NETWORK SECURITY SEARCHING & ANALYSING INFORMATION MAI Xuan Phu xuanphu150@gmail.com... © Network devices L] Overview of network security Definitions Tasks of Network Security Attack
Trang 1NETWORK SECURITY
SEARCHING & ANALYSING INFORMATION
MAI Xuan Phu xuanphu150@gmail.com
Trang 2Last lecture
L] Review
© OSI model
© TCP/IP
© Collision domain & broadcast domain
© Well-known protocols
® HTTP, FTP, DNS, SMTP, POP, IMAP, TCP, UDP, IP, ARP
© Network devices
L] Overview of network security
Definitions
Tasks of Network Security
Attacks, services and mechanisms
security attacks
Security services
Methods of Defense
OOWOO0O0D0 A model for Internetwork Security
Trang 3Today
L] Introduction
_Ì Footprinting
LÌ Scanning
_Ì Enumeration
Trang 4
Thanks
L] Some contents of this course are referenced from:
William Stallings, Cryptography and Network Security, slides by Lawrie Brown
Henric Johnson, Network Security, Blekinge Institute of Technology, Sweden
J Wang, Computer Network Security Theory and Practice, Springer, 2009
Security+ Guide to Network Security Fundamentals, Third Edition
Jim Kurose & Keith Ross, “Computer Networking: A Top-Down Approach’, 5th edition,
Addison Wesley, 2009
Jean-Pierre Lips, Sécurité des Sécurité des Systemes d'information, Université de Nice-
sophia Antipolis
Certified Ethical Hacker (CER), 7th Version
Renaud BIDOU, Security Training
Thank i Ou
Trang 5Contents
L] Introduction
_Ì Footprinting
LÌ Scanning
_Ì Enumeration
Trang 6
Information
LÌ Information as a concept has numerous meanings, from everyday usage to
technical settings
LJ Generally speaking, the concept of information is closely related to notions of constraint, communication,
control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, and representation (source: wikipedia)
_| Where are information?
Trang 7Business
L]Ì Information to banks?
L] Information to enterprise?
L] Information to military, to government?
Trang 8
System
⁄
L]Ì Information to a server?
L]Ì Information to an administrator?
Trang 9
Gathering information
UL] How to gather information?
L] What will we process these information?
Trang 10
Contents
L]Ì Introduction
_Ì Footprinting (CEH v/, chapter 2)
UL] scanning
_Ì Enumeration
Trang 11
Contents
L] Introduction
_} Footprinting
L} scanning (CEH v/, chapter 3)
_Ì Enumeration
Trang 12
Contents
L] Introduction
_Ì Footprinting
L] Scanning
_Ì Enumeration (CEH v7, chapter 4)
Trang 13
Heferences
L] William Stallings, Network Security Essentials, 2Nd edition
L] William Stallings, Cryptography and Network Securtty, Ath Edition
_I Mike Pastore & Emmett Dulaney, CompTIA Security+ - Study guide, 3° edition,
Wiley Publishing, 2006
L} Cryptography and Network Security Principles and Practices
L} Jie Wang, Computer Network Security - Theory and Practice, Springer
_Ì Justin Clarke & Nitesh Dhanjani, Network Security Tools, O'Reilly, April 2005
L] Certified Ethical Hacker, 7th version: chapter 2,3 &4
LJ iso 17799
Trang 14Discussion
L] Questions?
L] Ideas?
UL] Suggestions?
Trang 15Lab 1
L] List all information of this university network
O Server
O IP
O DNS
© So
_Ì Work in group
_Ì Sending task to xuanphu150@gmail.com