Nmedia - Fotolia
What are the best anti-network reconnaissance tools for Linux and Ubuntu systems?
One anti-network reconnaissance tool to consider is Active Defense Harbinger Distribution (ADHD). This tool prevents an attacker from getting system information while inside the network infrastructure.
ADHD comes with several preconfigured tools to defend against network reconnaissance attackers. Two favorites are Network Obfuscation and Virtualized Anti-Reconnaissance (Nova) and Honey Badger.
Nova is an open source software tool that is aimed at detecting network reconnaissance efforts within a private network. This tool lures an attacker into interacting with decoy systems, including files and open ports. The attacker, however, is denied access to the real network.
You can have infinite directories to make it very difficult for the attacker to get to his target. You can also get Nova to automatically shut down a specific port when the attacker attempts to scan it. When Nova detects the attacker's network reconnaissance attempts, the system administrator gets an alert via email or from logs. The attack can come either from the internet or from employees inside your enterprise who are not authorized to look around the network.
Honey Badger creates a webpage that looks like, for example, a Cisco administration interface. When the attacker attempting network reconnaissance is lured into accessing the page, Honey Badger sends a Java app to the attacker's computer. The application quietly grabs the attacker's IP address and uses Google API to locate the computer. It adds any other information to the report, which is sent to the system administrator.
Other anti-reconnaissance tools take different approaches to potential threats. For example, Microsoft's NetCease tool has the capability to change the registry keys in Windows to restrict access to private networks, which Honey Badger does not have.
Find out if DMZ networks can still provide enterprise security benefits
Learn how IPv6 network reconnaissance can be used to identify vulnerabilities
Read how data obfuscation techniques can protect corporate information
Dig Deeper on Real-time network monitoring and forensics
Related Q&A from Judith Myerson
The Signal Desktop application was found to be making decryption keys available in plaintext. Learn how the SQLite database and plaintext passwords ... Continue Reading
An exploit code for Dirty COW was accidentally shipped by Cisco with product software. Learn how this code ended up in a software release and what ... Continue Reading
Cisco's Webex Meetings platform had to be re-patched after researchers found the first one was failing. Discover what went wrong with the first patch... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.