Network Security Management Tools

advertisement
Network Security
Management Tools
Objectives
Upon completion of this chapter,
you will be able to:
• Describe security vulnerability testing,
detection, and auditing tools useful in
the Cisco network security environment
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-2
Integrity Testing Tools
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-3
Managing the Secure
XYZ Network
Web Surfer
PSTN/
ISDN
Dialup Client
Internet
Perimeter
Router
Dialup
Network Access
Server
Remote
Branch
Firewall
Bastion Host:
Web Server
FTP Server
Engineering
Sales
Campus
CiscoSecure ACS Server
TACACS+, RADIUS
Token
Server
Copyright 1998, Cisco Systems, Inc.
Campus
Client
MCNS—Network Security Management Tools—17-4
Scanners
• ISS SafeSuite (UNIX and NT)
Top commercial scanner
Suite of several scanners with GUI
• SATAN (UNIX)
Security Administrator’s Tool for Analyzing
Networks
Scans remote hosts for most known security holes
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-5
Scanners (cont.)
• NSS (UNIX)
• Strobe (UNIX)
• Jackal (UNIX)
• IdentTCPScan (UNIX)
• CONNECT (UNIX)
• FSPScan (Windows, OS/2)
• XSCAN (UNIX)
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-6
Sniffers
• Network General Sniffer
• Network General XRay
• Gobbler (DOS/Windows)
• ETHLOAD
• Netman suite (Etherman)
• Esniff.c
• Network Monitor (Microsoft)
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-7
Password Crackers/Checkers
• Passwd+
• Crack (UNIX)
CrackerJack (UNIX)
Pcrack (UNIX Perl script)
PaceCrack95 (Windows 95)
Hades (UNIX)
Qcrack (DOS/Windows)
Star Cracker (DOS)
John the Ripper (UNIX)
Killer Cracker (UNIX, others)
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-8
Network Utilities (UNIX)
• host
• traceroute
• rusers
• finger/sfingerd
• showmount
• WHOIS
• smrsh
• ssh
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-9
Logging Tools
• TCP_Wrapper
• swatch
• trimlog
• logdaemon (UNIX)
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-10
Tool Suites
• Merlin by CIAC (UNIX)
• Tiger (TAMU)
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-11
File/System Integrity Checkers
Used to guard against Trojan horses:
• MD5
• COPS (UNIX)
• Tripwire
• ATP (Anti-Tampering Program)
• Hobgoblin
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-12
System Monitors
• Windows/NT
• Cinco NeTXray for Win 95 and NT
• UltraScan v1.2 Port Scanner for NT
• Kane Security Analyst for NT
• Microsoft EP Dump for NT
• MicrosoftC2CERT
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-13
Windows 95 Tools
• NetScan Tools
• Network Toolbox
• TCP/IP Surveyor
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-14
Macintosh Tools
• MacTCP Watcher
• Query It!
• WhatRoute
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-15
Cisco IOS Software Commands
• traceroute
• show ip route
• debug ip packet
• rmon
• show ip ?
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-16
Chapter References
The following sites contain security tools:
• ftp://ciac.llnl.gov/pub/ciac/sectools/unix/
• ftp://coast.cs.purdue.edu/pub/tools/
• ftp://ftp.cert.org/pub/tools/
• ftp://ftp.win.tue.nl/pub/security/
• ftp://ftp.funet.fi/pub/unix/security/
• http://www.rootshell.com/
• http://filepile.com/
• http://www.iss.net/
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-17
Summary
• Scanners automatically detect security weaknesses
• ISS and SATAN are two of the most popular scanners
• Sniffers capture packet traffic for later analysis
• Password crackers and checkers can be used to detect
weak passwords, improving password security
• UNIX is the most powerful operating system for network
security, because it has many network utilities
• Network logging tools are useful for detecting intrusions
• Network security tools are also available for Windows NT
and 95, DOS, Macintosh, and OS/2
• Cisco IOS software has commands useful for security
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-18
Review Questions
Q1. Which network security tool for the Windows NT
platform would be useful for automatically detecting
security weaknesses as part of managing network
security?
A) ISS Safesuite
Q2. What is the Cisco IOS software command that can
substitute for a packet sniffer?
A) debug ip packet
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-19
Review Questions (Cont’d)
Q3. How can password crackers and checkers be used
in managing network security?
A) Password crackers and checkers can be used to detect weak
passwords, improving password security
Q4. Which operating system has the largest selection
of network security utilities?
A) UNIX is the most powerful operating system for network security,
because it has many network utilities
Copyright 1998, Cisco Systems, Inc.
MCNS—Network Security Management Tools—17-20
Download