Sam Spade 1.14 Open Source Security Tool by Steve Atkins

Size: px
Start display at page:

Download "Sam Spade 1.14 Open Source Security Tool by Steve Atkins"

Transcription

1 CS 413 Spring 2005 Max Konovalov Sam Spade 1.14 Open Source Security Tool by Steve Atkins University of Alaska Anchorage Department of Mathematical Sciences

2 This paper describes Sam Spade 1.14 open source security tool and covers the following topics: The main purpose of the software; Licensing and installation; Setup and configuration; Overview of the main features; Conclusion. The software contains numerous useful tools and utilities; however, I covered only the main and the most important features of the software in this paper. The Main Purpose The main purpose of Sam Spade 1.14 is to provide a set of network management and analysis tools for network administrator. Every administrator s computer contains a toolbox full of useful utilities for network management. These can include performance and diagnostic counters, network packet analyzers, remote control programs, administration modules for server software, and a variety of other tools. One of the most important features of Sam Spade is that the software contains most of those popular, commonly used, and helpful tools. Sam Spade is especially useful if a network has a permanent Internet connection. Sam Spade for Windows offers a suite of tools for protecting against spam on mail servers, analyzing and troubleshooting Web servers, and gathering information on Internet hosts. Many of these utilities were previously available only on UNIX machines. Most are aimed at stopping and tracking down spammers. Nevertheless, it is also possible to use Sam Spade to gather some general information about a network. This information helps network administrators to identify areas where hackers can gather too much information about network hosts. Network administrators, IT specialists, system analysts, and system security experts will find Sam Spade 1.14 very helpful and easy to use. Licensing and Installation Sam Spade 1.14 is General Public License (GPL) software. In other words, it is free. Sam Spade 1.14 can be run under Windows 95, 98, ME, NT, 2000, and XP. The installation package is available either from the CD, which comes with the book, or from the Sam Spade Website ( where it can be downloaded freely. The installation process is very simple: all it takes is to doubleclick on the spade114.exe file and follow the on-screen instructions. The setup program will do all the work. Setup and Configuration After the installation is complete, it is recommended to adjust a few settings. It is possible to run the software without any specific configuration; however, some of the features will be available only if some values are configured. The setup and configuration is very simple and usually do not take more than couple of minutes. To perform the settings adjustments, open Sam Spade and click Edit Options. This will bring up Options window, as shown on Picture 1. In the Basics tab, enter 2

3 your default DNS server (or use DHCP), your address, so that you can do SMTP relay checking, and your ISP s Web server, so that you can use the Awake feature to have Sam Spade send out periodic packets to keep a dial-up connection from being dropped (if you are using a dial-up connection). Picture 1: Basics tab of the Options dialog box After that, click on OK button to save the changes. The basic setup is complete. The Main Features Sam Spade has a nice user interface, as shown on Picture 2. It combines many of the traditional TCP/IP tools with some unique tools that give an administrator a great look at a network. Best of all, these tools are combined in one package. A network administrator will find versions of ping, nslookup, and traceroute. Those Sam Spade versions are intuitive and flexible, especially when compared to the Windows versions of these TCP/IP tools. For example, with the ping feature, you can set the number of echo requests you prefer on the toolbar; then, every time you use ping, it will use that setting. At the command line, you have to use a switch such as ping -n 2 each time you want to set the echo number. 3

4 Picture 2: Sam Spade user interface Another useful utility of the software is traceroute feature. It is possible to do a fast traceroute or a slow traceroute. The fast traceroute outputs the quick list of hops the packet makes from the originating machine to a designated host. The slow traceroute is more like the traditional traceroute utility. However, both traceroute options provide a nice graph to accompany the information, as shown on Picture 3. 4

5 Picture 3: Fast traceroute function Sam Spade also includes some traditional UNIX tools, such as whois and finger. Whois is actually the default tool. If you simply enter a domain such as google.com in the Sam Spade toolbar hostname field and hit Enter key, Sam Spade will return the whois information on who owns the domain name, as well as other registration information, such as the technical contact for the domain. In addition to nslookup, Sam Spade offers a more advanced DNS querying tool called dig, which requests all the DNS records for an individual host and/or a domain. An advanced whois tool, called IP block whois, tries to find who owns a block of IP addresses. Sam Spade also provides a set of spam tools: SMTP Verify: Checks to see whether an address is a true address or if it is being forwarded. SMTP relay check: Measures the security of a mail server. It attempts to relay mail externally. If it is successful, the mail server is vulnerable to being exploited by spammers looking for a third-party machine to relay their mail. header analysis: Allows you to paste an address from your mail client into the Sam Spade toolbar and analyze it with all of the standard tools. A sample output of the parser is shown on Picture 4. Blacklist lookups and Abuse.net query: Both allow you to interact with Web sites (and organizations) that track down and report known spammers. A sample output of the Blacklist lookup is shown on Picture 5. 5

