Nmap Security Tool Survey 104
spring writes "Every so often, the author of everyone's favorite network reconnaissance tool, nmap, runs a survey to determine which security-oriented software products are most popular. This year's tool survey was just released, and it contains some interesting results. Old favorites like Nessus, Snort, Netcat, and Ethereal made the list, of course. SAINT and SARA are still around. But a number of new tools appeared this year, like Windows-only GFI LANguard, SuperScan, and Cain & Abel. Nikto and Kismet demonstrate the growing importance of wireless networks. The survey contains many good tools. Certainly worth a read."
Security tools are awesome, but.... (Score:5, Insightful)
You also have to have a good preventive security plan, which these tools will help out in. However, there should also be a plan of action should these security measures get bypassed (i.e. an insider job, program exploits, trojans, etc...)
But that's just my contention...
Re:Security tools are awesome, but.... (Score:5, Insightful)
isn't why they are called tools and not solutions ?!?!
Re:Security tools are awesome, but.... (Score:3, Insightful)
Fair enough, I agree with you there. I simply meant to say that sometimes these tools are referred to as a complete solution, which is most likely a misnomer.
Re:Security tools are awesome, but.... (Score:2, Insightful)
sooo true, I (unfortunately) witnessed it too many times.
Re:Security tools are awesome, but.... (Score:1, Funny)
Dear Slashdot: Where the fuck is my "Post anonymously" button? Are you telling me I have to logout to post anonymously now? What the fuck is wrong with you assfucks?
I am not slashdot, buttttt.... (Score:1)
No idea why you do not see it. Perhaps post your config instead of just cursing at the owners? maybe it's only broken with some combinations?
FWIW, old coal burner pentium, linux,i686, moz 1.3b browser
Re:Security tools are awesome, but.... (Score:1)
I suppose not being able to post anonymously would be either to discourag
Re:Security tools are awesome, but.... (Score:2)
Re:Security tools are awesome, but.... (Score:3, Informative)
Last I checked, Nikto had nothing to do with wireless networks. It's a web server scanner based off Whisker [wiretrip.net].
Re:Security tools are awesome, but.... (Score:1)
- Sullo [cirt.net]
Re:Security tools are awesome, but.... (Score:4, Insightful)
Re:Security tools are awesome, but.... (Score:3, Insightful)
Anyway, Defense in Depth is always good -- if an attacker penetrates the firewall, it's good to have hosts that are harder to crack. If the host gets cracked, you'd want to have an incident response plan and policy so that you can contain the damage.
In Bastille Linux [bastille-linux.org]'s defense, we try very hard to educate the sysadmin/user so they'll make better decisions. Bastille tries to educate the user, to help her build a good hardening policy for her hosts an
Saint became commercial product (Score:1)
My two cents (Score:1)
Cain & Abel has been around for ages, so maybe a new one on the list, not really a new tool.
Just my two cents.
Re:My two cents (Score:1)
Why aren't there any numbers in the list? I would like to know how many votes a given scanner was given.
Lies, damn lies and statistics.
Re:My two cents (Score:1)
Ditto for SuperScan. The link has copyright 2000, and I've known about it for approximately that long.
instead of a firewall (Score:2)
I'd like to see zone alarm beat that! My solution wouln't give any modal dialog boxes either.
Re:friewall (Score:4, Informative)
Re:friewall (Score:1)
I agree--it has a lot of shortcomings...
Re:friewall (Score:1)
Umm, bring up the ZoneAlarm window/interface, click on Alerts & Logs and then under Alert Events Shown select Off. And as far as allowing other programs to go online, click on Program Control then click on the Programs tab and add the executable which generates the alert. Really,
I know the *most* popular security purchase..... (Score:4, Informative)
When a windows java exploit can reformat your disk by visiting a malformed web page, you don't really have to wonder why they're so popular.
Fine set of tools. (Score:5, Funny)
Ethereal a security tool ? (Score:4, Informative)
Re:Ethereal a security tool ? (Score:5, Insightful)
Knowing the how allows you to put in filters. Filters allows you to operate.
