Open Source Security Tool Overview



Similar documents
ANTI-HACKER TOOL KIT. ourth Edition

Penetration Testing LAB Setup Guide

INFORMATION SECURITY TRAINING CATALOG (2015)

Open Source Security Tools

By Jascha Wanger

Network/Internet Forensic and Intrusion Log Analysis

Introduction Open Source Security Tools for Information Technology Professionals

NETWORK SECURITY. Scott Hand. Melanie Rich-Wittrig. Enrique Jimenez

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

OWASP Logging Project - Roadmap

Course Title: Penetration Testing: Security Analysis

Some Tools for Computer Security Incident Response Team (CSIRT)

Open Source Security Tools for Information Technology Professionals

2016 TÜBİTAK BİLGEM Cyber Security Institute

Penetration Testing with Kali Linux

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

4. Exercise: Developing CERT Infrastructure 4.1 GENERAL DESCRIPTION 4.2 EXERCISE COURSE. 4.3 Introduction to the exercise. CERT Exercises Handbook

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Linux and Open Source for (Almost) Zero Cost PCI Compliance. Rafeeq Rehman

Penetration Testing Workshop

INFORMATION SECURITY TRAINING CATALOG (2016)

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

How To Choose A Network Firewall

Build Your Own Security Lab

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Security of IPv6 and DNSSEC for penetration testers

Passive Vulnerability Detection

information security and its Describe what drives the need for information security.

June 2014 WMLUG Meeting Kali Linux

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Virtual Learning Tools in Cyber Security Education

Move over, TMG! Replacing TMG with Sophos UTM

Chapter 9 Firewalls and Intrusion Prevention Systems

Open Source Security: Opportunity or Oxymoron?

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

NETWORK SECURITY HACKS *

Clavister InSight TM. Protecting Values

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Fighting Advanced Persistent Threats (APT) with Open Source Tools

IDS and Penetration Testing Lab ISA656 (Attacker)

Reduce Security Compliance Costs Using Open Source

BEGINNER S GUIDE to. Open Source Intrusion Detection Tools.

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

How To Manage Sourcefire From A Command Console

Network Defense Tools

CRYPTUS DIPLOMA IN IT SECURITY

Network Forensics: Log Analysis

Vulnerability Assessment and Penetration Testing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Intrusion Analysis (Hands-on)

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

74% 96 Action Items. Compliance

To read more Linux Journal or start your subscription, please visit

SANS Top 20 Critical Controls for Effective Cyber Defense

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

How To Protect A Network From Attack From A Hacker (Hbss)

Tk20 Network Infrastructure

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Networks & Security Course. Web of Trust and Network Forensics

Description: Objective: Attending students will learn:

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

April 11, (Revision 2)

Configuring Security for FTP Traffic

Intrusion Detection System (IDS)

EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS

Endian Unified Threat Management

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Ovation Security Center Data Sheet

Achieving PCI-Compliance through Cyberoam

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

Introduction to Network Security Lab 2 - NMap

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

FortKnox Personal Firewall

Computer Security DD2395

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Divide and Conquer Real World Distributed Port Scanning

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Network Security and Firewall 1

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Protecting Critical Infrastructure

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Transcription:

Open Source Security Tool Overview Presented by Kitch Spicer & Douglas Couch Security Engineers for ITaP 1

Introduction Vulnerability Testing Network Security Passive Network Detection Firewalls Anti-virus/Anti-malware Host Intrusion Forensics Encryption Log File Analysis Miscellaneous All-In-One disks 2

Vulnerability Testing OpenVAS Network and host vulnerability scanner. Offshoot of Nessus NSAT Network Security Analysis Tool (similar to OpenVAS) Nikto Web application vulnerability scanner. W3AF Web Application Attack and Audit Pixy PHP Code scanner for XSS and SQLI 3

Network Security Wireshark (Windows, Linux, UNIX) Multi-platform network protocol analyzer with a lot of features and a variety of export format options. Snort (Windows, Linux, UNIX, Mac) IDS/IPS which combines signature, protocol and anomaly-based inspection. 4

Network Security NTop (Windows, Linux, UNIX, Mac) Network traffic probe providing insight to network usage. Analyzes IP traffic and sorts it based upon source and destination and has the ability to passively identify the host OS. 5

Network Security nfdump (Linux, UNIX) Set of command-line tools to collect and process netflow data. NfSen (Linux, UNIX) Web-based GUI for nfdump tools. Allows you to view flows, packets and bytes and easily navigate through netflow data. 6

