19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 8-3:<br />

NetScan-<br />

Tools Pro<br />

OS Fingerprinting<br />

tool.<br />

Chapter 8: Network Infrastructure<br />

Configure firewalls to look for potentially malicious behavior over time (such<br />

as the number of packets received in a certain period of time) and have rules<br />

in place to cut off attacks if a certain threshold is reached, such as 10 port<br />

scans in one minute or 100 consecutive ping (ICMP) requests.<br />

Most firewalls and IPSs can detect such scanning and cut it off in real time.<br />

You can break applications on your network when restricting network traffic,<br />

so make sure that you analyze what’s going on and understand how applications<br />

and protocols are working before you disable any type of network traffic.<br />

Scanning SNMP<br />

Simple Network Management Protocol (SNMP) is built in to virtually every<br />

network device. Network management programs (such as HP OpenView and<br />

LANDesk) use SNMP for remote network host management. Unfortunately,<br />

SNMP also presents security vulnerabilities.<br />

Vulnerabilities<br />

The problem is that most network hosts run SNMP enabled with the default<br />

read/write community strings of public/private. The majority of network<br />

devices I come across have SNMP enabled and don’t even need it.<br />

133

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!