Network Security Footprinting And Enumeration Computer Science Essay

Categories: Network

LSASS stands for Local Security Authority Subsystem Service. In Microsoft Windows runing systems it is a procedure that is responsible for implementing the security policy on the system. The procedure lsass.exe serves as the Local Security Authentication Server by Microsoft, Inc. It is responsible for the enforcement of the security policy in the operating system. It checks whether a user 's designation is valid or non whenever he or she trying to entree the computing machine system. With the executing of the file lsass.

exe, the system acquires security by barricading the entree of unwanted users to any private information that have been saved. The file lsass.exe besides take the responsible in watchword alterations done by the user. The procedure lsass.exe chiefly operates in the system through its ability to make entree items. These items will encapsulate the file 's security form, which contains the necessary information to treat user hallmark such as informations on which user holds entree to the system and whether the entree is compulsory or discretional.

Get quality help now
Marrie pro writer
Marrie pro writer
checked Verified writer

Proficient in: Network

star star star star 5 (204)

“ She followed all my directions. It was really easy to contact her and respond very fast as well. ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

It is writes to the Windows Security Log. By the manner, physical expiration of lsass.exe will ensue in the Welcome screen losing its histories and motivating a restart of the machine.

Microsoft Windows LSASS is most likely to remotely exploitable buffer overrun exposure. The particular vulnerable system constituent is LSASRV.DLL. Successful attempt development of this issue may let a distant aggressor to put to death malicious codification on a vulnerable system and automatically ensuing in full system via media.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

A distant user can put to death arbitrary codification with SYSTEM privileges on the mark system. This issue largely be exploited by an distant user on Microsoft Windows 2000 and XP runing systems. The issue reportedly merely be exploited by local, attested users on Microsoft Windows Server 2003 and Microsoft Windows XP 64-Bit Edition 2003. Microsoft has stated that a local decision maker could work the issue on these platforms, though this does non look to present any extra security hazard as the decision maker will probably already hold complete control over the system. Buffer overflow exposure was reported in Microsoft Windows in the LSASS execution.

The affected map is a logging map in LSASRV.DLL that makes a vsprintf ( ) map call without formalizing the input. As a consequence, a long twine statement is sent to the logging map can trip the flood. Microsoft reports that there are some RPC maps that will accept a long twine as a parametric quantity and effort to compose the value to the debug log file. This defect may impact ports including port 135 ( Microsoft End Point Mapper besides known as DCE/RPCA Locator service, used to remotely pull off services includingA DHCP waiter, A DNSA waiter andA WINS. Besides used byA DCOM ) , 137 ( NetBIOSA NetBIOS Name Service ) , 138 ( NetBIOSA NetBIOS Datagram Service ) , 139 ( NetBIOSA NetBIOS Session Service ) , 445 ( Microsoft-DSA Active Directory, Windows portions ) , and 593 ( HTTP RPC Ep Map, A Remote process callA overA Hypertext Transfer Protocol, frequently used byA Distributed Component Object ModelA services andA Microsoft Exchange Server ) . Microsoft has assigned a 'Critical ' badness evaluation to Windows 2000 and XP and a 'Low ' badness evaluation to Windows Server 2003.

Chapter 2 - Footprinting & A ; Enumeration

Introduction

Footprinting is one of a hacker 's best friends. The procedure of footprinting is the first measure in information assemblage of hackers. To execute or queer a successful onslaught, one needs to garner information. The hacker 's purpose is to larn about all facets of the perspective organisation 's security position, profile of their Intranet, distant entree capablenesss, and intranet/extranet presence.

The systematic and methodical footprinting of an organisation enables aggressors to make a complete profile of an organisation 's security position. By utilizing a combination of tools and techniques coupled with a healthy dosage of forbearance, aggressors can take an unknown entity and cut down it to specific scope of sphere names, web blocks, and single IP references of systems straight connected to the cyberspace, every bit good as many other inside informations refering to its security position.

Enumeration is the procees that hacker performe after the footmark analysis and generated a map that approximates to their cognition of the mark web. Therefore, hacker are able gather as much informations as possible from the targeted system.

