Hands-on Lab 8: Network Security Auditing
(DUE April 20, 2006 by midnight EST)
Part A: Nmap port scanner

Pre-assignment: Nmap ("Network Mapper") [ http://www.insecure.org/nmap/ ] is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers, and both console and graphical versions are available. Nmap is free software, available with full source code under the terms of the GNU GPL.

Nmap is available for Windows (http://www.nmapwin.org/ ) and Linux.

Before installing Nmap for Windows, you must first install WinCap (from http://winpcap.polito.it/) to allow for the capture of network packets. This can be done independently or by installing includes nmapwin_1.3.1.exe (http://download.insecure.org/nmap/dist/nmapwin_1.3.1.exe), which includes Nmap and Winpcap. [THE INSTALLATIONS HAVE ALREADY BEEN DONE]

  1. Review how to connect to the VPN concentrator.
  2. Use VNC to connect to Sail1, Sail2, Sail3, Sail6, or Sail7.

Assignment:

Post-assignment:

  1. Submit answers to the following questions based on the reports you generated. (SUBMIT TO DROP-BOX in WebCT.)
    1. Is nmap able to identify the operating system running on each system?
    2. Using the ports that are open and the probable services running on those ports, try and determine what operating systems are running on the devices. Explain your decision.
    3. List several services running on each host?
    4. Which host appears the most secure? least secure? Explain your decisions.
    5. Describe several uses of Nmap.
    6. Which feature of Nmap did you find the most useful and why?
    7. Which feature of Nmap did you find the most difficult to use and why?
Part B: - security scanner

Pre-assignment: "A security scanner is a software which will audit remotely a given network and determine whether bad guys (aka 'crackers') may break into it, or misuse it in some way.
Unlike many other security scanners, Nessus does not take anything for granted. That is, it will not consider that a given service is running on a fixed port - that is, if you run your web server on port 1234, Nessus will detect it and test its security. It will not make its security tests regarding the version number of the remote services, but will really attempt to exploit the vulnerability."

  1. Review the features of the Nessus server & client: http://www.nessus.org/ and the demo

Assignment:

Post-assignment: SUBMIT TO DROP-BOX in WebCT.

  1. Submit the report that you saved above.
  2. Submit answers to the following questions based on the reports you generated.
    1. What operating systems are running on the different hosts?
    2. What web server (if any) is running on each computer?
    3. List several services running on each computer?
    4. Which host had the higest number of vulnerabilites? least number of vulnerabilities?
    5. Identify one high severity vulnerability for each computer (if there is one). Describe the vulnerability and discuss control(s) to minimize the risk from the vulnerability.
    6. Describe several uses of Nessus.
    7. Which feature of Nessus did you find the most useful and why?
    8. Which feature of Nessus did you find the most difficult to use and why?