yulia_zoNe

Biarkan hamparan keindahan terpancar dalam hatimu lewat nada innerbeauty yang selalu kamu pancarkan................

Lab 8.4.2 Configuring Access Policies and DMZ Settings
Objectives
  • Log in to a multi-function device and view security settings.
  • Set up Internet access policies based on IP address and application.
  • Set up a DMZ for an open access server with a static IP address.
  • Set up port forwarding to limit port accessibility to only HTTP.
  • Use the Linksys WRT300N Help features.
Background / Preparation
This lab provides instructions for configuring security settings for the Linksys WRT300N. The Linksys provides a software-based firewall to protect internal, local-network clients from attack by external hosts. Connections from internal hosts to external destinations can be filtered based on the IP address, destination website, and application. The Linksys can also be configured to create a demilitarized zone (DMZ) to control access to a server from external hosts. This lab is done in teams of two, and two teams can work together to test each other’s access restrictions and DMZ functionality. It is divided into 2 parts:
  • Part 1 – Configuring access policies
  • Part 2 – Configuring DMZ settings
The following resources are required:
  • Linksys WRT300N or other multi-function device with the default configuration
  • User ID and password for the Linksys device if different than the default
  • Computer running Windows XP Professional to access the Linksys GUI
  • Internal PC to act as a server in the DMZ with HTTP and Telnet servers installed (preconfigured or Discovery Live CD server)
  • External server to represent the ISP and Internet (with preconfigured DHCP, HTTP, and Telnet servers running (real server with services installed or Discovery Live CD server)
  • Cabling to connect the PC hosts, Linksys WRT300N or multi-function device, and switches
Part 1 – Configuring access policies
Step 1: Build the network and configure the hosts
  1. Connect the host computers to switch ports on the multi-function device as shown in the topology diagram. Host-A is the console and is used to access the Linksys GUI. Host-B is initially a test machine but later becomes the DMZ server.
  2. Configure the IP settings for both hosts using Windows XP Network Connections and TCP/IP properties. Verify that Host-A is configured as a DHCP client. Assign a static IP address to Host-B in the 192.168.1.x range with a subnet mask of 255.255.255.0. The default gateway should be the internal local network address of the Linksys device.
NOTE: If Host-B is already a DHCP client, you can reserve its current address and make it static using the DHCP Reservation feature on the Linksys Basic Setup screen.
  1. Use the ipconfig command to display the IP address, subnet mask, and default gateway for Host-A and Host-B and record them in the table. Obtain the IP address and subnet mask of the external server from the instructor and record it in the table
Host IP Address Subnet Mask Default Gateway
Host A 192.168.10.2 255.255.255.0 192.168.10.1
Host-B/DMZ Server 192.168.30.11 255.255.255.0 192.168.30.1
External Server 192.168.20.2 255.255.255.0 192.168.20.1
Step 2: Log in to the user interface
  1. To access the Linksys or multi-function device web-based GUI, open a browser and enter the default internal IP address for the device, normally 192.168.1.1.
  2. Log in using the default user ID and password, or check with the instructor if they are different.
  3. The multi-function device should be configured to obtain an IP address from the external DHCP server. The default screen after logging in to the multi-function device is Setup > Basic Setup. What is the Internet connection type?
Jawab:
Tipe internet connectionnya adalah wireless internet connection.
  1. What is the default router (internal) IP address and subnet mask for the multi-function device?
Jawab:
Default router : 192.168.1.1
Subnet mask   : 255.255.255.0
  1. Verify that the multi-function device has received an external IP address from the DHCP server by clicking the Status > Router tab.
  2. What is the external IP address and subnet mask assigned to the multi-function device?
Jawab:
IP address External : 192.168.3.1
Subnet mask         : 255.255.255.0
Step 3: View multi-function device firewall settings
  1. The Linksys WRT300N provides a basic firewall that uses Network Address Translation (NAT). In addition, it provides additional firewall functionality using Stateful Packet Inspection (SPI) to detect and block unsolicited traffic from the Internet.
  2. From the main screen, click the Security tab to view the Firewall and Internet Filter status. What is the status of SPI Firewall protection?
Jawab:
Statusnya adalah enabled.
  1. Which Internet Filter checkboxes are selected?
Jawab:
Internet filter yang dipilih adalah filter anonymous internet request
  1. Click Help to learn more about these settings. What benefits does filtering IDENT provide?
Jawab:
Keuntungannya adalah mencegah serangan (attack) terhadap router melalui internet.
Step 4: Set up Internet access restrictions based on IP address
In Lab 7.3.5, you saw that wireless security features can be used to control which wireless client computers can access the multi-function device, based on their MAC address. This prevents unauthorized external computers from connecting to the wireless access point (AP) and gaining access to the internal local network and the Internet.
The multi-function device can also control which internal users can get out to the Internet from the local network. You can create an Internet access policy to deny or allow specific internal computers access to the Internet based on the IP address, MAC address, and other criteria.
  1. From the main multi-function device screen, click the Access Restrictions tab to define Access Policy 1.
  2. Enter Block-IP as the policy name. Select Enabled to enable the policy, and then select Deny to prevent Internet access from a specified IP address.
  3. Click the Edit List button and enter the IP address of Host-B. Click Save Settings and then Close. Click Save Settings to save Internet Access Policy 1 – Block IP.
  4. Test the policy by attempting to access the external web server from Host-B. Open a browser and enter the IP address of the external server in the address area. Are you able to access the server?
Jawab:
Ya, akses servernay diaktifkan.
  1. Change the status of the Block-IP Policy to Disabled and click Save Settings. Are you able to access the server now?
Jawab:
Tidak bisa karena dalam keadaan disable.
  1. What other ways can access policies be used to block Internet access?
Jawab:
Cara lainnya adalah dengan menggunakan proxy.
Step 5: Set up an Internet access policy based on an application
You can create an Internet access policy to block specific computers from using certain Internet applications or protocols on the Internet.
  1. From the main Linksys GUI screen, click the Access Restrictions tab to define an Internet Access Policy.
  2. Enter Block-Telnet as the policy name. Select Enabled to enable the policy, and then click Allow to permit Internet access from a specified IP address as long as it is not one of the applications that is blocked.
  3. Click the Edit List button and enter the IP address of Host-B. Click Save Settings and then Close. What other Internet applications and protocols can be blocked?
Jawab:
  1. Select the Telnet application from the list of applications that can be blocked and then click the double right arrow to add it to the Blocked List. Click Save Settings.
  2. Test the policy by opening a command prompt using Start > All Programs > Accessories > Command Prompt.
  3. Ping the IP address of the external server from Host-B using the ping command. Are you able to ping the server?
Jawab:
Ya, saya akses ping ke server.
  1. Telnet to the IP address of the external server from Host-B using the command telnet A.B.C.D (where A.B.C.D is the IP address of the server).
  2. Are you able to telnet to the server?
NOTE: If you are not going to perform lab Part 2 at this time and others will be using the equipment after you, skip to Step 3 of Part 2 and restore the multi-function device to its default settings.
Part 2 – Configuring a DMZ on the multi-function device
Step 1: Set up a simple DMZ
It is sometimes necessary to allow access to a computer from the Internet while still protecting other internal local network computers. To accomplish this, you can set up a demilitarized zone (DMZ) that allows open access to any ports and services running on the specified server. Any requests made for services to the outside address of the multi-function device will be redirected to the server specified.
  1. Host-B will act as the DMZ server and should be running HTTP and Telnet servers. Verify the Host-B has a static IP address or, if Host-B is a DHCP client, you can reserve its current address and make it static using the DHCP Reservation feature on the Linksys device Basic Setup screen.
  2. From the main Linksys GUI screen, click the Applications & Gaming tab then click DMZ.
  3. Click Help to learn more about the DMZ. For what other reasons might you want to set up a host in the DMZ?
Jawab:
Karena DMZ berguna untuk menambahkan lapisan keamanan untuk LAN.
  1. The DMZ feature is disabled by default. Select Enabled to enable the DMZ. Leave the Source IP Address selected as Any IP Address, and enter the IP address of Host-B in the Destination IP address. Click Save Settings and click Continue when prompted.
    1. Test basic access to the DMZ server by pinging from the external server to the outside address of the multi-function device. Use the ping –a command to verify that it is actually the DMZ server responding and not the multi-function device. Are you able to ping the DMZ server?
Jawab:
Ya, saya aktif ping DMZ Server.
  1. Test HTTP access to the DMZ server by opening a browser on the external server and pointing to the external IP address of the multi-function device. Try the same thing from a browser on Host-A to Host-B using the internal addresses. Are you able to access the web page?
Jawab:
Ya, able access web page.
  1. Test Telnet access by opening a command prompt as described in Step 5. Telnet to the outside IP address of the multi-function device using the command telnet A.B.C.D (where A.B.C.D is the outside address of the multi-function device).
Are you able to telnet to the server?
Jawab:
Tidak, tidak akses ke telnet server.
Step 2: Set up a host with single port forwarding