6 Picture 4: header parser output Picture 5: Blacklist lookup output The Sam Spade suite also provides some useful Web site tools. The Crawl Web tool, shown in Picture 6, allows searching a Web site based on specific query parameters you set. It also enables you to download all the documents of an entire Web site. The program includes a Web browser that offers a raw source-code view of a Web site rather than a graphical view. The browser doesn t send any identifying information to the host Web server. In addition, it doesn t support any plug-ins, scripting languages, or other browser add-ons, and it doesn t actually render the 6

7 HTML into a graphical format. As a result, it allows you to see meta fields, hidden form fields, white-on-white text, and other developer tricks for disguising information. Figure 6: Crawl Web tool Sam Spade also includes some security tools that could send up some red flags if you decide to use them to look at information on other companies, especially large multinational organizations. These tools include a port scanner, a DNS zone transfer tool, and the above-mentioned SMTP relay checker. The port scanner in Sam Spade provides scanning of the TCP/IP ports on computer. By default it scans six common ports; however, if you need to scan any other TCP/IP ports on your system, just click on Advanced button and select the ports you want to scan as shown on Picture 7. If you use the port scanner on another network, be aware that you can set off hacker detection programs. 7

8 Picture 7: Advanced TCP/IP port scanner The SMTP relay checker we discussed above can also set off alerts for companies that carefully guard against spamming. DNS Zone transfers are extremely useful for testing your own domain to make sure hackers can t gather valuable information about your systems architecture. Once you have enabled zone transfers, go to the fields at the top of the Sam Spade toolbar and enter your fully qualified domain name in the hostname field (on the left side) and enter the IP address of one of your DNS servers in the name server field (on the right side). Then click Tools Zone Transfer. If you see Query refused, you are in good shape. However, if you discover that Zone Transfer has provided a list of your DNS entries, your network is vulnerable. You ll need to disable zone transfers on your DNS servers if you are managing your own name servers, or you ll need to call your ISP and request that it disable zone transfers if it s doing DNS for your Internet servers. In order to use port scanning, SMTP relay checking, and zone transfers, you have to go to Edit Options and then click on the Advanced tab, shown on Picture 8. Here, you can select any of these tools you want to use. Picture 8: Choosing security tools in Advanced tab 8

9 Summary of the most useful Sam Spade functions is shown in the Table 1. Functions Descriptions This is the same as the built-in Windows and UNIX ping, except you Ping can easily configure the number of pings and the output is a little more verbose. Nslookup Similar to the UNIX command of the same name. Whois Similar to the UNIX command of the same name. IPBlock Trace Finger Blacklist Abuse Scan Addresses Crawl website This command checks the ARIN database for an IP address or set of IP addresses and generates some useful information on it. This data includes the organization that owns those IPs, where they were allocated from an ISP, and different contacts, including a contact to report abuse of they registered one. See figure 2.2 for an example output. Similar to the traceroute command. However, additional information is generated, such as any reverse DNS entry and a graphical display of the latency between hops. Similar to the UNIX command of the same name. Checks to see if your mail server is listed in any of the black hole lists (databases that contain the addresses of known spammers). If your address somehow gets in there (by leaving your server open to mail relays, for example), then some people won t be able to get mail from you. Looks up the official abuse contact for a set of IP addresses so you can register a complaint if you are having a problem with one of their addresses. Performs a basic port scan for a range of addresses. This very simple port scanner identifies open network ports. Takes a Web site and crawls it, identifying each link and page and any other forms or file it can reach. This is useful for finding all the pages that a Web site references and for looking for files that you weren t aware were there. Table 1: Sam Spade Main Functions Conclusion Sam Spade offers a great all-in-one security analysis suite of TCP/IP and networking tools. Although it is mostly useful for Internet Service Providers and security professionals, it can also be very valuable for network administrators who manage Internet servers and external security (including Firewalls and Access Control Lists on routers). It can also be useful for network consultants when evaluating sites and making recommendations for improving performance and security. 9

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver

LevelOne FBR User s Manual. 1W, 4L 10/100 Mbps ADSL Router. Ver LevelOne FBR-1416 1W, 4L 10/100 Mbps ADSL Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 FBR-1416 Features... 1 Package Contents... 3 Physical Details... 3 CHAPTER 2

More information

inetquery 2005 User Guide

inetquery 2005 User Guide User Guide Table of Contents Page: 2 Introduction... 4 License Agreement... 5 LICENSE AGREEMENT...5 LICENSE... 5 OTHER RESTRICTIONS... 5 LIMITED WARRANTY...5 DISCLAIMER OF DAMAGES... 5 System Requirements...

More information

Nsauditor White Paper. Abstract

Nsauditor White Paper. Abstract Nsauditor White Paper NSASOFT LLC. http://www.nsauditor.com E-mail: info@nsauditor.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein

More information

Session 16 Windows 7 Professional DNS & Active Directory

Session 16 Windows 7 Professional DNS & Active Directory Session 16 Windows 7 Professional DNS & Active Directory Fall 2011 ITE153 Operating Systems 1 Session 16 Windows 7 Professional Configuring TCP/IP Addressing & Name Resolution Fall 2011 ITE153 Operating

More information

Visual WhoIs 2004 Manual Software River Solutions, Inc.

Visual WhoIs 2004 Manual Software River Solutions, Inc. Visual WhoIs 2004 Manual Visual WhoIs 2004 Introduction Welcome to Visual WhoIs 2004 a very handy application that allows you to find information about web sites, ip addresses, email addresses and find

More information

I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11

I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11 I m InTouch router configuration p. 1 I m InTouch Installation Guide for the DSL/Cable environment with a Linksys router Models: BEFSRU31, BEFSR41 V.2, BEFSR11 Note: Different models may vary slightly

More information

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking

1/18/13. Network+ Guide to Networks 5 th Edition. Objectives. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

CHAPTER 7 ADVANCED ADMINISTRATION PC

CHAPTER 7 ADVANCED ADMINISTRATION PC ii Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband ADSL Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

SolarWinds Engineer s Toolset Fast Fixes to Network Issues

SolarWinds Engineer s Toolset Fast Fixes to Network Issues DATASHEET SolarWinds Engineer s Toolset Fast Fixes to Network Issues SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.

More information

and Web Site Tracing

and Web Site Tracing Email and Web Site Tracing Jaqui Lynch Mainline Information Systems Email jaqui.lynch@mainline.com http://www.circle4.com/jaqui/papers/emailtrace.pdf Session 6830 Agenda Obtaining Email Headers Understanding

More information

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking

Network+ Guide to Networks 5 th Edition. Chapter 10 In-Depth TCP/IP Networking Network+ Guide to Networks 5 th Edition Chapter 10 In-Depth TCP/IP Networking Objectives Understand methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

SolarWinds Engineer s Toolset Fast Fixes to Network Issues

SolarWinds Engineer s Toolset Fast Fixes to Network Issues DATASHEET SolarWinds Engineer s Toolset Fast Fixes to Network Issues SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.

More information

Certified Vulnerability Assessor

Certified Vulnerability Assessor Certified Vulnerability Assessor COURSE BENEFITS Course Title:Certified Vulnerability Assessor Duration: 3Day Language: English Class Format Options: Instructor-led classroom Live Online Training Prerequisites:

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

Configuring IPv6 DNS. Introduction to IPv6 DNS. Configuring the IPv6 DNS client. Configuring static domain name resolution

Configuring IPv6 DNS. Introduction to IPv6 DNS. Configuring the IPv6 DNS client. Configuring static domain name resolution Contents Configuring IPv6 DNS 2 Introduction to IPv6 DNS 2 Configuring the IPv6 DNS client 2 Configuring static domain name resolution 2 Configuring dynamic domain name resolution 2 Displaying and maintaining

More information

General Network Troubleshooting

General Network Troubleshooting Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise

More information

Franzes Francisco Manila IBM Domino Server Crash and Messaging

Franzes Francisco Manila IBM Domino Server Crash and Messaging Franzes Francisco Manila IBM Domino Server Crash and Messaging Topics to be discussed What is SPAM / email Spoofing? How to identify one? Anti-SPAM / Anti-email spoofing basic techniques Domino configurations

More information

Fiery Network Controller for DocuColor 5065 SERVER & CONTROLLER SOLUTIONS. Printing from Windows

Fiery Network Controller for DocuColor 5065 SERVER & CONTROLLER SOLUTIONS. Printing from Windows Fiery Network Controller for DocuColor 5065 SERVER & CONTROLLER SOLUTIONS Printing from Windows 2005 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

LevelOne Broadband Routers

LevelOne Broadband Routers LevelOne Broadband Routers FBR-1100TX FBR-1400TX FBR-1401TX FBR-1700TX User's Guide TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 Features of your LevelOne Broadband Router... 1 Package Contents... 4

More information

Where is Geolocation of an IP Address?