If the hackers are able to reach the host on certain ports such as TCP 139 or 445, so they will try to anonymously recite sensitive information from the system like user names, last logon day of the months, watchword alteration day of the months and so on

What is Footprinting

In computing machines, footprinting is the procedure of roll uping informations sing a specific web environment, normally for the intent of happening ways to irrupt into the environment. Footprinting can uncover system exposures and better the easiness with which they can be exploited.

Footprinting is the agencies by which hackers target an organisation and utilize a distant entree procedure to earn proprietary information relevant to organisation 's Internet and web processors. They besides entree the organisational profiles for the intent of mapping out the mark organisation 's security stance. Footprinting employs a `` who is '' questions technique which produces employee names, phone Numberss, and other information upon petition from the hacker.

Areas targeted by computing machine hackers are Domain Name Systems ( DNS ) and Internet protocols ( IP ) in order to pull out references, Firewalls designed to protect systems from external invasion ; and Quick stairss usually associated with corporate acquisitions and temperaments and subsequent broadcast medium of this acquisition information on the Internet, Intranets, and mass media. When companies get other companies or dispose of subordinates, several paperss are produced which become public information that are of mark involvement to interlopers. These paperss are normally created through legal procedures secondary to the acquisition procedure.

How Attacker utilizing Footprinting

Footprinting is the first measure that hacker choping to a web. The aggressor first identifies the assorted sphere names that he 's interested in working. He so performs a footprint analysis of the mark to garner every bit much information as possible through publically available beginnings. The footmark analysis gives the hacker an indicant of how big the mark might be, how many possible entry points exist, and what, if any, security mechanisms might be to queer the onslaught. During a footmark analysis, the hacker attempts to detect all potentially related information that may be utile during the onslaught. This information includes: -

Company names

Domain names

Business subordinates

Internet Protocol ( IP ) webs

Administrative Contacts

Problems revealed by decision makers

Hackers pay peculiar attending to possible entry points that might besiege the `` front door. '' For illustration, instead than trying to interrupt through a major corporation 's firewall, the aggressor identifies a startup company ( merely acquired by the major corporation ) and so efforts to leverage weak security in the smaller company that might supply unrestricted practical private web ( VPN ) entree to the larger mark.

Port scanners are used to find which hosts are alive on the Internet, which Transmission Control Protocol ( TCP ) and User Datagram Protocol ( UDP ) ports are listening on each system, and the operating system that is installed on each host. Traceroutes are performed to assist place the relationship of each host to every other and to place possible security mechanisms between the aggressor and the mark. Unfortunately, worlds are frequently the weakest security nexus in a corporation. A clever phone call to the proficient support section can frequently compromise critical information:

`` Hi-this is Bill and I forgot my watchword. Can you remind me what it is? ''

Attacker normally used this tool for footprinting: -

Nslookup Command line tool in Windows NT 4.0, Windows 2000, and Windows XP that can be used to execute DNS questions and zone transportations.

Tracert Command line tool used by hackers to make web maps of the mark 's web presence.

SamSpade. The SamSpade.org Web interface that performs Whois searchs, frontward and change by reversal DNS hunts, and traceroutes.

What is Enumeration

Enumeration is the procedure to place sphere names and associated webs. This procedure performed by hacker after footprinting procedure. The chief aim of the aggressor is to place valid user histories or groups where he can stay invisible one time he has compromised the system. The terminal consequence of executing numbering is the hacker has the information they need to assail your system.

Enumeration involves active connexions being made to the mark system, or subjecting it to directed questions made to a system. Normally, an qui vive and secure system will log such efforts. Often the information gathered is what the mark might hold made public - such as a DNS reference. However, it is possible that the aggressor stumbles upon a distant IPC portion such as the IPC $ in Windowss, that can be probed with a void session and portions and histories enumerated.

Concept On determining the security position of the mark, the aggressor can turn this information to this advantage by working some resource sharing protocol or compromising an history. The type of information enumerated by hackers can be slackly grouped into the undermentioned classs:

1. Network resources and portions

2. Users and Groups

3. Applications and Banners

How Attacker utilizing Enumeration

After the aggressor have learned adequate basic information about their mark, they will try to derive entree to the mark system by masquerading as authorised users. This means that they need a watchword for a user history that they have discovered through some stairss.