Re:Ethereal a security tool ? (Score:4, Informative)
Re:Ethereal a security tool ? (Score:4, Informative)
Sometimes ducks don't just quack. The sometimes fly and lay eggs too.
Re:Ethereal a security tool ? (Score:5, Insightful)
It's a nice way to check a connection is not made, that packets do not go out of one or another interface, that traffic is encrypted. tcpdump can do the same (except follow TCP traffic, which is very enlightning for users who like telnet).
So while Ethereal does not increase security by itself, it does add security by making it possible to check out the packets. That makes is IMHO a security tool.
Re:Ethereal a security tool ? (Score:1)
mac os X tools (Score:5, Informative)
rpg [well.com] password generator
kismac [binaervarianz.de] a kismet equivalent that also includes a WEP cracker. very nice!
macanalysis [macanalysis.com] a really good security tools suite
Re:mac os X tools (Score:3, Interesting)
Anyway, if anyone here is interested in helping package Bastille for Mac, especially with that perl upgrade, please contact me!
- Jay
Wellenreiter (Score:5, Informative)
Re:Wellenreiter (Score:5, Informative)
Wellenreiter only received 6 votes (even after correcting for poor spelling :) and 10 were needed to place #75. But since it is clearly a useful free tool, I just added a link to it in the Kismet entry. [insecure.org]
Thanks for the suggestion,
-Fyodor
Concerned about your network security? Try the free Nmap Security Scanner [insecure.org]
WAP Detectors (Score:4, Interesting)
What I want is something that scans for known MAC ID's or something to identifiy wireless access points without having to fly all over the country to do it.
There are plenty of wireless based scanners but they involve travel.
Any hints?
Re:WAP Detectors (Score:4, Informative)
The popular scanning solutions include several APs that cover your building/area and passivly listen for WiFi traffic. They are typically permamently mounted and listening.
Re:WAP Detectors (Score:4, Informative)
APTools (Score:4, Informative)
Strangely enough... (Score:5, Interesting)
Nessus is, however, a single tool, that can be as both useful to the white hat5 as it is the bl4ck hats.
It gets my number one tool vote as being as useful to both partys - yet completely impartial.
A very difficult road to tread indeed...
Re:Strangely enough... (Score:3, Insightful)
Your analogy to file sharing is bad. A better analogy would be to weapons.
In some la-la fantasy world where violence does not exist, no one would no needs weapons for self-defense. In reality, however, not allowing weapons puts the law-abiding at the mercy of criminals, who may still yet possess illegal weapons.
In some la-la fantasy world where exploits do not exist, no would need to audit their network for security holes. In reality, however, not allowing such tools would leave law-abiding network adm
Timely article for my needs (Score:5, Interesting)
So I welcome any such article as the one posted here to help better educate me and get me up to date on the even the most mundane of utilities (I hadn't even heard of nessus/netcat)
I'm not a fresh unix convert or technically challenged, it's just that my occupation has demanded that I focus on front end and applicational development rather than network security and monitoring.
So to get by I've been using very basic common sense like running firewalls for port blocking, not running insecure services such as telnet and in the event that i have to (one of my servers is a multiuser webhost so I had to turn FTP on) research and run a more secure variant of that service (for FTP I opted for vsftpd over wu/pro)
And for security, besides my basic IP Masquerading and port blocking firewall (ya, it's that basic, I'm no guru) I run tripwire, which I run a sanity check daily as well as run snort.
This config runs on everyting from my OS X laptop to the RH9 boxes for dev/production serving and seems "ok" for the moment.
I do plan on evaluating/installing some kernal level patches to the RH boxen such as grsecurity [grsecurity.net] but I thought I'd use this topic to fish for pointers as I am also looking for some good educational material such as IP/Network configuration and indepth material on properly setting up an ironclad DMZ. So if anyone has some highly recommended links or knows of soome good books on amazon to point out or even comments to make here to give some pointers, i'd be much appreciative.
Re:Timely article for my needs (Score:2)
In the meantime, I've found that Hacking Linux Exposed, by Hutch, Lee and Kurtz is very cool, and O'reilly's Building Linux Firewalls is very thorough.
