PPT - EDUCAUSE Library
Download
Report
Transcript PPT - EDUCAUSE Library
Unit 4: Freeware Security Tools
Use Freeware Tools to help evaluate
commercial tools OR
“you have more tools than you think”
The Layers of Security
Policy
Awareness
Risk Analysis
Incident Response
Free Tools
Educause MARC, 2003
Copyright 2002, Marchany
2
Suggested Strategy
Use freeware tools to gain experience with your
system/network environment.
Gain experience with the features provided by these
tools in order to better analyze a vendor tool.
Freeware tools provide a good short-term solution.
Vendor tools may provide better long-term solution.
Educause MARC, 2003
Copyright 2002, Marchany
3
The Tools
Audit/Port Scanning Tools
Nessus
Saint
Sara
Nmap, strobe
Tripwire, AIDE
“Personal” Firewall
TCP Wrappers
Portsentry,ipfilters
ZoneAlarm, BlackIce, NeoWorks
Educause MARC, 2003
Copyright 2002, Marchany
4
The Tools
Syslog Scanners
Logcheck
Sniffers
Snoop, iptrace, tcpdump
Netwatch (NT)
Snort
Educause MARC, 2003
Copyright 2002, Marchany
5
The Tools
Sysadmin Tools
Big Brother
Password Checkers
Crack, nt-crack, l0phtcrack,npasswd, passwd+
Lsof, inzider (NT)
Sudo (unix)
Remote Control Tools
VNCviewer
Homegrown Tools
Network Mgt Tools that can be used for Incident
Response
Educause MARC, 2003
Copyright 2002, Marchany
6
Audit/Port Scan Tools
These tools can be used to scan your systems
and network for vulnerabilities.
Some tools can perform integrity checks on
designated files.
They have very good reporting tools usually
based on HTML.
Educause MARC, 2003
Copyright 2002, Marchany
7
Nessus
Available from www.nessus.org
Best of the scanning tools
Easy to build for Linux, harder for Solaris, need to
work on other OS.
Requires GNU tools
Provides HTML based reports
Has distributed architecture: clients (Windows,
Unix) & engines (Unix only)
Educause MARC, 2003
Copyright 2002, Marchany
8
Nessus – Pros/Con
Pro
Easy to install if you have linux
Most comprehensive tests for your money
Con
Not that easy to understand at first
Non-linux builds require GNU software
Some inconsistency in quality of checks
Must use Unix server for specific user accounts
Educause MARC, 2003
Copyright 2002, Marchany
9
Educause MARC, 2003
Copyright 2002, Marchany
10
Educause MARC, 2003
Copyright 2002, Marchany
11
Educause MARC, 2003
Copyright 2002, Marchany
12
Educause MARC, 2003
Copyright 2002, Marchany
13
Educause MARC, 2003
Copyright 2002, Marchany
14
X
Educause MARC, 2003
Copyright 2002, Marchany
15
Educause MARC, 2003
Copyright 2002, Marchany
16
Educause MARC, 2003
Copyright 2002, Marchany
17
Educause MARC, 2003
Copyright 2002, Marchany
18
Educause MARC, 2003
Copyright 2002, Marchany
19
Educause MARC, 2003
Copyright 2002, Marchany
20
SAINT
Based on SATAN, developed by World Wide
Security, Inc. (www.wwdsi.com)
Security Administrator’s Integrated Network Tool
Gathers info on remote hosts/nets
Looks at finger, NFS, NIS, ftp, tftp, rexd, statd
Can run heavy, moderate or light probes on targets.
Will check for the SANS Top 10 Threats
Educause MARC, 2003
Copyright 2002, Marchany
21
Educause MARC, 2003
Copyright 2002, Marchany
22
Educause MARC, 2003
Copyright 2002, Marchany
23
Educause MARC, 2003
Copyright 2002, Marchany
24
SARA
Security Auditor’s Research Assistant
www.www-arc.com/sara
Checks for SANS Top 10 Threats
Does Unix/Windows vulnerability tests
Has CVE dictionary support
Search engine for post audit analysis
Has a Report Writer
Educause MARC, 2003
Copyright 2002, Marchany
25
Educause MARC, 2003
Copyright 2002, Marchany
26
Educause MARC, 2003
Copyright 2002, Marchany
27
Educause MARC, 2003
Copyright 2002, Marchany
28
Educause MARC, 2003
Copyright 2002, Marchany
29
Port Scanning Tools
Strobe was one of the earliest port scanning
tools.
