`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`
`VULNERABILITY SCANNERS: A PROACTIVE
`VULNERABILITY SCANNERS: A PROACTIVE
`APPROACH TO ASSESS WEB APPLICATION SECURITY
`APPROACH TO ASSESS WEB APPLICATION SECURITY
`
`Sheetal Bairwa1, Bhawna Mewara2and Jyoti Gajrani3
`Sheetal Bairwal, Bhawna Mewara2and Jyoti Gajrani3
`
`1,2,3Department of Information Technology, Government Engineering College, Ajmer
`1,2,3Department of Information Technology, Government Engineering College, Ajmer
`
`ABSTRACT
`ABSTRACT
`
`With the increasing concern for security in the network, many approaches are laid out that try to protect
`With the increasing concern for security in the network, many approaches are laid out that try to protect
`the network from unauthorised access. New methods have been adopted in order to find the potential
`the network from unauthorised access. New methods have been adopted in order to find the potential
`discrepancies that may damage the network. Most commonly used approach is the vulnerability
`discrepancies that may damage the network. Most commonly used approach is the vulnerability
`assessment. By vulnerability, we mean, the potential flaws in the system that make it prone to the attack.
`assessment. By vulnerability, we mean, the potential flaws in the system that make it prone to the attack.
`Assessment of these system vulnerabilities provide a means to identify and develop new strategies so as to
`Assessment of these system vulnerabilities provide a means to identify and develop new strategies so as to
`protect the system from the risk of being damaged. This paper focuses on the usage of various vulnerability
`protect the system from the risk of being damaged. This paper focuses on the usage of various vulnerability
`scanners and their related methodology to detect the various vulnerabilities available in the web
`scanners and their related methodology to detect the various vulnerabilities available in the web
`applications or the remote host across the network and tries to identify new mechanisms that can be
`applications or the remote host across the network and tries to identify new mechanisms that can be
`deployed to secure the network.
`deployed to secure the network.
`
`KEYWORDS
`KEYWORDS
`
`Vulnerability, Static analysis, Attack graph, Scanners, Test–Bed
`Vulnerability, Static analysis, Attack graph, Scanners, Test—Bed
`
`1. INTRODUCTION
`1. INTRODUCTION
`
`With the emergence of information technology, the security aspect of the users has become a
`With the emergence of information technology, the security aspect of the users has become a
`more concerned factor. Since most of the software developers are not aware of various security
`more concerned factor. Since most of the software developers are not aware of various security
`measures to be introduced into the system as their motive is just to make the software application
`measures to be introduced into the system as their motive is just to make the software application
`run in a desired state without taking into consideration the flaws that the programming language
`run in a desired state without taking into consideration the flaws that the programming language
`might have introduced into the system; to protect the users from the risk of being attacked by any
`might have introduced into the system; to protect the users from the risk of being attacked by any
`unauthorised access, it becomes significantly more important to devise new strategies and
`unauthorised access, it becomes significantly more important to devise new strategies and
`methodologies that will consider the security breaches to which the user is prone to. Not only the
`methodologies that will consider the security breaches to which the user is prone to. Not only the
`software developed with flaws makes the user vulnerable to attacks, most often network also
`software developed with flaws makes the user vulnerable to attacks, most often network also
`becomes a key factor by compromising the security aspect of the users.
`becomes a key factor by compromising the security aspect of the users.
`
`Assessing and eliminating the vulnerabilities requires the knowledge and deep understanding of
`Assessing and eliminating the vulnerabilities requires the knowledge and deep understanding of
`these vulnerabilities. It becomes necessary enough to know the basic idea that works behind these
`these vulnerabilities. It becomes necessary enough to know the basic idea that works behind these
`vulnerabilities such as what makes them to appear in the system, what flaws need to be corrected
`vulnerabilities such as what makes them to appear in the system, what flaws need to be corrected
`to make the system free from these vulnerabilities, what alternatives can be further devised for
`to make the system free from these vulnerabilities, what alternatives can be further devised for
`these vulnerabilities so that in future, their risk can be reduced and many more.
`these vulnerabilities so that in future, their risk can be reduced and many more.
`Various methods have been deployed to identify these vulnerabilities and appropriate steps are
`Various methods have been deployed to identify these vulnerabilities and appropriate steps are
`taken. Strategies such as static analysis, attack graph generation and its analysis, usage of
`taken. Strategies such as static analysis, attack graph generation and its analysis, usage of
`vulnerability scanners are some of them. However, the use of vulnerability scanners to detect the
`vulnerability scanners are some of them. However, the use of vulnerability scanners to detect the
`vulnerabilities is quite prominent today. They play a significant role in the generation of attack
`vulnerabilities is quite prominent today. They play a significant role in the generation of attack
`graphs.
`graphs.
`
`DOI:10.5121/ijcsa.2014.4111
`DO1:10.5121/ijcsa.2014.4111
`
`113
`113
`
`WIZ, Inc. EXHIBIT - 1030
`WIZ, Inc. v. Orca Security LTD.
`
`WIZ, Inc. EXHIBIT - 1030
`WIZ, Inc. v. Orca Security LTD.
`
`
`
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`Our work involves study of various port scanners and vulnerability scanners, scanning of various
`Our work involves study of various port scanners and vulnerability scanners, scanning of various
`online web applications and remote host using these scanners. We analysed various
`online web applications and remote host using these scanners. We analysed various
`vulnerabilities and make a comparison of various scanners based on their capability to identify
`vulnerabilities and make a comparison of various scanners based on their capability to identify
`these vulnerabilities.
`these vulnerabilities.
`
`Section 2 explains various techniques developed before the usage of vulnerability scanners.
`Section 2 explains various techniques developed before the usage of vulnerability scanners.
`Section 3 describes various vulnerability scanners in detail with the results, when applied on
`Section 3 describes various vulnerability scanners in detail with the results, when applied on
`various websites. Comparative study of various scanners is given in Section 4.
`various websites. Comparative study of various scanners is given in Section 4.
`
`2. TECHNIQUES FOR VULNERABILITY SCANNING
`2. TECHNIQUES FOR VULNERABILITY SCANNING
`
`2.1 STATIC ANALYSIS
`2.1 STATIC ANALYSIS
`
`Static analysis is a fast and reliable technique. It has been considered as an efficient method in
`Static analysis is a fast and reliable technique. It has been considered as an efficient method in
`detecting the vulnerabilities [3].This technique focuses on the analysis of program structure using
`detecting the vulnerabilities [3].This technique focuses on the analysis of program structure using
`various means. It emphasizes on the analysis of the code of the program in order to detect the
`various means. It emphasizes on the analysis of the code of the program in order to detect the
`flaws present in it.
`flaws present in it.
`
`Some of the techniques included in static analysis are lexical analysis, type inference, constraint
`Some of the techniques included in static analysis are lexical analysis, type inference, constraint
`analysis and many more. Lexical analysis focuses on the semantics of the program structure; the
`analysis and many more. Lexical analysis focuses on the semantics of the program structure; the
`program structure is divided into modules and then each module is compared with the loophole
`program structure is divided into modules and then each module is compared with the loophole
`library in order to detect any flaws present in the system. Type inference is related to the data type
`library in order to detect any flaws present in the system. Type inference is related to the data type
`rules for the variable. It determines whether the variables used in the program are in sync with the
`rules for the variable. It determines whether the variables used in the program are in sync with the
`type to which they relate. Constraint analysis is a two-step process. It involves- constraint
`type to which they relate. Constraint analysis is a two-step process. It involves- constraint
`generation and constraint solution [1].
`generation and constraint solution [1].
`
`Many tools based on the techniques mentioned above are developed. The first tool developed was
`Many tools based on the techniques mentioned above are developed. The first tool developed was
`FlexeLint. It uses pattern matching algorithm to detect flaws. Other tools developed are ITS4,
`FlexeLint. It uses pattern matching algorithm to detect flaws. Other tools developed are ITS4,
`SPLINT, UNO, FindBugs, Checkstyle, ESC/Java, and PMD. ITS4, Checkstyle and PMD are
`SPLINT, UNO, FindBugs, Checkstyle, ESC/Java, and PMD. ITS4, Checkstyle and PMD are
`based on lexical analysis; SPLINT is based on rule checking; UNO is based on model checking;
`based on lexical analysis; SPLINT is based on rule checking; UNO is based on model checking;
`ESC/Java is based on theorem proving and FindBugs is based on both lexical and dataflow
`ESC/Java is based on theorem proving and FindBugs is based on both lexical and dataflow
`analysis [1].
`analysis [1].
`
`These tools have been evaluated by analysing their performance in terms of false positives and
`These tools have been evaluated by analysing their performance in terms of false positives and
`false negatives. Many of them have low false positives, some produce accurate results and many
`false negatives. Many of them have low false positives, some produce accurate results and many
`witnessed high false negatives. Hence, static analysis techniques have many demerits associated
`witnessed high false negatives. Hence, static analysis techniques have many demerits associated
`with them. For instance, a loophole library or database is maintained which is used to validate the
`with them. For instance, a loophole library or database is maintained which is used to validate the
`vulnerabilities found in the program; however if an unknown vulnerability is detected, then it is
`vulnerabilities found in the program; however if an unknown vulnerability is detected, then it is
`not possible to compare it with the predefined loophole library for its validation [1].
`not possible to compare it with the predefined loophole library for its validation [1].
`
`Thus, to resolve the deficiencies associated with the static analysis, an approach was suggested
`Thus, to resolve the deficiencies associated with the static analysis, an approach was suggested
`that involved combining the dynamic detection strategy with static analysis.
`that involved combining the dynamic detection strategy with static analysis.
`
`2.2 ATTACKGRAPH ANALYSIS
`2.2 ATTACKGRAPH ANALYSIS
`
`Attack graph is defined as the succinct representation of all the paths followed by an attacker in a
`Attack graph is defined as the succinct representation of all the paths followed by an attacker in a
`network to achieve its desired state. The desired state may involve damaging the network,
`network to achieve its desired state. The desired state may involve damaging the network,
`stealing the network packets or gaining a complete access over it to determine what is going in
`stealing the network packets or gaining a complete access over it to determine what is going in
`the network.
`the network.
`
`114
`114
`
`
`
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`Network security is a key aspect of security concern and many ways have been identified to
`Network security is a key aspect of security concern and many ways have been identified to
`protect it. The recent approach that has been included is the use of attack graphs. Attack graph has
`protect it. The recent approach that has been included is the use of attack graphs. Attack graph has
`become the most widely used approach with reference to network security.
`become the most widely used approach with reference to network security.
`
`Attack graphs help to determine the security weaknesses that lie in the network. System
`Attack graphs help to determine the security weaknesses that lie in the network. System
`administrators use it to analyze the network for its weaknesses that may allow an attacker to
`administrators use it to analyze the network for its weaknesses that may allow an attacker to
`exploit it and gain control over the network [2]. Attack graphs are usually large enough as they
`exploit it and gain control over the network [2]. Attack graphs are usually large enough as they
`represent the complete network with its underlying weaknesses, hence they are quite complex to
`represent the complete network with its underlying weaknesses, hence they are quite complex to
`understand and analyse. Both the generation and analysis of attack graph are significant for
`understand and analyse. Both the generation and analysis of attack graph are significant for
`protecting the network from security breaches.
`protecting the network from security breaches.
`
`The most common approach to generate an attack graph requires the analysis of vulnerabilities
`The most common approach to generate an attack graph requires the analysis of vulnerabilities
`that lie in the network and then using an attack graph generator, attack graphs can be generated
`that lie in the network and then using an attack graph generator, attack graphs can be generated
`[4]. The vulnerabilities could be identified with the help of various vulnerability scanners that are
`[4]. The vulnerabilities could be identified with the help of various vulnerability scanners that are
`designed for this purpose only. Specifically, Nessus is extensively used for the identification of
`designed for this purpose only. Specifically, Nessus is extensively used for the identification of
`the underlying vulnerabilities.
`the underlying vulnerabilities.
`
`Various other techniques have already been proposed for generating an attack graph as well as for
`Various other techniques have already been proposed for generating an attack graph as well as for
`their analysis. For instance, adjacency matrix clustering algorithm makes the complex attack
`their analysis. For instance, adjacency matrix clustering algorithm makes the complex attack
`graph simpler enough. It combines the blocks having similar attack graph pattern. The matrix
`graph simpler enough. It combines the blocks having similar attack graph pattern. The matrix
`represents the attack reachability within one step. For multiple steps, matrix is raised to a higher
`represents the attack reachability within one step. For multiple steps, matrix is raised to a higher
`power level [13].
`power level [13].
`
`Ranking algorithm is another approach, based on the rank of the attack graphs. The rank decides
`Ranking algorithm is another approach, based on the rank of the attack graphs. The rank decides
`the priority of an attack graph that is more applicable to attacker [14]. Another approach is a
`the priority of an attack graph that is more applicable to attacker [14]. Another approach is a
`game theoretic approach where the attacker and network administrator are considered as two
`game theoretic approach where the attacker and network administrator are considered as two
`players and a Nash equilibrium is applied that gives the administrator an idea of attacker’s
`players and a Nash equilibrium is applied that gives the administrator an idea of attacker's
`strategy and helps him to plan to do something in order to protect the network [12].
`strategy and helps him to plan to do something in order to protect the network [12].
`
`Table 1 above compares the various attack graph generation and analysis techniques and
`Table 1 above compares the various attack graph generation and analysis techniques and
`illustrates the advantages and disadvantages of each [2].
`illustrates the advantages and disadvantages of each [2].
`
`Technique
`
`Author
`
`Clustered
`adjacency
`matrix
`
`Steven Noel
`Sushi N9,514
`
`Hierarchical
`aggregation
`
`Steven Noel
`Sushi J jjRcLia
`
`Merits
`Automatic, parameter-
`free, and scales linearly
`with problem size
`
`Fran*work useful for
`both computational
`and cognitive scalability
`
`Demerits
`Need to calculate highest level of
`adjacency matrix for multistep
`reach
`li c,
`The process of interactive de-
`aggregation is potemiallytedious to
`determine low level details
`
`Minimization
`analysis
`
`S. Ma
`0. SI,asna
`J. Wing
`
`Ranking graph yaibbav
`Mehta
`C. ,Dartzi5,
`_aif,slig Thu
`Edmund
`Clarke
`J. Wing
`
`Identifies the smallest
`set of countermeasures
`required to prevent all
`possible attack paths
`Ease and flexibility of
`modelling
`
`Approach is limited to Directed
`Acyclic Graph
`
`Difficult for security manager to
`make decision on actions to protect
`network
`
`Game theoretic K.W. Lye
`Jeannette
`Wing
`
`Allows to know more
`about attacker's
`attack strategies
`
`Full state space is extremely large.
`
`Table 1: Comparison of the attack graph techniques
`Table 1: Comparison of the attack graph techniques
`
`115
`115
`
`
`
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`3. VULNERABILITY SCANNERS
`3. VULNERABILITY SCANNERS
`
`A large number of applications are becoming online, but how secure are these products is a matter
`A large number of applications are becoming online, but how secure are these products is a matter
`of concern as it is related to the user’s security who will be ultimately using the application. Thus,
`of concern as it is related to the user's security who will be ultimately using the application. Thus,
`it becomes necessary to find out vulnerabilities present in the software application that may cause
`it becomes necessary to find out vulnerabilities present in the software application that may cause
`a severe risk to the user’s security [5].
`a severe risk to the user's security [5].
`
`Vulnerability assessment means identifying the vulnerabilities in the system before they could be
`Vulnerability assessment means identifying the vulnerabilities in the system before they could be
`used by anyone else with bad intentions of harming the network. This is a proactive approach
`used by anyone else with bad intentions of harming the network. This is a proactive approach
`where the vulnerability is found and is dealt with accordingly before anyone comes to know about
`where the vulnerability is found and is dealt with accordingly before anyone comes to know about
`it. More emphasis has always been laid on the firewall protection but the internal functionality
`it. More emphasis has always been laid on the firewall protection but the internal functionality
`does matter. Vulnerability assessment is not only performed on a particular application but it even
`does matter. Vulnerability assessment is not only performed on a particular application but it even
`correlates the platform on which the application is being run, middleware, operating system being
`correlates the platform on which the application is being run, middleware, operating system being
`used etc. It takes into consideration all the factors that can provide the correct answer for the
`used etc. It takes into consideration all the factors that can provide the correct answer for the
`assessment of the vulnerability and security of the system. Therefore, vulnerability scanners are
`assessment of the vulnerability and security of the system. Therefore, vulnerability scanners are
`used to scan the network system and/or the software applications.
`used to scan the network system and/or the software applications.
`
`Scanning can be of two types:
`Scanning can be of two types:
`
`a) Passive Scanning: In passive scanning, it is determined whether a tool can enlist the
`a) Passive Scanning: In passive scanning, it is determined whether a tool can enlist the
`vulnerabilities by considering the existing network.
`vulnerabilities by considering the existing network.
`b) Active Scanning: In active scanning, it is determined whether the queries can be made to
`b) Active Scanning: In active scanning, it is determined whether the queries can be made to
`the network for the vulnerability.
`the network for the vulnerability.
`
`Different categories of scanner are:
`Different categories of scanner are:
`
`a) Port Scanners: Port scanners are used to scan the ports for determining the open and
`a) Port Scanners: Port scanners are used to scan the ports for determining the open and
`closed ports, operating system, services offered.
`closed ports, operating system, services offered.
`b) Application Scanners: Application scanners are used to assess a specific application on
`b) Application Scanners: Application scanners are used to assess a specific application on
`the network in order to track its weaknesses that can be further used to cause the risk to
`the network in order to track its weaknesses that can be further used to cause the risk to
`the system.
`the system.
`c) Vulnerability Scanners: Vulnerability scanners are the ones that find out the
`c) Vulnerability Scanners: Vulnerability scanners are the ones that find out the
`vulnerabilities in the system which if accessed by a malicious user or hacker can put the
`vulnerabilities in the system which if accessed by a malicious user or hacker can put the
`whole network system at risk.
`whole network system at risk.
`
`Penetration testing is the other concept that follows the vulnerability assessment. With penetration
`Penetration testing is the other concept that follows the vulnerability assessment. With penetration
`testing, it is possible to make use of the loopholes or vulnerabilities to gain an unauthorised
`testing, it is possible to make use of the loopholes or vulnerabilities to gain an unauthorised
`access. It validates how effectively the system can respond to the real life attacks.
`access. It validates how effectively the system can respond to the real life attacks.
`
`OWASP (Open Web Application security Project) focuses on providing the better security of the
`OWASP (Open Web Application security Project) focuses on providing the better security of the
`software. It has enlisted commonly critical vulnerabilities that the application may be prone to.
`software. It has enlisted commonly critical vulnerabilities that the application may be prone to.
`These vulnerabilities when exploited provide the risk of losing security and confidentiality. For
`These vulnerabilities when exploited provide the risk of losing security and confidentiality. For
`instance, Injection vulnerability occurs due to the execution of a command or query for an
`instance, Injection vulnerability occurs due to the execution of a command or query for an
`untrusted data; Broken Authentication and Session Management, due to improper implementation
`untrusted data; Broken Authentication and Session Management, due to improper implementation
`of an application risks the user’s confidentiality. Cross Site Scripting, commonly referred as XSS
`of an application risks the user's confidentiality. Cross Site Scripting, commonly referred as XSS
`is another flaw in which attacker injects malicious script into web pages viewed by users and also
`is another flaw in which attacker injects malicious script into web pages viewed by users and also
`to bypass access controls. Insecure Direct Object References, in which developers unknowingly
`to bypass access controls. Insecure Direct Object References, in which developers unknowingly
`leave some holes which give a chance to attackers to access and manipulate directory, database
`leave some holes which give a chance to attackers to access and manipulate directory, database
`key. Cross Site Request Forgery or CSRF, is an attack where user is forged to click on a link that
`key. Cross Site Request Forgery or CSRF, is an attack where user is forged to click on a link that
`is intuitively designed to steal the cookies and other private details of the user. Sensitive data
`is intuitively designed to steal the cookies and other private details of the user. Sensitive data
`exposure is another area of vulnerability where the sensitive data such as credit card details,
`exposure is another area of vulnerability where the sensitive data such as credit card details,
`authentication credentials etc. are not secured which helps an attacker to conduct the fraud [15].
`authentication credentials etc. are not secured which helps an attacker to conduct the fraud [15].
`
`116
`116
`
`
`
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`Next subsections discuss various scanners and the results obtained by scanning various web
`Next subsections discuss various scanners and the results obtained by scanning various web
`applications using these scanners.
`applications using these scanners.
`
`3.1 NMAP
`3.1 NMAP
`
`Nmap is a port scanner that is used to scan the ports. It takes an IP address or the host name and
`Nmap is a port scanner that is used to scan the ports. It takes an IP address or the host name and
`then finds the basic information related to it. If an IP address is provided, it then finds the host to
`then finds the basic information related to it. If an IP address is provided, it then finds the host to
`which it belongs to. It also finds the number of ports that are running on that particular host,
`which it belongs to. It also finds the number of ports that are running on that particular host,
`number of ports that are opened, number of closed ports, services provided by those ports, for
`number of ports that are opened, number of closed ports, services provided by those ports, for
`instance, whether services are TCP-oriented or FTP-oriented [10]. It even predicts the type of
`instance, whether services are TCP-oriented or FTP-oriented [10]. It even predicts the type of
`operating system being used on that particular host. The topology of the scanned host is recorded
`operating system being used on that particular host. The topology of the scanned host is recorded
`in the graphical format which shows the various gateways through which the local machine
`in the graphical format which shows the various gateways through which the local machine
`accesses that particular remote host.
`accesses that particular remote host.
`
`Considering the ports that are opened, an attack can be designed in order to have an unauthorised
`Considering the ports that are opened, an attack can be designed in order to have an unauthorised
`and a legitimate access to the host with a goal set in mind. Moreover, if the opened ports are
`and a legitimate access to the host with a goal set in mind. Moreover, if the opened ports are
`providing the services which are TCP-oriented or FTP-oriented, it becomes easy to gain access to
`providing the services which are TCP-oriented or FTP-oriented, it becomes easy to gain access to
`the host.
`the host.
`
`A number of various sites have been scanned using NMAP. The figure below depicts the results
`A number of various sites have been scanned using NMAP. The figure below depicts the results
`obtained after scanning RTU website.
`obtained after scanning RTU website.
`
`Scan
`
`lode Profile Help
`
`Target
`
`lvimmr.duaKan
`
`Command: nmap-T4-A-vmmvio.rtuadn
`
`, .4.4..
`
`Services
`
`Nmap Output Ports/ Hosts I Topology I Host Detail I Scans
`
`Profile
`
`f Irdensescan
`
`OS ( Host
`
`'
`
`V
`
`lovrvidtthacM(115.