The basic DMZ hosting set up in Step 6 allows open access to all ports and services running on the server, such as HTTP, FTP, and Telnet,. If a host is to be used for a particular function, such as FTP or web services, access should be limited to the type of services provided. Single port forwarding can accomplish this and is more secure than the basic DMZ, because it only opens the ports needed. Before completing this step, disable the DMZ settings for step 1.
Host-B is the server to which ports are forwarded, but access is limited to only HTTP (web) protocol.
  1. From the main screen, click the Applications & Gaming tab, and then click Single Port Forwarding to specify applications and port numbers.
  2. Click the pull-down menu for the first entry under Application Name and select HTTP. This is the web server protocol port 80.
  3. In the first To IP Address field, enter the IP address of Host-B and select Enabled. Click Save Settings.
  4. Test HTTP access to the DMZ host by opening a browser the external server and pointing to the outside address of the multi-function device. Try the same thing from a browser on Host-A to Host-B. Are you able to access the web page?
Jawab:
Ya, pengaksesan ke web page.
  1. Test Telnet access by opening a command prompt as described in Step 5. Attempt to telnet to the outside IP address of the multi-function device using the command telnet A.B.C.D (where A.B.C.D is the outside IP address of the multi-function device).
Are you able to telnet to the server?
Tidak ada pengaksesan ke telnet server.
Step 3: Restore the multi-function device to its default settings
  1. To restore the Linksys to its factory default settings, click the Administration > Factory Defaults tab.
  2. Click the Restore Factory Defaults button. Any entries or changes to settings will be lost.
NOTE: The current settings can be saved and restored at a later time using the Administration > Management tab and the Backup Configuration and Restore Configuration buttons.
Lab 8.4.3 Performing a Vulnerability Analysis
CAUTION: This lab may violate legal and organizational security policies. The security analyzer downloaded in this lab should only be used for instructional purposes in a lab environment. Before using a security analyzer on a live network, check with your instructor and network administration staff regarding internal policies concerning the use of these tools.
Objectives
  • Download and install security analyzer software.
  • Test a host to determine potential security vulnerabilities.
Background / Preparation
Security analyzers are valuable tools used by network administrators and auditors to identify network and host vulnerabilities. There are many vulnerability analysis tools, also known as security scanners, available to test host and network security. In this lab, you will download and install the Microsoft Baseline Security Analyzer (MBSA). MBSA is designed to identify potential security issues related specifically to Microsoft operating systems, updates, and applications. It also identifies unnecessary services that may be running, as well as any open ports.
MBSA runs on Windows Server and Windows XP systems and scans for common security misconfigurations and missing security updates for the operating system as well as most versions of Internet Information Server (IIS), SQL Server, Internet Explorer (IE), and Office products. MBSA offers specific recommendations to correct potential problems.
This lab can be done individually or in teams of two.
The following resources are required:
  • Computer running Windows XP Professional to act as the test station.
  • High-speed Internet connection for downloading MBSA (unless pre-installed).
  • Computer must be attached to the integrated router switch or a standalone hub or switch.
  • Optionally, you can have a server running a combination of DHCP, HTTP, FTP, and Telnet (preconfigured).
Step 1: Download and install MBSA
  1. Open a browser and go to the MBSA web page at:   http://www.microsoft.com/technet/security/tools/mbsa2/default.mspx
  2. What is the latest version of MBSA available?
Jawab:
MBSA versi 2.2
  1. What are some of the features MBSA provides?
Jawab:
-Command-line and Graphical User Interface (GUI) options
- Scan local computer, remote computer, or groups of computer
- Scan against Microsoft’s maintained list of updates (on Microsoft.com) or local server running Software Update Services 1.0
- Scan for common security configuration vulnerabilitie
- Scan for missing security updates
- View reports in MBSA Graphical User Interface or Command Line Interface
- Compatibility with SMS 2.0 and 2003 Software Update Services Feature Pack
- Support for single processor and multiprocessor configurations
- Localized to English, French, German, and Japanese although MBSA 1.2.1 can scan a machine of any local
  1. Scroll down the page and select the desired language to begin the download process.
  2. Click Continue to validate the copy of Microsoft Windows you are running.
  3. Click Download Files below and select the file you want to download. (The English setup file is MBSASetup-EN.msi). Click the Download button on the right of this file. How many megabytes is the file to download?
Jawab:
1.7 MB besarnya file yang akan di download.
  1. When the File Download – Security Warning dialog box displays, click Save and download the file to a specified folder or the desktop. You can also run it from the download website.
  2. Once the download is complete, make sure all other applications are closed. Double-click the downloaded file. Click Run to start the Setup program, and then click Run if you are prompted with a Security Warning. Click Next on the MBSA Setup screen.
  3. Select the radio button to accept the license agreement and click Next. Accept the defaults as the install progresses, and then click Finish. Click OK on the final MBSA Setup screen, and close the folder to return to the Windows desktop.
Step 2: Build the network and configure the hosts
  1. Connect the host computer(s) to the integrated router, a hub, or a switch as shown in the topology diagram. Host-A is the test station where MBSA will be installed. The server is optional.
  2. Set the IP configuration for the host(s) using Windows XP Network Connections and TCP/IP properties. If the host is connected to the integrated router, configure it as a DHCP client; otherwise go to Step 1d.
  3. If the host is connected to a hub or switch and a DHCP server is not available, configure it manually by assigning a static IP address.
Which IP address and subnet mask does Host-A and the server (optional) have?
Jawab:
IP Address : 192.168.1.1
Subnet mask : 255.255.255.0
Step 3: Run MBSA on a host
  1. Double-click the desktop icon for MBSA or run it from Start > All Programs.  When the main screen displays, which options are available?
Jawab:
- Welcome
- Pick a computer to scan
- Pick multiple computer to scan
- Pick a security report to view
- Help
- About
- Microsoft Security Web Site
Step 4: Select a computer to scan
  1. On the left side of the screen, click Pick a computer to scan. The computer shown as the default is the one on which MBSA is installed.
  2. What are the two ways to specify a computer to be scanned?
Jawab:
Caranya adalah :
- Scan using assign Update Services servers only
- Scan using Microsoft Update only
  1. Accept the default computer to be scanned. De-select Check for IIS and SQL administrative vulnerabilities, since these services are not likely to be installed on the computer being scanned. Click Start Scan.
Step 5: View security update scan results
  1. View the security report. What are the results of the security update scan
Jawab:
Tidak ada file hasil scannya.
  1. If there are any red or yellow Xs, click How to correct this. Which solution is recommended?
Jawab:
Tidak ada terdapat red atau yellow X5.
Step 6: View Windows scan results in the security report
  1. Scroll down to view the second section of the report that shows Windows Scan Results. Were there any administrative vulnerabilities identified?
Jawab:
Local Account Password Test, Automatic Update, Guest Account, File system.
  1. On the Additional System Information section of the screen (below), in the Issue column for Services, click What was scanned, and click Result details under the Result column to get a description of the check that was run. What did you find? When finished, close both popup windows to return to the security report.
Jawab:
Step 7: View Desktop Application Scan Results in the Security report
  1. Scroll down to view the last section of the report that shows Desktop Applications Scan Results. Were there any administrative vulnerabilities identified?
Jawab:
Macro security
  1. How many Microsoft Office products are installed?
Jawab:
Produk Microsoft office yang diinstall adalah 4 buah produk.
  1. Were there any security issues with Macro Security for any of them?
Jawab:
Tidak ada security untuk yang lainnya.
Step 8: Scan a server, if available
  1. If a server with various services is available, click Pick a computer to scan from the main MBSA screen and enter the IP address of the server, and then click Start Scan. Which security vulnerabilities were identified?
Jawab:
  1. Were there any potentially unnecessary services installed? Which port numbers were they on?
Jawab:
Step 9: Uninstall MBSA using Control Panel Add/Remove Programs
  1. This step is optional, depending on whether the host will be automatically restored later by a network process.
  2. To uninstall MBSA, click Start > Control Panel > Add/Remove Programs. Locate the MBSA application and uninstall it. It should be listed as Microsoft Baseline Security Analyzer 2.0.1. Click Remove, and then click Yes to confirm removal of the MBSA application. When finished, close all windows to return to the desktop.
Step 10: Reflection
  1. The MBSA tool is designed to identify vulnerabilities for Windows-based computers. Search the Internet for other tools that might exist. List some of the tools discovered.
Jawab:
Toolsnya adalah:
- Client versions of Windows, including Windows
- Windows Server, including Windows Server 2008
- SQL Server
- Internet Information Server (IIS)
- Internet Explorer
- Microsoft Office
  1. Which tools might there be for non-Windows computers? Search the Internet for other tools that might exist and list some of them here.
Jawab:
Toolnya adalah SQL Server
  1. Which other steps could you take to help secure a computer against Internet attacks?
Jawab:
Step tentang Internet attacks terdapat pada step 8

Lab 9.3.3 Troubleshooting Physical Connectivity

Conclution of this lab activity are:
-  If the wireless client is unable to connect to the AP, it may be because of wireless connectivity problems.
What factors can affect your ability to connect hosts using RF?
a. Not all wireless standards are compatible. The 802.11a (5 GHz band) is not compatible with the
802.11b/g/n standards (2.4 GHz band). Within the 2.4 GHz band, each standard uses different
technology. Unless specifically configured, equipment that conforms to one standard may not function
with that conforming to another.
b. Each wireless conversation must occur on a separate, non-overlapping channel. Some AP devices can
be configured to select the least congested or highest throughput channel. Although automatic settings
work, manual setting of the AP channel provides greater control and may be necessary in some
environments.
c. The strength of an RF signal decreases with distance. If the signal strength is too low, devices will be
unable to reliably associate and move data. The signal may be dropped. The NIC client utility can be
used to display the signal strength and connection quality.
d. RF signals are susceptible to interference from outside sources, including other devices functioning on
the same frequency. A site survey should be used to detect for this.
e. APs share the available bandwidth between devices. As more devices associate with the AP, the
bandwidth for each individual device will decrease causing network performance problems. The solution
is to reduce the number of wireless clients using each channel.
- Modern WLANs incorporate various technologies to help secure the data on the WLAN: incorrect
configuration of any of these can prevent communication. List three.
a. the SSID
b. authentication
c. encryption.

kesimpulan dari lab ini adalah:
- Jika wireless client tidak dapat terhubung ke AP, itu mungkin karena masalah konektivitas nirkabel.Faktor-faktor apa yang dapat mempengaruhi kemampuan Anda untuk terhubung host menggunakan RF?a. Tidak semua standar nirkabel yang kompatibel. The 802.11a (5 GHz) tidak kompatibel dengan
802.11b/g/n standar (2,4 GHz). Dalam pita 2,4 GHz, menggunakan setiap standar yang berbeda
teknologi. Kecuali khusus dikonfigurasi, peralatan yang sesuai dengan satu standar tidak dapat berfungsi
dengan yang sesuai dengan yang lain.
b. Setiap percakapan nirkabel harus terjadi pada saluran yang terpisah, tidak tumpang tindih. Beberapa AP perangkat dapat dikonfigurasi untuk memilih paling padat atau saluran throughput tertinggi. Meskipun pengaturan otomatis kerja, petunjuk pengaturan saluran AP memberikan kontrol yang lebih besar dan mungkin diperlukan dalam beberapa lingkungan.
c. Kekuatan sinyal RF menurun dengan jarak. Jika kekuatan sinyal terlalu rendah, perangkat akan
tidak dapat data andal asosiasi dan bergerak. Sinyal dapat dihapus. Utilitas klien NIC dapat
digunakan untuk menampilkan kekuatan sinyal dan kualitas koneksi.
d. Sinyal RF rentan terhadap gangguan dari sumber luar, termasuk perangkat lain yang berfungsi pada
frekuensi yang sama. Sebuah survei situs harus digunakan untuk mendeteksi untuk ini.
e. AP berbagi bandwidth yang tersedia antar perangkat. Sebagai perangkat lebih diasosiasikan dengan AP,
bandwidth untuk setiap perangkat individu akan menurun menyebabkan masalah kinerja jaringan. Solusinya
adalah untuk mengurangi jumlah klien nirkabel menggunakan setiap saluran.
- Modern WLAN menggabungkan berbagai teknologi untuk membantu mengamankan data pada WLAN: salah konfigurasi salah satu dapat mencegah komunikasi. Daftar tiga.a. SSID
b. otentikasi
c.
enkripsi.

conclution of this Lab are:
 
-  What type of troubleshooting technique is your best option when troubleshooting wireless networks, wired networks and networks that use both?
A divide-and -conquer technique 

- What do inactive LEDs potently indicate?
a. device failure
b. port failure
c. cabling issues. 

- You are troubleshooting a Linksys ISR. What do the following LED lights indicate?
Solid Green –
Solid green indicates that a device is plugged into the port but no traffic is flowing.
Flashing Green –
Flashing green indicates the device is plugged in and receiving traffic.
Amber –
Amber indicates the device is making adjustments to the way the port is operating.
No Light –
No light indicates that nothing is plugged into the port, or there is an issue with the wired or wireless connection. 

- There are several issues to watch for in cabling. List and explain each.
a. Be sure to use the correct type of cable. Two types of TP cables are commonly encountered in networking: Straight-through cables and Cross-over cables. Using the wrong type of cable may prevent connectivity.
b. Improper cable termination is one of the main problems encountered in networks. To avoid this,cables should be terminated according to standards. Terminate cables via 568A or 568B termination standard Avoid untwisting too much cable during termination Crimp connectors on the cable jacket to provide strain relief
c. Maximum cable run lengths exist based on characteristics of the different cables. Exceeding these run lengths can have a serious negative impact on network performance.
d. If connectivity is a problem, verify that the correct ports are being used between the networking devices.
e. Protect cables and connectors from physical damage. Support cables to prevent strain on connectors  and run cable through areas that will not be in the way.



  Kesimpulan dari lab actifity ini adalah:
- Apa jenis teknik pemecahan masalah merupakan pilihan terbaik anda ketika troubleshooting jaringan nirkabel, kabel jaringan dan jaringan yang menggunakan keduanya?membagi-dan-menaklukkan teknik- Apa yang tidak aktif potently LED menunjukkan?a. kegagalan perangkatb. port kegagalanc. kabel isu.- Anda adalah sebuah masalah ISR Linksys. Apa lampu LED berikut menunjukkan?Solid Green -Solid hijau menunjukkan bahwa perangkat dicolokkan ke port tapi lalu lintas tidak mengalir.Hijau berkedip -Berkedip hijau menandakan perangkat tersambung dan menerima lalu lintas.Amber -Amber menunjukkan perangkat ini membuat penyesuaian dengan cara port operasi.Light Tidak -Tidak ada cahaya menunjukkan bahwa tidak ada yang terhubung ke pelabuhan, atau ada masalah dengan kabel atau nirkabel koneksi.- Ada beberapa isu untuk menonton dalam kabel. Daftar dan jelaskan masing-masing.
a. Pastikan untuk menggunakan jenis kabel yang benar. Dua jenis kabel TP yang biasa ditemui dijaringan: Straight-melalui kabel dan Cross-over kabel. Menggunakan jenis kabel yang salah dapat mencegah konektivitas.b. terminasi kabel yang tidak benar adalah salah satu masalah utama yang dihadapi dalam jaringan. Untuk menghindari hal ini, kabel harus diakhiri sesuai dengan standar.Hentikan kabel melalui standar pengakhiran 568A atau 568B Hindari terlalu banyak menguraikan kabel selama pemutusan Crimp konektor di jaket kabel untuk menyediakan bantuan strainc. Maksimum panjang kabel menjalankan ada berdasarkan karakteristik kabel yang berbeda. Lebih menjalankan ini panjang dapat memiliki dampak negatif serius pada kinerja jaringan.d. Jika konektivitas masalah, pastikan bahwa port yang benar yang sedang digunakan antara networking perangkat.e. Melindungi kabel dan konektor dari kerusakan fisik. kabel Dukungan untuk mencegah ketegangan pada konektor dan jalankan kabel melalui daerah yang tidak akan di jalan.

