130 likes | 305 Views
Computer Security Workshops. Module 3 - Vulnerability Assessment. Vulnerability Assessment. Attack Overview Gathering Information / Fingerprinting Vulnerability Assessment Attempt Exploit Defender Fix Vulnerabilities To prevent exploits. Vulnerability Assessment Tools.
E N D
Computer Security Workshops Module 3 - Vulnerability Assessment
Vulnerability Assessment • Attack Overview • Gathering Information / Fingerprinting • Vulnerability Assessment • Attempt Exploit • Defender • Fix Vulnerabilities • To prevent exploits
Vulnerability Assessment Tools • Collected Set of Tools for Determining Possible Security Holes • Components • Port scanning • Additional checks on ports for: • Software packages actually running • Versions of those packages • Possible vulnerabilities on these combinations • Vulnerability database to support above • Possibly other components • Check for weak passwords • Check for general patch levels • Etc.
Example • Going beyond port scanning • Port scanning may find port 21 listening, ftp • OS fingerprint – Linux 2.2 kernel • Service query – identifies ftp as wu-ftpd version 2.4.2 • What specific vulnerabilities does wu-ftpd 2.4.2 have?
Where To Position Vulnerability Assessment Tools? • Don’t want them on bastion hosts, firewalls • Could be used against you • Safer but less useful in secure zones • Best may be to install on laptop • Connect to DMZ, insecure zone, secure zone when needed • Disconnect when not being used
Vulnerability Assessment Tools • Linux • Nessus • Windows • Nessus 3.0 for Windows • Microsoft Baseline Security Analyzer • LanSpy
Nessus • Probably most well-known vulnerability assessment tool • Uses nmap for initial port scanning • Two-level architecture • Server: runs scans • Client: control scans, view reports • http://www.nessus.org
Nessus Structure • Uses plug-ins to abstract vulnerability tests • Tests further grouped into families • Uses accounts for authorization • Can configure through running server interactively • as opposed to running server in daemon state
Nessus Notes • Plugins tab • Be careful with enabling all plugins • Dangerous plugins can interrupt or even crash services on ports
Nessus results • Good graphical interface • Listing of findings with recommendations • Examples: http://www.nessus.org/demos
Nessus for Windows 3.0 • Nessus 3.0 • Currently supported Windows product • Same client/server structure • Vulnerability database customized for Windows environments • http://www.nessus.org/nessus/
Microsoft Baseline Security Analyzer • Program that analyzes a Windows system for vulnerability • Analyzes in several areas • OS and related utilities - patch levels • Accounts – password content and expiration • Services – whether unneeded services present • Utility security settings (e.g. IIS, SQL Server) • Etc. • Start/Programs/Microsoft Baseline Security Analyzer
Other Microsoft Tools • Sysinternals Tools • http://www.sysinternals.com • Now part of Microsoft • Many interesting and useful security tools for Windows • Sysinternals Tools Examples • Autoruns – Start/Programs/sysinternals/autoruns.exe • Process Explorer – Start/Programs/sysinternals/procexp.exe • Other • CurrPorts – much information on services using ports – Start/Programs/CurrPorts