`
`1921683137
`
`nrnap-T4-A-vwmwduacjn
`
` Scanning www.rtu.ac.in (115.178.96.9) [4 ports]
`Completed Ping Scan at 09:53, 0.27s elapsed (1 total hosts)
`Initiating Parallel DNS resolution of 1 host. at 09:53
`Completed Parallel DNS resolution of 1 host. at 09:53, 8.06s elapsed
`Initiating SYN Stealth Scan at 09:53
`Scanning www.rtu.ac.in (115.178.96.9) [1000 ports]
`Discovered open port 3306/tcp on 115.178.96.9
`Discovered open port 21/tcp on 115.178.96.9
`Discovered open port 111/tcp on 115.178.96.9
`Discovered open port 80/tcp on 115.178.96.9
`Discovered open port 443/tcp on 115.178.96.9
`Discovered open port 22/tcp on 115.178.96.9
`Discovered open port 8443/top on 115.178.96.9
`Increasing send delay for 115.178.96.9 from 0 to 5 due to max_successful_tryno increase to 5
`Increasing send delay for 115.178.96.9 from 5 to 10 due to max_successful_tryno increase to 6
`Completed SYN Stealth Scan at 09:54, 54.863 elapsed (1000 total ports)
`Initiating Service scan at 09:54
`Scanning 7 services on www.rtu.ac.in (115.178.96.9)
`Completed Service scan at 09:55, 77.73s elapsed (7 services on 1 host)
`Initiating RPCGrind Scan against www.rtu.ac.in (115.178.96 at 09:55
`Completed RPCGrind Scan against www.rtu.ac.in (115.178.96 at 09:55, 4.443 elapsed (1 port)
`Initiating OS detection (try 91) against www.rtu.ac.in (115.178.96.9)
`Retrying OS detection (try 92) against www.rtu.ac.in (115.178.96.9)
`Initiating Traceroute at 09:56
`
`Figure1. Nmap basic output for RTU website
`Figurel. Nmap basic output for RTU website
`
`Figure 1 shows the basic details of RTU website including the IP address, number of total ports
`Figure 1 shows the basic details of RTU website including the IP address, number of total ports
`available, number of open ports discovered, performing RPCGrind scan and much more other
`available, number of open ports discovered, performing RPCGrind scan and much more other
`relevant details.
`relevant details.
`
`117
`117
`
`
`
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014
`
`In
`
`!Atria !t trine sten
`
`Scan _zos attic Help
`
`tesiel
`
`unaw.il to e.. n
`
`am' and
`
`^map -- 1 -A -venew.itu.ac. n
`
`Hosts I[ Sen.i...
`
`',map Output I Ports I Hosts I Tcpolocr, Host: e:a is I Sons
`
`5S e I-0.3
`/rain stu.ac in (1_3.
`
`--
`
`III, E21633.1E,
`
`n-nm.rt.s.oc..- (1151/3.3t.i.: ,
`
`HI tn....wads
`
`U last States
`State
`.a pied.
`
`NP
`t
`
`Intrusl ports 1
`C osed ports,
`SW
`
`1
`
`5csrned ports:
`Uc t me
`I ni. li 0
`
`.:tR.:
`_22
`Wm! Cit ,11 09:11:37 :013
`
`E Addresses
`9 Pv4 1' 71 :8.969
`
`tire Not r.vm able
`P/..1,C, Not aye able
`
`El Hastens,.
`
`tikrnr. —ypa an....to.ac. n uscr
`Mutt- —ype 1:7.17896.9 Ltc.kdapa.•set.i. s - PTR
`
`E Operating System
`tykrosaft1sAndows vista H crn e , rern urn
`SDI. W meant o' Sever 27.08
`
`Pik m.
`
`ALcusaty
`
`Figure2. Host details of RTU
`Figure2. Host details of RTU
`
`Figure 2 outlays the host details of RTU website which includes the host status that depicts the
`Figure 2 outlays the host details of RTU website which includes the host status that depicts the
`number of total ports scanned, number of open ports available, number of filtered ports. It shows
`number of total ports scanned, number of open ports available, number of filtered ports. It shows
`IPv4 address of the website ;IPv6 and MAC address are not available for this website. Further,
`IPv4 address of the website ;IPv6 and MAC address are not available for this website. Further,
`the type of operating system used and its accuracy of being correct is also illustrated. In this case,
`the type of operating system used and its accuracy of being correct is also illustrated. In this case,
`types of operating system detected may be Microsoft Windows Vista Home Premiu

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site