Nmedia - Fotolia
What are the best anti-network reconnaissance tools for Linux and Ubuntu systems?
One anti-network reconnaissance tool to consider is Active Defense Harbinger Distribution (ADHD). This tool prevents an attacker from getting system information while inside the network infrastructure.
ADHD comes with several preconfigured tools to defend against network reconnaissance attackers. Two favorites are Network Obfuscation and Virtualized Anti-Reconnaissance (Nova) and Honey Badger.
Nova is an open source software tool that is aimed at detecting network reconnaissance efforts within a private network. This tool lures an attacker into interacting with decoy systems, including files and open ports. The attacker, however, is denied access to the real network.
You can have infinite directories to make it very difficult for the attacker to get to his target. You can also get Nova to automatically shut down a specific port when the attacker attempts to scan it. When Nova detects the attacker's network reconnaissance attempts, the system administrator gets an alert via email or from logs. The attack can come either from the internet or from employees inside your enterprise who are not authorized to look around the network.
Honey Badger creates a webpage that looks like, for example, a Cisco administration interface. When the attacker attempting network reconnaissance is lured into accessing the page, Honey Badger sends a Java app to the attacker's computer. The application quietly grabs the attacker's IP address and uses Google API to locate the computer. It adds any other information to the report, which is sent to the system administrator.
Other anti-reconnaissance tools take different approaches to potential threats. For example, Microsoft's NetCease tool has the capability to change the registry keys in Windows to restrict access to private networks, which Honey Badger does not have.
Find out if DMZ networks can still provide enterprise security benefits
Learn how IPv6 network reconnaissance can be used to identify vulnerabilities
Read how data obfuscation techniques can protect corporate information
Dig Deeper on Real-time network monitoring and forensics
Related Q&A from Judith Myerson
Brrr ransomware, a Dharma variant, was found adding malicious extensions to encrypted files. Discover how this is possible and how this attack can be... Continue Reading
Despite being designed to improve security, infosec experts have warned against preloading the HSTS protocol. Learn about the risks of preloaded HSTS... Continue Reading
Check Point researchers found a fax machine attack allowing attackers to access scanned documents. Discover how this is possible and how users can ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.