Nmedia - Fotolia
What are the best anti-network reconnaissance tools for Linux and Ubuntu systems?
One anti-network reconnaissance tool to consider is Active Defense Harbinger Distribution (ADHD). This tool prevents an attacker from getting system information while inside the network infrastructure.
ADHD comes with several preconfigured tools to defend against network reconnaissance attackers. Two favorites are Network Obfuscation and Virtualized Anti-Reconnaissance (Nova) and Honey Badger.
Nova is an open source software tool that is aimed at detecting network reconnaissance efforts within a private network. This tool lures an attacker into interacting with decoy systems, including files and open ports. The attacker, however, is denied access to the real network.
You can have infinite directories to make it very difficult for the attacker to get to his target. You can also get Nova to automatically shut down a specific port when the attacker attempts to scan it. When Nova detects the attacker's network reconnaissance attempts, the system administrator gets an alert via email or from logs. The attack can come either from the internet or from employees inside your enterprise who are not authorized to look around the network.
Honey Badger creates a webpage that looks like, for example, a Cisco administration interface. When the attacker attempting network reconnaissance is lured into accessing the page, Honey Badger sends a Java app to the attacker's computer. The application quietly grabs the attacker's IP address and uses Google API to locate the computer. It adds any other information to the report, which is sent to the system administrator.
Other anti-reconnaissance tools take different approaches to potential threats. For example, Microsoft's NetCease tool has the capability to change the registry keys in Windows to restrict access to private networks, which Honey Badger does not have.
Find out if DMZ networks can still provide enterprise security benefits
Learn how IPv6 network reconnaissance can be used to identify vulnerabilities
Read how data obfuscation techniques can protect corporate information
Dig Deeper on Real-time network monitoring and forensics
Related Q&A from Judith Myerson
The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Continue Reading
Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on ... Continue Reading
The Signal Desktop application was found to be making decryption keys available in plaintext. Learn how the SQLite database and plaintext passwords ... Continue Reading