Where is Geolocation of an IP Address? WHAT IS MY IP HIDE IP CHANGE IP VPN PROXY DDOS WEB S KB FORUMS Where is Geolocation of an IP Address? Your public IP Address is 73.245.1.29. Hide IP with VPN IPv4, IPv6 or Domain Name IP Lookup Here are

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking

Network+ Guide to Networks 6 th Edition. Chapter 9 In-Depth TCP/IP Networking Network+ Guide to Networks 6 th Edition Chapter 9 In-Depth TCP/IP Networking Objectives Describe methods of network design unique to TCP/IP networks, including subnetting, CIDR, and address translation

More information

CSC 5930/9010 Offensive Security: OSINT

CSC 5930/9010 Offensive Security: OSINT CSC 5930/9010 Offensive Security: OSINT Professor Henry Carter Spring 2019 Recap Designing shellcode requires intimate knowledge of assembly, system calls, and creative combinations of operations But allows

More information

IP806GA/GB Wireless ADSL Router

IP806GA/GB Wireless ADSL Router IP806GA/GB Wireless ADSL Router 802.11g/802.11b Wireless Access Point ADSL Modem NAT Router 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features...

More information

Broadband Router DC-202. User's Guide

Broadband Router DC-202. User's Guide Broadband Router DC-202 User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...3 CHAPTER 2 INSTALLATION... 5 Requirements...

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition Chapter 3 Investigating Web Attacks Objectives After completing this chapter, you should be able to: Recognize the indications

More information

The term "router" in this document refers to both routers and Layer 3 switches. Step Command Remarks. ipv6 host hostname ipv6-address

The term router in this document refers to both routers and Layer 3 switches. Step Command Remarks. ipv6 host hostname ipv6-address Contents Configuring IPv6 DNS 1 Overview 1 Configuring the IPv6 DNS client 1 Configuring static domain name resolution 1 Configuring dynamic domain name resolution 1 Displaying and maintaining IPv6 DNS

More information

Troubleshooting Your Network

Troubleshooting Your Network Troubleshooting Your Network Networking for Home and Small Businesses Chapter 9 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License 3.0 By-Sa Cisco name, logo and

More information

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver LevelOne WBR-3407 11g Wireless ADSL VPN Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features... 1 Package Contents... 5 Physical Details... 6 CHAPTER

More information

Installation guide for Choic . Enterprise Edition. When Installing On The Same Server As: Microsoft s Exchange 2000 & 2003 Mail Servers

Installation guide for Choic . Enterprise Edition. When Installing On The Same Server As: Microsoft s Exchange 2000 & 2003 Mail Servers Installation guide for ChoiceMail Enterprise Edition When Installing On The Same Server As: Microsoft s Exchange 2000 & 2003 Mail Servers May, 2004 Version 2.5.2 Table of Contents Page Downloading and

More information

ADSL2+ 4-Port Modem Router Quick Setup Guide RTA1335

ADSL2+ 4-Port Modem Router Quick Setup Guide RTA1335 ADSL2+ 4-Port Modem Router Quick Setup Guide RTA1335 Important This Guide is intended to get you started quickly. We have made the factory default setting of this router suitable for New Zealand 1. All

More information

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED 01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED Contents 1. Introduction 3 2. Security Testing Methodologies 3 2.1 Internet Footprint Assessment 4 2.2 Infrastructure Assessments

More information

SMTP Sending s While on PureVPN

SMTP Sending  s While on PureVPN SMTP Sending E-Mails While on PureVPN If you are facing difficulties sending e-mails while being connected to PureVPN, this may be because we are blocking outgoing e-mail services (SMTP). We block outgoing

More information

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

BraindumpsIT.   BraindumpsIT - IT Certification Company provides Braindumps pdf! BraindumpsIT http://www.braindumpsit.com BraindumpsIT - IT Certification Company provides Braindumps pdf! Exam : GPEN Title : GIAC Certified Penetration Tester Vendor : GIAC Version : DEMO Get Latest &

More information

LAB 1 HOW THE WEB WORKS

LAB 1 HOW THE WEB WORKS LAB 1 HOW THE WEB WORKS What You Will Learn About IP addresses and Domain Names About some web browser plugins to help with development Examine headers sent by the HTTP protocol How to trace the route

More information

The Administration Tab - Diagnostics

The Administration Tab - Diagnostics The Administration Tab - Diagnostics The diagnostic tests (Ping and Traceroute) allow you to check the connections of your network components. Ping Test. The Ping test will check the status of a connection.

