country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

BN203 Network Security

tag 0 Download6 Pages / 1,406 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: BN203
  • University: Melbourne University Of Technology
  • Country: Australia

Network security is a critical component of any firm, especially with the rising incidences of cyber espionage. Deploying and maintaining the best security exposure requires that a firm understands vulnerabilities that can be exploited on its network, and take mitigation measures to avoid being a victim of a cyber attack.

 

 

Answer:

Introduction

Network security is a critical component of any firm, especially with the rising incidences of cyber espionage. Deploying and maintaining the best security exposure requires that a firm understands vulnerabilities that can be exploited on its network, and take mitigation measures to avoid being a victim of a cyber attack. To understand how well a network and computers on the network are secured, it is important to carry out security scans - at a minimum - or a full penetration testing.

A number of tools can be used to scan a network for vulnerabilities. Key among them include; Open VAS,TCPdump, Metasploit, Nmap, PRTG and GFI LanGuard. For this assignment, the tools of choice are Metasploit and Nmap.  

Nmap or Network Mapper is a tool for network scanning; a process that entails discovery of active hosts on a given network, as well as information about the given hosts [1]. NMAP scans a network and builds a map of the network, informing on active hosts, operating system running on the hosts, active ports , applications and services. Nmap maps out a network by sending out well crafted packets to the host, and depending on the responses, the tool can tell the active hosts [1]. The tool provides 4 basic scanning facilities; Network Mapping, Port Scanning, Service and Version Detection and OS Detection. Additionally, the tool can be extended to perform advanced network scanning such as evading firewalls and perimeter defences, vulnerability detection,  masking the origin of the scan and timed scans which enable stealthy scans [1].

Information obtained through Nmap, such as open ports is used to launch attacks through the openings. For the case where Nmap reports on software versions running on a host, the information can be used to look for specific vulnerabilities for the given software version.

Metasploit is a tool for scanning a network or host for security vulnerabilities [2]. The tool comes bundled with the ability to scan for vulnerabilities, exploits that can be used to compromise the vulnerabilities, payloads for the exploits, encoders and auxiliary modules [2]. The exploits are OS and application specific, thus when a scan finds an application with a known vulnerability, it can easily be exploited using the bundled exploits and payload [2].

Literature Review

Network security attacks can be devastating to an organization, business or even a government. Recent attacks, such as the hack on Sony Systems, attacks on Equifax - an American credit company [3], and Ashley Madison just shows how devastating an attack can be. In all the attacks, the hacking follows four critical steps, as outline in [4] ;

Reconnaissance or Information gathering is the first stage of an attack, and is the subject of this paper. An attacker gathers information through scanning the target, Enumerating the services and foot printing the victim [5]. Information gathering helps in identifying network vulnerabilities can be exploited on the target network or system. The attacker understands the attack environment by getting information about ports, machines on the network, services running, operating systems among other.

After gathering sufficient information, and depending on the nature of vulnerability, an attacker can launch an attack through a number of attack vectors. The most common attack types as outline in [6] includes; Denial-of-Service Attack, Intrusion, Virus, Worms, Trojans, Buffer Overflow attacks, Advanced Persistent Threats, Eavesdropping  and Traffic analysis attacks.  

With intrusion attacks, a hacker tries to gain unauthorized access to a computing resource, to access or manipulate information [7]. With DoS attacks, the target is flooded with too many bogus requests, from other compromised hosts,  to take up computing resources, thus starving genuine requests and rendering the network or computer unusable [7]. Viruses and Worms on the other hand are used to either carry out automated exploits, send information to the attacker or used to launch attacks such as DoS attacks on other hosts [7].

 

For this exercise, we used Nmap to scan a network for hosts and vulnerabilities. Step one of this involved downloading and installing Nmap on the laptop. This was then followed by an quick ping scan of the targeted network with IP range; 192.168.43.1/24, intended to aid in discovering hosts on the network.

The next step was carrying out an intense scan to discover the ports, services and OSs running on the discovered hosts.

