SlideShare a Scribd company logo
UNIT IV
ATTACK TECHNIQUES
WHAT IS NETWORK RECONNAISSANCE?
‱ Network reconnaissance helps cybersecurity professionals
to identify potential attack vectors that attackers could
exploit. By understanding the vulnerabilities in their
network or system, organizations can take steps to protect
themselves and mitigate the risk of a successful attack.
THERE ARE TWO MAIN TYPES OF
RECONNAISSANCE
‱ Active reconnaissance
With active reconnaissance, hackers interact
directly with the computer system and
attempt to obtain information through
techniques like automated scanning or
manual testing and tools like ping and netcat.
Active recon is generally faster and more
accurate, but riskier because it creates more
noise within a system and has a higher
chance of being detected.
‱ passive reconnaissance
‱ Passive reconnaissance gathers
information without directly
interacting with systems, using tools
such as Wireshark and Shodan and
methods such as OS fingerprinting to
gain information.
HOW RECONNAISSANCE WORKS
‱ Reconnaissance generally follows seven steps:
1.Collect initial information
2.Determine the network range
3.Identify active machines
4.Find access points and open ports
5.Fingerprint the operating system
6.Discover services on ports
7.Map the network
USING THESE STEPS, AN ATTACKER WILL AIM TO GAIN
THE FOLLOWING INFORMATION ABOUT A NETWORK
‱ File permissions
‱ Running network services
‱ OS platform
‱ Trust relationships
‱ User account information
HOW TO PREVENT RECONNAISSANCE
‱ Organizations can use penetration testing to determine what their network would
reveal in the event of a reconnaissance attack. Organizations can
outsource the work by hiring security testing professionals to carry out penetration
testing, vulnerability assessment, compliance testing, etc.
‱ During testing, organizations can deploy port scanning tools (which scan large
networks and determine which hosts are up) and vulnerability scanners (which find
known vulnerabilities in the network).
‱ SIEM solutions can also detect source IPs that are running a port scanning tool in
your network.
NETWORK RECONNAISSANCE WITH NMAP
‱ Nmap (Network Mapper) is a powerful open-source tool
used for network exploration and security auditing.
‱ It allows you to discover hosts and services on a computer
network, thus creating a "map" of the network's structure.
KEY FEATURES OF NMAP
1. Host Discovery: Nmap can discover hosts on a network by sending packets and
analyzing responses.
2. Port Scanning: It can identify open ports on target systems, which helps in
understanding the services running on those systems.
3. Version Detection: Nmap can often determine the versions of software and
services running on discovered ports, aiding in vulnerability assessment.
1.OS Fingerprinting: It can sometimes guess the operating
system running on a target host by analyzing patterns in
network packets.
2.Scripting: Nmap supports scripting with Nmap Scripting
Engine (NSE), allowing for automated tasks and advanced
probing.
USE CASES OF NMAP
 Security Audits: Assessing the security posture of a network by identifying
open ports and potential vulnerabilities.
 Network Inventory: Creating an inventory of hosts and services for network
management purposes.
 Penetration Testing: Identifying potential entry points into a network that
could be exploited by attackers.
VULNERABILITY AUDITS WITH OPENVAS
‱ OpenVAS (Open Vulnerability Assessment System) is a framework of several services and tools offering
vulnerability scanning and management. It helps in identifying security issues in target systems and networks.
‱ Key features of OpenVAS:
1. Vulnerability Scanning: It scans target systems for known vulnerabilities based on a database of signatures.
2. Reporting: OpenVAS provides detailed reports on identified vulnerabilities, including severity levels and
potential impacts.
3. Integration: It can integrate with other tools and workflows, enhancing its usability in larger environments.
4. Continuous Monitoring: OpenVAS supports continuous monitoring to detect new vulnerabilities as they
emerge.
USE CASES OF OPENVAS
 Regular Security Audits: Conducting scheduled scans to ensure ongoing security of systems and
networks.
 Compliance Checking: Verifying compliance with security standards and regulations that mandate
vulnerability assessments.
 Risk Assessment: Assessing the risk posed by identified vulnerabilities and prioritizing remediation
efforts.
INTEGRATION AND WORKFLOW
 Sequential Usage: Typically, Nmap is used first for initial reconnaissance, identifying hosts and open
ports. This information then informs the scope of vulnerability scanning with
OpenVAS.
 Automated Workflows: Both tools support scripting and automation, enabling
integration into larger security workflows and environments.
 Reporting and Remediation: The output from OpenVAS can guide
remediation efforts based on the vulnerabilities identified by both tools.
Network security ppt presentation and download