More information

Installation Guide For Choic . Enterprise Edition. When Installing On The Same Server As: Microsoft s Exchange 5.5 Mail Server

Installation Guide For Choic . Enterprise Edition. When Installing On The Same Server As: Microsoft s Exchange 5.5 Mail Server Installation Guide For ChoiceMail Enterprise Edition When Installing On The Same Server As: Microsoft s Exchange 5.5 Mail Server May, 2004 Version 2.5.2 Table of Contents Page Downloading and Running the

More information

About MonitorWare Console 1.0

About MonitorWare Console 1.0 About MonitorWare Console 1.0 Features Adiscon MonitorWare Console works together with MonitorWare Agent / WinSyslog to provide a centralized view of the system-generated events data. If you would like

More information

Windows Help document Part A

Windows Help document Part A Compiled by: Todd Johnstone Before starting these steps, open a Word document, save it in documents in a folder called computing problems and use that document to capture items that show as bad as you

More information

Using BiDiBLAH: Very concise getting started guide.

Using BiDiBLAH: Very concise getting started guide. Using BiDiBLAH: Very concise getting started guide. 1 Tables of contents Using BiDiBLAH... 3 Install procedure:... 3 Installing the raw socket driver:... 3 Install and/or configure your firewall... 5 Configure

More information

Troubleshooting SMTP Routing. Chris Miller Director of Messaging/Collab Connectria

Troubleshooting SMTP Routing. Chris Miller Director of Messaging/Collab Connectria Troubleshooting SMTP Routing Chris Miller Director of Messaging/Collab Connectria What We ll Cover Following the breadcrumbs in the forest Planning to be an archeologist Running relay races, jumping hurdles

More information

Microsoft Windows Server 2003 Administration Fundamentals

Microsoft Windows Server 2003 Administration Fundamentals C01613540.fm Page 1 Monday, April 12, 2004 10:19 AM Part I Microsoft Windows Server 2003 Administration Fundamentals The fundamental tasks you need for Microsoft Windows Server 2003 administration are

More information

Guide to TCP/IP, Third Edition. Chapter 8: The Dynamic Host Configuration Protocol

Guide to TCP/IP, Third Edition. Chapter 8: The Dynamic Host Configuration Protocol Guide to TCP/IP, Third Edition Chapter 8: The Dynamic Host Configuration Protocol 1 Objectives Understand the basic services DHCP offers to its clients and explain its background Understand the specifics

More information

Scan to Quick Setup Guide

Scan to  Quick Setup Guide Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:

More information

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0 DC-228 ADSL2+ Modem/Router -Annex A- User Manual Version: 1.0 TABLE OF CONTENTS 1 PACKAGE CONTENTS...3 2 PRODUCT LAYOUT...4 3 NETWORK + SYSTEM REQUIREMENTS...6 4 DC-228 PLACEMENT...6 5 SETUP LAN, WAN...7

More information

BiPAC 8501/8521. SHDSL.bis (VPN) Firewall Bridge/Router. Quick Start Guide

BiPAC 8501/8521. SHDSL.bis (VPN) Firewall Bridge/Router. Quick Start Guide BiPAC 8501/8521 SHDSL.bis (VPN) Firewall Bridge/Router Quick Start Guide Quick Start Guide Chapter 1: Introduction 2 Billion BiPAC 8501/8521 SHDSL.bis (VPN) Firewall Bridge/ Router For more detailed instructions

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

DHCP and DDNS Services

DHCP and DDNS Services This chapter describes how to configure the DHCP server or DHCP relay as well as dynamic DNS (DDNS) update methods. About, page 1 Guidelines for, page 3 Configure the DHCP Server, page 4 Configure the

More information

TCP/IP Diagnostic Utilities on Windows 2008 Server

TCP/IP Diagnostic Utilities on Windows 2008 Server TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

LAB 1 HOW THE WEB WORKS

LAB 1 HOW THE WEB WORKS LAB 1 HOW THE WEB WORKS What You Will Learn About IP addresses and Domain Names About some web browser plugins to help with development Examine headers sent by the HTTP protocol How to trace the route

More information

This guide explains how to manage the network settings from your computer or your printer s control panel. See the appropriate section below.

