480 likes | 648 Views
Assembling a security software tool kit. Presented by Stan Dormer, B.Sc., FIIA Director of Education & Training Services MindGrove Ltd. Framework. 1730 – 1845 Refreshments Chance to talk. Assembling a security toolkit – important drivers. Simple, cost effective, non-intrusive
E N D
Assembling a security software tool kit Presented by Stan Dormer, B.Sc., FIIADirector of Education & Training ServicesMindGrove Ltd MindGrove
Framework • 1730 – 1845 • Refreshments • Chance to talk MindGrove
Assembling a security toolkit – important drivers • Simple, cost effective, non-intrusive • Maybe even free • Don’t destabilise the installation • Rapid to learn, rapid to deploy • Don’t have to read the 3,000 page handbook • Don’t have to wait for the next day for results MindGrove
Good selection via MindGrove website • Forensic Tools, Utilities and Resources • The Coroner's Toolkit • The Digital Detective • TUCOFS– The Ultimate Collection of Forensic Software • Password Recovery Resources– Tools to Recover Passwords • Freeware Tools site containing many items useful to auditors • AUDIT & SECURITY TOOLS AND USEFUL UTILITIES • AIDA32 - good and comprehensive inventory tool • The Centre for Internet Security (CIS)– provides tools to improve, measure, monitor and compare the security status of Internet-connected systems and appliances – Windows – Solaris – Linux – HP-UX – Cisco IOS – Oracle • UNIX– security tools and utilities – including SATAN and SARA • Sawmill– a powerful log analysis tool • Sam Spade– a free and useful network lookup tool that includes finding an IP address from a hostname, or vice-versa, traceroute, dig, email header analysis and more • Microsoft security tools from Microsoft Security • Netcraft– site that enables you to determine which hosting software is being run • Software and network auditing– free hardware, software and network inventory tools • SPAM - are we on someone's blacklist? Look up mail IP address here then check spam database lookup on same site • What's that process in Task Manager?– look-up processes that you see in task manager and find out if they are safe –What's going on in XP?– a huge inventory of Windows XP knowledge –What's that UNIX process?– a useful repository of knowledge about common UNIX processes and programs • Wireless Scanner– Retina eEye Scanner for Windows and Pocket PC • Windows NT/2000/XPDumpSec– free reporting tool/s to create audit reports from Windows systems MindGrove
Begin with a bit of probing at the workstation level Try AIDA32 for a click and point overview BelArc is good too! Nice report in Browser And let’s check that the Baseline kernel is authentic – use SigVerif MindGrove
So now to the security infrastructure – try MBSA, it’s free MindGrove
And to top off the review we should add in one of the free to acquire security sweep tools from CIS Here we are going to use the Scanner for XP from CIS but they also have scanners for: Windows XP Professional Windows Server Mac OS X FreeBSD Solaris 10 Solaris 2.5.1 - 9.0 Red Hat Linux SUSE Linux Slackware Linux HP-UX AIX Novell Cisco IOS Router Cisco PIX Exchange Server 2003 Oracle Database 8i Oracle Database 9i/10g Apache Web Server SQL Server 2000 BIND Novell eDirectory MindGrove
Part of a network? Perhaps we want to find nearby wireless networks – try Retina Scan from eEye - free MindGrove
Excellent range of utilities for file searching Try SnapView for a rapid peek at objects Try Snowbird for quick basic searches MindGrove
What’s in the file? • Here we need a fast search engine that is capable of finding what we want in seconds • Better than that we want a tool that will rapidly index the file making it easy to find any word of choice • Here we are using dtSearch – this requires licensing – will cost £100 for the desktop version dTsearch MindGrove
The power comes from the search engine doing a pre-index MindGrove
Indexing complete MindGrove
Search index for words MindGrove
Retrieve locations MindGrove
Display location when value found MindGrove
Really good bit level searcher • Sometimes we need to probe at a much lower level – maybe even down to the disc surface itself We like WinHex – its pretty low cost – less than £30 for a standard version and less than £500 for a full forensic suite MindGrove
Standard workspace MindGrove
File selection MindGrove
File Properties MindGrove
Making an identical copy MindGrove
Finding a word MindGrove
Finding a text based passage MindGrove
Marking off records or transactions MindGrove
Cloning a disc MindGrove
Looking for differences MindGrove
Explore Drive MindGrove
Fundamental structures - MFT MindGrove
There’s always room for one more nice file viewer We like TextPad – a low cost shareware product MindGrove
Notion of Hashing • Computing an unique value for the contents of a file • Uses one of a variety of algorithms • SHA1; MD5 • Each algorithm computes the unique digital fingerprint of a file MindGrove
Hashing… 0010010101000100111010001000101000100010001010101000000 001001010100010 MindGrove
SHA1 – MD5 differences MindGrove
Use Hashing to detect alteration • Hash file to create protective hash-sum • Re-check hash at future date to prove absence of activity MindGrove
Invoice before and after alteration Hash before alteration File: F:\CATS\Correspondence\Invoices-IM35.doc Hash: 46EC620AE635E31094D0925FF18B0993 Hash after alteration File: F:\CATS\Correspondence\Invoices-IM35.doc Hash: 1FE0B7C54F7C2723BF4678BEA5888FCD MindGrove
Hashing • Demonstration of hashing – most simple tools are free At the file level At the transaction level MindGrove
Eliminating known files • Hash a target file • Compare to known value in hash dictionary • Dictionaries are available with hundreds of thousands of file hash values corresponding to known files • Dictionaries hold both SHA-1 and MD5 values • Eliminate known files and concentrate on unknown files • May remove up to 95% of files from consideration MindGrove
IP Address trace • Sam Spade MindGrove
And finally a little bit about cookies Load the cookie folder Then the cookie viewer – we like CookieView – it’s free MindGrove
Assembling a security toolkit – important drivers • Simple, cost effective, non-intrusive • Maybe even free • Don’t destabilise the installation • Rapid to learn, rapid to deploy • Don’t have to read the 3,000 page handbook • Don’t have to wait for the next day for results MindGrove
Assembling a security software tool kit Presented by Stan Dormer, B.Sc., FIIADirector of Education & Training ServicesMindGrove Ltd MindGrove