Subscribe via RSS

Social

www.flickr.com
This is a Flickr badge showing public photos and videos from kalel71. Make your own badge here.
Clicking on these helps me out

Search Site
Hobby Photography
Twitter
Amazon Stuff

« Linux based Backup/Cloning Applications | Main | Virtual Desktops in Windows »
Monday
Jun082009

Testing your IT Security defenses

The best way to make sure your infrastructure is secure, is to test its defenses. Just like with backups, you don't know if your system is fully functional until you've attempted a restore and succeeded. No matter how thorough you may be with your firewalls and network systems, we all make mistakes. Not only could you have missed something, but there are constant exploits & holes being released and tested on systems everywhere.

Hence, we need to try Hacking into your own system(s). This technique is commonly referred to as Pen-Testing (Penetration Testing). This is a deep field to go into, so I will just point you in a direction to start off with, by listing some of the common tools used in this field. That being said, the tools required for Pen-Testing, are the same used by hackers, so use caution.

The main tool I use as a basis for testing is Nessus. This application is a Network Vulnerability Scanner with support for Windows, OSX and Linux. It does everything from port scans to distribution specific exploits. The database for all of it's information is kept up to date via feeds. Feeds are provided in 2 forms. Free for home and private use, and a Commercial version that is most frequently updated. The free version is usually only around 24 hours behind the commercial version.

Nessus attempts safe testing for known vulnerabilities, it's mostly non-destructive. Just enough execution to run reporting and list the weaknesses/holes in your systems. It's a very useful tool without the worries of bringing down a particular exploitable unit, although sometimes older equipment such as printers may trigger a lockup and require a restart.

The next step once you have a list of vulnerabilities, is to actually prove or attempt something such as deliver a payload via an exploit, or add a user with certain access. This is where the Metasploit framework comes in. Warning, this tool is very powerful and will allow you to use the actual exploits/vulnerabilities such as injecting a remote application or dll to gain access to a system or network.

As a Security Auditor, you could use NMap to run port scans to list open and closed ports as well as OS finger printing/identification. Then use Metasploit to gain access to a system, and simply change the status of a port to OPEN. Then you could run Nmap again, and show the newly opened ports, accessible via the exploits.

This is a deep subject matter, but this brief mention of tools should get you going in the right direction for testing your own systems. Once you have identified problems, fix them. If you can't, then find security professionals that can help you. The main thing, is identifying the problems and protecting your data.

These tools I have mentioned here are all free with the exception of Nessus having a commercial version. However, you can get started right away with all of them. They are all cross-platform. Nmap comes built in with linux. Mac OSX has Nmap built into the it's Network Utility in it's utilities folder. In Windows, you can use the Zenmap GUI or the command-line version.

These aren't the only tools available either. If you are so inclined, check out the BackTrack Live security CD. It's a bootable Linux CD that comes pre-loaded with these tools and many more. They are very complex and very powerful as well.

PrintView Printer Friendly Version

EmailEmail Article to Friend

Reader Comments

There are no comments for this journal entry. To create a new comment, use the form below.

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>