This guide explains how to manage the network settings from your computer or your printer s control panel. See the appropriate section below. INTR.FM (A4 size) Introduction Finding the Information This guide explains how to manage the network settings from your computer or your printer s control panel. See the appropriate section below. Connecting

More information

Basics of executing a penetration test

Basics of executing a penetration test Basics of executing a penetration test 25.04.2013, WrUT BAITSE guest lecture Bernhards Blumbergs, CERT.LV Outline Reconnaissance and footprinting Scanning and enumeration System exploitation Outline Reconnaisance

More information

APPLICATION NOTE. Subject: C-more setup and functionality Date Issued: C-more functionality

APPLICATION NOTE. Subject: C-more  setup and functionality Date Issued: C-more  functionality APPLICATION NOTE THIS INFORMATION PROVIDED BY AUTOMATIONDIRECT.COM TECHNICAL SUPPORT IS PROVIDED "AS IS" WITHOUT A GUARANTEE OF ANY KIND. These documents are provided by our technical support department

More information

Tracking Packet Flow Using Path Analysis

Tracking Packet Flow Using Path Analysis CHAPTER 4 Tracking Packet Flow Using Path Analysis Path Analysis is an operations and diagnostic application that traces the connectivity between two specified points on your network and the physical and

More information

Oversimplified DNS. ... or, even a rocket scientist can understand DNS. Step 1 - Verify WHOIS information

Oversimplified DNS. ... or, even a rocket scientist can understand DNS. Step 1 - Verify WHOIS information Oversimplified DNS... or, even a rocket scientist can understand DNS Step 1 - Verify WHOIS information GOALS: Make sure that WHOIS reports every name server you have, and doesn't report any that aren't

More information

Agha Mohammad Haidari General ICT Manager in Ministry of Communication & IT Cell#

Agha Mohammad Haidari General ICT Manager in Ministry of Communication & IT Cell# Install a DNS server in Windows Server 2008 IT administrators who have little or no experience with Domain Name System (DNS), can learn to install, configure and troubleshoot a Windows Server 2008 DNS

More information

Lab 6.7.1: Ping and Traceroute

Lab 6.7.1: Ping and Traceroute Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0

More information

Wireless-G Router User s Guide

Wireless-G Router User s Guide Wireless-G Router User s Guide 1 Table of Contents Chapter 1: Introduction Installing Your Router System Requirements Installation Instructions Chapter 2: Preparing Your Network Preparing Your Network

More information

EventSentry Quickstart Guide

EventSentry Quickstart Guide Contents I Part I About This Guide 2 Part II Overview 3 Part III Installing EventSentry 6 1 Installation with... Setup 7 2 Management Application... 8 3 Configuration... 9 4 Remote Update... 12 5 Heartbeat

More information

Attack Prevention Technology White Paper

Attack Prevention Technology White Paper Attack Prevention Technology White Paper Keywords: Attack prevention, denial of service Abstract: This document introduces the common network attacks and the corresponding prevention measures, and describes

More information

Chapter 1. Footprinting: Knowing Where to Look IN THIS CHAPTER: Footprinting Explained Summary

Chapter 1. Footprinting: Knowing Where to Look IN THIS CHAPTER: Footprinting Explained Summary Chapter 1 Footprinting: Knowing Where to Look IN THIS CHAPTER: Footprinting Explained Summary 3 4 Part I: Hacking Fundamentals Before potential attackers can begin to test the windows and rattle the doorknobs

More information

ch02 True/False Indicate whether the statement is true or false.

ch02 True/False Indicate whether the statement is true or false. ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be

More information

MikroWall Hotspot Router and Firewall System

MikroWall Hotspot Router and Firewall System MikroWall Hotspot Router and Firewall System Installation and configuration guide Contents: 1.0 The Device:...2 1.1 The MikroWall Wireless...2 1.2 MikroWall Standard...2 2.0 Installation...2 2.1 Before

More information

LevelOne. User's Guide. Broadband Router FBR-1402TX FBR-1403TX

LevelOne. User's Guide. Broadband Router FBR-1402TX FBR-1403TX LevelOne Broadband Router FBR-1402TX FBR-1403TX User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 LevelOne Broadband Router Features... 1 Package Contents... 3 Physical Details...4 CHAPTER 2 INSTALLATION...

