Security Tools CS480 b Dick Steflik CACLS Windows
Security Tools CS-480 b Dick Steflik
CACLS • Windows NT, W 2000, XP • Displays or modifies access control lists (ACLs) of files
CACLS • cacls /T /E /G administrator: F d: users*. * • Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D: drive. • cacls /T /E /R Everyone d: users • Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D: drive. • Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified.
CACLS (examples)
CACLS Of course anything done using CACLS could also be done through the GUI.
NSLOOKUP • • Name Server Lookup Windows NT, W 2000, Linux, UNIX used to resolve Internet names to IP addresses default (no parameter) returns default name server address (windows) ; on Linux/UNIX enters conversational mode allowing lookups until you quit
NSLOOKUP
Traceroute • Tracert (windows) ; traceroute (Linux/Unix) • used to display all of the routers between two communicating Internet hosts • options: • -d don’t resolve addresses to host names • -h (m) max number of hops to search for target • -j (hostlist) loose source route along the host list • -w (timeout) wait (timeout) msec for each reply
tracert
xmtr • LINUX version of traceroute • requires superuser authority • GUI application
ping • Send an ICMP echo request message to a specific host • plat form differences • Linux - no parameters, sends repeated /continuous requests until terminated • Windows - -t switch send continuous pings • Unix (most) -s switch sends continuous pings
ping
WS-Ping – Security Analysis Tool • COTS (common Off The Shelf) IPSwitch • www. ipswitch. com • Verify connectivity to a particular device on your network • Quantitatively test data connections between your computer and a remote • • • system Trace the path to a network host or device Obtain information on host names and IP addresses Scan your network and list devices and network services View summary information about a network host or device including the official hostname, IP address, and contact information (from the Whois database) View Simple Network Management Protocol values as well as Windows network domains, hosts, and workstations Search information (such as user's full names and e-mail addresses) available through LDAP
WS-Ping • Features tools for : • Ping - Click to Enlarge Ping - Use Ping to determine if a network device is reachable. • Traceroute - Use traceroute to trace the path to a network host or device. • Throughput - Click to Enlarge Throughput - Use Throughput to test the data speed on a connection with a remote host. • Lookup - Use Lookup to obtain information on host names and IP addresses. • Info - Use the Info tool to view summary information about a network host or device. • Whois - Use Whois to obtain information on names from the Network Information Center. • Finger - Use finger to obtain information about a user or host (if supported on the remote host). • SNMP - Use the SNMP tool to view Simple Network Management Protocol values. • Scan - Use Scan to scan your network and list devices. • Win. Net - Use the Win. Net tool to view your Windows Network domains, hosts, and workstations. • LDAP- Use the LDAP tool to search for names and information available through LDAP. • Time - Use the time tool to query multiple time servers or to synchronize your local system clock. • Quote - Use Quote to view quotations from a Quote server. • HTML - Use the HTML tool to help you efficiently debug your Web site.
SATAN • Security Administrators Tool for Analyzing Networks • • • web based Ten years old Open Source ( http: //www. fish. com/satan Rational for SATAN is explained at : • http: //www. fish. com/satan/admin-guide-to-cracking. html There a number of SATAN derivatives: • SAINT Scan Engine – Saint Corporation • http: //www. saintcorporation. com/products/saint_engine. html • SANTA
SATAN • SATAN recognizes several common networkingrelated security problems, and reports the problems without actually exploiting them. • For each type or problem found, SATAN offers a tutorial that explains the problem and what its impact could be. • The tutorial also explains what can be done about the problem: correct an error in a configuration file, install a bugfix from the vendor, use other means to restrict access, or simply disable service.
Problems Found by SATAN • • • NFS file systems exported to arbitrary hosts NFS file systems exported to unprivileged programs NFS file systems exported via the portmapper NIS password file access from arbitrary hosts Old (i. e. before 8. 6. 10) sendmail versions REXD access from arbitrary hosts X server access control disabled arbitrary files accessible via TFTP remote shell access from arbitrary hosts writable anonymous FTP home directory
Nessus • Vulnerability Scanner • Nessus development Team • plug-in based • • • • Finger Abuses Windows Backdoors Gain a shell remotely CGI abuses Remote file access RPC Firewalls FTP SMTP Gain root remotely NIS DOS Miscellaneous
Nessus • Client Server architecture • plug-ins are for the server, client is for administration and analysis • creates reports in HTML, La. Te. X, ASCII, and XML • including graphs
- Slides: 19