LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 06-25-2009, 08:09 AM   #1
satishmali1983
LQ Newbie
 
Registered: Mar 2009
Distribution: Mandriva 2008.0
Posts: 21

Rep: Reputation: 16
Tools For Vulnerability scanning & some tips for secure your server


Hello

I am new in Linux industry. I am using Mandriva 2008.0 distribution, i want to perform vulnerability assessment of my server, so please provide me the Best tools in the market to perform vulnerability assessment. And also the some steps to hardening Linux Server. I am using FTP, Apache Server & Samba server.

Actually i want to do security audit of my server, so required the necessary steps to perform the total security Audit & also suggest tool to perform that.

Thanks
Satish
 
Old 06-25-2009, 08:30 AM   #2
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Maybe start by looking at the Security references thread?
 
Old 06-25-2009, 08:31 AM   #3
JulianTosh
Member
 
Registered: Sep 2007
Location: Las Vegas, NV
Distribution: Fedora / CentOS
Posts: 674
Blog Entries: 3

Rep: Reputation: 90
Hire a professional.

Simply having the tools to do a security audit will not be sufficient. The knowledge and experience requirement to accurately describe your systems' security posture is vast.

I'm sure you'll get many tips from LQ on doing a security audit. Take the tips to heart, experiement and learn. But if you're doing this audit for an organization, do them a favor and allow someone with experience to give them an accurate view of their systems so they can make informed decisions to protect their assets.
 
Old 06-25-2009, 10:57 AM   #4
nowonmai
Member
 
Registered: Jun 2003
Posts: 481

Rep: Reputation: 48
Simply using tools to perform a security audit will give you very little in the way of useable information unless you know how to use it. I would brush up on my security... learn to understand vulnerabilities and exploits. Listen to security podcasts and read blogs.
Then try these tools...
nmap
nessus
metasploit

To harden your box, dump ftp and use sftp instead.
Learn about mod_security and greensql (if you have a sql backend on your box).
Don't open samba to the outside world.
Learn how to chroot your outward facing services.
 
Old 06-25-2009, 11:16 AM   #5
nowonmai
Member
 
Registered: Jun 2003
Posts: 481

Rep: Reputation: 48
Also, if you are going to have your server facing the internet... consider placing a firewall between your server and the net. I use IPCop myself, but Smoothwall or Astaro are also worth a look.
They all provide firewalling, VPN passthrough or endpoint, instrusion detection/prevention and a certain amount of malware scanning on both http and email traffic.
 
Old 07-01-2009, 12:44 PM   #6
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
I don't believe that you have to hire a security professional to get a good assessment of your security posture. That is usually big money and this assumes there is money available to contract someone to perform the security assessment. The assumption could be that the server is in a corporate environment...it could be a server that is colo'd by someone that is not associated with a corporation.

Network and system administrators can learn as much as they can about securing the machines they are charged to maintain and still have an outstanding security posture. It depends on how diligent, proactive, and thorough the admin is, IMO.

IMO, everything a security professional does when assessing security should be within the domain (or at least basic understanding) of the network/system admin. This is usually key when the admin has to mitigate risk. To mitigate, you have to at least understand the vulnerability in order to assess and mitigate the risk. If an admin can't do that, they shouldn't be in the positions they're in.

To the OP, there are tons of docs and write-ups on understanding basic security. This forum has some sticky threads on some of them. Good researching is key.

Just my 2 cents...

Last edited by unixfool; 07-01-2009 at 05:29 PM.
 
Old 07-01-2009, 01:33 PM   #7
xeleema
Member
 
Registered: Aug 2005
Location: D.i.t.h.o, Texas
Distribution: Slackware 13.x, rhel3/5, Solaris 8-10(sparc), HP-UX 11.x (pa-risc)
Posts: 988
Blog Entries: 4

Rep: Reputation: 254Reputation: 254Reputation: 254
satishmali1983,
I concur with Admiral Beotch & unixfool. However, take it from someone that was in the Security Audit industry. Most of our customers were banks, credit unions, and armored couriers that were required to follow certain Federal regulations in order to stay in business.

