carbonvur.blogg.se

How to use nessus enum
How to use nessus enum













  • Uses TTL (time to live) option in the IP packet as a “hop counter”.
  • traceroute: lets you view the route that an IP packet follows from one host to another.
  • Once we have identified potential networks we need to determine potential access paths into the network.
  • Textbook has discussion of how to do this.
  • One way to accomplish zone transfer is to use nslookup.
  • This is akin to providing a blueprint of your internal network to anybody who asks.
  • – Thus, internal hostnames and IP addresses may be revealed to external sources.
  • Potential problem occurs if zone transfer is allowed and the organization hasn’t segregated its internal (private) network information from its external (public) information.
  • A zone transfer allows a secondary server to update its info from the primary master.
  • (Some misconfigured systems may allow server to provide zone transfer to anyone who asks.)
  • A security problem is to allow DNS zone transfers from unknown/untrusted Internet users.
  • DNS is a distributed database used for mapping IP addresses & hostnames.
  • Download and run programs that will help.
  • Access web sites with capability to search.
  • Whois databases valuable in this search.
  • Goal is to identify domain names and associated networks.
  • Start with the organization’s web page if they have one.
  • IDS, firewalls, and other security devices.
  • how to use nessus enum

    TCP and UDP services for internal systems.IP addresses for system on internal network.

    how to use nessus enum

  • Internal attack: same goal but from inside of the security perimeter – map out the network and determine current security posture.
  • Possible security HW/SW (firewalls, IDS).
  • System HW and SW (OS and applications).
  • TCP and UDP services running on systems.
  • how to use nessus enum

    IP addresses for Internet connected systems.External attack: Enables attackers to create a profile of an organization’s security posture including:.Footprinting/Scanning/Enumeration Lesson 9















    How to use nessus enum