Download presentation
Presentation is loading. Please wait.
Published byAileen Rogers Modified over 9 years ago
1
DIYTP 2009
2
Assessing a System - Basics Why? Vulnerabilities What to look at: The six ‘P’s Patch Ports Protect Policies Probe Physical
3
Assessing a System - Basics Patches First rule of computer security Patches are released for all types of software, all the time MUST BE UP-TO-DATE!! Organization should have a patch management policy/system
4
Assessing a System - Basics Ports Should be managed by ‘least privilege’ principle Ports which are not needed, should be shut down ….as well as their associated services Protect Protective software/devices should be used Firewall IDS Anti-virus
5
Assessing a System - Basics Policies Should be reviewed periodically as organizational needs and software/hardware changes Types: Acceptable use (i.e. e-mail, Internet use) Disaster recovery Password
6
Assessing a System – Basics Probe Take a look and see what the network looks like Should use multiple analysis tools to assess your network Look for security flaws Should be scheduled regularly
7
Assessing a System - Basics Physical Policy or procedures should address how systems are secured Do they need to be locked up? Backup media Is it stored in a secure location? (i.e. fireproof safe) Routers/switches/hubs Who has access? How should it be secured?
8
Assessing a System – Initial Reconnaissance Tools Nslookup IP addresses Records for domain Whois Owner of a domain, IP address ARIN IP address allocation
9
Assessing a System – Initial Reconnaissance Netcraft www.netcraft.comwww.netcraft.com What the target is running VisualRoute www.visualware.comwww.visualware.com Visual traceroute to target Sam Spade www.samspade.orgwww.samspade.org Multiple tools in one package
10
Assessing a System – Social Engineering Social Engineering People are security’s weakest link Many attack vectors Impersonation Dumpster diving Shoulder surfing
11
Assessing a System - Scanning Common Tools: Nmap and Nessus Finds hosts Operating system Firewalls Vulnerabilities Ping IP Connectivity Traceroute Maps out route to target
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.