*IF* this server belongs to someone who's sole intention is to run a business, you may want to invest in an annual contract with an organization that will scan the server from the outside and offers penetration-testing. Typically about $1,000 per year from a good Payment Card Industry (PCI)-compliant vendor.

However, if this is a personal server, or one that belongs to a small "mom & pop" outfit, then by all means;
nmap, along with "nmapfe" - Google it up and read-up on it's homepage (it was even featured in a Matrix movie!)
Nessus - A Commercial Vulnerability scanner that gives you solutions. There's a free version, too.
MetaSploit - A bit more complicated than Nessus, but a skilled user can attempt almost any known exploit with this one!

However, I would suggest some of the basics;
blockhosts.py - Can be configured to run via cron, and can put the banhammer on anyone trying to brute-force their way in via SSH, FTP, or HTTP (the web part takes a bit more setup).
iptables - A workhorse used by many front-end applications, such as smoothwall.
SSH - Read the man pages for sshd_config and ssh! Most Linux distributions have "PermitRootLogin Yes" set. Turn. That. Off.

Now, if you're starting to feel hardcore about locking-down the server, google-up "bastion host +linux". But keep a backup handy (there is a such thing as 'too tight').
 
Old 07-01-2009, 02:19 PM   #8
tekhead2
Member
 
Registered: Apr 2004
Distribution: slackware/FreeBSD/Vector
Posts: 291

Rep: Reputation: 52
From my personal experience .. download a copy of Backtrack and boot an old laptop into it and spend the rest of your life in their forums figuring out how to use it. The guys at remote-exploit aren't the end all for security, but when it come to open source security tools and audits I've never had trouble finding an answer from them. They are usually up to date on whats going on. http://forums.remote-exploit.org/ Here is where to get Backtrack http://remote-exploit.org/backtrack.html Its an bootable cd distro loaded with open source security tools. The distro it's self however is not meant to be installed as it is somewhat insecure by design and meant to be ran from a non-writable drive like a cdrom.

Last edited by tekhead2; 07-01-2009 at 02:22 PM.
 
Old 07-01-2009, 02:34 PM   #9
geek.ksa
Member
 
Registered: Jan 2009
Location: Dhahran, Saudi Arabia
Distribution: RHEL 5
Posts: 42

Rep: Reputation: 17
No need to hire a pro.

Foundstone,, is a great product with very nice reporting tools.

check http://www.foundstone.com/us/index.asp
 
Old 07-02-2009, 05:51 AM   #10
nowonmai
Member
 
Registered: Jun 2003
Posts: 481

Rep: Reputation: 48
^
OK, with all due respect... as soon as I saw the McAfee branding, any potential respect I might have for that firm/site/product dropped to zero.

The Windows requirement doesn't do much for its credibility either.

Last edited by nowonmai; 07-02-2009 at 05:53 AM.
 
Old 07-02-2009, 07:10 AM   #11
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by nowonmai View Post
^
OK, with all due respect... as soon as I saw the McAfee branding, any potential respect I might have for that firm/site/product dropped to zero.

The Windows requirement doesn't do much for its credibility either.
You'd be VERY surprised by this tool. It is difficult to maintain, but the results are very robust. I would frequently use Nessus alongside it when conducting vuln assessments at a previous job...both are very consistent when comparing the results amongst each other, although you definitely have to understand how to configure both when doing 'bake-offs' between the two.

Don't let the McAfee branding and Windows requirement cloud the issue. The end results are the same as if you were running a non-Win32 system and using free tools... and the free tools that Foundstone offers to the public is showing that they are generous and don't have issues with offering free tools to the public.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: "Linux more secure than Windows", Microsoft vulnerability report suggests LXer Syndicated Linux News 0 08-21-2007 01:30 PM
LXer: "Linux more secure than Windows", Microsoft vulnerability report suggests LXer Syndicated Linux News 0 08-21-2007 09:20 AM
Secure file transfer server - tools ? taphagreg Linux - Security 1 03-19-2007 10:52 PM
LXer: Book Review: Network Security Hacks: Tips & Tools for Protecting Your Privacy LXer Syndicated Linux News 0 11-24-2006 01:24 AM
LXer: Tips on keeping your Ubuntu Linux server secure LXer Syndicated Linux News 0 08-24-2006 01:54 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:18 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration