Security Audit: Prabhaker Mateti
Security Audit: Prabhaker Mateti
Security Audit: Prabhaker Mateti
Prabhaker Mateti
Policy based
Assessment of risk
Examines site methodologies and practices
Dynamic
Communication
Host
Firewall
Networks
Large networks
RFC 1244
``Site Security Handbook''
Other Documentation
Hardware/software inventory
Network topology
Key personnel
Emergency numbers
Incident logs
Information is power
Expectations
Measure policy compliance
Assessing risk & security level
Assessing potential damage
Change management
Security incident response
When to audit?
Emergency!
Before prime time
Scheduled/maintenance
Audit Schedules
SAINT/SATAN/ISS
Nessus
lsof /pff
Nmap, tcpdump, ipsend
MD5/DES/PGP
COPS/Tiger
Crack
laptop computer
three kilograms or less
graphics display
MB memory
MB disk
ethernet (as many connectors as possible)
Unix / Linux
Secured OS
OS source code
Audit tools
Development tools
Unix / Linux
Security policy
Examine dissemination
procedures
Policies are worthless unless people read
and understand them
Ideally it is distributed and addressed when
people join org
Email is useful for updates, changes
Written user acknowledgment necessary
Review Documentation
Hardware/software inventory
Network topology
Key personnel
Emergency numbers
Incident logs
Technical Investigation
Run static tools (COPS, Crack, etc.)
Check system logs
Check system against known vulnerabilities
(CERT, bugtraq, CIAC advisories, etc.)
Follow startup execution
Check static items (config files, etc.)
Search for privileged programs (SUID, SGID, run
as root)
Examine all trust
Nmap
SAINT/SATAN/ISS
Crack
Nessus
COPS/Tiger
rhosts, hosts.equiv
NFS, NIS
DNS
Windowing systems
User traffic and interactive flow
NFS/AFS/RFS
NIS
News
WWW/httpd
Proxy (telnet, ftp, etc.)
Authentication (Kerberos, security tokens, special
services)
Management Protocols (SNMP, etc.)
wuftpd
TCP wrappers
Logdaemon
Xinetd
GNU fingerd
Network daemons
Anything SUID, SGID
Programs run as system account
CGI's