
Security Basics mailing list archives
Re: information harvesting from within the network
From: Alexander Klimov <alserkli () inbox ru>
Date: Sun, 22 May 2005 11:15:57 +0300 (IDT)
On Fri, 20 May 2005, ddjjembe 2 wrote:
Background: I work in a university that has university typical security practices. Currently any authenticated user can scan the parts of the network with tools like LANguard or Nessus and obtain a considerable amount of information from them. Most of the computers in our network are windows computers. We also have departments with MACs and *nix machines. Goal: If possible, lock down the Windows computers with group policies and/or templates to disable this potential unauthorized information harvesting users and then restrict scanning ability to the security group with LDAP permissions. Am I on the right track here? I would like to achieve this without using a host based firewall.
Probably you should first make clear why you want to stop this `unauthorized information harvesting.' Note that the names of your hosts are likely known from `Entire Network,' and it is very likely that in a university environment every host is more or less the same with respect to what services it runs and what `vulnearabilities' it has, e.g., if you have VNC installed on one host most likely it is installed on almost every other host (and even with the same password). Note that whatever you do to stop scanning from windows would not stop somebody plugging in his laptop and run nmap from it (or just booting linux live CD on the host). -- Regards, ASK
Current thread:
- information harvesting from within the network ddjjembe 2 (May 20)
- RE: information harvesting from within the network Jason Lopez (May 23)
- Re: information harvesting from within the network Alexander Klimov (May 23)
- <Possible follow-ups>
- RE: information harvesting from within the network Beauford, Jason (May 20)
- RE: information harvesting from within the network D Adler (May 23)
- RE: information harvesting from within the network Andrew Shore (May 23)
- Re: information harvesting from within the network Micheal Espinola Jr (May 24)
- Re: information harvesting from within the network Henry Anslinger (May 26)