http://www.onguardonline.gov/
Sunday, January 3, 2010
Security awareness training
Security awareness training is one of the least expensive and most effective ways of protecting your organizations assets. I came across this site which has some useful games, videos and quizzes suitable for a general user population. Enjoy.
http://www.onguardonline.gov/
http://www.onguardonline.gov/
Tuesday, December 1, 2009
SHODAN - Banner grabbing search engine
I recently discovered a new search engine which has some interesting capabilities, from the site..
SHODAN lets you find servers/ routers/ etc. by using the simple search bar up above. Most of the data in the index covers web servers at the moment, but there is some data on FTP, Telnet and SSH services as well. Let me know which services interest you the most and I'll prioritize them in my scanning.
What makes this interesting (and somewhat controversial) is SHODAN (Sentient Hyper-Optimized Data Access Network) has done the leg work and initial scanning for those wishing to break into (or secure) systems.
If a new exploit is released which targets a vulnerability in a specific version of Apache, lets say, why bother scaning for vulnerable web servers when someone else has done it for you? Add filtering by country / domain / keyword and an attacker can build a nice set of targets without ever sending a packet to any of them.
Here are a few SHODAN queries to demonstrate
SHODAN lets you find servers/ routers/ etc. by using the simple search bar up above. Most of the data in the index covers web servers at the moment, but there is some data on FTP, Telnet and SSH services as well. Let me know which services interest you the most and I'll prioritize them in my scanning.
What makes this interesting (and somewhat controversial) is SHODAN (Sentient Hyper-Optimized Data Access Network) has done the leg work and initial scanning for those wishing to break into (or secure) systems.
If a new exploit is released which targets a vulnerability in a specific version of Apache, lets say, why bother scaning for vulnerable web servers when someone else has done it for you? Add filtering by country / domain / keyword and an attacker can build a nice set of targets without ever sending a packet to any of them.
Here are a few SHODAN queries to demonstrate
IIS servers running default page:
http://shodan.surtri.com/?q=port%3A80+iisstart.htm
Cisco devices listening on port 80:
http://shodan.surtri.com/?q=port%3A80+%22Cisco%22
IP's in the US with telnet open:
http://shodan.surtri.com/?q=country%3Aus+port%3A23
Citrix servers in Brazil on port 80 http://shodan.surtri.com/?q=citrix%20country:BR%20port:80
Thursday, November 26, 2009
Using Nmap to fingerprint network applications
nmap is one of my favorite network tools. It's versatile and powerful and lots of fun to use. Nmap scan types are denoted by -s*. -sS is a syn stealth or half-open scan and -sT is a TCP connect scan which uses the full TCP three way handshake. One of the most useful scan types is -sV, which "fingerprints" the open ports nmap discovers. By fingerprinting the port, nmap can often determine exactly what application or service is listening behind it.
To illustrate, take the example below. This is an internet host that appears to be listening on port 443 which is commonly used for https.
nmap -sS 66.57.111.10
PORT STATE SERVICE
443/tcp open https
If we change the scan type to -sV and add -p443 we can fingerprint the listening port.
nmap -sV -p443 66.57.111.10
443/tcp open ssh WeOnlyDo sshd 2.1.3 (protocol 2.0)
Very interesting, -sV shows us that its actually an SSH server listening on the port and also tells us the specific version of the software.
Subscribe to:
Posts (Atom)