From the scan; two hosts were active; one of the host is the local windows machine used for scanning, while the other was an Android phone., as shown below.

The Open port 53 on the Android phone runs a domain name resolutions service dnsmasq 2.51.  The software running on the port dnsmasq the most commonly used , lightweight DHCP and DNS server, which finds wide usage in home networks, for managing DHCP leases and as a  caching DNS stub resolver [8]. Many phone and network equipment manufacturers prefers to use dnsmasq  as it consumes very low computing resources, is highly flexible and simple to configure [8].  The summary of vulnerabilities for this software are as summarized below;

The version running on this device, dnsmasq 2.51, has 4 main known vulnerabilities; information leak, Segmentation fault, Stack buffer overflow and Heap buffer overflow [8]. The most severe of the vulnerabilities can be triggered by using a malicious domain that would send DNS requests to the dnsmasq, and make it cache the replies from the domain. Carefully constructed DNS requests and responses to the dnsmasq would result in an internal buffer overflow on the heap; this has the potential of allowing the execution of the attacker's payload [8]. A second vulnerability with dnsmasq 2.51still relates to buffer overflow, enabling an attacker to launch a DoS attack.

Since the network had only two live hosts; the host from which the scanning were being done and the Android phone on the network, the Metasploit scans were only done to confirm the findings of what was found with Nmap.

Threats related to the outdated dnsmasq software can be mitigated by updating the software or applying security patches. According to [8], the vulnerability was in versions lower than 2.78, after which the vulnerability was fixed. For android devices, the security patch was released in October of 2017. For this specific device, still running dnsmasq version 2.51, the urgent solution is to patch the software with the security patch or allow the device to update critical updates.

Conclusion

This paper has presented a theoretical analysis and practical information gathering, using Nmap and Metasploit tools. Being the first step in the hacking process, as well as being a critical step for IT security specialists, the tools used in reconnaissance are critical in ensuring maximum network security is achieved. Both Nmap and Metasploit aids in this endeavour by facilitating network scanning; identifying open ports, services, software applications, operating systems and vulnerabilities that can be exploited.

Nmap maps out a network by sending out well crafted packets to the host, and depending on the responses, the tool can tell the active hosts. It scans a network and builds a map of the network, informing on active hosts, operating system running on the hosts, active ports , applications and services. On the other hand, Metasploit scans a network or a host for vulnerabilities. Besides providing scanning capabilities, the tool comes bundled with the ability to scan for vulnerabilities, exploits that can be used to compromise the vulnerabilities, payloads for the exploits, encoders and auxiliary modules.

The practical information-gathering exercise discovered a major vulnerability on an Android phone that was serving as a Wireless Network hotspot. The outdated dnsmasq has know vulnerabilities which can be exploited through buffer overflow attacks. The vulnerability can however be fixed through patching of the application or updating the software.

 

References

Mark. "Host Discovery with nmap." Exploring nmap's default behavior1 (2002): 16.

C. Joshua. "An analysis of the ids penetration tool: Metasploit." The InfoSec Writers Text Library, Dec9 (2010).

M. Andriotis, Rapoport, and R. McMillan. "‘We’ve been breached’: Inside the Equifax hack." Editorial], The Wall Street Journal(2017).

Bhuyan, H. Monowar, D Bhattacharyya, and J. K. Kalita. "Surveying port scans and their detection methodologies." The Computer Journal54.10 (2011): 1565-1581.

H, Nazrul, et al. "Network attacks: Taxonomy, tools and systems." Journal of Network and Computer Applications40 (2014): 307-324.

H, Simon, and R Hunt. "A taxonomy of network and computer attacks." Computers & Security1 (2005): 31-43.

Bhuyan, H. Monowar, D. K. Bhattacharyya, and J. K. Kalita. "Network anomaly detection: methods, systems and tools." Ieee communications surveys & tutorials16.1 (2014): 303-336.