Therefore, two common ways to acquire that watchword by utilizing societal technology or by utilizing a beastly force onslaught.

The procedure of onslaught is executing assorted questions on the many whois databases on the Internet. So the hacker would merely question the registrar to obtain the information they are looking for. The hacker merely needs to cognize which registrar the company is listed with. There are five types of questions which are as follows:

Registrar Question: This question gives information on possible spheres fiting the mark.

Organizational Question: This is seeking a specific registrar to obtain all cases of the mark 's name. The consequences show many different spheres associatwith the company.

Sphere Question: A sphere question is based off of consequences found in an organisational question. ( company 's reference, sphere name, decision maker and his/her phone figure, and the system 's sphere waiters ) .

Network Question: The 4th method one could utilize the American Registry for Internet

Numbers is to detect certain blocks owned by a company. It 's good to utilize a wide hunt here, every bit good as in the registrar question.

POC Question: This question finds the many IP adresses a machine may hold

Enumeration normally used tools

Netcat ( listed under Network Utility Tools ) The hacker 's Swiss ground forces knife. Used for

streamer grabbing and port scanning, among other things.

Epdump/Rpcdump Tools to derive information about distant process call ( RPC )

services on a waiter.

Getmac ( Windows NT resource kit ) Windows NT bid to obtaining the media entree control ( MAC ) Ethernet bed reference and binding order for a computing machine running Windows NT 4.0, Windows 2000, or Windows XP.

DumpSec Security scrutinizing plan for Windows NT systems. It enumerates user and group inside informations from a chosen system. This is the audit and numbering tool of pick for Big Five hearers ( PricewaterhouseCoopers, Ernst & A ; Young, KPMG, Arthur Andersen, and Deloitte & A ; Touche ) and hackers likewise.

SDKs Many package development kits ( SDKs ) provide hackers with the basic tools that they need to larn more about systems.

Chapter 3 - Solution about Footprinting & A ; Enumeration

Based on our research, the solution that we found, maintain spots up to day of the month by put ining hebdomadal or day-to-day if possible. Buffer overflow and privilege escalation onslaughts can normally be prevented by maintaining spots up-to-date. Shut down unneeded services/ports. Review your installing demands by extinguishing unneeded services and applications.

After that, alteration default watchwords by taking strong watchwords that utilize uppercase/ lowercase/ numbers/special characters. Some database applications create a database decision maker history with no watchword. Control physical entree to systems. Protecting physical entree to computing machine systems is every bit of import as protecting computing machine entree and be certain employees lock down consoles when non in use-an unbarred desktop screen can immediately let a hacker entree to the web as a privileged user.

On the other manus, curtail unexpected input. Some Web pages allow users to come in usernames and watchwords. These Web pages can be used maliciously by leting the user to come in in more than merely a username. Perform backups and prove them on a regular footing and educate employees about the hazards of societal technology and develop schemes to formalize individualities over the phone, via e-mail, or in individual.

The most of import, encrypt and password-protect sensitive informations. Datas such as Web accessible electronic mail should be considered sensitive informations and should be encrypted, and implement security hardware and package. Firewalls and invasion sensing systems should be installed at all margins of the web. Viruss, Java, and ActiveX can potentially harm a system. Anti-virus package and content filtering should be utilized to minimise this menace.

Decision

As decision, all users should hold installed proper antivirus and firewall in their system or waiter. lsass.exe is a procedure which is registered as a Trojan can be removed in order to forestall from working your system or waiter. This procedure is a security hazard and should be in your system. All unwanted port besides can be block to do certain there is no manner for this job can be happened. Plus, Microsoft already spread their working spots to avoid all these fortunes. Merely download from trusted beginning and spot in your system.

As for footprinting, all company must aware of onslaught. They need to believe like a hacker to forestall their company information stolen or an onslaught to harm their system. Defending the web against onslaught requires changeless watchfulness and instruction. Although there is no formula for vouching the absolute security of your web.

Updated: Nov 01, 2022
Cite this page

Network Security Footprinting And Enumeration Computer Science Essay. (2020, Jun 02). Retrieved from https://studymoose.com/network-security-footprinting-and-enumeration-computer-science-new-essay

Network Security Footprinting And Enumeration Computer Science Essay essay
Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment