TIR Solutions
description
Transcript of TIR Solutions
![Page 1: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/1.jpg)
Tim Wostradowski , Ian Brophy, John Ang
![Page 2: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/2.jpg)
![Page 3: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/3.jpg)
Project Conception Developing the Idea Refining the Method Gathering the Data From Data to Information Results
Linux Windows Overall
The Future of the Project Final Thoughts Q & A
![Page 4: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/4.jpg)
Security Based Interested in Security Related Matters
Research Based The Pursuit of Knowledge
Sponsor Seccuris’ Project Idea
![Page 5: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/5.jpg)
Open Source
Testing Backtrack
Storing Data Database
Viewing Data Web interface
![Page 6: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/6.jpg)
Operating Systems Stock Installations
What Data is Relevant? Ports, fingerprint, exploits Default security measures?
Analyze Vulnerabilities
![Page 7: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/7.jpg)
BackTrack NMAP
Port Mapping/Scanning
Metasploit Framework Exploits
![Page 8: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/8.jpg)
Analysis of Baseline Security Default Security Measures? Open ports? Exploits?
Digging Deeper Comparisons Logical Conclusions
![Page 9: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/9.jpg)
Fedora
Ubuntu
openBSD
freeBSD
![Page 10: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/10.jpg)
Pre XP Defenseless
XP SP2: the dawn of Windows firewalls
Post XP Solid baseline security measures
![Page 11: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/11.jpg)
Windows Firewall
The XP Transition Defender
Linux Closed Ports
Windows vs Linux Equilibrium or landslide?
![Page 12: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/12.jpg)
Non-default Software Explore the Adverse Affects
Web Interface More Features
ie: Comparison Tool
Implement on Real Hardware Are Virtual Machines Really On Par?
![Page 13: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/13.jpg)
Windows and Linux Surprising Equality
Upgrade Your Operating System ie: Windows XP to Windows 7
Keep It On Firewall Application Defender
![Page 14: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/14.jpg)
Some Ideas:
Did you learn anything from this presentation?
What did we learn from this project?
Does something need clarification?
What was our favorite aspect of the project?
![Page 15: TIR Solutions](https://reader035.fdocuments.us/reader035/viewer/2022081512/56812d0e550346895d91e7c3/html5/thumbnails/15.jpg)