27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Muhammad Naveed<br />

response could also mean that a packet filter dropped the probe or any response it<br />

elicited. So Nmap does not know for sure whether the port is open or being filtered. The<br />

UDP, IP protocol, FIN, NULL, and Xmas scans classify ports this way.” (Nmap Reference<br />

Guide)<br />

4.6 closed|filtered<br />

“This state is used when Nmap is unable to determine whether a port is closed or filtered.<br />

It is only used for the IP ID idle scan.” (Nmap Reference Guide)<br />

5. Benchmark for the analysis<br />

The study was based on the following types of organizations:<br />

Educational and Research<br />

Commercial Organization<br />

News Channels<br />

Before analysis of the webservers in Pakistan, benchmark is set for the analysis using the famous<br />

organizations, which were assumed to be secure and the scans also showed them to be secure. As<br />

the study is based on the three types of organizations, we have set benchmarks for each of them.<br />

5.1 Education and research organizations<br />

To set the benchmark for education and research organization, Massachusetts Institute of<br />

Technology (MIT) webserver was scanned using its domain address. The scanned results show the<br />

best security, which is very impressive and attests that highly skilled and information security aware<br />

people are working in the network.<br />

The MIT’s scan result shows that only opened ports are those that are used by webserver and they<br />

should be open for the web service, all other ports are blocked. The aggressive operating system<br />

scan reveals with 94% accuracy that FreeBSD operating system is running on the server.<br />

The scan results for MIT are shown in Table 2 to Table 4.<br />

Table 2: Scan details for MIT<br />

Scanned Web Server www.mit.edu (18.9.22.169)<br />

Scan Launching Time 2010-08-14 00:50 PKST<br />

Scan Type Slow Comprehensive Scan<br />

Scan Time 2935.93 seconds<br />

Raw packets sent 4150 (156.946KB)<br />

Raw packets received 483 (29.058KB)<br />

Table 3: Port scan results for MIT<br />

Port Protocol State Service<br />

80 Tcp Open http<br />

443 Tcp Open http<br />

8001 Tcp Open http (probably for MIT Radio)<br />

Table 4: Aggressive OS scan results for MIT<br />

OS Name and Version Type Vendor OS Family OS Generation Accuracy of result<br />

Free BSD 6.2-<br />

General FreeBSD FreeBSD 6.X 94%<br />

RELEASE<br />

Purpose<br />

To further enhance the benchmark Indian Institute of Technology at Delhi was also analyzed which<br />

also revealed that the webserver is very secure. The only ports that were found open were the ports<br />

that are used by the webserver to provide web services. All other ports that were used were either<br />

behind the firewall and were protected or they were blocked. Aggressive operating system scan<br />

191

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!