Network Security Management Tools

Chia sẻ: Nguyen Thuc Anh Nguyenthucanh | Ngày: | Loại File: PPT | Số trang:20

0
105
lượt xem
24
download

Network Security Management Tools

Mô tả tài liệu
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Describe security vulnerability testing, detection, and auditing tools useful in the Cisco network security environment

Chủ đề:
Lưu

Nội dung Text: Network Security Management Tools

  1. Network Security Management Tools
  2. Objectives Upon completion of this chapter, you will be able to: • Describe security vulnerability testing, detection, and auditing tools useful in the Cisco network security environment Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-2
  3. Integrity Testing Tools Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-3
  4. Managing the Secure XYZ Network Web Surfer PSTN/ Dialup Client ISDN Remote Branch Internet Network Access Dialup Server Perimeter Router Firewall Bastion Host: Sales Engineering Web Server FTP Server Campus Campus Client Token CiscoSecure ACS Server Server TACACS+, RADIUS Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-4
  5. Scanners • ISS SafeSuite (UNIX and NT) Top commercial scanner Suite of several scanners with GUI • SATAN (UNIX) Security Administrator’s Tool for Analyzing Networks Scans remote hosts for most known security holes Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-5
  6. Scanners (cont.) • NSS (UNIX) • Strobe (UNIX) • Jackal (UNIX) • IdentTCPScan (UNIX) • CONNECT (UNIX) • FSPScan (Windows, OS/2) • XSCAN (UNIX) Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-6
  7. Sniffers • Network General Sniffer • Network General XRay • Gobbler (DOS/Windows) • ETHLOAD • Netman suite (Etherman) • Esniff.c • Network Monitor (Microsoft) Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-7
  8. Password Crackers/Checkers • Passwd+ • Crack (UNIX) CrackerJack (UNIX) Pcrack (UNIX Perl script) PaceCrack95 (Windows 95) Hades (UNIX) Qcrack (DOS/Windows) Star Cracker (DOS) John the Ripper (UNIX) Killer Cracker (UNIX, others) Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-8
  9. Network Utilities (UNIX) • host • traceroute • rusers • finger/sfingerd • showmount • WHOIS • smrsh • ssh Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-9
  10. Logging Tools • TCP_Wrapper • swatch • trimlog • logdaemon (UNIX) Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-10
  11. Tool Suites • Merlin by CIAC (UNIX) • Tiger (TAMU) Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-11
  12. File/System Integrity Checkers Used to guard against Trojan horses: • MD5 • COPS (UNIX) • Tripwire • ATP (Anti-Tampering Program) • Hobgoblin Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-12
  13. System Monitors • Windows/NT • Cinco NeTXray for Win 95 and NT • UltraScan v1.2 Port Scanner for NT • Kane Security Analyst for NT • Microsoft EP Dump for NT • MicrosoftC2CERT Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-13
  14. Windows 95 Tools • NetScan Tools • Network Toolbox • TCP/IP Surveyor Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-14
  15. Macintosh Tools • MacTCP Watcher • Query It! • WhatRoute Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-15
  16. Cisco IOS Software Commands • traceroute • show ip route • debug ip packet • rmon • show ip ? Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-16
  17. Chapter References The following sites contain security tools: • ftp://ciac.llnl.gov/pub/ciac/sectools/unix/ • ftp://coast.cs.purdue.edu/pub/tools/ • ftp://ftp.cert.org/pub/tools/ • ftp://ftp.win.tue.nl/pub/security/ • ftp://ftp.funet.fi/pub/unix/security/ • http://www.rootshell.com/ • http://filepile.com/ • http://www.iss.net/ Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-17
  18. Summary • Scanners automatically detect security weaknesses • ISS and SATAN are two of the most popular scanners • Sniffers capture packet traffic for later analysis • Password crackers and checkers can be used to detect weak passwords, improving password security • UNIX is the most powerful operating system for network security, because it has many network utilities • Network logging tools are useful for detecting intrusions • Network security tools are also available for Windows NT and 95, DOS, Macintosh, and OS/2 • Cisco IOS software has commands useful for security Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-18
  19. Review Questions Q1. Which network security tool for the Windows NT platform would be useful for automatically detecting security weaknesses as part of managing network security? A) ISS Safesuite Q2. What is the Cisco IOS software command that can substitute for a packet sniffer? A) debug ip packet Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-19
  20. Review Questions (Cont’d) Q3. How can password crackers and checkers be used in managing network security? A) Password crackers and checkers can be used to detect weak passwords, improving password security Q4. Which operating system has the largest selection of network security utilities? A) UNIX is the most powerful operating system for network security, because it has many network utilities Copyright © 1998, Cisco Systems, Inc. MCNS—Network Security Management Tools—17-20
Đồng bộ tài khoản