250 likes | 623 Views
Network Security Management Tools. Objectives. Describe security vulnerability testing, detection, and auditing tools useful in the Cisco network security environment. Upon completion of this chapter, you will be able to:. Integrity Testing Tools. Managing the Secure XYZ Network. Web Surfer.
E N D
Objectives • Describe security vulnerability testing, detection, and auditing tools useful in the Cisco network security environment Upon completion of this chapter, you will be able to:
Managing the Secure XYZ Network Web Surfer PSTN/ISDN Dialup Client Remote Branch Internet Dialup Network AccessServer Perimeter Router Firewall Bastion Host: Web Server FTP Server Engineering Sales Campus CampusClient TokenServer CiscoSecure ACS ServerTACACS+, RADIUS
Scanners • ISS SafeSuite (UNIX and NT) • Top commercial scanner • Suite of several scanners with GUI • SATAN (UNIX) • Security Administrator’s Tool for Analyzing Networks • Scans remote hosts for most known security holes
Scanners (cont.) • NSS (UNIX) • Strobe (UNIX) • Jackal (UNIX) • IdentTCPScan (UNIX) • CONNECT (UNIX) • FSPScan (Windows, OS/2) • XSCAN (UNIX)
Sniffers • Network General Sniffer • Network General XRay • Gobbler (DOS/Windows) • ETHLOAD • Netman suite (Etherman) • Esniff.c • Network Monitor (Microsoft)
Password Crackers/Checkers • Passwd+ • Crack (UNIX) • CrackerJack (UNIX) • PaceCrack95 (Windows 95) • Qcrack (DOS/Windows) • John the Ripper (UNIX) • Pcrack (UNIX Perl script) • Hades (UNIX) • Star Cracker (DOS) • Killer Cracker (UNIX, others)
Network Utilities (UNIX) • host • traceroute • rusers • finger/sfingerd • showmount • WHOIS • smrsh • ssh
Logging Tools • TCP_Wrapper • swatch • trimlog • logdaemon (UNIX)
Tool Suites • Merlin by CIAC (UNIX) • Tiger (TAMU)
File/System Integrity Checkers Used to guard against Trojan horses: • MD5 • COPS (UNIX) • Tripwire • ATP (Anti-Tampering Program) • Hobgoblin
System Monitors • Windows/NT • Cinco NeTXray for Win 95 and NT • UltraScan v1.2 Port Scanner for NT • Kane Security Analyst for NT • Microsoft EP Dump for NT • MicrosoftC2CERT
Windows 95 Tools • NetScan Tools • Network Toolbox • TCP/IP Surveyor
Macintosh Tools • MacTCP Watcher • Query It! • WhatRoute
Cisco IOS Software Commands • traceroute • show ip route • debug ip packet • rmon • show ip ?
Chapter References The following sites contain security tools: • ftp://ciac.llnl.gov/pub/ciac/sectools/unix/ • ftp://coast.cs.purdue.edu/pub/tools/ • ftp://ftp.cert.org/pub/tools/ • ftp://ftp.win.tue.nl/pub/security/ • ftp://ftp.funet.fi/pub/unix/security/ • http://www.rootshell.com/ • http://filepile.com/ • http://www.iss.net/
Summary • Scanners automatically detect security weaknesses • ISS and SATAN are two of the most popular scanners • Sniffers capture packet traffic for later analysis • Password crackers and checkers can be used to detect weak passwords, improving password security • UNIX is the most powerful operating system for network security, because it has many network utilities • Network logging tools are useful for detecting intrusions • Network security tools are also available for Windows NT and 95, DOS, Macintosh, and OS/2 • Cisco IOS software has commands useful for security
Review Questions Q1. Which network security tool for the Windows NT platform would be useful for automatically detecting security weaknesses as part of managing network security? • A) ISS Safesuite Q2. What is the Cisco IOS software command that can substitute for a packet sniffer? • A) debug ip packet
Review Questions (Cont’d) Q3. How can password crackers and checkers be used in managing network security? • A) Password crackers and checkers can be used to detect weak passwords, improving password security Q4. Which operating system has the largest selection of network security utilities? • A) UNIX is the most powerful operating system for network security, because it has many network utilities