Available from ciac.llnl.gov
Nmap is the more sophisticated grandson of
strobe
Available from www.insecure.org
Educause MARC, 2003
Copyright 2002, Marchany
30
Educause MARC, 2003
Copyright 2002, Marchany
31
Educause MARC, 2003
Copyright 2002, Marchany
32
Tripwire
Available from www.tripwire.com
First of the file integrity checkers
Unix and NT versions available
Network capable versions available
Academic version is free. Commercial and
NT versions are not.
Useful in finding trojan programs
Educause MARC, 2003
Copyright 2002, Marchany
33
Tripwire
Generates a “signature” for each file based
on checksums and other characteristics.
These signatures are stored in a database file
that should be kept offline.
This is the baseline.
Educause MARC, 2003
Copyright 2002, Marchany
34
Tripwire
To initialize the DB: tripwire –initialize
Update DB interactively:
tripwire
-interactive
Non-interactive DB update:
tripwire – update <FN>
Educause MARC, 2003
Copyright 2002, Marchany
35
Tripwire
Security Issues
Need to protect the DB
Need to protect the vulnerable executables
Advantages
Simple interface, good choice of crypto hash functions,
good all-around tool
Disadvantages
Kernel mod attacks, initial tw.config takes some time to
customize, NT version is good but costs $$$, no network
security
Educause MARC, 2003
Copyright 2002, Marchany
36
Educause MARC, 2003
Copyright 2002, Marchany
37
Personal Firewall Tools
These tools monitor connection attempts to
your system and give you the option of
allowing or denying the access
They log the connection attempt to standard
log files
More valuable than real Firewall, IMHO.
Educause MARC, 2003
Copyright 2002, Marchany
38
Portsentry/TCP Wrappers
Available from www.psionic.com
TCP Wrappers available from ciac.llnl.gov and a
ton of other sites
Any host that scans a list of “banned” ports is
placed in an /etc/hosts.deny file
Need TCP Wrappers installed on the machine
Tcpwrappers logs attempts to connect to services
Educause MARC, 2003
Copyright 2002, Marchany
39
TCP Wrappers
Everyone should buy Wietse Venema dinner
for writing this tool.
Purpose
Log network connections to a system
Allow you to filter who connects to the system
Needs an inetd-like program to act as the
dispatcher of network services
Educause MARC, 2003
Copyright 2002, Marchany
40
TCP Wrappers Features
Allows you to monitor/filter incoming
requests for SYSTAT, FINGER, FTP,
TELNET, R-Commands, TFTP, TALK and
other network services.
Provides access control to restrict what
systems connect to what network daemons.
Provides some protection from host spoofing
Educause MARC, 2003
Copyright 2002, Marchany
41
TCP Wrappers
Advantages
Logs and applies access controls to remote connections
Lets you define which daemons are wrapped
Does good reverse lookup on hosts
Disadvantages
Ident service not reliable
Only looks at network daemons spawned by inetd
Doesn’t wrap ALL services (RPC)
Could give a false sense of security
Educause MARC, 2003
Copyright 2002, Marchany
42
Portsentry
Available from www.psionic.com
Monitors ports and performs an action when
an attempt to access the port is made.
Usually access is denied to the probing
systems.
Monitors TCP and UDP traffic. A little more
flexible than TCP Wrappers
Educause MARC, 2003
Copyright 2002, Marchany
43
Portsentry Configuration Files
Portsentry.conf contains the list of ports to be
monitored.
3 levels of paranoia
Educause MARC, 2003
Copyright 2002, Marchany
44
Educause MARC, 2003
Copyright 2002, Marchany
45
IP Filter
Software package that can do NAT or basic firewall
services.
Designed to be used as a loadable kernel module
but can be incorporated into a Unix kernel
Can be configured to do IP Accounting (count #
bytes), IP Filtering or IP authentication or NAT.
http://coombs.anu.edu.au/~avalon/ip-filter.html
Educause MARC, 2003
Copyright 2002, Marchany
46
IP Filter
Can explicitly allow/deny any packet.
