{"id":632,"date":"2021-05-04T17:42:42","date_gmt":"2021-05-04T21:42:42","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/?p=632"},"modified":"2021-05-04T17:42:42","modified_gmt":"2021-05-04T21:42:42","slug":"week-5-scanning-network-vulnerabilities-prince-patel","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/2021\/05\/04\/week-5-scanning-network-vulnerabilities-prince-patel\/","title":{"rendered":"Week 5 Scanning Network Vulnerabilities- Prince Patel"},"content":{"rendered":"<h2>Network Vulnerability Scanning<\/h2>\n<p>Kali Linux provides tools that are capable of scanning network devices such as databases, routers, switches and protocols such as SNMP and SMB. Here are the most common tools below:<\/p>\n<h3>1. CISCO Analysis<\/h3>\n<p>CISCO devices are susceptible to a number of vulnerabilities that can be assessed with a couple of tools. When auditing routers, Kali Linux ships with the Cisco Auditing Tool (CAT), which can help an attacker or penetration tester identify vulnerabilities ranging from SNMP community strings to old CISCO bugs and default credentials that can be used to gain illegal access to the router.<\/p>\n<p>To test our host on Kali, we executed the command below:<\/p>\n<pre><strong>#CAT -h 192.168.67.73 -w lists\/community -a lists\/passwords -i<\/strong><\/pre>\n<p><a href=\"https:\/\/mk0resourcesinf5fwsf.kinstacdn.com\/wp-content\/uploads\/11-24.png\" target=\"_blank\" rel=\"attachment noopener wp-att-48593 noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-48593\" src=\"https:\/\/mk0resourcesinf5fwsf.kinstacdn.com\/wp-content\/uploads\/11-24.png\" alt=\"\" width=\"550\" height=\"171\" \/><\/a>CAT proceeds to audit for default credentials and SNMP community strings as shown above.<\/p>\n<h3>2. SNMP Analysis<\/h3>\n<p>Kali Linux also allows attackers and pentesters to obtain information from hosts with the Simple Network Management Protocol (SNMP) protocol. This can be extremely vital in preparing further attacks targeting the host.<\/p>\n<p>On our attacking machine, we executed the command below and were able to get a ton of information about our target.<\/p>\n<p><a href=\"https:\/\/mk0resourcesinf5fwsf.kinstacdn.com\/wp-content\/uploads\/12-23.png\" target=\"_blank\" rel=\"attachment noopener wp-att-48594 noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-48594\" src=\"https:\/\/mk0resourcesinf5fwsf.kinstacdn.com\/wp-content\/uploads\/12-23.png\" alt=\"\" width=\"550\" height=\"138\" \/><\/a><\/p>\n<p>As can be seen above, we were able to identify the ethernet card information, how long the system had been connected via that card, the host name and, as shown below, the number of network interfaces with their respective information.<\/p>\n<p><a href=\"https:\/\/mk0resourcesinf5fwsf.kinstacdn.com\/wp-content\/uploads\/13-19.png\" target=\"_blank\" rel=\"attachment noopener wp-att-48595 noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-48595\" src=\"https:\/\/mk0resourcesinf5fwsf.kinstacdn.com\/wp-content\/uploads\/13-19.png\" alt=\"\" width=\"550\" height=\"168\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>ref-https:\/\/resources.infosecinstitute.com\/topic\/vulnerability-mapping-with-kali-linux\/#:~:text=Vulnerability%20mapping%20is%20an%20activity,%2C%20however%2C%20the%20same%20thing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Vulnerability Scanning Kali Linux provides tools that are capable of scanning network devices such as databases, routers, switches and protocols such as SNMP and SMB. Here are the most common tools below: 1. CISCO Analysis CISCO devices are susceptible to a number of vulnerabilities that can be assessed with a couple of tools. When [&hellip;]<\/p>\n","protected":false},"author":12990,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[663943],"tags":[],"class_list":{"0":"post-632","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-instructor","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/posts\/632","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/users\/12990"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/comments?post=632"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/posts\/632\/revisions"}],"predecessor-version":[{"id":633,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/posts\/632\/revisions\/633"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/media?parent=632"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/categories?post=632"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5203sec001spring2021\/wp-json\/wp\/v2\/tags?post=632"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}