Lab 1.2.3 Mapping ISP Connectivity Using Traceroute
Objectives
•Run the Windows tracert utility from a local host computer to a website on a different continent.
• Interpret the traceroute output to determine which ISPs the packets passed through on their way from the local host to the destination website.
• Draw a diagram of the traceroute path, showing the routers and ISP clouds passed through from the local host to the destination website, including IP addresses for each device.
Background / Preparation
In this activity, you will use the Windows tracert utility to map Internet connectivity between your local ISP and the other ISPs that it uses to provide global Internet access. You will also map connectivity to the following major Regional Internet Registries (RIRs). However, your instructor may choose different destination websites. 
•  AfriNIC (African Network Information Centre) – Africa Region
•  APNIC (Asia Pacific Network Information Centre) – Asia/Pacific Region
•  ARIN (American Registry for Internet Numbers) – North America Region
•  LACNIC (Regional Latin-American and Caribbean IP Address Registry) – Latin America and some Caribbean Islands
•  RIPE NCC (Réseaux IP Européens) – Europe, the Middle East, and Central Asia
This activity can be done individually, in pairs, or in teams. It can be done as an in-class activity or as a homework assignment, depending on whether the classroom computers have access to the Internet.  The following resources are required:
•  Host computer with the Windows operating system
•  Access to the command prompt
• Internet connection
•  Routes Traced worksheet for each destination URL. The worksheet is attached to this lab. Each student completes their own worksheets and gives them to the instructor.
•  Global Connectivity Map, which is attached at the end of this lab
•  Access to the PC command prompt
Step 1: Run the tracert utility from a host computer
a. Verify that the host computer has a connection to the Internet.
b. Open a Command Prompt window by clicking Start > Run and typing cmd. Alternatively, you may click Start > All programs > Accessories > Command Prompt.
c.  At the prompt, type tracert and your first destination website. The output should look similar to the following:
d. Save the tracert output in a text file as follows:
1)  Right-click the title bar of the Command Prompt window and choose Edit > Select All.
2)  Right-click the title bar of the Command Prompt window again and choose Edit > Copy.
3) Open the Windows Notepad program: Start > All Programs > Accessories > Notepad.
4)  To paste the output into Notepad, choose Edit > Paste.
5) Choose File > Save As and save the Notepad file to your desktop as tracert1.txt.
e. Run tracert for each destination website and save the output in sequentially numbered files.
f. Run tracert from a different computer network, for example, from the public library or from a friend’s computer that accesses the Internet using a different ISP (for instance, cable instead of DSL). Save a copy of that output in Notepad and print it out for later reference.
Step 2: Interpret tracert outputs to determine ISP connectivity
Routes traced may go through many hops and a number of different ISPs depending on the size of your ISP and the location of the source and destination hosts. In the example output shown below, the tracert packets travel from the source PC to the local router default gateway to the ISPs Point of Presence (POP) router and then to an Internet Exchange Point (IXP). From there they pass through two Tier 2 ISP routers and then though several Tier 1 ISP routers as they move across the Internet backbone. When they leave the Tier 1 ISPs backbone, they move through another Tier 2 ISP on the way to the destination server at
www.ripe.net.
a.  Open the first traceroute output file and answer the following questions.
1)  What is the IP address of your local POP router?
Jawab:
Ip address dari local POP Router adalah 192.168.190.5
2)  How many hops did the traceroute packet take on its journey from the host computer to the
destination?
Jawab:
Pengambilan paket data selama proses pada tracert ada sebanyak 16 kali
3)  How many different ISPs did the traceroute packet pass through on its journey from the host
computer to the destination?
Jawab:
Jumlah tracert melewati isp yang berbeda untuk sampai ketujuan ada sebanyak 5 kali adapun alamat alamat tujuan

  1. if-1-0-0-1980.mcore3.laa-losangeles.as6453.net [66.110.59.18]
  2. ix-10-0-0-0.tcore1.lvw-losangeles.as6453.net [216.6.84.49]
  3. if-10-0.core3.nto-newyork.as6453.net [216.6.57.66]
  4. if-7-0-0.core2.ad1-amsterdam.as6453.net [80.231.81.45]
  5. if-4-0.mcore3.njy-newark.as6453.net [216.6.84.2]
4)  List the IP addresses and URLs of all the devices in the traceroute output in the order that they appear on the Routes Traced worksheet.
5)  In the Network Owner column of the worksheet, identify which ISP owns each router. If the router belongs to your LAN, write “LAN”. The last two parts of the URL indicates the ISP name. For example, a router that has “sprint.net” in its URL belongs to the network of an ISP called Sprint.
6)  Did the traceroute pass through an unidentified router between two ISPs? This might be an IXP. Run the whois command utility or whois function of a visual traceroute program to identify ownership of that router. Alternatively, go to http://www.arin.net/whois to determine to whom the IP is assigned.
b.  Complete the worksheet using the traceroute output file for each of the other destination URLs.
c.  Compare your results from the different traceroute output files. Did your ISP connect to different ISPs to reach different destinations?
Jawab:
Ya, pada kasus melakukan tracert ke http://whois.arin.net/ui isp nya masing masing protocol yang berbeda salaing terkoneksi untuk mencapai tujuan yaitu hit-nxdomain.opends.com [67.215.65.132]
Dan adapun ISP yang berbeda untuk saling terkoneksi adalah
  1. xe-1-0-0.r21.newthk02.hk.bb.gin.ntt.net [129.250.3.206]
  2. p64-4-1-1.r21.tokyjp01.jp.bb.gin.ntt.net [129.250.3.1]
  3. as-0.r21.Isanca03.us.bb.gin.ntt.net [192.250.6.4]
d.  If you ran a traceroute from a different computer network, check the output for that traceroute file as well. Was the number of hops different to reach the same destination from different local ISPs? Which ISP was able to reach the destination in fewer hops?
Jawab:
Jumlah HOP untuk mencapai destination pada sebuah alamat tracert yang dituju akan tetap sama. Meskipun telah dilakukan beberapa kali test tracert akan memunculkan jumlah list hop yang sama. Maka ISP yang membutuhkan sedikit hop untuk mencapai tujuannya adalah ISP B (cable service provider)
Step 3: Map the connectivity of your ISP
a.  For each traceroute output, draw a diagram on a separate sheet of paper showing how your local ISP interconnects with other ISPs to reach the destination URL, as follows:
1)  Show all of the devices in sequence from the LAN router to the destination website server. Label all of the devices with their IP addresses.
2)  Draw a box around the local POP router that you identified, and label the box “POP”.
3)  Draw an ISP cloud around all the routers that belong to each ISP, and label the cloud with the ISP name.
4)  Draw a box around any IXP routers that you identified, and label the box “IXP”.
b.  Use the Global Connectivity Map to create a combined drawing showing only ISP clouds and IXP boxes.
Worksheet for Routes Traced
Destination URL: www.ripe.net [193.0.6.139]          Total Number of Hops: 16
Router IP Address Router URL  (if any) Network Owner  (LAN, Name of ISP or IXP)
192.168.190.5
ns4.unp.ac.id
192.168.37.9 58.26.87.109 tm.net.my
66.110.59.18
losangeles.as6453.net
216.6.84.49
losangeles.as6453.net
216.6.84.2
njy-newark.as6453.net
216.6.57.66
nto-newyork.as6453.net
80.231.81.45
ad1-amsterdam.as6453.net
80.231.81.18
ad1-amsterdam.as6453.net
195.219.150.70
ad1-amsterdam.as6453.net
195.69.144.68
gw.amsix.nikrtr.ripe.net
193.0.6.139
www.ripe.net