Distinguishes between multiple interfaces.
Filters by IP network, hosts or protocol.
Filters by port number or port range.
Logs the following:
TCP/UDP/ICMP/IP packet headers
First 128 bytes
Pass or blocked status
Educause MARC, 2003
Copyright 2002, Marchany
47
IP Filter
Statistics collected include:
Packets blocked
Packets used for accounting (packet count)
Packets passed
Packets logged
Inbound/outbound packet information
Educause MARC, 2003
Copyright 2002, Marchany
48
Educause MARC, 2003
Copyright 2002, Marchany
49
IP Filter Log Format
Jul 30 01:46:52 myhost.vt.edu ipmon[147]: [ID
702911local0.warning] 01:46:52.196772 hme0 @0:5 b
194.143.66.126,21 ->198.82.255.255,21 PR tcp len 20 40 -S IN
Jul 30 01:47:03 myhost.vt.edu ipmon[147]: [ID
702911local0.warning] 01:47:03.269595 hme0 @0:5 b
194.143.66.126,21 ->198.82.255.255,21 PR tcp len 20 40 -S IN
Jul 30 05:53:51 myhost.vt.edu ipmon[147]: [ID
702911local0.warning] 05:53:50.699235 hme0 @0:5 b
203.90.84.163,1781 ->198.82.255.255,21 PR tcp len 20 60 -S IN
Educause MARC, 2003
Copyright 2002, Marchany
50
Logcheck
Available from www.psionic.com
Syslog keyword scanner
When it matches something, it does
something
Send email
Page someone
Run a command
Educause MARC, 2003
Copyright 2002, Marchany
51
logcheck.violations
These keywords denote a
problem and are flagged by
logcheck.
Educause MARC, 2003
Copyright 2002, Marchany
52
logcheck.ignore
Phrases listed in this file
are ignored by the
logcheck program.
Educause MARC, 2003
Copyright 2002, Marchany
53
logcheck.hacking
Keywords in this file indicate
an attack is taking place
Educause MARC, 2003
Copyright 2002, Marchany
54
Educause MARC, 2003
Copyright 2002, Marchany
55
Zone Alarm
Available from www.zonelabs.com
Not quite free
Client based, application level firewall
Designed to prevent unauthorized sending
and receiving of packets to your workstation
Good defense against trojans
Educause MARC, 2003
Copyright 2002, Marchany
56
Configuring Zone Alarm
ZA requires you authorize each & every
application that attempts to send receive
information to/from your network
connection.
Default is BLOCK. This pops up a window
asking what to do
Educause MARC, 2003
Copyright 2002, Marchany
57
Basic Setup
Click the arrow in ZA box that points down and to
the right
Click the security button
Verify local security is set to MEDIUM
Verify internet security is set to HIGH
Click the advanced button
Do NOT put a checkmark next to your adapter,
OW, all machines in your subnet will be considered
to be in your local zone
Click OK
Educause MARC, 2003
Copyright 2002, Marchany
58
Educause MARC, 2003
Copyright 2002, Marchany
59
Educause MARC, 2003
Copyright 2002, Marchany
60
Educause MARC, 2003
Copyright 2002, Marchany
61
Black Ice Defender
Available from www.networkice.com
Workstation Version
End-user PC with a single connection
Tuned for common attacks to workstations
Server Version
Additional NT and W2K attacks signatures
IcePac Suite allows multiple agents to be managed
from a single host. Can install agents remotely.
Not quite free
Educause MARC, 2003
Copyright 2002, Marchany
62
Educause MARC, 2003
Copyright 2002, Marchany
63
NeoWatch
Available from www.neoworx.com
Another Personal FW type tool for Windows
systems.
Does traceback to the originating site.
Similar features as Zone Alarm and Black Ice
Defender
Can send data to a central site.
Not quite Free $39.95. Trial version is free for 30
days
Educause MARC, 2003
Copyright 2002, Marchany
64
Educause MARC, 2003
Copyright 2002, Marchany
65
Educause MARC, 2003
Copyright 2002, Marchany
66
Educause MARC, 2003
Copyright 2002, Marchany
67
Sniffers: snoop, iptrace,
tcpdump, snort
Some systems have builtin sniffers
Solaris - snoop
AIX - iptrace
Linux - tcpdump
NT/2000 - netwatch
Tcpdump is the generic sniffer for those
systems with no builtin sniffer
Educause MARC, 2003
Copyright 2002, Marchany
68
Sniffer Output - Solaris Snoop
1042
1045
1046
1047
1050
1052
1053
1054
1055
1056
1087
1090
1093
1094
1105
1108
1115
1120
1122
1123
1124
1125
1126
1127
1128
1131
1133
1136
0.10594 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754 login:
0.02429 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754
0.02039 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754
0.03137 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754
0.09288 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754
1.17258 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 b
0.08960 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754 b
0.10377 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754
0.08251 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 r
0.04324 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754 r
0.24398 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 e
0.01475 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754 e
0.07074 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 a
0.11020 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754 a
0.07212 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754 Password:
0.02244 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754
0.24651 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 p
0.07970 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754
0.00623 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 o
0.11307 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754
0.09368 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 o
0.10588 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754
0.08829 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 h
0.13538 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754
0.10856 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 b
0.04106 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754
0.16857 cesgi1.ce.vt.edu -> scws29.harvard.edu TELNET C port=6754 e
0.02925 scws29.harvard.edu -> cesgi1.ce.vt.edu TELNET R port=6754
Educause MARC, 2003
Copyright 2002, Marchany
69
Tcpdump Example
Educause MARC, 2003
Copyright 2002, Marchany
70
Big Brother
Web based system and network monitor
Client server model
Clients run on the systems you want to monitor
Simple shell scripts that monitor different
aspects of your system and network
What can it check?
Disk space, CPU Utilization, critical processes,
weather parameters, building monitors
Educause MARC, 2003
Copyright 2002, Marchany
71
Big Brother
Color coded WWW page showing a matrix
of machines and monitored functions
Notifies sysadmins by email, pager, SMS.
System requirements
Unix – www server, /bin/sh, C compiler to port
BB
NT – v4.0 with SP3 minimum, Intel or Alpha
platforms.
Educause MARC, 2003
Copyright 2002, Marchany
72
Educause MARC, 2003
Copyright 2002, Marchany
73
Educause MARC, 2003
Copyright 2002, Marchany
74
Educause MARC, 2003
Copyright 2002, Marchany
75
VNCViewer
Available from www.uk.research.att.com/vnc
Great remote control tool for Windows
95/98, NT, 2000, Macintosh, Unix clients
Nice help desk tool
It displays the remote desktop on your
system.
A better version of BackOrifice, BO2K tool
Educause MARC, 2003
Copyright 2002, Marchany
76
Educause MARC, 2003
Copyright 2002, Marchany
77
Educause MARC, 2003
Copyright 2002, Marchany
78
Educause MARC, 2003
Copyright 2002, Marchany
79
Lsof, inzider
These programs list the processes running on
a system.
They also list the files opened by those
processes.
Useful in finding where a sniffer log file is
located
Educause MARC, 2003
Copyright 2002, Marchany
80
Sample lsof Utility Output
# ./lsof /sbin/racket.udp
COMMAND PID USER FD TYPE DEVICE SIZE/OFF INODE NAME
racket.ud 450
root txt VREG 128, 16
20332 15836
/sbin/racket.
