The stateful packet inspection firewall can filter at the packet level, allowing you to set up sophisticated rules to prevent unwanted users or applications from gaining access. However you need to have more than a basic understanding of networking to implement these successfully.
It's possible to set up intrusion alerts to be sent as an email or network broadcast to a particular PC on the network. Buffalo's AOSS (AirStation One-touch Secure System) should help users to set up secure wireless connections to other AOSS-enabled devices.
Pros:
Inexpensive; easy to implement security. Cons: Overall:
|
|
Hostname (URL): http://192.168.11.1 Server: micro_httpd Date: Sat Oct 09 13:37:58 2004 Scanning Time 1892 second(s) Scanning Method: Standard Scan |
|
Generated by N-Stealth HTTP Security Scanner Free Edition |
|
GET |
|
|
|
![]() |
Confidential Information |
The following report contains confidential information, do not distribute, email, fax or transfer via any electronic mechanism unless it has been approved by our security policy. All copies and backups of this document should be saved on protected storage at all times. Do not share any of the information contained within this report with anyone unless they are authorized to view the information. Violating any of the previous instructions is ground for termination. |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Executive Summary |
|
Vulnerability Summary |
Address 192.168.011.001 |
General: 192.168.011.001
Address: 192.168.11.1
No More Details Available
Report Date: 10/09/04 07:01:13 AM
No More Details Available
Domain Name: air.setup
No More Details Available
Ping Response: Host Did Not Respond
No More Details Available
Machine: 192.168.011.001
Open Ports: 5
No More Details Available
Closed Ports: 65530
No More Details Available
Ports: 192.168.011.001
53: DOMAIN - Domain Name Server
53: UDP:DOMAIN - Domain Name Server
Port State: Open
Version: 9.2.2
80: WWW-HTTP - World Wide Web HTTP (Hyper Text Transfer Protocol)
Port State: Open
Version: MICRO_HTTPD
2601: ZEBRA - Zebra VTY
Port State: Open
2602: RIPD - RIPd VTY
Port State: Open
5431: PARK AGENT (veritas.com)
Detected Protocol: HTTP
Port State: Open
Version: UPNP/1.0 AIRSTATION SERIES/1.0
Glossary |
DoS Attack: A Denial of Service (DoS) attack is a remote attack against a servers TCP/IP stack or services. DoS attacks can saturate a servers bandwidth, saturate all available connections for a particular service, or even crash a server.
Exploit: A script or program that takes advantage of vulnerabilities in services or programs to allow an attacker to gain unauthorized or elevated system access.
Host: A node on a network. Usually refers to a computer or device on a network which both initiates and accepts network connections.
IP Address: The 32-bit address defined by the Internet Protocol in STD 5, RFC 791. It is usually represented in dotted decimal notation. Any device connected to the Internet that used TCP/IP is assigned an IP Address. An IP Address can be likened to a home address in that no two are alike.
Netbios: Network Basic Input Output System. The standard interface to networks on IBM PC and compatible networks.
Ping: A program used to test reachability of destination nodes by sending them an ICMP echo request and waiting for a reply.
Port: A port in the network sense is the pathway that a computer uses to transmit and receive data. As an example, Web Servers typically listen for requests on port 80.
Registry: The internal system configuration that a user can customize to alter his computing environment on the Microsoft Windows Platform. The registry is organized in a hierarchical structure of subtrees and their respective keys, subkeys, and values that apply to those keys and subkeys
Risk Level - Info: A-squad may provide additional information about a host that does not necessarily represent a security threat, but may be useful to the administrator in order to better assess the security of the host, or the network at large. These alerts are displayed with the list of discovered vulnerabilities, and are indicated by a green 'I' icon.
Risk Level - Low: A low-risk vulnerability is typically one that only presents a threat in specific and unlikely circumstances. Such a vulnerability may provide an attacker with information that could be combined with other, higher-risk vulnerabilities, in order to compromise the host or its users.
Risk Level - Medium: Medium-risk vulnerabilities are serious security threats that would allow a trusted but non-privileged user to assume complete control of a host, or would permit an untrusted user to disrupt service or gain access to sensitive information.
Risk Level - High: A vulnerability is designated as high-risk if it would allow a user who has not been given any amount of trust on a susceptible host to take control of it. Other vulnerabilities that severely impact the overall safety and usability of the network may also be designated as high-risk.
Service: A service is a program running on a remote machine that in one way or another provides a service to users. For example, when you visit a website the remote server displays a web page via its web server service.
Share: A folder, set of files, or even a hard drive partition set up on a machine to allow access to other users. Shares are frequently set up with incorrect file permissions which could allow an attacker to gain access to this data.
Sniffer: frequently attackers will place a sniffer program on a compromised machine. The sole purpose of a sniffer is to collect data being transmitted on the network in clear-text including usernames and passwords.
Subnet: A portion of a network, which may be a physically independent network segment, which shares a network address with other portions of the network and is distinguished by a subnet number.
Vulnerability: A weakness or a flaw in a program or service that can allow an attacker to gain unauthorized or elevated system access.