Network Security Nmap (Windows, Linux, UNIX, Mac) Network discovery tool which uses raw IP packets to determine what hosts are on the network as well as any services the hosts are running, the OS, and more. 7

Network Security Netcat (Linux, UNIX, Mac) Network utility which provides data reading and writing capabilities using the TCP/IP protocol. Also has built-in port scanning, tunneling mode, and advanced usage options. 8

Network Security AFICK (Windows, Linux) File integrity tool - very simple interface that shows what files have changed on a system. 9

Network Security tcpdump (Linux, UNIX, Mac) Command-line packet sniffer/analyzer which allows the user to display packets that are being sent and received over the network which the system is attached. WinDump (Windows) Windows version of tcpdump 10

Passive Network Detection P0f (Windows, Linux, UNIX) Extremely versatile passive OS fingerprinting tool which can not only identify OS, but can detect the use of a firewall, NAT, load balancer, and even remote system ISP. 11

Passive Network Detection PADS Passive Asset Detection System Signature-based detection engine which passively detects network assets. Provides context to IDS alerts when used to supplement existing IDS/IPS systems. 12

Firewalls pfsense Customized FreeBSD distro to be used as a firewall and router. It includes features such as: VPN, NAT, Redundancy, Load Balancing, DHCP Server and Relay, etc. 13

Firewalls SmoothWall Firewall which includes its own hardened OS and provides a userfriendly web interface. Features include: proxies (Web, POP3 email, IM), QoS, IDS via Snort, real-time traffic graphs, etc. 14

Firewalls AppArmor (Linux) Utilizes policy-based profiles for application access and protects the system from malware aimed at application vulnerabilities as well as unwanted programs. 15

Firewalls ModSecurity (OS Independent) Web Application firewall which can work embedded or as a reverse proxy. Protects against various web application attacks and has HTTP traffic logging, monitoring and real-time analysis capabilities. 16

Anti-Virus/Anti-Malware ClamAV (Windows, Linux) Anti-virus toolkit for UNIX with a focus on e-mail scanning at the mail gateway. Rootkit Hunter (Linux, UNIX) Tool used to check Linux/UNIX systems for the presence of rootkits as well as other unwanted tools. 17

Anti-Virus/Anti-Malware Nixory (OS independent) Program used with the Firefox web browser which protects users from malicious data mining. It is aimed at removing cookies which are used for tracking purposes in a malicious manner. 18

Host Intrusion Osiris Host integrity monitoring system. A tripwire replacement OSSEC Host intrusion detection including file integrity, log analysis, policy monitoring, and rootkit detect Samhain (Beltain) Similar to OSSEC. Beltain (non-free) offers a control panel. 19

Forensics AIR Automated Image and Restore is a GUI front-end to dd for creating forensic images. Autopsy A web front-end for the sleuth kit tools. ODESSA An open and extensible suite for acquisition, analysis and documentation of evidence. Live View Creates a Vmware image out of a raw DD image. Keeps a pristine image. 20

Encryption GnuPG (Windows, Linux, Mac) OpenPGP suite that allows users to encrypt and sign data and communication. Features a key management system as well as access modules for public key directories. gpg4win (Windows) Windows version of GnuPG. 21

Encryption AxCrypt (Windows) File encryption software which provides the ability to compress, encrypt, decrypt, store, send and work with files. Integrates with Windows Explorer. 22

Log File Analysis BASE (OS Independent) Basic Analysis and Security Engine - Web interface which performs analysis of Snort alerts and detections. Snare (Various OSes) Collects and analyzes security, application, system, DNS, file replication service, and AD logs. 23

Log File Analysis Splunk (Various OSes) Monitoring and reporting tool which utilizes logs, metrics, and various data from applications, servers and network devices. The information is then indexed into a searchable repository from which graphs, reports and alerts can be generated. 24

Miscellaneous OCS Inventory and package deployment system for Windows and *nix systems. DBAN Darik s Boot And Nuke: wipes drives effectively BleachBit Wipes free space Portable Apps Various SysInternals Windows tools 25

All-In-One SIFT Workstation Created by SANS for forensic analysis BackTrack Penetration testing and other hacker tools OSSIM Live CD with a network SIEM system preinstalled. Metasploit Ruby based framework for penetration tools and security tools 26

Conclusion Further questions? Where do you want to go from here? 27