# ./lsof -p 450
COMMAND PID
racket.ud 450
root
racket.ud 450
root
racket.ud 450
root
racket.ud 450
root
racket.ud 450
root
USER FD TYPE DEVICE SIZE/OFF
cwd VDIR 128, 16
1024
2/
txt VREG 128, 16
20332 15836
txt VREG 128, 16 1483100 904
txt VREG 128, 16
585876 2051
3u inet 0x8af730e4
0t0 TCP *:3038
# ./lsof -p 1423,1424
COMMAND PID USER FD TYPE DEVICE SIZE/OFF
racket.ud 1423
root cwd VDIR 128, 16
1024
2/
racket.ud 1423
root txt VREG 128, 16
20332 15836
racket.ud 1423
root txt VREG 128, 16 1483100 904
racket.ud 1423
root txt VREG 128, 16
585876 2051
racket.ud 1423
root 0u inet 0x89c804e0
0t373 TCP
cesgi1.ce.vt.edu:3038->sable.cc. vt. edu:4894
racket.ud 1423
root 1u inet 0x8a8d8d60
0t225 TCP
cesgi1.ce.vt.edu:1307->vtaix.cc.vt.edu:telnet
racket.ud 1424
root cwd VDIR 128, 16
1024
2/
racket.ud 1424
root txt VREG 128, 16
20332 15836
racket.ud 1424
root txt VREG 128, 16 1483100 904
racket.ud 1424
root txt VREG 128, 16
585876 2051
racket.ud 1424
root 3u inet 0x8af730e4
0t0 TCP *:
Educause MARC, 2003
Copyright 2002, Marchany
INODE NAME
/sbin/racket. udp
/lib/libc.so.1
/lib/rld
INODE NAME
/sbin/racket. udp
/lib/libc. so.1
/lib/rld
/sbin/racket. udp
/lib/libc. so.1
/lib/rld
81
Fport
Available from www.foundstone.com
Windows version of lsof
Shows the ports and the programs listening on
those ports
Current version (9/20/01): 1.33
Educause MARC, 2003
Copyright 2002, Marchany
82
Educause MARC, 2003
Copyright 2002, Marchany
83
Active Ports
Similar to fport
Keeps an open window showing the
processes listening on ports.
Free for Windows platforms
Educause MARC, 2003
Copyright 2002, Marchany
84
Educause MARC, 2003
Copyright 2002, Marchany
85
LANGuard Monitor
Use to scan your networks for information on
Windows systems.
Collects network interface addresses,
NETBIOS names, IP address, open ports, etc.
Scan individual system or subnets
Available from www.gfi.com
Educause MARC, 2003
Copyright 2002, Marchany
86
Educause MARC, 2003
Copyright 2002, Marchany
87
Educause MARC, 2003
Copyright 2002, Marchany
88
Educause MARC, 2003
Copyright 2002, Marchany
89
Sysadmin Tools
Sudo
Unix access control is all (root) or nothing
(user).
Some commands (backup, restore) are restricted
to root but are really an OPER class command.
You don’t want an operator to have root access
but you want them to do backups.
Sudo lets you set up this “pseudo” privilege
scheme.
Educause MARC, 2003
Copyright 2002, Marchany
90
Sudo
Sudo uses user identity and host to restrict
the commands the user can run in “root”
mode.
It is a restricted root shell.
User is prompted for a special password that
allows them to run the command.
Educause MARC, 2003
Copyright 2002, Marchany
91
Sudo
The sudoers files lists the commands, shells, hosts
that a user can execute commands
Should always list the full path name for the
commands
Notifies sysadmins if illegal uses of sudo is
attempted.
Notifies sysadmins if user in sudoers tries to run a
restricted command
Educause MARC, 2003
Copyright 2002, Marchany
92
Proactive Password Tools
Most newer OS allow you to set password rules in
config files.
Crack is still the best of the bunch.
Npasswd and passwd+ are two older but still
effective tools.
Npasswd is a good tool for those who don’t want to
spend a lot of time configuring a password checker
Passwd+ requires more configuration time.
Educause MARC, 2003
Copyright 2002, Marchany
93
Crack
The first of the really good password crackers.
Available on the net for the past 10 years.
Easy to customize. Works on non-shadow password
files.Use a preprocessor to rebuild in old format or
use NIS, NIS+ . Can be distributed among
systems
http;//www.users.dircon.co.uk/~crypto/
Crack Results Example
Educause MARC, 2003
Copyright 2002, Marchany
94
npasswd
Uses ASCII dictionaries or DBM format
dictionaries. If the password is in the dictionary, it’s
rejected. Case and reversed word checks are done.
Does singlecase (Yes/No) checks
Allow passwords in one case. Default = No.
Does Control Character (Yes/No) checks.
Allows passwords with ASCII control characters in them.
Default = Yes.
Does min/max length checks.
Educause MARC, 2003
Copyright 2002, Marchany
95
npasswd
Checks for 3 sequential occurrences of the
same character. This value can be modified.
Does illegal character check. (^C, ^D, ^G, ^J,
^M, ^O, ^Q, etc.
Good, quick easy tool to use.
