Security%20Tools - PowerPoint PPT Presentation

About This Presentation
Title:

Security%20Tools

Description:

For each type or problem found, SATAN offers a tutorial that explains the ... Problems Found by SATAN. NFS file systems exported to arbitrary hosts ... – PowerPoint PPT presentation

Number of Views:49
Avg rating:3.0/5.0
Slides: 20
Provided by: Dic972
Category:

less

Transcript and Presenter's Notes

Title: Security%20Tools


1
Security Tools
  • CS-480b
  • Dick Steflik

2
CACLS
  • Windows NT, W2000, XP
  • Displays or modifies access control lists (ACLs)
    of files

3
CACLS
  • cacls /T /E /G administratorF d\users\.
  • Cacls will add Full Control for the adminsitrator
    account all files and subfolders in the Users
    folder of the D\ drive.
  • cacls /T /E /R Everyone d\users
  • Cacls will remove all permissions for the
    'Everyone' group in all files and subfolders in
    the Users folder of the D\ drive.
  • Be sure to use the /E switch when you are just
    making modifications to a specific account or
    group. Without the /E switch, your settings will
    replace the current security with only what is
    specified.

4
CACLS (examples)
5
CACLS
Of course anything done using CACLS could also be
done through the GUI.
6
NSLOOKUP
  • Name Server Lookup
  • Windows NT, W2000, Linux, UNIX
  • used to resolve Internet names to IP addresses
  • default (no parameter) returns default name
    server address (windows) on Linux/UNIX enters
    conversational mode allowing lookups until you
    quit

7
NSLOOKUP
8
Traceroute
  • Tracert (windows) traceroute (Linux/Unix)
  • used to display all of the routers between two
    communicating Internet hosts
  • options
  • -d dont resolve addresses to host names
  • -h (m) max number of hops to search for target
  • -j (hostlist) loose source route along the host
    list
  • -w (timeout) wait (timeout) msec for each reply

9
tracert
10
xmtr
  • LINUX version of traceroute
  • requires superuser authority
  • GUI application

11
ping
  • Send an ICMP echo request message to a specific
    host
  • plat form differences
  • Linux - no parameters, sends repeated /continuous
    requests until terminated
  • Windows - -t switch send continuous pings
  • Unix (most) -s switch sends continuous pings

12
ping
13
WS-Ping Security Analysis Tool
  • COTS (common Off The Shelf) IPSwitch
  • www.ipswitch.com
  • Verify connectivity to a particular device on
    your network
  • Quantitatively test data connections between your
    computer and a remote system
  • Trace the path to a network host or device
  • Obtain information on host names and IP addresses
  • Scan your network and list devices and network
    services
  • View summary information about a network host or
    device including the official hostname, IP
    address, and contact information (from the Whois
    database)
  • View Simple Network Management Protocol values as
    well as Windows network domains, hosts, and
    workstations
  • Search information (such as user's full names and
    e-mail addresses) available through LDAP

14
WS-Ping
  • Features tools for
  • Ping - Click to Enlarge Ping - Use Ping to
    determine if a network device is reachable.
  • Traceroute - Use traceroute to trace the path to
    a network host or device.
  • Throughput - Click to Enlarge Throughput - Use
    Throughput to test the data speed on a connection
    with a remote host.
  • Lookup - Use Lookup to obtain information on host
    names and IP addresses.
  • Info - Use the Info tool to view summary
    information about a network host or device.
  • Whois - Use Whois to obtain information on names
    from the Network Information Center.
  • Finger - Use finger to obtain information about a
    user or host (if supported on the remote host).
  • SNMP - Use the SNMP tool to view Simple Network
    Management Protocol values.
  • Scan - Use Scan to scan your network and list
    devices.
  • WinNet - Use the WinNet tool to view your Windows
    Network domains, hosts, and workstations.
  • LDAP- Use the LDAP tool to search for names and
    information available through LDAP.
  • Time - Use the time tool to query multiple time
    servers or to synchronize your local system
    clock.
  • Quote - Use Quote to view quotations from a Quote
    server.
  • HTML - Use the HTML tool to help you efficiently
    debug your Web site.

15
SATAN
  • Security Administrators Tool for Analyzing
    Networks
  • web based
  • Ten years old
  • Open Source ( http//www.fish.com/satan
  • Rational for SATAN is explained at
  • http//www.fish.com/satan/admin-guide-to-cracking.
    html
  • There are a number of SATAN derivatives
  • SAINT Scan Engine Saint Corporation
  • http//www.saintcorporation.com/products/saint_en
    gine.html
  • SANTA

16
SATAN
  • SATAN recognizes several common
    networking-related security problems, and reports
    the problems without actually exploiting them.
  • For each type or problem found, SATAN offers a
    tutorial that explains the problem and what its
    impact could be.
  • The tutorial also explains what can be done about
    the problem correct an error in a configuration
    file, install a bugfix from the vendor, use other
    means to restrict access, or simply disable
    service.

17
Problems Found by SATAN
  • NFS file systems exported to arbitrary hosts
  • NFS file systems exported to unprivileged
    programs
  • NFS file systems exported via the portmapper
  • NIS password file access from arbitrary hosts
  • Old (i.e. before 8.6.10) sendmail versions
  • REXD access from arbitrary hosts
  • X server access control disabled
  • arbitrary files accessible via TFTP
  • remote shell access from arbitrary hosts
  • writable anonymous FTP home directory

18
Nessus
  • Vulnerability Scanner
  • Nessus development Team
  • plug-in based
  • Finger Abuses
  • Windows
  • Backdoors
  • Gain a shell remotely
  • CGI abuses
  • Remote file access
  • RPC
  • Firewalls
  • FTP
  • SMTP
  • Gain root remotely
  • NIS
  • DOS
  • Miscellaneous

19
Nessus
  • Client Server architecture
  • plug-ins are for the server, client is for
    administration and analysis
  • creates reports in HTML, LaTeX, ASCII, and XML
  • including graphs
Write a Comment
User Comments (0)
About PowerShow.com