Identifying Network Threats using Network Security Tools
Verified
Added on 2023/06/11
|8
|1877
|404
AI Summary
This report discusses the use of Nmap and Metasploit for identifying network threats and exploiting vulnerabilities. It also covers threat mitigation techniques and provides a literature review. Subject: Network Security, Course Code: N/A, Course Name: N/A, College/University: N/A
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK SECURITY 1 Identifying Network Threats using Network Security Tools Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 NETWORK SECURITY 1 Table of Contents Introduction...........................................................................................................................................2 Literature Review..................................................................................................................................2 Network Security Tools..........................................................................................................................4 Threat Mitigation Techniques................................................................................................................5 Conclusion.............................................................................................................................................5 Bibliography...........................................................................................................................................7
2 NETWORK SECURITY 1 Introduction The report is prepared for using two network security tools for the analysis of the new security threats acting on the network and identification of the technique used for addressing the threat. Two open source network monitoring tool i.e. Nmap and Metasploit is used for the analysis of the vulnerability of the local area network of our institute. The tools are available in kali Linux and it is installed in a virtual machine for exploitation of the current network. The Nmap is used for scanning the network and the threats identified are discussed in the report. The metasploit is used for the identification of the payload on the network and it is combined with Nmap for gathering information from the network. Literature Review
3 NETWORK SECURITY 1 The nmap is used for finding the ports in a system that are open and used for intruding into the system using the open port for testing the vulnerability of the system. The ports can also be used for sending asynchronous packet and causing denial of service attack. The metasploit is used for gaining the access of the system using the open ports and used for security audit for the network. It can be combined with different types of codes for the exploitation in a network.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4 NETWORK SECURITY 1 Network engineers are mainly required for anticipation of various kinds of attacks and overcoming them. There are many kinds of methods which can be used for overcoming the given attacks like Denial of service (DoS) or Distributed Denial of Service Attack (DDoS), social engineering and malware. Dos attack is mainly considered to be much easiest to be understanding. A successful kind of DoS attack can easily take place when the ability of the device for performing is prevented. Methods which can cause various kinds of condition range which begins from sending of large number of traffic at the given device to triggering of device which can be easily used for buffering. Any kind of triggering in the device can be used for entering the error. A simple kind of DDoS can be easily performed by the help of error condition. A simple kind of DDoS attack can be easily performed by the help of third party network which focus on the availability of a given network into another kind of network capacity into another kind of network device with less kind of capacity. The target can be easily seen when the various kinds of attack can be easily originated and certain number of action taken into account. One of the common kind of attack is social engineering. This particular kind of attack require a certain level of skill which is considered to be of much exceptional value. Social engineering does not need any kind of technology. It mainly takes up the advantage of social methods which can be easily used for extraction of any kind of information.Malware is considered to be short form of malicious software. Malware is mainly inclusive of modern kind of attacks. This is mainly inclusive of certain number of methods like viruses, worm, spyware, Trojan and adware. It mainly differs in operation when it is combined with various kinds of operation. Network Security Tools Nmap is considered to be a free and open source kind of source which is mainly used for discovering and auditing of security. Many kinds of system and network administrator also finds it useful for dealing with large number of problems like inventory of network, proper management of service upgrade schedules a monitoring of host or service uptime. Nmap makes use raw kind of IP packets in proper kind of novel which is mainly used for determination of various kinds of host which are available on the network. It is also used for analysing the kind of service available with host offering and kind of operating system which is running. It was mainly designed for analysing the fact for scanning various kinds of networks and proper kind of work fine should be available for it. Nmap is mainly used for large number of platforms like Linux, Mac OS and windows. Apart from the classic kind of available command it is mainly inclusive of advanced kind of GUI and result of viewer. It comes up with proper kind of flexible data transfer technique and tools for debugging. It comes up with various kinds of tools for comparing the available kind of scan results. A packet kind of generation and tool for responsive analysis.
5 NETWORK SECURITY 1 Metaspoilt is a well-known penetration test that is mainly performed for analysing various kinds of vulnerabilities in a given network. It generally provides the infrastructure, content and various kinds of tool for performing various kinds of test in network. It can be stated like an extensive kind of security auditing. It comes up with new kinds of security model that is mainly used for new kinds of model and content team which is mainly added on regular basis. Metasploit is a famous in the domain of security world soon after it was released in the year of 2004. It is mainly defined as a proper kind of advanced tool platform that is mainly used for developing, testing and exploitation of code. It is mainly defined as a well-known model which is mainly used for payloads, encoders and exploitation which can be easily integrated as much as possible which can be easily used metasploit framework which is nothing but an outlet that can be easily used for cut edge for various kinds of exploitation of various kinds of research. Threat Mitigation Techniques A large number of steps can be taken for overcoming various kinds of issues in a network like Configuration of firewall Segregation of network Web application Be careful about the privilege of network. Patch management Configuration of firewall:It is very important for proper management of configuration of firewall. It mainly ensures the fact that various kinds of configuration must be there in active nature. Network configuration:Along with checking of various kinds of firewalls it is very essential for analysing the segregation of things which are working in an effective way in all the network and ingress point. Web vulnerabilities:Weakness and issues in various kinds of web application are considered to be main kind of attack vendor by the help of vectors by which the organization is compromised. Patch management:One of the best that is taken into consideration of security of various kinds of system and services are patched as per the requirement. Conclusion From the above report it can be concluded that using the Nmap and the Metasploit helps in identification of the current vulnerability of the network and the both of them can be used as a good combination for the exploitation of the network. The metasploit can be used for evading the
6 NETWORK SECURITY 1 antivirus solution installed in the targeted machine and offers advanced penetration testing features for the exploitation of the vulnerability in the current network. The nmap is used for scanning the network utilizing raw IP packet and it can easily gather different information from the network such as the version of the operating system, available hosts connected in the network and existence of the firewall, etc. that are essential for performing the penetration testing.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7 NETWORK SECURITY 1 Bibliography [1].Armstrong, M.E., Jones, K.S., Namin, A.S. and Newton, D.C. What Vulnerability Assessment and Management Cybersecurity Professionals Think Their Future Colleagues Need to Know. InProceedings of the 49th ACM Technical Symposium on Computer Science Education(pp. 1082-1082). ACM., 2018, February. [2].Atwater, E., Bocovich, C., Hengartner, U. and Goldberg, I. Live Lesson: Netsim: Network simulation and hacking for high schoolers. In2017 {USENIX} Workshop on Advances in Security Education ({ASE} 17). USENIX} Association}., 2017 August. [3].Cuppens, F. WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator. InSecurity of Industrial Control Systems andCyber Physical Systems: First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papers(Vol. 9588, p. 63). Springer., 2016, June. [4].Holik, F., Horalek, J., Marik, O., Neradova, S. and Zitta, S. Effective penetration testing with Metasploit framework and methodologies. InComputational Intelligence and Informatics (CINTI), 2014 IEEE 15th International Symposium on(pp. 237-242). IEEE., 2014, November. [5].Johansen, G., Allen, L., Heriyanto, T. and Ali, S.Kali Linux 2–Assuring Security by Penetration Testing. Packt Publishing Ltd., 2016. [6].Nayak, P. and Sinha, P. Analysis of Random Way Point and Random Walk Mobility Model for Reactive Routing Protocols for MANET Using NetSim Simulator. InArtificial Intelligence, Modelling and Simulation (AIMS), 2015 3rd International Conference on(pp. 427-432). IEEE., 2015 December. [7].Peng, J., Li, H., Wang, Y. and Chen, J. A web tool for measuring gene semantic similarities by combining Gene Ontology and gene co-function networks. InProceedings of the 6th ACM Conference on Bioinformatics, Computational Biology and Health Informatics(pp. 678-679). ACM., 2015 September. [8].Saifuddin, K.M., Ahmed, A.S., Reza, K.F., Alam, S.S. and Rahman, S. Performance analysis of cognitive radio: Netsim viewpoint. InElectrical Information and Communication Technology (EICT), 2017 3rd International Conference on(pp. 1-6). IEEE., 2017 December. [9].Singh, G., Cheema, A.K. and Kapoor, N. Performance Evaluation of Routing Protocol in Internet of Things using Netsim.International Journal,8(3)., 2017. [10].Weidman, G.Penetration testing: a hands-on introduction to hacking. No Starch Press., 2014.