PERHATIAN: Laboratorium ini mungkin melanggar kebijakan keamanan hukum dan organisasi. Alat analisis keamanan download di lab ini hanya boleh digunakan untuk tujuan pembelajaran dalam lingkungan laboratorium. Sebelum menggunakan alat analisa keamanan pada jaringan hidup, periksa dengan instruktur Anda dan jaringan tenaga administrasi yang terkait dengan kebijakan internal mengenai penggunaan alat tersebut.
Tujuan
• Men-download dan menginstal perangkat lunak keamanan analyzer.
• Uji tuan rumah untuk menentukan kerentanan keamanan potensial.
Latar Belakang / Persiapan
analisis Keamanan adalah alat berharga digunakan oleh administrator jaringan dan auditor untuk mengidentifikasi kerentanan jaringan dan host. Ada banyak alat analisis kerentanan, juga dikenal sebagai scanner keamanan, tersedia untuk menguji keamanan host dan jaringan. Pada lab ini, Anda akan mendownload dan menginstal Microsoft Baseline Security Analyzer (MBSA). MBSA dirancang untuk mengidentifikasi isu-isu keamanan potensial terkait khusus dengan sistem operasi Microsoft, update, dan aplikasi. Hal ini juga mengidentifikasi layanan yang tidak perlu yang dapat berjalan, begitu juga dengan port terbuka.
MBSA berjalan pada Windows Server dan Windows XP sistem dan scan untuk misconfigurations keamanan bersama dan update keamanan yang tidak tersedia untuk sistem operasi serta sebagian besar versi Internet Information Server (IIS), SQL Server, Internet Explorer (IE), dan produk Office. MBSA menawarkan rekomendasi khusus untuk memperbaiki masalah potensial.
Laboratorium ini dapat dilakukan secara individu atau dalam tim dua.
Sumber berikut diperlukan:
• Komputer menjalankan Windows XP Professional untuk bertindak sebagai stasiun uji.
• Internet kecepatan tinggi koneksi untuk men-download MBSA (kecuali pra-instal).
• Komputer harus dilampirkan ke switch penerus yang terintegrasi atau mandiri hub atau switch.
• Opsional, Anda dapat memiliki server yang menjalankan kombinasi dari DHCP, HTTP, FTP, dan Telnet (dikonfigurasi).

Langkah 1: Download dan instal MBSA

a. Buka browser dan pergi ke halaman web MBSA di: http://www.microsoft.com/technet/security/tools/mbsa2/default.mspx
b. Apa itu versi terbaru dari MBSA tersedia??(MBSA 2.2)
c. Apa adalah beberapa fitur MBSA menyediakan?( MBSA 2.2 adalah versi terbaru dari keamanan gratis Microsoft dan penilaian kerentanan scan alat untuk administrator, auditor keamanan, dan profesional TI.

MBSA 2.2 dibangun pada versi 2.1.1 sebelumnya MBSA yang mendukung Windows 7 dan Windows Server 2008 R2 dan memperbaiki masalah kecil yang dilaporkan oleh pelanggan. MBSA akan bekerja dengan didukung semua versi Windows termasuk Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 dan Windows Server 2008 R2.

MBSA juga kompatibel dengan Microsoft Update, Windows Server Update Services 2.0 dan 3.0, SMS Inventory Tool untuk Microsoft Update (ITMU), dan sccm 2007.

Untuk daftar lengkap produk yang didukung oleh MBSA berbasis Microsoft Update (MU) dan Windows Server Update Services (WSUS) teknologi, kunjungi Produk Didukung oleh halaman WSUS.

Lihat halaman MBSA untuk informasi lebih lanjut atau untuk mendownload versi terbaru.

Kecuali khusus mencatat, semua referensi MBSA 2.0 di halaman TechNet MBSA juga berlaku untuk semua versi MBSA.
)
 d. Gulir ke bawah halaman dan pilih bahasa yang diinginkan untuk memulai proses download.
e. Klik Lanjut untuk memvalidasi salinan Microsoft Windows yang Anda jalankan.
f. Klik Download File di bawah dan pilih file yang ingin Anda download. (File setup Inggris MBSASetup-EN.msi). Klik tombol Download di sebelah kanan file ini. Berapa banyak megabyte adalah file untuk men-download?
?(1.7 MB)
g. Ketika Download File - Peringatan Keamanan menampilkan kotak dialog, klik Simpan dan download file ke folder tertentu atau desktop. Anda juga dapat menjalankannya dari situs download.
h. Begitu download selesai, pastikan semua aplikasi lain ditutup. Klik ganda file yang didownload. Klik Run untuk memulai program Setup, kemudian klik Jalankan jika Anda diminta dengan Peringatan Keamanan. Klik Next pada layar Setup MBSA.
i. Pilih tombol radio untuk menerima perjanjian lisensi dan klik Next. Menerima default install berlangsung, dan kemudian klik Selesai. Klik OK pada layar Setup MBSA akhir, dan dekat folder untuk kembali ke desktop Windows.


Langkah 2: Membangun jaringan dan mengkonfigurasi host
a. Hubungkan komputer host (s) ke router yang terintegrasi, hub, atau switch seperti yang ditunjukkan pada diagram topologi. Host-A adalah stasiun pengujian dimana MBSA akan diinstal. Server adalah opsional.
b. Mengatur konfigurasi IP untuk host (s) menggunakan Windows XP Network Connections dan TCP / IP properti. Jika host dihubungkan ke router yang terintegrasi, mengkonfigurasinya sebagai klien DHCP, jika tidak lanjutkan ke Langkah 1d.
c. Jika tuan rumah terhubung ke sebuah hub atau switch dan server DHCP tidak tersedia, konfigurasikan secara manual dengan menetapkan sebuah alamat IP statis.
Yang alamat IP dan subnet mask tidak Host-A dan server (opsional) telah??(192.168.1.101)

Langkah 3: Jalankan MBSA pada sebuah host
a. Klik dua kali ikon desktop untuk MBSA atau menjalankannya dari Start> All Programs.
Ketika menampilkan layar utama, opsi yang tersedia?

Langkah 4: Pilih sebuah komputer untuk memindai
a. Di sisi kiri layar, klik Pick komputer untuk scan. Komputer ditampilkan sebagai default adalah salah satu yang MBSA diinstal.
b. Apa adalah dua cara untuk menentukan komputer yang akan dipindai?(dengan workgroup computer name atau lansung aja ke IP adressnya)
c. Terima default komputer akan dipindai. Periksa De-pilih untuk IIS dan kerentanan SQL administrasi, karena layanan ini tidak mungkin yang harus diinstal pada komputer yang sedang dipindai. Klik Start Scan

Langkah 5: pembaruan keamanan Lihat hasil scan
a. Lihat laporan keamanan. Apa hasil dari update keamanan scan??(office security update, windows security update, my SQL security update)
b. Jika ada Xs merah atau kuning, klik Bagaimana memperbaiki hal ini. Solusi mana yang direkomendasikan?(klik” how to connect this” maka jalankan recomendasinya)


Langkah 6: Lihat Windows hasil scan dalam laporan keamanan
a. Gulir ke bawah untuk melihat bagian kedua dari laporan yang menunjukkan Windows Hasil Scan. Apakah ada kelemahan administrasi diidentifikasi?