I've also come to realize (admin'ing my company's network for a little over a year and only getting nipped once by me foolishly leaving FTP open) that using iptables with the default door closed
Wasn't nmap the tool of controversy from SGI? (Score:3, Interesting)
He developed it as a tool to help system administators secure their system but SGI did not like it because crackers could use it.
Was this SGI tool nmap or not? I was only 16 at the time and can't remember.
Re:Wasn't nmap the tool of controversy from SGI? (Score:5, Informative)
You're almost certainly thinking of Dan Farmer's SATAN. Read the story for yourself. [svn.net]
Re:Wasn't nmap the tool of controversy from SGI? (Score:2)
It still pisses me off today that clueless SGI managers view security through obscurity as a means to an end. Irix today is knows to be one of the least secure versions of Unix out of the box right besied SCO openserver. Hmm how did that happen? Judging by how SGI treated security in the past including this incident shows how Irix got the way it did. Here is sgi's opinion on it [llnl.gov].Non biased info is here. [purdue.edu]
Anyway he should named it something different. A clueless perso
Re:Wasn't nmap the tool of controversy from SGI? (Score:2)
I mean, calling it 'SATAN' instead of something like 'Cute Puppy Dog Network Analysis Tool' is a reflection of his intent.
That said, I'm really happy that tools like SATAN exist now. Scanning your own network is a great way to learn about network security.
IRIX has changed since those days (Score:2)
For those that have been away from IRIX for awhile, even since 6.5.0 shipped, a lot has been added in
Re:IRIX has changed since those days (Score:2)
But yeah, most IRIX boxes (especially older ones) are running Sendmail 8.9.3 or worse.
Re:IRIX has changed since those days (Score:2)
Brainless management, crazy high prices, and new MIPS processors behind schedule. There are gobs of reasons why SGI may tank soon. They do have a pretty cool new Linux/Itanium2 system based on Origin architecture. 512 GB RAM and 64 processors on a single linux box (not a cluster).
The biggest SGI is MIPS/IRIX based, though... up to 1024 processors and 1 TB ram on a single mac
OT: Secure your SGI today... (Score:3, Informative)
2) Install the security patches [sgi.com] for your version of IRIX (note that IRIX releases previous to 6.5.15 will probably not have the most recent security patches available).
3) If you're a security newbie, run the "Improve System Security" appli
Security for the home user (Score:5, Funny)
2) Put it back in the box.
3) Send it back to the place that you bought it from.
Sure its not very practical, but it would make my job a hell of a lot easier
Re:Security for the home user (Score:3, Funny)
Re:Security for the home user (Score:4, Funny)
Re:Security for the home user (Score:2)
I am surprised ... (Score:2, Interesting)
Re:I am surprised ... (Score:5, Informative)
AIDE [cs.tut.fi] only received 4 votes, while 10 were needed to place #75. But I agree that it is a useful free tool that potential Tripwire [tripwire.com] users should know about. And so I have added an AIDE link to that entry [insecure.org].
Thanks,
-Fyodor
Concerned about your network security? Try the free Nmap Security Scanner [insecure.org]
Re:I am surprised ... (Score:1)
Please modify your comment on insecure.org to include that Windoze with Cygwin is also supported.
May your tribe increase!
SAINT not SAINTLY (Score:3, Troll)
They were similarly named, however, there was very little chance of them being confused for one another. Apparently SAINT didn't have enough confidence in their own marketing or their customers intelligence to keep their lawyers out of it.
Just my 2 cents worth. But then, my 2 cents has an effect on a few large clients with large budgets. Good Job SAINT.
uh.. wrong product name? (Score:4, Informative)
It's now called Nagios [nagios.org]
Always... (Score:1)
Eeye (Score:4, Informative)
Re:Eeye (Score:3, Informative)
But I wonder if it's not a bad thing that these tools are starting to auto-fix so many items, like the aforementioned Retina and the registry issues. Call me old-fashioned, but I like my people to fix the problems on a box by actually getting onto the box and doing it from there. Tha
Re: Eeye (Score:2)
For the funky stuff...that's why I suggest to always deploy changes/patches to a single PC, run it for 24 hours, then roll changes out to the rest. I always suggest something like SUS for p