Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

Network Security

Network Inventory Management

Team Members

Tavva Madhusudhan Reddy 10091D0095 madhu.tavva@gmail.com


V. Bharat babu 10091D0009 bharath.vuppula@gmail.com
O. Sandeep Reddy 10091D0036 sandyhunky@gmail.com
M. Praveen Kumar 10091D0078 manneypraveen@gmail.com
Network Security

ACKNOWLEDGEMENT REPORT

The information provided in the document is gathered by the proper research and observation.
The mentioned details are verified by the following people.

Verified by: Rajesh

Designation: System/Network Administrator

Network Inventory Management Page 2


Network Security

Contents
Scope of network........................................................................................................................................4
Networking equipment:..............................................................................................................................4
Cables......................................................................................................................................................4
Switch......................................................................................................................................................4
Server......................................................................................................................................................4
Description of performance and capabilities...............................................................................................4
Bandwidth...............................................................................................................................................4
Capacity...................................................................................................................................................4
Network.......................................................................................................................................................4
Fiber Port Specifications..........................................................................................................................4
Features of Catalyst 2750........................................................................................................................5
Topology:.....................................................................................................................................................5
Nodes:.........................................................................................................................................................5
Plug Points:..................................................................................................................................................5
Lan Connectors:...........................................................................................................................................5
WiFi Access Points:......................................................................................................................................5
Desktops:.....................................................................................................................................................6
Servers:........................................................................................................................................................6
Printers:.......................................................................................................................................................6
Switches:.....................................................................................................................................................6
Scanners:.....................................................................................................................................................6
Routers:.......................................................................................................................................................6
Infrastructure:.............................................................................................................................................6
Computers based on OS:.............................................................................................................................6
Software:.....................................................................................................................................................7
MAC Addresses:...........................................................................................................................................7
NMAP:.........................................................................................................................................................9
NESSUS:.....................................................................................................................................................19
Vulnerability Scanner................................................................................................................................20

Network Inventory Management Page 3


Network Security

Ntop.......................................................................................................................................................20
Comparison Report...................................................................................................................................23
RATING......................................................................................................................................................23

Network Inventory Management Page 4


Network Security

Scope of network: (Area / Building): J4 Lab

Networking equipment:
Cables
• Optical Fiber for ISP

• CAT5

• Ethernet LAN

Switch
• CISCO

 Catalyst 2950(Second layer)


 Catalyst 3750(Third layer)
 D-LINK

Server
INTEL Processor (Xeon)

Description of performance and capabilities :


Bandwidth
• 4Mbps

Capacity
• 24 X 3 Ports (1 – lab)

Network
Internet Service Provider (ISP) – RailTel Corporation

Fiber Port Specifications

 Optical transmitter wavelength: 1300 nm

 Optical receiver sensibility: -33.5 to -11.8 decibel mill watt (dB)

 Optical transmitter power: -20 dB to -14 dB

Network Inventory Management Page 5


Network Security

Features of Catalyst 2750

 Ports: 24 x RJ-45 10/100Base-TX (LAN), 2 x RJ-45 Console (Management)

 Expansion Slots: 2 x GBIC

 Connectivity Media: Cable Twisted Pair

 Data Transfer Rate: 10Mbps Ethernet, 100Mbps Fast Ethernet, 1Gbps Gigabit Ethernet

 Performance: 13.6Gbps Switching Fabric, 8.8Gbps Forwarding Bandwidth

 MTBF: 479086 Hour(s)

 Memory: 8MB Buffer Memory, 8MB Flash Memory, 16MB SDRAM

 Address Table: 8K MAC Addresses

Topology:
The systems in the lab are connected with the star bus topology. The main server is situated in one room
and the connections from the server to the all other systems.

Nodes:
Node in the Lan network should consists of MAC address where as in the internet it should consists of
IP address. The no. of nodes in the lab is 37 that have MAC address or IP address.

Plug Points:
The 150 power plug points are present in J4 lab.

Lan Connectors:
The lan connectors are in total in the lab are 50. But the switch is present in the lab which consists of 10
connectors.

WiFi Access Points:


The one wifi access point is present in the lab which belongs to the cisco company.

Network Inventory Management Page 6


Network Security

Desktops:
The no. of desktops in the lab are two.

Servers:
There are no servers present in the lab.

Printers:
No printers are situated in the lab.

Switches:
One switch is located in the lab which consists of 10 connections.

Scanners:
No scanners are present in the lab.

Routers:
The total LAN is connected to the single router.

Infrastructure:

Equipment Type Own Rented Student Owned


Cat cables 
Lan connectors 
Chairs 
Laptops  (35)

Computers based on OS:


Windows XP Win Vista Windows 7 Ubantu Fedora Mac
Desktops 1 1
Laptops 3 1 30 25 5 0

Network Inventory Management Page 7


Network Security

Software:
Software Version
MS Office 2010 Beta
MS Office 2007 12.0.4518.1014
Edit plus 3
VLC Player 1.1.4
Internet Download Manager 5.19 Build 3
Net beans IDE 6.8
Google talk Beta
Skype 4.1.0.178
Mysql 5.0
Nero 7,8,10
Win Rar 3.12
Kaspersky workstations 8.0
Sound forge pro 10.0
Dev Cpp 4.9.9.2
Total video converter 3.1.2

MAC Addresses:

Device (Laptop/Desktop) Ip Address MAC Address Operating System System name


MS Office Anti virus (with version) Browsers

laptop 172.16.0.169 00-26-22-4F-C2-CF windows 7 prashanth 2007 AVG 11


"Chrome, Firefox, IE"

Acer Laptop 172.16.1.167 08-00-27-00-7C-A8 "windows 7, fedora" Kiran-Lappy 2007


kaspersky 2010 "Firefox, IE"

Acer 172.16.0.71 00-26-22-4F-C0-DB windows 7 Namo narayana 2007 Microsoft


Security Essentials Firefox

Laptop 172.16.0.213 00:26:22:4F:BF:CC "windows XP, fedora" Shra1 "2010, open


office(Linux)" avira "Chrome, Firefox, IE, Epic"

Acer Laptop 172.16.2.63 00-26-22-4F-C4-4F windows 7 VISWATEJ-PC 2010


Kaspersky Internet Security 2011 "Firefox, IE"

Laptop 172.16.6.6 00:26:22:4f:c1:63 "windows 7, ubuntu" bhuvan-pc "2007, open


office(Linux)" "Klam Av for ubuntu, avira for windows" "Chrome, Firefox, IE, Epic, Opera"

Laptop 172.16.3.77 00-26-22-4F-C1-57 "windows 7, ubuntu" MSIT-PC "2007, open


office(Linux)" "Firefox, IE"

Network Inventory Management Page 8


Network Security

Laptop 192.168.2.4 00-24-BE-76-E2-DF windows 7 SANDEEP 2007 Kaspersky


9.0.0.736 "Chrome, Firefox, IE"

Laptop 172.16.0.180 00-26-22-4F-BF-D9 windows XP abhiii 2007 Kaspersky Internet


security 2011 Epic

Laptop 172.16.7.255 00:26:22:4f:c4:a2 ubuntu Madhu-PC "2010, open office(Linux)"


kasperasky workstation 8.0 "Firefox, IE, Epic, Opera"

Acer Laptop 172.16.3.124 00-26-22-4F-C2-C8 "windows XP, fedora" Rocky "2007, open
office(Linux)" kaspersky2011 "Firefox, IE"

Laptop 172.16.5.107 00-26-22-4F-BF-D0 "windows XP, ubuntu" jntumsit "2007, open


office(Linux)" Kaspersky 6.0.3 "Firefox, IE, Opera"

LapTop 172.16.2.50 00:1d:72:c5:0a:8a ubuntu Suman 2007 Chrome

Laptop 172.16.4.148 00-26-22-4F-C0-26 windows 7 Praveen 2007 MIcrosoft


Securit Essentials "Chrome, Firefox, IE"

Laptop 172.16.1.69 00:26:22:4F:C4:1B windows 7 mahender 2007 MIcrosoft


Securit Essentials "Chrome, Firefox, IE"

Laptop 172.16.1.238 00:26:22:24:C0:A3 windows 7 Ritish 2010 MIcrosoft Securit


Essentials "Chrome, Firefox, IE"

Network Inventory Management Page 9


Network Security

NMAP:

Nmap is basically used for port scanning, OS detection, intense scan, depth scan, topology, host details
and more. The basic things we observed using this tool is we can find the ports that are in use, closed,
opened, filtered, unfiltered, opened|filtered, closed|filtered.