?(tidak complete dalam meng update, dan firewall nya tidak aktif dalam protecsi)

b. Pada bagian Informasi Tambahan Sistem layar (di bawah), di kolom Isu untuk Layanan, klik Apa yang dipindai, dan klik rincian Hasil bawah kolom Hasil untuk mendapatkan gambaran dari pemeriksaan yang dijalankan. Apa yang Anda temukan?Setelah selesai, tutup kedua jendela popup untuk kembali ke laporan keamanan
(beberapa potensial keamanan tidak bisa diinstal maka untuk recommendasi coba lagi)

Langkah 7: Lihat Hasil Pemindaian Aplikasi Desktop dalam laporan Keamanan
a. Gulir ke bawah untuk melihat bagian terakhir dari laporan yang menunjukkan Aplikasi Desktop Hasil Pemindaian. Apakah ada kelemahan administrasi diidentifikasi?
(ada, bahwasanya internet explorer tidaak aman buat beberapa user)


b. Berapa banyak produk Microsoft Office yang diinstal?(10)
c. Apakah ada masalah keamanan apapun dengan Makro Keamanan untuk salah satu dari mereka?(ada)
Langkah 8: Scan server, jika tersedia
a. Jika server dengan berbagai layanan yang tersedia, klik Pick komputer untuk memindai dari layar MBSA utama dan masukkan alamat IP dari server, dan kemudian klik Start Scan. kerentanan keamanan yang telah diidentifikasi?(IE zone)

b. Apakah ada layanan berpotensi tidak perlu diinstal? Yang nomor port yang mereka pada?
(ada)



Langkah 9: Uninstall MBSA menggunakan Control Panel Add / Remove Programs
a. Langkah ini adalah opsional, tergantung pada apakah tuan rumah akan secara otomatis dikembalikan kemudian oleh proses jaringan.
b. Untuk uninstall MBSA, klik Start> Control Panel> Add / Remove Programs. Cari aplikasi MBSA dan uninstall itu. Ini harus tercantum sebagai Microsoft Baseline Security Analyzer 2.0.1. Klik Hapus, kemudian klik Ya untuk mengkonfirmasi penghapusan aplikasi MBSA. Setelah selesai, tutup semua jendela untuk kembali ke desktop



Langkah 10: Refleksi
a. MBSA Alat ini dirancang untuk mengidentifikasi kerentanan untuk komputer berbasis Windows. Cari di Internet untuk alat lain yang mungkin ada. Daftar beberapa alat ditemukan.

isinya:

