11.jpg)
Ettercap
→ Ettercap is a tool for network protocol analysis and security auditing
→ Capable of intercepting traffic , capture passwords, and conduct active eavesdropping
against common protocols
→ Supports active and passive
dissection of many protocols
![Page 12: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/12.jpg)
Features
→ Ettercap offers four modes of operation:
1.IP-Based
2.MAC-Based
3.ARP-Based
4. PublicARP-based
→ Character injection into an established connection
→ HTTPS support
→ Plug-in support
![Page 13: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/13.jpg)
Features(contd…)
→ Password collectors for
→ Packet filtering/dropping
→ OS fingerprinting
→ Passive scanning of the LAN
→ Hijacking of DNS requests
![Page 14: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/14.jpg)
![Page 15: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/15.jpg)
Sam Spade
→ Sam Spade utility was authored by Steve Atkins in 1997
→ Sam Spade is a network tool suite, with some extra features that will enable you to track unsolicited email.
→ The Sam Spade tool acts as a sleuth that finds as much public information about an IP address or DNS address
→ It integrates the capabilities found in ping, traceroute, time, whois, nslookup, finger, DIG , etc
![Page 16: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/16.jpg)
Features
→ DNS zone transfer
→ SMTP Relay Check
→ Scan Addresses
→ Crawl website
→ Browse web
→ Fast and Slow Traceroute
→ Decode URL
→ Parse email headers
→ Check cancels
![Page 17: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/17.jpg)
![Page 18: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/18.jpg)
Backtrack
→ Linux distribution designed for penetration testing, aka "ethical hacking“
→ BackTrack is a Linux distribution that is security focused and contains over 300 security tools integrated with a highly polished user interface
→ current version is BackTrack 5 R3
![Page 19: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/19.jpg)
![Page 20: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/20.jpg)
Hydra
→ very fast network logon cracker
→ perform rapid dictionary attacks against more then 30 protocols, including TELNET, FTP, HTTP, HTTPS, MS-SQL, MYSQL,SNMP, POP3, IMAP etc
![Page 21: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/21.jpg)
Features
→ IPv6 Support
→ Graphic User Interface
→ Internationalized support (RFC 4013)
→ HTTP proxy support
→ SOCKS proxy support
![Page 22: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/22.jpg)
![Page 23: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/23.jpg)
Deep Freeze
→Developed by Feronics ,Deep Freeze makes computer configurations indestructible
→Any changes made to a computer are wiped out at the end of the session
→Provides immunity from:
→Accidental system misconfiguration
→Malicious software activity
→Incidental system degradation
![Page 24: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/24.jpg)
Features
→Multiple Thaw Spaces
→Hidden Thaw Spaces
→Improved Console Functionality
→Remote Desktop Control
→Remote EXE & MSI execution(using PSEXEC)
→New Event Scheduler
→Multiple, daily events now possible
![Page 25: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/25.jpg)
![Page 26: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/26.jpg)
Conclusion
No system or network is absolutely secure , as hackers or many algorithms are there to break passwords and much valuable information, which leads to a great loss. Hence network security tools provides the remedy by many ways.
![Page 27: Network ssecurity toolkit](https://reader033.fdocuments.us/reader033/viewer/2022051817/548259deb47959190d8b479c/html5/thumbnails/27.jpg)
Thank You!!!