Project Supervisor:- Sudesh Kumar
Ankit Kumar
2012ECS16
I am doing my internship with Berry9IT services Hyderabad. There I work as a security analyst.
Reported 37 issues, 18 are High level Vulnerability
Work to configure VPN and Monitor the whole network using NESSUS and generate the report on every week.
vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure.
Nmap:- Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. While Nmap is commonly used for security audits, many systems and network administrators find it useful for routine tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
•Host discovery
•Port scanning
•Version detecting
•OS detection
•Scriptable interaction with the target
•Runs on Linux, Windows, Mac OS X and other smaller operating systems
•GUI options:
•Zenmap
•XNMap
•NmapFE
•DNS lookup- matches name with IP
•NMap pings the remote target with 0 byte packets to each port
•If packets are not received back, port is open
•If packets are received, port is closed
•Sends different packets with different timing to determine filtered/unfiltered, version, etc.
•Firewalls can interfere with this process
•When run through command prompt or terminal, entry fields are:
•Program
•Constraints on run
•Target
•Ex. > nmap –sS scanme.nmap.org
•Ex. > nmap -Db ftp.pathetic.net secret.pathetic.net
•Can be used for hacking- to discover vulnerable ports
•System admins can use it to check that systems meet security standards
•Unauthorized use of Nmap on a system could be illegal. Make sure you have permission before using this tool
Nessus is a proprietary comprehensive[clarification needed] vulnerability scanner which is developed by Tenable Network Security.
Nessus allows scans for the following types of vulnerabilities:
1. Crawl
2. Audit
1. Authentication Bypass
2. Union based method
3. Error based method
4. Firewall Bypass
XSS:- Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.