virtualization, cloud computing and os fingerprinting
TRANSCRIPT
Virtualization,Cloud
Computing, and OSF
Virtualization
What
WhenWhy
Virtualization
• creation of a virtual version of something.
• subjectively a complete machine but objectively not.
• IBM early 50s• Unix Users Workspace• 1990 Application
Virtualization by java “Stealth” project
• 1998 VMware
• Easily controlled• Coast Effective• Disaster recovery• Server virtualization
Types of Virtualization
Virt
ualiz
ation
Full virtualization
Para virtualization
• OS Runs on the Hypervisor as User level Process (Ring 3)• Less Privileges• No need to make changes to OS Code• Trap and Emulate
• Modify Guest OS source• OS can see Access hardware underneath Hypervisor• OS know that it’s virtualized
Cloud Computing
What
When
Why
Where
• the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
• Started in the 1950s.• 1990s virtualized
private network connections.
Coast Effective• Universal access.• Environment
Friendly• Flexible
• PaaS & IaaS.• Private & Hybrid.• Big Data Analytics.• File Storage.• Backup
OS Fringprinting
Memory Based
UFO
FS Based
Network Based
OS Fingerprinting Techniques
Network Based
Getting IP System Status
Sending Packets
AnalyzingComparingOS Detected
Network Based Open ports for operation
ICMP and Modern Firewalls
Speed
Antifinger OS Solutions
File System Based
Unknown FS
Not very accurate on non-Linux OSs
Encryption
UFO
Generating Signatures
Adding to Database
Getting Signatures
From Target
Matching OS Detected
Memory Based
OS DetectedcomparisonComputing
HashSeparationDump Memory
The End