Friday, January 29, 2010

ITC 358 Ass02 _Task01

Step 01

The Wireshark is one of the protocol analyzer(also called a Sniffer) which captures the packets to decode and analyze its co
Onntents. To download the following program we can browse the following website and download as required.



Step 06
To capture the network interface adapter following procedure as shown in figure helps out, to capture desired network interface we can just select and click on Start



Step 07
To generate some network traffic here I have used some command which is highlighted in the following 2 network traffic





Step 08

Due to security reason the bluehost.com doesn't allow to host the website for following task (kindly have a look on the following figure as type the site as given), so I'm proceeding as Step09





Step 09
Now I'm searching some username and password as Gerald and happy respectively as follows as I did in ITC358 assignment 01.



Step 14

The in search for Gerald as username and happy for password has been generated at the bottom of the screen as shown.



To prevent Wireshark to capture the datas, various filters can be used like capture filter, various firewall rules can be applied.So I found wireshark as a very flexible network protocol analyzer can be composed according to the user.

Retest01

This is the 1st test LINE

Thsi= is the 2nd test line

3rd post

4th post

Thursday, January 28, 2010

ITC 358 Ass02 _Task04

Nessus Vulnerability Scanner


Step 01
In order to download the program called Nessus following URL helps and can be done as shown in figure



Step 03
To register the software enter the detail as shown in figure



Step 05
To start the Nessus Derver configuration following displayed windows will be fruitful and the task can be operated as desired by the Admin.



Step 06

Nessus Client Software can be opearated for any host as shown in the figure.






Step 10

While Starting the Nessus Client Software for the host, the following message appears stated as shown in the figure below.


Step 13
To scan the Networks the IP range has to be provided , and has to be provided as shown in the figure below, which scans for the host in the network.



Step 15
Scanning the network is done as shown in the figure, which shows the host that are connected in the Network in the form of IP addresses.



Step 17
When the scan of the network is finished the detailed about protocols and services can be found in the left pane and and its details can be generated from the right pane as shown in the figure, while noting the Risk Factor of each item, the status shows as None  which means the system is under contorl and no vulenrable act has been in the particular protocol or  service of the particular host of the network.




The information that has been detailed by the following Nessus Vulnerability Scanner can be very useful to the anyone , where most of the details of the Network Activities are scanned and listed. By analysing all these information we can prevent the Network system from the Vulenerable attacks in order to run the Network system smoothly.