Computers: Security: Malicious Software
  • Nessus - Security scanner for Linux, BSD, Solaris, and other flavors of Unix. Performs over 900 remote security checks, and suggests solutions for security problems.
  • Nmap - Developers of NMAP, a network port scanner and service detector offering stealth SYN scan, ping sweep, FTP bounce, UDP scan and operating system fingerprinting. Downloads, documentation, security tools directory and a mailing lists archive. [Windows, MacOS, Unix]
  • Acunetix Web Vulnerability Scanner - Scans for common security vulnerabilities such as SQL injection, cross site scripting and other web vulnerabilities.
  • Angry IP Scanner - A freeware IP scanner for Windows. Display NetBIOS information, MAC address; save result to CSV, TXT, HTML or XML file.
  • AppDetective - Penetration testing scanner that locates and assesses the strength of databases and web applications within your network.
  • Arirang - A webserver security scanner based on twwwscan.
  • Atelier Web Security Port Scanner - TCP, UDP, NetBios scanner.
  • Attack Tool Kit Project - An open-source utility to realize vulnerability checks and enhance security audits.
  • Auto IP Scanner - Scan your PC for open ports ( Http, Https, Ftp, Dns, MySql, Imap, Smtp, Pop, Dc++, Irc).
  • AutoScan - Am application designed to explore and to manage your network. Entire subnets can be scanned simultaneously without human intervention. OS detection, automatic network discovery, a port scanner, a Samba share browser, and the ability to save the network state.
  • Beyond Security - Vulnerability assessment of internal networks or Intranets using an automated scanning server.
  • CXL Ltd. - Provides details of AZScan, a non-intrusive software tool which will review the security Oracle and Unix, OS400 and OpenVMS systems.
  • Cum Security Toolkit (cst) - Contains a cgi script scanner with 11 anti-IDS tactics and +2200 vulnerable scripts in the database; and a port scanner with banner grabber.
  • Domino HTTP security scanner - Security scan for Domino web servers.
  • DominoDig - Audits Lotus Domino web servers. Produces an HTML report that provides a list of all the unique .nsf databases it was able to access, as well as IP addresses and email addresses.
  • Filterrules - Description and download of the GPL-licensed firewall testing and documentation tool.
  • FusionVM Enterprise - FusionVM from Critical Watch automates the process of proactively managing network vulnerabilities and exposures. It enables a unified corporate process that is enterprise-wide, repeatable and measureable.
  • GFI LANguard - Provides information such as service pack level of the machine, missing security patches, open shares, open ports, services/applications active on the computer, key registry entries, and weak passwords. Remotely install security patches and service packs.
  • Gherkin - Free security scan manager incorporating Nessus vulnerability scanning, dns and nmb lookup, host resolving, and nmap fingerprinting and scanning.
  • HFNetChkPro - Patch management tool scans Microsoft servers and desktops. Schedule and immediate remote patch scans and installations. Freeware and command-line versions available.
  • IIS Vulnerability Scanner ver 1.0 - Contains 1700+ server and file checks including hundreds of unicode and directory traversal vulnerability checks for IIS.
  • IP Range Scanner - This tool enables the user to retrieve a list of computer host names, logon account names, MS IIS service status, and/or determine the use of non-LocalSystem accounts (used to start services).
  • IPSonar - IPsonar maps and provides risk assessment to network assets.
  • IPaudit vulnerability scans - Check open ports on vulnerabilities.
  • ISS - Internet Scanner Tool. Performs scheduled and selective probes of communication services, operating systems, applications and routers to uncover and report systems vulnerabilities that might be open to attack.
  • Immunity Canvas - Tests for over 50 exploits. Licenses include full source code.
  • Infiltration Systems - Network security scanning software for detecting, auditing, and fixing network security exploits and vulnerabilities.
  • Inguama - A free penetration testing and vulnerability discovery toolkit entirely written in python.
  • Joomla! Security/Vulnerability Scanner - Signature based scanner that can detect Joomla vulnerabilities.
  • MaxPatrol Security Scanner - Network security and web-application scanner with prediction capabilities.
  • MegaPing scanner - TCP and UDP portscanner and NetBIOS scanner, Displays installed service packs, open TCP and UDP ports, missing security patches.
  • N-Stealth Security Scanner - Vulnerability-assessment product that scans web servers to identify security problems and weaknesses on local and remote web servers. Commercial and free editions are available.
  • NGSSoftware - Security scanners and assessment tools for Oracle, Domino, and SQL Server. Checks for weak passwords and vulnerability to SQL injection and cross-site scripting.
  • NScan - It includes network/host scanner, a set of additional features currently limited to whois and traceroute and numerous options to fully customize the scan process.
  • Network Analyzing - Network scanning and auditing software which scans your network or webserver for over 20,000 exploits.
  • Network Scanning Software - Network scanning and auditing software which scans your network computers for vulnerabilities, exploits, and information enumerations.
  • Network Security Audit Tools and Vulnerability Scanner - Network security and vulnerability scanner, password and product key recovery software.
  • Nikto - A web server scanner which performs tests against web servers for multiple items, including over 2200 potentially dangerous files/CGIs, versions on over 140 servers, and problems on over 210 servers.
  • Online Security Check - Free firewall, privacy and browser security test.
  • Online Vulnerability assessment ASP with graphical network display, updated daily - Online vulnerability scanner which scans for SANS "top ten" vulnerabilities.
  • PCMantra - Registry Cleaner, Anti Spyware - Offers privacy software for disk management and registry cleaning, anti-spyware and spam filter. Downloads and online sales available.
  • PatchQuest and ScanFi - Automated patch management and vulnerability assessment software for scanning, distributing and managing patches, security hotfixes and updates across heterogeneous networks comprising Windows, Red Hat and Debian Linux systems.
  • PivX Solutions Inc - Offer vulnerability and malware scanning software products for home and enterprise users.
  • Portswigger.net - Web application security testing software. Product details, downloads, how to order and screenshots.
  • Powerfuzzer - A highly automated web fuzzer. It is capable of spidering website and identifying inputs.
  • Proactive Windows Security Explorer - A password security test tool that's designed to identify and close security holes by executing an audit of account passwords, and exposing insecure account passwords.
  • Rapid7 - A vulnerability assessment and compliance solution that scans applications, databases, networks, and operating systems.
  • Retina Network Security Scanner - Identifies security vulnerabilities, suggests appropriate corrective actions and fixes. Free MyDoom, Nimda, DCOM, Sapphire SQL Worm, and Nimda scanner downloads.
  • SQL Server 2000 Security Tools - Microsoft tool scans for instances of MS SQL Server 2000 vulnerable to the "Slammer" worm, and then apply updates to the affected files. Includes SQL Scan, SQL Check,and SQL Critical Update.
  • Saint Corporation - Network vulnerability assessment scanner.
  • Securescout perimeter penetration testing - Tests are performed over the Web to Internet-connected systems.
  • SecurityMetrics Appliance - Network Scanner - Vulnerability Assessment, Intrusion Detection and Prevention.
  • Shadow Security Scanner - Offers vulnerability auditing modules for many systems and services. These include: NetBIOS, HTTP, CGI and WinCGI, FTP, DNS, DoS vulnerabilities, POP3, SMTP, LDAP, TCP/IP, UDP, Registry, Services, Users and Accounts, password vulnerabilities, publishing extensions, MSSQL, IBM BD2, Oracle, MySQL, PostgressSQL, Interbase, and MiniSQL.
  • SourceForge.net: Gamja : Web vulnerability scanner - Scans for XSS(Cross site scripting) and SQL Injection.
  • Spectator scanning tool - Scans Windows NT/2000/XP/2003 machines for P2P applications, remote-control applications, service packs, etc.
  • SuperScan, SQLScan, BOping - Several security scanners, including a portscanner, a scanner for the Back Orifice, a scanner for Microsoft SQL Server "Slammer" Worm.
  • TrustSight Security Scanner - Cross-Site Scripting, SQL Attacks,OS Attacks, Directory Traversal, cookie manipulation are tested. Claims not only to be able to find not only known vulnerabilities, but also potential new ones. CVE Compatible.
  • Visionael Security Audit - Software providing device discovery, scanning, prioritization, and report generation of vulnerabilities.
  • Vulnerability Scanning Cluster Project - A web-based interface for the Nessus vulnerability scanner and a backend queue manager for scan requests. Allows users to hierarchically manage networks of hosts, scanning policies, and automated scans.
  • Wapiti - Web application security auditor - Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.
  • Watchfire - AppScan - A web application vulnerability assessment product.
  • Web Security - Jamesmaurer.com - Offers online security testing and provides a list of privacy tools to help make internet travels safer.
  • WebCruiser - Security Scanner - Vulnerability Scanner and a series of security tools.
  • WhatsMyIP.org - Scans your ports and tells you which are open, closed, blocked etc.
  • Wikto Web Assessment Tool - Web server fingerprinting, directory and link extraction, Nikto and Google Hack DB scans.
  • httprecon project - Web server fingerprinting and enumeration.
  • load balancer detector - Halberd discovers HTTP load balancers. May be useful for testing load balancer configurations and for web application auditing purposes.
  • nCircle IP360 Vulnerability Management - An appliance-based solution that proactively discovers and assesses network vulnerabilities and exposures to protect networks and IP-enabled devices.
  • sqlmap: a blind SQL injection tool - SQL scanner capable of enumerating entire remote databases, and perform an active database fingerprinting.
  • wmap - A web scanner which checks for files and CGIs in non-standard directories.
  • Product Review: Acunetix Web Vulnerability Scanner - A review of the Acunetix web vulnerability scanner. (August 11, 2005)
  • Vulnerability Scanners - Review of several vulnerability scanners.
  • Network Security: Know Your Weaknesses - Review of six vulnerability scanners.
  • Vulnerability Scanner Review - Network Computing's review of several commercial and open-source Vulnerability Assessment Scanners. (January 08, 2001)

b. Alat yang mungkin ada untuk komputer non-Windows? Cari di Internet untuk alat lain yang mungkin ada dan daftar beberapa di sini.
(lihat diatas dijawaban no a)
c. Langkah-langkah lain yang bisa Anda ambil untuk membantu mengamankan komputer terhadap serangan internet?
jawab:


1. Mengupdate anti virus
2. mengaktifkan tools untuk proteksi atau scan (tune-up)
3. pakai antivirus local juga
4. pakai anti virus internasional yang khusus untuk keamanan dalam berinternet.

>

About this blog

smile......
n
welcome......

my picture

my picture

You can replace this text by going to "Layout" and then "Page Elements" section. Edit " About "

widget

Powered By Blogger
Diberdayakan oleh Blogger.

Popular Posts

Followers

About Me