Download presentation
Presentation is loading. Please wait.
Published bySilvia Carroll Modified over 9 years ago
1
Scanning with ISS Security-SIG 15 December 2005 David Taylor & John Lupton ISC Information Security ISC/Information Security
2
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu ISS - Internet Security Scanner Commercial product of Internet Security Systems Provides Windows-based scanning for vulnerabilities on hosts running all major PC operating systems –Windows –Mac OS X –Unix/Linux
3
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Which Windows? Dave Taylor sez… –Windows 2000 or above, BUT… –Win 2003 and XP/SP2 have been problematic –Win 2000 or XP/SP1 seem to work best
4
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Who’s Allowed to Scan? Anyone is permitted to scan their own system Penn Sysadmins and LSP’s are permitted to scan IP addresses/ranges for which they have responsibility
5
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Scanning Etiquette The “Golden Rule”…you don’t appreciate someone else scanning your addresses without your knowledge or permission, right? “Let My People Know”…unless there’s a good reason to keep it secret, tell your users when you will be scanning, and from which IP address
6
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Firewalls If you are scanning from inside a firewall, you will need to disable it to prevent problems with scan accuracy If your target(s) is/are behind a firewall, you will need to: –Disable the firewall during the scan, OR –Locate the scanning system inside the firewall
7
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Downloading & Installing ISS Go to www.iss.net/download Set up an account (necessary, but free) Sign in to the Download Center Search for Internet Scanner 7.0 SP2 –Allows installation of SQL desktop engine as part of single installation –Dave sez: older versions require separate installations, and are “a pain in the bootie”. Click on colored “FULL INSTALLS” tab Download file (there’s only one) and install as per instructions
8
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu OK, what next?… The software “as is” will allow scanning of the localhost (127.0.0.1) To scan other hosts, you need to obtain and install a “key” Send email to security@isc - we will “cut” you a key and transmit it to you, along with instructions how to import it into ISS
9
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
10
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Installing Updates After installing the ISS application, update the scanning modules by running “X-Press Update Install” –Located in ‘Start’ menu –Go to Starbucks…it will take a while Once the updated modules have been installed, you’re ready to roll
11
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
12
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Scanning Credentials From a stand-alone, non-domain system: –Results similar to what outside hacker could see From a standard domain user account: –Results similar to what other domain users could see From a Domain Administrator account: –Results will show much more detail, e.g. patch level
13
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Set Up a Session From ‘Start’ Menu… –Create a new session –Choose a template, OR start with a blank session and construct your own new policy –Give it a name, and click ‘OK’ –Edit the policy and select your scan target(s) Be Aware!…Plugins for Destructive Denial of Service vulnerabilities may cause a remote system to become unresponsive - or crash altogether
14
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
15
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
16
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
17
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
18
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
19
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
20
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
21
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Set Up a Session (cont.) Save the policy and close the Policy Editor Select the policy, then name the session Enter a host range, or load from a list –Remember the “Golden Rule” - don’t scan anyone’s space but your own
22
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
23
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
24
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
25
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu To Ping, or not to Ping? You have an option to “ping” the hosts in your target range before the scan is performed Many hosts are configured to block all ICMP activity, but can still be scanned Generally better to NOT use the “ping” option –Scans take longer, but are usually more accurate –If hosts you know are present return “unreachable”: Use ‘Tools->Session Properties’ and choose ‘Scan Always’ Forces ISS to run all modules in the policy
26
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Running the Scan Let ‘er rip… Go to Starbucks again
27
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
28
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Result Reports Results can be presented in several escalating levels, e.g.: –Executive summary –Technically detailed, with step-by-step mitigation procedures Need help? Write to us at security@iscsecurity@isc
29
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
30
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
31
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
32
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu
33
Scanning with ISS 15 December 2005 ISC/Information Security security@isc.upenn.edu Useful Links Download: www.iss.net/download Support: www.iss.net/support Plug-in Info: xforce.iss.net/ SANS Internet Storm Center: isc.sans.org SANS@Risk: www.sans.org/newsletters/risk French Security Incident Response Team (known for releasing Zero-Day Advisories): www.frsirt.com/english/ Metasploit: www.metasploit.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.