Unformatted text preview:

Security ToolsCACLSSlide 3CACLS (examples)Slide 5NSLOOKUPSlide 7TraceroutetracertxmtrpingSlide 12WS-Ping – Security Analysis ToolWS-PingSATANSlide 16Problems Found by SATANNessusSlide 19Security ToolsCS-480bDick SteflikCACLS•Windows NT, W2000, XP•Displays or modifies access control lists (ACLs) of filesCACLS•cacls /T /E /G administrator:F d:\users\*.*•Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive.•cacls /T /E /R Everyone d:\users•Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive.•Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified.CACLS (examples)CACLSOf course anything done using CACLS could also be done through the GUI.NSLOOKUP•Name Server Lookup•Windows NT, W2000, Linux, UNIX•used to resolve Internet names to IP addresses•default (no parameter) returns default name server address (windows) ; on Linux/UNIX enters conversational mode allowing lookups until you quitNSLOOKUPTraceroute•Tracert (windows) ; traceroute (Linux/Unix)•used to display all of the routers between two communicating Internet hosts •options:•-d don’t resolve addresses to host names•-h (m) max number of hops to search for target•-j (hostlist) loose source route along the host list•-w (timeout) wait (timeout) msec for each replytracertxmtr•LINUX version of traceroute•requires superuser authority•GUI applicationping•Send an ICMP echo request message to a specific host•plat form differences•Linux - no parameters, sends repeated /continuous requests until terminated•Windows - -t switch send continuous pings•Unix (most) -s switch sends continuous pingspingWS-Ping – Security Analysis Tool•COTS (common Off The Shelf) IPSwitch •www.ipswitch.com•Verify connectivity to a particular device on your network•Quantitatively test data connections between your computer and a remote system•Trace the path to a network host or device•Obtain information on host names and IP addresses•Scan your network and list devices and network services•View summary information about a network host or device including the official hostname, IP address, and contact information (from the Whois database)•View Simple Network Management Protocol values as well as Windows network domains, hosts, and workstations•Search information (such as user's full names and e-mail addresses) available through LDAPWS-Ping•Features tools for :•Ping - Click to Enlarge Ping - Use Ping to determine if a network device is reachable.•Traceroute - Use traceroute to trace the path to a network host or device.•Throughput - Click to Enlarge Throughput - Use Throughput to test the data speed on a connection with a remote host.•Lookup - Use Lookup to obtain information on host names and IP addresses.•Info - Use the Info tool to view summary information about a network host or device.•Whois - Use Whois to obtain information on names from the Network Information Center.•Finger - Use finger to obtain information about a user or host (if supported on the remote host).•SNMP - Use the SNMP tool to view Simple Network Management Protocol values.•Scan - Use Scan to scan your network and list devices.•WinNet - Use the WinNet tool to view your Windows Network domains, hosts, and workstations.•LDAP- Use the LDAP tool to search for names and information available through LDAP.•Time - Use the time tool to query multiple time servers or to synchronize your local system clock.•Quote - Use Quote to view quotations from a Quote server.•HTML - Use the HTML tool to help you efficiently debug your Web site.SATAN•Security Administrators Tool for Analyzing Networks•web based•Ten years old•Open Source ( http://www.fish.com/satan•Rational for SATAN is explained at :•http://www.fish.com/satan/admin-guide-to-cracking.html•There are a number of SATAN derivatives:•SAINT Scan Engine – Saint Corporation• http://www.saintcorporation.com/products/saint_engine.html•SANTASATAN•SATAN recognizes several common networking-related security problems, and reports the problems without actually exploiting them. •For each type or problem found, SATAN offers a tutorial that explains the problem and what its impact could be. •The tutorial also explains what can be done about the problem: correct an error in a configuration file, install a bugfix from the vendor, use other means to restrict access, or simply disable service.Problems Found by SATAN•NFS file systems exported to arbitrary hosts •NFS file systems exported to unprivileged programs •NFS file systems exported via the portmapper •NIS password file access from arbitrary hosts •Old (i.e. before 8.6.10) sendmail versions •REXD access from arbitrary hosts •X server access control disabled •arbitrary files accessible via TFTP •remote shell access from arbitrary hosts •writable anonymous FTP home directoryNessus•Vulnerability Scanner•Nessus development Team •plug-in based•Finger Abuses•Windows•Backdoors•Gain a shell remotely•CGI abuses•Remote file access•RPC•Firewalls•FTP•SMTP•Gain root remotely•NIS•DOS•MiscellaneousNessus•Client Server architecture•plug-ins are for the server, client is for administration and analysis•creates reports in HTML, LaTeX, ASCII, and XML•including


View Full Document

BU CS 455 - TOPOLOGICAL MANIFOLDS

Download TOPOLOGICAL MANIFOLDS
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view TOPOLOGICAL MANIFOLDS and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view TOPOLOGICAL MANIFOLDS 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?