Network Vulnerability Analysis and Mitigation Strategies
100 likes | 165 Vues
Explore the realm of S.N.U.P.E. and penetration testing to identify and neutralize network vulnerabilities. Utilize tools to analyze risks and secure your network using white hat hacking methods.
Network Vulnerability Analysis and Mitigation Strategies
E N D
Presentation Transcript
Project S.N.U.P.E( ) By Patrick D. Cook
Introduction • Background Why this topic and what is S.N.U.P.E () • Purpose • Look for vulnerabilities within a network • Analyze and Mitigate the risk • Topic Area • Penetration Testing • White hat hacking
Staging • Purpose • Tools • Cyberarmy http://www.cyberarmy.com • Whois http://www.networksolutions.com • WS_ Ping Pack Prohttp://www.ipswitch.com • Layers of the OSI model
Neutralizing • Purpose • Tools • File Wrangler http://www.tucows.com • PowerDesk's ExplorerPlus http://www.mijenix.com/powerdesk98.asp • Revelation http://www.snadboy.com • Layers of the OSI model
Unarming • Purpose • Tools • Cygwin Win32 http://www.cygnus.com • Wipe ftp://ftp.technotronic.com/unix/log-tools/wipe-1.00.tgz • Zap ftp://ftp.technotronic.com/unix/log-tools/zap.c • Layers of the OSI model
Penetration • Purpose • Tools • L0phtcrack's Reads mb http://www.l0pht.com/ • Legion http://www.rhino9.com • Layers of the OSI model
Exploiting • Purpose • Tools • Portfuck http://www.stargazer.net • Unhide http://www.webdon.com • Layers of the OSI model
Real World Examples • Microsoft Security Flaw • http://money.cnn.com/2003/05/09/technology/msft_passport.reut/ • High School Student teaches school • http://abcnews.go.com/sections/scitech/TechTV/techtv_HS_hacker021225.html
Summary • The majority of the tools attack a similar area from the Transport layer to the Application layer (as indicated by the following diagram) is the most vulnerable to attacks.
References • Stuart McClure, Joel Scambra, and George Kurtz, Hacking Expose: Network Security Threats and Solutions ( California: Osborne/McGraw-Hill, 2001) • The biggest virus encyclopedia: Virus List.com http://www.viruslist.com/