Presentation is loading. Please wait.

Presentation is loading. Please wait.

DIYTP 2009. Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.

Similar presentations


Presentation on theme: "DIYTP 2009. Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical."— Presentation transcript:

1 DIYTP 2009

2 Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical

3 Assessing a System - Basics  Patches  First rule of computer security  Patches are released for all types of software, all the time  MUST BE UP-TO-DATE!!  Organization should have a patch management policy/system

4 Assessing a System - Basics  Ports  Should be managed by ‘least privilege’ principle  Ports which are not needed, should be shut down  ….as well as their associated services  Protect  Protective software/devices should be used  Firewall  IDS  Anti-virus

5 Assessing a System - Basics  Policies  Should be reviewed periodically as organizational needs and software/hardware changes  Types:  Acceptable use (i.e. e-mail, Internet use)  Disaster recovery  Password

6 Assessing a System – Basics  Probe  Take a look and see what the network looks like  Should use multiple analysis tools to assess your network  Look for security flaws  Should be scheduled regularly

7 Assessing a System - Basics  Physical  Policy or procedures should address how systems are secured  Do they need to be locked up?  Backup media  Is it stored in a secure location? (i.e. fireproof safe)  Routers/switches/hubs  Who has access?  How should it be secured?

8 Assessing a System – Initial Reconnaissance  Tools  Nslookup  IP addresses  Records for domain  Whois  Owner of a domain, IP address  ARIN  IP address allocation

9 Assessing a System – Initial Reconnaissance  Netcraft www.netcraft.comwww.netcraft.com  What the target is running  VisualRoute www.visualware.comwww.visualware.com  Visual traceroute to target  Sam Spade www.samspade.orgwww.samspade.org  Multiple tools in one package

10 Assessing a System – Social Engineering  Social Engineering  People are security’s weakest link  Many attack vectors  Impersonation  Dumpster diving  Shoulder surfing

11 Assessing a System - Scanning  Common Tools:  Nmap and Nessus  Finds hosts  Operating system  Firewalls  Vulnerabilities  Ping  IP Connectivity  Traceroute  Maps out route to target

12


Download ppt "DIYTP 2009. Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical."

Similar presentations


Ads by Google