More information

TDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013

TDTS06 Computer Networks Final Exam: 14:00-18:00, Friday, November 1, 2013 Final Examination: 14:00-18:00, Friday, November 1, 2013 Time: 240 minutes Total Marks: 40 Grade Requirements: three (20/40); four (28/40); and five (36/40). Assistance: None (closed book, closed notes,

More information

DHCP and DDNS Services for Threat Defense

DHCP and DDNS Services for Threat Defense The following topics explain DHCP and DDNS services and how to configure them on Threat Defense devices. About DHCP and DDNS Services, on page 1 Guidelines for DHCP and DDNS Services, on page 3 Configure

More information

Packet Tracer - Using Traceroute to Discover the Network (Instructor Version)

Packet Tracer - Using Traceroute to Discover the Network (Instructor Version) (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Scenario The company you work for has acquired a new branch location.

More information

Two kinds of size notation are employed in this manual. With this machine refer to the metric version.

Two kinds of size notation are employed in this manual. With this machine refer to the metric version. Network Guide 1 2 3 4 5 6 7 Functions Available over a Network Connecting the Network Cable to the Network Setting Up the Machine on a Network Windows Configuration Using the Printer Function Configuring

More information

Steps for Gathering Information

Steps for Gathering Information weaknesses that can be exploited, and based on that information, they would decide not only which target to attack, but how to attack it. No matter what the target is, before an attacker goes after it,

More information

Configuring SharePoint 2007

Configuring SharePoint 2007 26636.book Page 77 Thursday, February 14, 2008 4:38 PM Chapter 3 Configuring SharePoint 2007 MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Manage Administration Manage Central Admin UI Manage the

More information

Hands-on Networking Fundamentals. Chapter 12 Maintaining and Troubleshooting Your Network

Hands-on Networking Fundamentals. Chapter 12 Maintaining and Troubleshooting Your Network Hands-on Networking Fundamentals Chapter 12 Maintaining and Troubleshooting Your Network Objectives Use hardware and software methods to monitor a network Perform backups over a network Solve a broad range

More information

Downloaded from manuals search engine

Downloaded from   manuals search engine Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details... 4 CHAPTER 2 INSTALLATION... 6 Requirements... 6 Procedure... 6 CHAPTER 3 SETUP...

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

Using ICMP to Troubleshoot TCP/IP Networks

Using ICMP to Troubleshoot TCP/IP Networks Laura Chappell Using ICMP to Troubleshoot TCP/IP Networks Illustration: Norman Felchle Editor s Note: This article is based on Laura Chappell s upcoming book TCP/IP Analysis and Troubleshooting, which

More information

Analyzer Quick Start Guide

Analyzer Quick Start Guide September 18, 2006 Overview Introduction This guide provides connection and initial configuration instructions for your Proventia Network ADS 3.6.1 Analyzer appliance. These instructions allow you to connect

More information

Objectives. Connecting with Computer Science 2

Objectives. Connecting with Computer Science 2 Objectives Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar with Internet-related protocols Understand how the TCP/IP protocols relate to the Internet

More information

Locating Users in the Network with User Tracking

Locating Users in the Network with User Tracking CHAPTER 3 Locating Users in the Network with User Tracking User Tracking allows you to locate end-user hosts and IP phones in the network. It uses information gathered from network devices to display data

More information

Configuring a Microsoft Windows 2000 DHCP and DNS Server

Configuring a Microsoft Windows 2000 DHCP and DNS Server Configuring a Microsoft Windows 2000 DHCP and DNS Server White Paper Abstract This white paper sets out to describe the steps necessary to install a Brother printer into a Windows 2000 network that is

More information

1 Hardware Installation

1 Hardware Installation 1 Hardware Installation 1.1 Choosing the Best Location for Wireless Operation Many environmental factors may affect the effective wireless function of the DSL Router. If this is the first time that you

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 9 Networking Practices

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 9 Networking Practices : Managing, Maintaining, and Troubleshooting, 5e Chapter 9 Networking Practices Objectives Learn how to connect a computer or small network to the Internet using a broadband, satellite, or dialup connection

More information

Abusing Windows Opener to Bypass CSRF Protection (Never Relay On Client Side)

Abusing Windows Opener to Bypass CSRF Protection (Never Relay On Client Side) Abusing Windows Opener to Bypass CSRF Protection (Never Relay On Client Side) Narendra Bhati @NarendraBhatiB http://websecgeeks.com Abusing Windows Opener To Bypass CSRF Protection Narendra Bhati Page

More information

Principles of ICT Systems and Data Security

Principles of ICT Systems and Data Security Principles of ICT Systems and Data Security Ethical Hacking Ethical Hacking What is ethical hacking? Ethical Hacking It is a process where a computer security expert, who specialises in penetration testing