RedHat, dnsmasq: Multiple Critical and Important vulnerabilities. [Online] Available at https://access.redhat.com/security/vulnerabilities/3199382

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Network Security. Retrieved from https://myassignmenthelp.com/free-samples/bn203-network-security.

"Network Security." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/bn203-network-security.

My Assignment Help (2019) Network Security [Online]. Available from: https://myassignmenthelp.com/free-samples/bn203-network-security
[Accessed 12 July 2020].

My Assignment Help. 'Network Security' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/bn203-network-security> accessed 12 July 2020.

My Assignment Help. Network Security [Internet]. My Assignment Help. 2019 [cited 12 July 2020]. Available from: https://myassignmenthelp.com/free-samples/bn203-network-security.


MyAssignmenthelp.com has become preferred online assignment help provider in Australia due to its efficiency and professionalism. Our highly skilled assignment writers work day in and day out to resolve students' doubts 'can I do my assignment perfectly' or 'will I able to write my assignment exactly in a manner that professors want' and provide them needed Assignment Help. Hence, students, who avail our services, get the chance to secure higher grades.

Latest Networking Samples

CO4509 Computer Security Assignment

Download : 0 | Pages : 14
  • Course Code: CO4509
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction: Computer security is a major concern for every organisation and most importantly to safe guard the data stored on the system from any loss. It is important to secure the information from data loss or inception of viruses or malware in the system. Security completely deals with securing the data stored on the network from any unauthorized loss. Every organisation is dependent on computer for performing certain tasks thus ...

Read More arrow

HS1011 Data Communication And Networks Methodology

Download : 0 | Pages : 5
  • Course Code: HS1011
  • University: Victoria University
  • Country: Australia

Answer: Introduction The given three scenario are analyzed for the selection of the network management tool. With the increase in the complexity of the network it is crucial to select a robust network monitoring solution and thus the Manage Engine network monitoring tool is selected for analyzing the data flow in the network. It can be used for monitoring the network activities and get the status of each of the network devices connected with ...

Read More arrow

CS2S562 Secure Software Development

Download : 0 | Pages : 2

Answer: Introduction: Internet of things is simply network of  any physical computing devices. The IoT devices are used literary in day to day activities. So many devices are constructed emulating the internet of things.  Since there are so many devices of internet of things, i simulated a home automation system using C sharp programming language, visual studio 2015 IDE. From the requirement of the console system application of th...

Read More arrow

COIT20261 Network Routing And Switching 2

Download : 0 | Pages : 4

Answer: A 1: a)                           b)                   c)   Here /27 is the subnet mask, ie) 255.255.255.224   Binary Format of Given Address is,   154.78.177.3         --->10011010.01001110.10110001.000 00011   2...

Read More arrow

CI7130 Network And Information Security

Download : 0 | Pages : 13
  • Course Code: CI7130
  • University: Kingston University London
  • Country: United Kingdom

Answer: Introduction: The aim of this report is to address the issues and challenges being faced by the AO world plc organization considering the last IT installation and the operations involved within the activities of the organization. Since the organization is based on online services, it has become a considerable factor for addressing the vulnerabilities related to the challenges and issues in the security of the network. The organization...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,360,163

Orders

4.9/5

Overall Rating

5,081

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1592 Order Completed

96% Response Time

Jane Sima

Ph.D in Psychology with Specialization in Industrial-Organizational Psychology

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

610 Order Completed

100% Response Time

Cheryl Zhao

PhD in Statistics

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

good it was perfect clear answer just what i need for ode thank you so much!! clear and in steps

flag

User Id: 304633 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating

The current help needs to improve on his English writing. While the coach was helpful in providing the content, I had to rework the context of whole paper to make it readable for the level of output expected. But overall it was helpful since I don't ...

flag

User Id: 223122 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating

Work is perfectly written, though not graded yet but I’m being optimistic that a good grade will be awarded.

flag

User Id: 369420 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating

It was well written and I\'m 100% satisfied. The expert knew exactly what to do and finished well above my expectations.

flag

User Id: 332269 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?