Educause MARC, 2003
Copyright 2002, Marchany
96
Home Grown Tools
Build specific packages for the tools
Preconfigured with your site information
Easy to install (pkgadd, RPM)
Put on a CD so you can configure the machines
offline.
Preconfigured Tripwire, SSH, IP Filters, lsof,
CIS Security Benchmark scripts
Other Firewall installation scripts
Educause MARC, 2003
Copyright 2002, Marchany
97
Educause MARC, 2003
Copyright 2002, Marchany
98
Educause MARC, 2003
Copyright 2002, Marchany
99
Home Grown Tools
Network Mgt Group developed a couple of
tools for their use.
Our CIRT can use the same tools to track an
attack in our network.
Our Netadmins controls the ENTIRE
University net and developed these tools to
help them manage, fix and bill usage of net
resources. SQL front ends to Oracle DB.
Educause MARC, 2003
Copyright 2002, Marchany
100
Educause MARC, 2003
Copyright 2002, Marchany
101
Educause MARC, 2003
Copyright 2002, Marchany
102
Educause MARC, 2003
Copyright 2002, Marchany
103
Educause MARC, 2003
Copyright 2002, Marchany
104
Educause MARC, 2003
Copyright 2002, Marchany
105
Educause MARC, 2003
Copyright 2002, Marchany
106
Educause MARC, 2003
Copyright 2002, Marchany
107
Educause MARC, 2003
Copyright 2002, Marchany
108
Educause MARC, 2003
Copyright 2002, Marchany
109
Educause MARC, 2003
Copyright 2002, Marchany
110
Using the Tools – A Strategy
Preparation
Detection
Containment
Eradication
Recovery
Followup
Educause MARC, 2003
Copyright 2002, Marchany
111
Preparation
Unix Host Systems
Install TCP Wrappers, Portsentry, logcheck,
tripwire, lsof, ipfilter
NT/2000
Inzider,syslog converters
Network
Ingress, egress filters in place
Router logs in place
Educause MARC, 2003
Copyright 2002, Marchany
112
Detection
Portsentry, TCP wrappers, Personal Firewall
tools usually send the first alarm.
Network router filters may trigger an alarm
as well.
Once an event is detected, reaction
mechanisms are enabled
Educause MARC, 2003
Copyright 2002, Marchany
113
Containment
Detection tools give the source IP address.
Router blocks may be enabled to prevent
additional attacks.
HC++ tool used to isolate offending system
Portsentry or PFW tools prevent further
access to the systems
Educause MARC, 2003
Copyright 2002, Marchany
114
Eradication
HC++ tool used to shut off internal port.
Router blocks on external IP address.
Tripwire used to remove offending files.
Network backup software can be used to
verify this. Why? Most network backup
software does incremental backups so they
can capture a newly installed file.
Educause MARC, 2003
Copyright 2002, Marchany
115
Recovery
“Jumpstart” style OS installation
Network and regular backup software
File servers may limit the damage
Educause MARC, 2003
Copyright 2002, Marchany
116
Followup
See what components worked.
Could additional scanning detect the holes?
How fast did the reaction mechanisms work?
Internal network tools work?
Backup procedures work?
What didn’t work? Why? How?
Educause MARC, 2003
Copyright 2002, Marchany
117
Summary
There are some excellent freeware tools that will
help you with sysadmin and security issues at your
site.
Use these tools to gain experience in evaluating
vendor tools.
A combination of vendor and freeware tools is
desired
There are MORE tools out there.
Educause MARC, 2003
Copyright 2002, Marchany
118
Where to Get the Tools
Http://ciac.llnl.gov
TCP Wrappers, crack, tcpdump, lsof
Http://www.wwdsi.com
SAINT
Http://www.www-arc.com/sara
SARA
Http://www.tripwire.com
tripwire
Educause MARC, 2003
Copyright 2002, Marchany
119
Where to Get the Tools
Http://www.psionic.com
Logcheck, portsentry
Http://www.uk.research.att.com/vnc
VNCViewer
Http://www.insecure.org
Nmap
Http://www.ssh.org
SSH
Educause MARC, 2003
Copyright 2002, Marchany
120
Where to Get the Tools
www.nessus.org
Nessus
http://packetstormsecurity.com
Educause MARC, 2003
Copyright 2002, Marchany
121