Subscribe:

Pages

Showing posts with label Techniques. Show all posts
Showing posts with label Techniques. Show all posts

Tuesday, 15 May 2012

Intro to Network Port Scanning and Advanced Techniques: How Snort's Stealth TCP Port Scanning Works

SecurityWeek Network reported "The simple truth is that the only way to be sure that we actually analyze all network malware-related traffic is to perform a full inspection of all traffic on all ports." One of the primary tools used by malicious attackers to assess your network weaknesses is the port scan. By running a port scan an attacker can find out what "doors" into your network are open. Once they know that information they can begin to research what sorts of vulnerabilities or exploits that might open up to a network. It is vital that organizations restrict and control the traffic that is allowed into the network. One of the important attacks that Snort NIDS detects is port scanning.

An Introduction to Port Scanning

According to Tony Bradley, a network security expert at About.com who wrote "Port Knocking: The Secret Knock Can Open Your System," port scanning is similar to a thief going through your neighborhood and checking every door and window on each house to see which are open and which are locked. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are two of the protocols that make up the TCP/IP protocol suite which is used universally to communicate on the Internet. Each of these has ports 0 through 65535 available, so essentially there are more than 65,000 doors to lock.

The first 1024 TCP ports are called the Well-Known Ports and are associated with standard services such as FTP, HTTP, SMTP, or DNS. Some of the addresses over 1023 also have commonly associated services, but the majority of these ports are not associated with any service and are available for a program or application to use to communicate.

TCP scanning is the most common type of scanning which uses the operating system's network functions. The attacker sends a SYN packet to the victim and in case the port is open then an ACK packet is sent back to the attacker by the victim thus notifying that the port is open. This process is termed as 3-way handshaking.

UDP Scanning is a connectionless protocol. This means that there is no notification sent back to the attacker whether the packet has been received or dropped by the victim's network. If a UDP packet is sent to a port that is not open, the system will respond with an ICMP port unreachable message. Most UDP port scanners use this scanning method and use the absence of a response to infer that a port is open.

What is Stealth TCP Port Scanning?

If the port scan is being done with malicious intent, the intruder would generally prefer to go undetected. Network security applications such as Network Intrusion Detection Systems (NIDS) can be configured to alert administrators if they detect connection requests across a broad range of ports from a single host. To get around this the intruder can do the port scan in strobe or stealth mode. Strobing limits the ports to a smaller target set rather than blanket scanning all 65536 ports. Stealth scanning uses techniques such as slowing the scan. By scanning the ports over a much longer period of time you reduce the chance that the target will trigger an alert."

Network intrusion detection systems (NIDS) monitors packets on the network wire and attempts to discover an intruder by matching the attack pattern to a database of known attack patterns. A typical example is looking for a large number of TCP connection requests (SYN) to many different ports on a target machine, thus discovering if someone is attempting a TCP port scan. A network intrusion detection system sniffs network traffic by promiscuously watching all network traffic."

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching, and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.

Tactical FLEX, Inc. is a privately owned software development firm based in Seattle, specializing in information security research, engineering, technology design, and production. With the technological development of Aanval® SIEM and IDS Solutions, Tactical FLEX, Inc. has become a global provider of information security vulnerability and risk management software solutions that protect businesses and organizations. The firm also provides IT consulting and professional services. Currently there are over 6,000 organizations worldwide in more than 100 countries that rely upon Aanval as part of their security infrastructure. These organizations include government security, defense organizations, weapons manufacturers, technology corporations, global financial organizations, space explorations, educational institutions, healthcare providers, and many others. For more information on Tactical FLEX, Inc. and Aanval, please visit http://www.aanval.com/.

Media Relations Contact:
Jennifer L. Manguino
Tactical FLEX, Inc
Telephone: 800-921-2584 Ext. 2151
Email: jmanguino@tacticalflex.com  


View the original article here

Techniques on Building a Good Website

A good business will always find ways to maximize its company's assets. It does not mean that a business must have a maximum manpower though. Some areas need to function without any manpower, like the website for example. In this case, a good technique, and following the guides in web designing will be the key.

There are ways on how to implement better guidelines in web designing. While sticking with the guidelines, it will perfectly work if techniques are associated well. Harmony must be the way in this process. The first guide is regarding the web designer. Corporations have their IT department to take care of this. A board will assign an IT head and the IT head will facilitate the maintenance and upgrade of the web. This is a good option, as the IT people will be governed with company's rules and guidelines. For small and medium sized businesses, they will most likely hire a firm to do their web as they consider this as a one-time deal. This option could save money though.

Make sure that the web design will be governed with guidelines that you laid down to your web designer. The result will be subject for some editing before the web is publicly published.

Match of identity. Your web design must guide you for a matched identity of your image. There must be a purpose why you made a website. You may want it locally, or maybe international, advertising or even online store. The design must be balance giving it an image of your company's purpose. In this way it will be more interesting to stay on your web and harmony will be accounted.

Information on the web is another guide lines to be observed. Before publishing something on the website, make sure that the information is reliable, so when the customer inquires about the insight, you have something as a reference of proof. This may take some time and needs some effort but it is worth it. Information will guide and build a company's trust.

Guidelines must be updated depending on season. Seasonal changes may cause ups and downs on the business. Get prepared and use effective approach to aim for betterment and improvement. Application is hard to follow at most time but it only needs discipline and a role model. Then the rest of the team will just do the implementation if they can see that the owner themselves are regulated with the company's rules and guidelines thus making it more effective and every aspect of the team will be dominated with their own rules and action.

Innovative technology is another big guide line to follow in web designing. An innovative mind and application will result in an advancement of company's growth and expansion. Don't limit your ability to expand and conquer the industry. It is a risk to take at first but it is a potential to reach the peak of success.

Sylvia Grimes lives on the East Coast and is a part time Internet Marketer and Real Estate Investor.

Sylvia Grimes uses her Internet Marketing to attract new business in making money from home

Looking for a Free way to get started Beginners learn Step-by-Step how to make $250/day from home.

Please visit: http://www.myworkfromhomebizonline.com/


View the original article here