19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8: Network Infrastructure<br />

✓ Getif (www.wtcs.org/snmp4tpc/getif.htm) for SNMP enumeration<br />

✓ Nmap (http://nmap.org) — or NMapWin (http://sourceforge.<br />

net/projects/nmapwin), the happy-clicky-GUI front end to Nmap —<br />

for host-port probing and operating system fingerprinting<br />

✓ WildPackets’ OmniPeek (www.wildpackets.com/products/<br />

omnipeek_network_analyzer) for network analysis<br />

✓ Wireshark (www.wireshark.org) for network analysis<br />

Vulnerability assessment<br />

These vulnerability assessment tools allow you to test your network hosts<br />

for various known vulnerabilities as well as potential configuration issues<br />

that could lead to security exploits:<br />

✓ GFI LANguard (www.gfi.com/lannetscan) for port scanning and vulnerability<br />

testing<br />

✓ Nexpose (www.rapid7.com/vulnerability-scanner.jsp), an allin-one<br />

tool for in-depth vulnerability testing<br />

✓ QualysGuard (www.qualys.com), a great all-in-one tool for in-depth<br />

vulnerability testing<br />

Scanning, Poking, and<br />

Prodding the Network<br />

Performing the ethical hacks described in the following sections on your network<br />

infrastructure involves following basic hacking steps:<br />

1. Gather information and map your network.<br />

2. Scan your systems to see which ones are available.<br />

3. Determine what’s running on the systems discovered.<br />

4. Attempt to penetrate the systems discovered if you choose to.<br />

Every network card driver and implementation of TCP/IP in most operating<br />

systems, including Windows and Linux, and even in your firewalls and routers,<br />

has quirks that result in different behaviors when scanning, poking, and prodding<br />

your systems. This can result in different responses from your various<br />

systems, including everything from false-positive findings to denial of service<br />

(DoS) conditions. Refer to your administrator guides or vendor websites for<br />

127

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!