nmap -PN 172.16.4.11(No Ping)

nmap -PS 172.16.4.11

Network Inventory Management Page 10


Network Security

nmap -PA 172.16.4.11

nmap --traceroute (Trace path to host)

Network Inventory Management Page 11


Network Security

nmap -R (DNS resolution for all targets)

Intense scan, all TCP ports

nmap -p 1-65535 -T4 -A -v 172.16.3.110

Network Inventory Management Page 12


Network Security

Intense scan, no ping

nmap -T4 -A -v -Pn 172.16.3.110

Quick traceroute

nmap -sn --traceroute 172.16.3.110

Network Inventory Management Page 13


Network Security

Network Inventory Management Page 14


Network Security

nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 209.85.231.104

nmap -T4 -A -v -PN 209.85.231.104

Network Inventory Management Page 15


Network Security

nmap -p 1-65535 -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 209.85.231.104

nmap -sS -sU -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 209.85.231.104

Network Inventory Management Page 16


Network Security

nmap -sP -PE -PA21,23,80,3389 209.85.231.104

nmap -T4 -F 209.85.231.104

Network Inventory Management Page 17


Network Security

nmap -sV -T4 -O -F --version-light 209.85.231.104

nmap -sP -PE -PS22,25,80 -PA21,23,80,3389 -PU -PO --traceroute 209.85.231.104

Network Inventory Management Page 18


Network Security

nmap 209.85.231.104

nmap -sS -sU -T4 -A -v -PE -PP -PS21,22,23,25,80,113,31339 -PA80,113,443,10042 -PO --script all
209.85.231.104

Network Inventory Management Page 19


Network Security

NESSUS:
Nessus primary function is to provide security and functioning as vulnerability scanner.

Network administrators and security professionals use Nmap to map out their networks, as well as to
determine:

• Status of a host

• Preferences of expected host

• Presence of unexpected services

• Network services available on a host

Nessus is designed to scan systems to determine their vulnerabilities. Some vulnerability checks, if safe
mode is disabled, can crash a system! As such, administrators expose a system to the scans prior to
putting them in production.

Nessus can be applied in:

• Security audits

• Asset profiling

• Sensitive data discovery

• Vulnerability analysis

Nmap by itself won't tell you the existence of vulnerabilities on a system. Between the scanning results,
your knowledge of computer networking, and your knowledge of your network baseline, you may be
able to figure out what vulnerabilities exist, address these issues, and improve your security posture.

Nessus is really a different class of tool compared to Nmap. It is more of an enterprise scanner. Nessus
uses a web interface for its user interface, and it allows the Nessus administrator to create multiple
users. The one interesting thing about Nessus is the ability to create policies which are composed of
scanning specifications--to include what security plugins are to be used, the types of ports to scan, any
credentials that may be needed, and so on.

Network Inventory Management Page 20


Network Security

A scan can then be created using that policy. It is in scans where targets are specified. Through the user
interface, one can view scan results even as the scan is in progress. Reports are generated in various
formats. This complete approach to vulnerability scanning puts Nessus on a higher level than Nmap.

When we scanned the entire lab by using both the port scanner using Nmap and vulnerability scanner
using Nessus we observed the following details and we rated the networking how secure it is and how to
we solve the problems in the network.

Vulnerability Scanner
Ntop

Traffic analyser

Network Inventory Management Page 21


Network Security

Packet statistics

Protocol distribution
Network Inventory Management Page 22
Network Security

last contacted peers

Comparison Report

For the Client 172.16.3.110


Network Inventory Management Page 23
Network Security

While searching with Nmap we observed that

The user PRASANNA – PC was having windows 7 ultimate operating system and the opened ports are
135, 139, 445 and 3306. The user contains installed Mysql 5.0.18 using protocol 10. The user was
located in the local lan.

While scanning with Nessus we found the following

The user was having threats with high vulnerability with the number of 10, medium 5 and low 2. The
high vulnerabilities consists of Mysql problem, the medium problems are with services of xampp.

RATING

After observing all the scanning Reports in the network we come to an conclusion by looking its
available fixes and reducing vulnerability consequences we can rate the network of J4 with 7 out of 10.
The considerations for this rating are physical devices, equipments and its configurations, vulnerabilities
for the user systems its patches and the possible solutions for securing the network by preventing with
the available sources.

RATING FOR THE J4 LAB NETWORK: 7/10.

Network Inventory Management Page 24

You might also like