More Related Content

PDF
Software for Finding vulnerabilities in programs.pdf
PPTX
Network scan
DOCX
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
PPTX
Cyber Security Hacking and Attack Tree Analysis
PPTX
Cyber Security Penetration Testing Tools
PPTX
An Toan Thong Tin.pptx
PPTX
Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...
PDF
Nessus Assesment Vulnerability Management.pdf
Software for Finding vulnerabilities in programs.pdf
Network scan
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Cyber Security Hacking and Attack Tree Analysis
Cyber Security Penetration Testing Tools
An Toan Thong Tin.pptx
Day 1 - Lab 1 Reconnaissance Scanning with NMAP, Vulnerability Assessment wit...
Nessus Assesment Vulnerability Management.pdf

Similar to Network security ppt presentation and download (20)

PPTX
Metasploit
PDF
Common Tools Used in Penetration Testing.pptx (1).pdf
 
PPTX
Scanning and Enumeration in Cyber Security.pptx
PPTX
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
PPTX
Top 10 Penetration Testing Tools(Pen test tools).pptx
PPTX
What is a Port Scan in data visualization
PDF
Types of Vulnerability Scanning An in depth investigation.pdf
PPT
Port scanning
PPT
Port scanning
PPTX
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
PDF
Network Vulnerability and Patching
PDF
Phase 2. Identify Targets and Run Scans Goal Identify the tools and.pdf
PPTX
PortScannercybersecurityproject(PP).pptx
DOCX
Virtual Labs SniffingConsider what you have learned so far
PPTX
Cyber-Security-Unit-4.pptx
PPTX
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
PPTX
Exploring Kali Linux Tools for Website Scanning via IP Address
PPT
CYBER FORENSICS-scanning and enumuration.ppt
PPTX
( Ethical hacking tools ) Information grathring
PDF
Lec_11_Introduction to Cyber Security.pdf
Metasploit
Common Tools Used in Penetration Testing.pptx (1).pdf
 
Scanning and Enumeration in Cyber Security.pptx
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
Top 10 Penetration Testing Tools(Pen test tools).pptx
What is a Port Scan in data visualization
Types of Vulnerability Scanning An in depth investigation.pdf
Port scanning
Port scanning
Cyber Security Project : Comprehensive Vulnerability Analysis Report.pptx
Network Vulnerability and Patching
Phase 2. Identify Targets and Run Scans Goal Identify the tools and.pdf
PortScannercybersecurityproject(PP).pptx
Virtual Labs SniffingConsider what you have learned so far
Cyber-Security-Unit-4.pptx
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Exploring Kali Linux Tools for Website Scanning via IP Address
CYBER FORENSICS-scanning and enumuration.ppt
( Ethical hacking tools ) Information grathring
Lec_11_Introduction to Cyber Security.pdf
Ad

Recently uploaded (20)

PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Introduction to Artificial Intelligence
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Nekopoi APK 2025 free lastest update
PDF
AI in Product Development-omnex systems
PDF
top salesforce developer skills in 2025.pdf
PPTX
ai tools demonstartion for schools and inter college
PPTX
Transform Your Business with a Software ERP System
PPTX
Essential Infomation Tech presentation.pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Design an Analysis of Algorithms II-SECS-1021-03
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Introduction to Artificial Intelligence
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
How to Migrate SBCGlobal Email to Yahoo Easily
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Nekopoi APK 2025 free lastest update
AI in Product Development-omnex systems
top salesforce developer skills in 2025.pdf
ai tools demonstartion for schools and inter college
Transform Your Business with a Software ERP System
Essential Infomation Tech presentation.pptx
Odoo Companies in India – Driving Business Transformation.pdf
Reimagine Home Health with the Power of Agentic AI​
Design an Analysis of Algorithms I-SECS-1021-03
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PTS Company Brochure 2025 (1).pdf.......
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Design an Analysis of Algorithms II-SECS-1021-03
Ad