More information

If you have a computer enabled with Intel Active Management Technology

If you have a computer enabled with Intel Active Management Technology Chapter13 Intel Active Management Technology in Small and Medium-sized Business I do not fear computers. I fear the lack of them. Isaac Asimov (1920 1992) If you have a computer enabled with Intel Active

More information

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic

n Given a scenario, analyze and interpret output from n A SPAN has the ability to copy network traffic passing n Capacity planning for traffic Chapter Objectives n Understand how to use appropriate software tools to assess the security posture of an organization Chapter #7: Technologies and Tools n Given a scenario, analyze and interpret output

More information

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking 1 Review of TCP/IP working Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path Frame Path Chapter 3 Client Host Trunk Link Server Host Panko, Corporate

More information

Lecture (08) Internetwork Layer II

Lecture (08) Internetwork Layer II genda Lecture (08) Internetwork Layer II Network Layer (Layer 3) ddressing (continue) IP Routing and Routing Protocols y: Dr. hmed ElShafee ١ ٢ Private and public addresses ny host with a direct connection

More information

CTS2134 Introduction to Networking. Module : Troubleshooting

CTS2134 Introduction to Networking. Module : Troubleshooting CTS2134 Introduction to Networking Module 10.4 10.7: Troubleshooting Interpreting ipconfig Condition Static IP DHCP Alternate Configuration APIPA ipconfig /all Output DHCP Enabled = No and DHCP Server

More information

Features of Netcat. Abstract. Keywords. I. Introduction. II. History. Jeffrey Kurcz School of Computer Science University of Windsor

Features of Netcat. Abstract. Keywords. I. Introduction. II. History. Jeffrey Kurcz School of Computer Science University of Windsor Features of Netcat Jeffrey Kurcz School of Computer Science University of Windsor kurcz@uwindsor.ca Abstract This paper discusses the many uses that Netcat can perform for many different tasks that need

More information

Installation instructions for Choic Enterprise.

Installation instructions for Choic Enterprise. Installation instructions for ChoiceMail Enterprise. Please read this document in full before installing ChoiceMail Enterprise Files needed: ChoiceMail Enterprise Installation Package- the latest Installation

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

Using Diagnostic Tools

Using Diagnostic Tools Using Diagnostic Tools The Tools System Diagnostics page on the INVESTIGATE view provides several diagnostic tools that help troubleshoot various kinds of network problems and process monitors. Tech Support

More information

! " Lecture 5: Networking for Games (cont d) Packet headers. Packet footers. IP address. Edge router (cable modem, DSL modem)

!  Lecture 5: Networking for Games (cont d) Packet headers. Packet footers. IP address. Edge router (cable modem, DSL modem) Lecture 5: Networking for Games (cont d) Special Send case: to NAT 123.12.2.10 network 192.168.1.101 17.4.9.33 192.168.1.100 123.12.2.[0-128] IP address 23.11.3.10 Edge router (cable modem, DSL modem)

More information

Netcat Scanning to Backdoors

Netcat Scanning to Backdoors Netcat Scanning to Backdoors Security & Privacy on the Internet (03-60-467) Fall 2009 Submitted to Dr. A.K. Aggarwal Submitted By Jeffrey Kurcz School of Computer Science University of Windsor CONTENTS

More information

GreenEye Monitor. GEM Communication Setup Manual. For GEM model: GEM-W. (Wifi Only Option)

GreenEye Monitor. GEM Communication Setup Manual. For GEM model: GEM-W. (Wifi Only Option) GreenEye Monitor GEM Communication Setup Manual For GEM model: GEM-W (Wifi Only Option) Document Code: COM-W Ver 1.7 2013-10-23 Copyright Brultech Research Inc. 2013 Introduction CONTENTS 1 Introduction...

More information

BIPAC-645 DSL/Cable Router Plus ISDN Router With 4-Port 10/100M LAN Switch

BIPAC-645 DSL/Cable Router Plus ISDN Router With 4-Port 10/100M LAN Switch BIPAC-645 DSL/Cable Router Plus ISDN Router With 4-Port 10/100M LAN Switch Quick Start Guide Quick Start Guide Package Contents 1. BIPAC-645 2. AC Power Adapter (9V 1Amp) 3. RS-232 cable (Null modem type)

More information

Supporting Networked Computers

Supporting Networked Computers CHAPTER 7 Supporting Networked Computers After completing this chapter, you will be able to: Define the main concepts of networking, including the roles of TCP/IP, IP addresses, and subnet masks. Set up

More information