Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

vulnerability tests

  • 13-01-2004 9:18pm
    #1
    Registered Users, Registered Users 2 Posts: 986 ✭✭✭


    looking for sercuity holes in my system ect, i know its full of them.... ixd used to have one, but its gone now....


Comments

  • Closed Accounts Posts: 1,322 ✭✭✭phobos


    Well for starters there is a wide range of vulnerability types that can exist on a given system. I'd be surprised if you found a single tool that could address the majorty of them. Everything from the software you've installed, to the network, and generaly policies you have in place need to be considered, when doing a vulnerability assessment.

    What kind of environment does the host live in?
    Does the host provide services to other machines on the network?
    Does the host need access to services provided on the network?
    How many people need access to the machine?
    (the critical word in the last 2 being "need").

    The list can go on and on...
    However it is good to assess the situation, and then decided what to do in order to "improve" security. You are not going to create a 100% secure setup, because there is no such thing, and if there was, it would be unusable. The trade-off between usablility and security is in the hands of the administrator. Someone told me once that a computer with no power is 100% secure. My answer is that I could open the case and rob the hard disk. So physical access is something else, but that would fall under policy. Policies are just as important, if not more, than the software/hardware systems we put in place to improve security.

    You haven't provided enough information to describe what kind of system you wish to secure or assess for vulnerabilities, but I'm sure you can take some of what I've said and put it to use. There are plenty of software utilities out there that let us audit system security. Tools like nmap, snort, l0pht, John the Ripper, SuperScan, Kismet, Etheral, etc, etc, etc. But they won't cover every aspect. You will have to draw the line somewhere, and acknowledge that a line exists. Break the problem up in to distinct catagories, and identify risks. By all means use the tools of the trade to audit the system, that's what they are there for.

    At the moment I'm working on a security framework for system, which will be deployed on an isolated wireless network. I can tell you that "little" is not the word I'd use to describe what can go wrong in that scenario. But a lot of decisions regarding security have been made, and the system is a hell of a lot better than it was not so long ago. Some of the security features in place, I've written myself, and seem to work well in this scenario. But developing custom security tools (in-house) isn't always the best route to take, as application level vulerabilities can and do exist (after all we're only human).

    But first, learn everything you can about the host and it's environment. Ask yourself questions. Draft a procedure to audit & secure holes. Develop a policy to maintain a certain level of security. Remember updating software and hardware systems, along with updating secure policies are part and parcel of a good policy itself.

    ;-phobos-)


  • Moderators, Recreation & Hobbies Moderators, Science, Health & Environment Moderators, Technology & Internet Moderators Posts: 93,596 Mod ✭✭✭✭Capt'n Midnight


    And watch out for cookie exploits

    Especially chocolate chip cookies - "I'll give you a cookie if you let me have a go on the word processor!"


    Another thing to do is figure out is there anything on the system worth defending - you could set up a honeypot to waste intruders time and alert you to attacks - if practicable have internet access separate from data, ie not on the same network. You could also setup a light browsing PC (sacrificial) connected to the internet so if/when it gets trashed you just wipe and start over.

    Reminder - IE still has unpatched vunerabilites - if you are using windows without an external firewall you can make your system safer and thats before you take into account IE & Office & Outlook Express & VB scripting.

    XP SP2 will be out soon. One route crackers sometimes use is to attack files that have not changed since the original release of an OS (ie have never been patched) - if they can break one of these then most PC's are vunerable....


  • Closed Accounts Posts: 244 ✭✭osmethod


    What OS are you using?


  • Moderators, Recreation & Hobbies Moderators, Science, Health & Environment Moderators, Technology & Internet Moderators Posts: 93,596 Mod ✭✭✭✭Capt'n Midnight


    Originally posted by osmethod
    What OS are you using?
    Welcome aboard :)
    If you click on the search button in his post - other posts were re windows 2K and other windows apps.


  • Registered Users, Registered Users 2 Posts: 986 ✭✭✭wild_eyed


    this is a test machione, with no protection whatso ever.


  • Advertisement
  • Closed Accounts Posts: 244 ✭✭osmethod


    You could try this....

    http://www.elcomsoft.com/antexp.html


Advertisement