Network security ppt presentation and download

  • 2. WHAT IS NETWORK RECONNAISSANCE? ‱ Network reconnaissance helps cybersecurity professionals to identify potential attack vectors that attackers could exploit. By understanding the vulnerabilities in their network or system, organizations can take steps to protect themselves and mitigate the risk of a successful attack.
  • 3. THERE ARE TWO MAIN TYPES OF RECONNAISSANCE ‱ Active reconnaissance With active reconnaissance, hackers interact directly with the computer system and attempt to obtain information through techniques like automated scanning or manual testing and tools like ping and netcat. Active recon is generally faster and more accurate, but riskier because it creates more noise within a system and has a higher chance of being detected. ‱ passive reconnaissance ‱ Passive reconnaissance gathers information without directly interacting with systems, using tools such as Wireshark and Shodan and methods such as OS fingerprinting to gain information.
  • 4. HOW RECONNAISSANCE WORKS ‱ Reconnaissance generally follows seven steps: 1.Collect initial information 2.Determine the network range 3.Identify active machines 4.Find access points and open ports 5.Fingerprint the operating system 6.Discover services on ports 7.Map the network
  • 5. USING THESE STEPS, AN ATTACKER WILL AIM TO GAIN THE FOLLOWING INFORMATION ABOUT A NETWORK ‱ File permissions ‱ Running network services ‱ OS platform ‱ Trust relationships ‱ User account information
  • 6. HOW TO PREVENT RECONNAISSANCE ‱ Organizations can use penetration testing to determine what their network would reveal in the event of a reconnaissance attack. Organizations can outsource the work by hiring security testing professionals to carry out penetration testing, vulnerability assessment, compliance testing, etc. ‱ During testing, organizations can deploy port scanning tools (which scan large networks and determine which hosts are up) and vulnerability scanners (which find known vulnerabilities in the network). ‱ SIEM solutions can also detect source IPs that are running a port scanning tool in your network.
  • 7. NETWORK RECONNAISSANCE WITH NMAP ‱ Nmap (Network Mapper) is a powerful open-source tool used for network exploration and security auditing. ‱ It allows you to discover hosts and services on a computer network, thus creating a "map" of the network's structure.
  • 8. KEY FEATURES OF NMAP 1. Host Discovery: Nmap can discover hosts on a network by sending packets and analyzing responses. 2. Port Scanning: It can identify open ports on target systems, which helps in understanding the services running on those systems. 3. Version Detection: Nmap can often determine the versions of software and services running on discovered ports, aiding in vulnerability assessment.
  • 9. 1.OS Fingerprinting: It can sometimes guess the operating system running on a target host by analyzing patterns in network packets. 2.Scripting: Nmap supports scripting with Nmap Scripting Engine (NSE), allowing for automated tasks and advanced probing.
  • 10. USE CASES OF NMAP  Security Audits: Assessing the security posture of a network by identifying open ports and potential vulnerabilities.  Network Inventory: Creating an inventory of hosts and services for network management purposes.  Penetration Testing: Identifying potential entry points into a network that could be exploited by attackers.
  • 11. VULNERABILITY AUDITS WITH OPENVAS ‱ OpenVAS (Open Vulnerability Assessment System) is a framework of several services and tools offering vulnerability scanning and management. It helps in identifying security issues in target systems and networks. ‱ Key features of OpenVAS: 1. Vulnerability Scanning: It scans target systems for known vulnerabilities based on a database of signatures. 2. Reporting: OpenVAS provides detailed reports on identified vulnerabilities, including severity levels and potential impacts. 3. Integration: It can integrate with other tools and workflows, enhancing its usability in larger environments. 4. Continuous Monitoring: OpenVAS supports continuous monitoring to detect new vulnerabilities as they emerge.
  • 12. USE CASES OF OPENVAS  Regular Security Audits: Conducting scheduled scans to ensure ongoing security of systems and networks.  Compliance Checking: Verifying compliance with security standards and regulations that mandate vulnerability assessments.  Risk Assessment: Assessing the risk posed by identified vulnerabilities and prioritizing remediation efforts.
  • 13. INTEGRATION AND WORKFLOW  Sequential Usage: Typically, Nmap is used first for initial reconnaissance, identifying hosts and open ports. This information then informs the scope of vulnerability scanning with OpenVAS.  Automated Workflows: Both tools support scripting and automation, enabling integration into larger security workflows and environments.  Reporting and Remediation: The output from OpenVAS can guide remediation efforts based on the vulnerabilities identified by both tools.