Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Wireless security wikipedia , lookup
Computer network wikipedia , lookup
Computer security wikipedia , lookup
Airborne Networking wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Network tap wikipedia , lookup
Distributed firewall wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Security Tools CS-480b Dick Steflik CACLS • Windows NT, W2000, XP • Displays or modifies access control lists (ACLs) of files CACLS • cacls /T /E /G administrator:F d:\users\*.* • Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. • cacls /T /E /R Everyone d:\users • Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. • Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. CACLS (examples) CACLS Of course anything done using CACLS could also be done through the GUI. NSLOOKUP • • • • Name Server Lookup Windows NT, W2000, Linux, UNIX used to resolve Internet names to IP addresses default (no parameter) returns default name server address (windows) ; on Linux/UNIX enters conversational mode allowing lookups until you quit NSLOOKUP Traceroute • Tracert (windows) ; traceroute (Linux/Unix) • used to display all of the routers between two communicating Internet hosts • options: • -d don’t resolve addresses to host names • -h (m) max number of hops to search for target • -j (hostlist) loose source route along the host list • -w (timeout) wait (timeout) msec for each reply tracert xmtr • LINUX version of traceroute • requires superuser authority • GUI application ping • Send an ICMP echo request message to a specific host • plat form differences • Linux - no parameters, sends repeated /continuous requests until terminated • Windows - -t switch send continuous pings • Unix (most) -s switch sends continuous pings ping WS-Ping – Security Analysis Tool • COTS (common Off The Shelf) IPSwitch • www.ipswitch.com • • • • • • • • Verify connectivity to a particular device on your network Quantitatively test data connections between your computer and a remote system Trace the path to a network host or device Obtain information on host names and IP addresses Scan your network and list devices and network services View summary information about a network host or device including the official hostname, IP address, and contact information (from the Whois database) View Simple Network Management Protocol values as well as Windows network domains, hosts, and workstations Search information (such as user's full names and e-mail addresses) available through LDAP WS-Ping • Features tools for : • Ping - Click to Enlarge Ping - Use Ping to determine if a network device is reachable. • Traceroute - Use traceroute to trace the path to a network host or device. • Throughput - Click to Enlarge Throughput - Use Throughput to test the data speed on a connection with a remote host. • Lookup - Use Lookup to obtain information on host names and IP addresses. • Info - Use the Info tool to view summary information about a network host or device. • Whois - Use Whois to obtain information on names from the Network Information Center. • Finger - Use finger to obtain information about a user or host (if supported on the remote host). • SNMP - Use the SNMP tool to view Simple Network Management Protocol values. • Scan - Use Scan to scan your network and list devices. • WinNet - Use the WinNet tool to view your Windows Network domains, hosts, and workstations. • LDAP- Use the LDAP tool to search for names and information available through LDAP. • Time - Use the time tool to query multiple time servers or to synchronize your local system clock. • Quote - Use Quote to view quotations from a Quote server. • HTML - Use the HTML tool to help you efficiently debug your Web site. SATAN • Security Administrators Tool for Analyzing Networks • • • • • web based Ten years old Open Source ( http://www.fish.com/satan Rational for SATAN is explained at : • http://www.fish.com/satan/admin-guide-to-cracking.html There are a number of SATAN derivatives: • SAINT Scan Engine – Saint Corporation • http://www.saintcorporation.com/products/saint_engine.html • SANTA SATAN • SATAN recognizes several common networkingrelated security problems, and reports the problems without actually exploiting them. • For each type or problem found, SATAN offers a tutorial that explains the problem and what its impact could be. • The tutorial also explains what can be done about the problem: correct an error in a configuration file, install a bugfix from the vendor, use other means to restrict access, or simply disable service. Problems Found by SATAN • • • • • • • • • • NFS file systems exported to arbitrary hosts NFS file systems exported to unprivileged programs NFS file systems exported via the portmapper NIS password file access from arbitrary hosts Old (i.e. before 8.6.10) sendmail versions REXD access from arbitrary hosts X server access control disabled arbitrary files accessible via TFTP remote shell access from arbitrary hosts writable anonymous FTP home directory Nessus • Vulnerability Scanner • Nessus development Team • plug-in based • • • • • • • • • • • • • • Finger Abuses Windows Backdoors Gain a shell remotely CGI abuses Remote file access RPC Firewalls FTP SMTP Gain root remotely NIS DOS Miscellaneous Nessus • Client Server architecture • plug-ins are for the server, client is for administration and analysis • creates reports in HTML, LaTeX, ASCII, and XML • including graphs