Sunday, January 23, 2011

Performing Active Reconnaissance:with Nmap



1. Download the most current version of Nmap.

http://nmap.org/download.html


2. Open a command prompt and go to the directory that you have installed Nmap in.

Run Nmap ] from the command line to see the various options

Example :

1. Perform a full connect scan on one of the local devices you have identified on your network. The syntax is Nmap -sT IP_Address.

2. Perform a stealth scan on one of the local devices you have identified on your network. The syntax is Nmap -sS IP_Address.

3. Perform a UDP scan on one of the local devices you have identified on your network. The syntax is Nmap -sU IP_Address.

4. Perform a fingerprint scan on one of the local devices you have identified on your network. The syntax is Nmap -O IP_Address.

Do the vulnerability Research




Intro of vulnerability Research

1. To discovering vulnerabilities and designing of weakness will open .
and the application to attack
2.It can be classified based on:
- Severity Lever (Low,medium,or high)
- Exploit range (local or remote)

Important of Vulnerability Research

1. To know how to recover from network attack
2.to gather info about latest updated viruses
3.to get info to helps to prevent security problems
4.to protect your network from being attack

Venerability Research Tools
1. Get from vulnerabilityResearch websitse
Example : - www.securityfocus.com
- www.securiteam.com
- www.hackerstorm.com

- www.securitytracker.com
- www.microsoft.com/security

- www.securitymagazine.com

- www.secunia.com

- www.hackerwatch.com
- www.scmagazine.com
- nvd.nist.gov


:: help you expose your security holes and will show
you what the bad guys already know about your
hosts and network. ::



::(I-Newswire) April 25, 2009 HackerStorm.com have created scripts which allow easy viewing and browsing of scan job results without the need to run the native software clients.

Tim Mehmet, author if the tool comments: "we created this tool primarily to share scan job results with others on an intranet server, it also works equally well on a Linux laptops or desktops as well for local viewing".

Some of the features included in the HackerStorm Reporter tool are;

- Nessus v3 required & OpenVas v2.
- Simply export scan jobs into XML format and copy to the XML folder to view reports
- View by Risk
- View by Severity
- View just one host or all hosts in report
- Executive summary as well as detailed reports
- Ports and services found report
- Category summary report
- Export scan jobs to Excel (very useful with autofilter enabled).
- Save report as html and send as an offline copy in html.
- Easy installation, just extract the zip file to your web server

Tim mehmet says: "the potential benefits of this tool are really down to ones own imagination, for example, you could deploy the scripts into folders and simply apply permissions so that only certain groups of people can view the results, be it customers or different departments within an organisation".

"one of the more exciting potential benefits is that should you perform multiple scheduled scans on a regular basis, you could monitor the results in near real time with dynamic charting, for example, we have implemented a commercial solution to do this but we wanted an open source alternative as well, with our scripts you simply monitor for new XML reports and flash based charts can update your intranet page dynamically using the data variables that we generate with our scripts".

The tool is free to use, its freely available to download from the hackerstorm.com website. This also applies to professionals who wish to use it for work. Details can be found at http://www.hackerstorm.com.



###
http://www.i-newswire.com/free-reporting-tool-for-nessus/a278292
www.hackerstorm.com
London, UK
Timur Mehmet

Information Gathering: Finding Company URL




1.To search the company URL u can easily use Google because its provide rich of info
to perform passive reconnaissance .

2.You also can use example forums ,blogs ,newgroups for sensitive info of company

3. You also can guess to find internal company URL for example:

-Partners.xsecurity.com
-customers.xsecurity.com
-products.xsecurity.com
-Finance.xsecurity.com
-beta.xsecurity.com

4. You can get all the information of company website since the
time it was lunched
example using :www.archive.org

- at this website you can see the updates that make to the website,their
database,past products,contack and etc.