LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-19-2009, 08:16 AM   #1
pablo1999
Member
 
Registered: Oct 2007
Posts: 33

Rep: Reputation: 15
Assesment Toolkit for Linux


Hello,

I'm traying to select a good set of applications to start building a toolkit to do security assesments on Linux machines.

So far I have selected the following applications


Vulnerability Scanner - OpenVAS
Packet Sniffer - Wireshark
Intrusion Detection System - Snort
Web Vulnerability Scanner - Nikto
Password Cracker - THC Hydra
Rootkit Detector - Tripwire
Penetration Testing - Metasploit Framework


Do I need to really evaluate all these applications or some of them can do the job that others can do? For example, if I use the Metasploit Framework, do I need to use OpenVAS?

Thanks in advanced,

Last edited by pablo1999; 08-19-2009 at 08:17 AM.
 
Old 08-19-2009, 08:55 AM   #2
salasi
Senior Member
 
Registered: Jul 2007
Location: Directly above centre of the earth, UK
Distribution: SuSE, plus some hopping
Posts: 4,070

Rep: Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897
I am not a security expert, but:
  • In an ideal world, you would start from capabilities and then select applications until you have one, or more, that covers each capability that you need
  • You seem to have some of your list mis-filed (eg tripwire)
  • You might want to look at some distros explicitly targeted at this area to see what the established players use:
  • http://www.securitydistro.com/security-distros/
  • http://www.darknet.org.uk/2006/03/10...sics-recovery/
  • Also be aware that wireshark, while useful/vital/handy is quite a different thing from some of the others on the list. Some of the others are 'aim and fire' while wireshark won't do anything for you unless there is a sentient lifeform to look through the results. this may or may not be a concern to you.

And, be very careful what you ask for: it would be easy to get mistaken for someone who wants to hack in and do bad things rather than someone who is intent on improving and checking security by probing for vulnerabilities.
 
Old 08-19-2009, 09:26 AM   #3
pablo1999
Member
 
Registered: Oct 2007
Posts: 33

Original Poster
Rep: Reputation: 15
I will be doing a network assessment and the network has Linux machines. I selected those applications because those are the among the most popular ones.

Going back to my question. Do I need to really evaluate all these applications or some of them can do the job that others can do? For example, if I use the Metasploit Framework, do I need to use OpenVAS?

Thanks in advanced.
 
Old 08-19-2009, 02:35 PM   #4
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 422Reputation: 422Reputation: 422Reputation: 422Reputation: 422
Quote:
Rootkit Detector - Tripwire
Unless there has been a pretty serious change of direction, I don't think Tripwire is a rootkit detector. Instead, Tripwire detects changes to files, regardless of how those changes are made. Aide and Samhain do a similar sort of thing. Examples of rootkit detectors would be rkhunter or chkrootkit.
 
Old 08-19-2009, 05:52 PM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by pablo1999 View Post
Do I need to really evaluate all these applications or some of them can do the job that others can do? For example, if I use the Metasploit Framework, do I need to use OpenVAS?
It depends on what "doing a network assessment" comprises of here. Is it "just" reconnaissance, interpreting results and reporting, or would you be required to actively exploit specific vulns? Do you have a plan or an outline?
 
Old 08-20-2009, 07:52 AM   #6
pablo1999
Member
 
Registered: Oct 2007
Posts: 33

Original Poster
Rep: Reputation: 15
Quote:
It depends on what "doing a network assessment" comprises of here. Is it "just" reconnaissance, interpreting results and reporting, or would you be required to actively exploit specific vulns? Do you have a plan or an outline?
This is the workflow I'm planning to target:

Identity IP networks and hosts
Perform network scanning
Investigate vulnerabilities
Exploitation of vulnerabilities

So far I have found that I can use OpenVAS and Metasploit Framework for doing the tasks mentioned above.
 
Old 08-20-2009, 08:27 AM   #7
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Sorry, forgot to ask some more: what is the purpose of the assessment? Is it in any way linked to probing for or achieving a level of security as in SANS Top-10, HIPAA, CIS, NIST, OWASP, PCI-DSS or other official standards? What auditing best practices do you try to adhere to and which auditing templates do you use? Who owns the networks you'll be working on (you, your employer, paying customers)? Do these networks contain production servers? Can you assess what risk exploiting vulns on production servers holds and how to mitigate damages? What would be the added value of exploiting vulns when reporting them linking to the appropriate CVE entry for fixing should be enough? Sorry if you only see questions and no answers, I'm just interested to see how amateuristic or professional your approach is.
 
Old 08-20-2009, 10:42 AM   #8
pablo1999
Member
 
Registered: Oct 2007
Posts: 33

Original Poster
Rep: Reputation: 15
Quote:
what is the purpose of the assessment?
To get familiarized with the available tools.

Quote:
Is it in any way linked to probing for or achieving a level of security as in SANS Top-10, HIPAA, CIS, NIST, OWASP, PCI-DSS or other official standards?
No.


Quote:
What auditing best practices do you try to adhere to and which auditing templates do you use?
I dont have any templates yet. Where can I get more information about auditing templates?

Quote:
Who owns the networks you'll be working on (you, your employer, paying customers)?
I will be using VMWare Server to create a small environment.


Quote:
Can you assess what risk exploiting vulns on production servers holds and how to mitigate damages?
I will be using VMWare Server to create a small environment.

Quote:
What would be the added value of exploiting vulns when reporting them linking to the appropriate CVE entry for fixing should be enough?
I want to get exposure to Metasploit Framework.
 
Old 08-20-2009, 11:28 AM   #9
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by pablo1999 View Post
To get familiarized with the available tools. (..) I want to get exposure to Metasploit Framework.
Clear. I think you best just go read and experiment with those toolkits then. Exploiting vulns may seem thrilling but having the knowledge to interprete results, being able to explain the report to the client and making recommendations (adding value) is what rakes in the money. To get an idea of what the field contains have a look at the the reading material at say the CIS, NIST and OWASP sites and securityfocus.com and insecure.org mailing lists for starters?
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Installation of Linux Trace toolkit sudhansu Linux - Kernel 1 01-08-2009 05:53 AM
LXer: Ontology Toolkit for Linux LXer Syndicated Linux News 0 12-11-2007 03:11 AM
RAID 0 risk assesment GATTACA Linux - Hardware 7 03-27-2006 08:57 PM
Linux Trace Toolkit tabish121 Programming 1 11-18-2005 09:27 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:09 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration