You are on page 1of 36

3.

Auditoria de Segurana de Redes e Sistemas


Operacionais
3.1. SAINT
3.1.1. Objetivo


3.1.2. Teoria Introdutria:
SAINT SATAN Security Administrator Tool for
Analyzing Networks SAINT
Word Wide Digital
Security Inc
SAINT
SATAN
SATAN
WWW Gopher anonymous FTP
CERT, Computer Emergency Response Team CIAC Computer
Incident Advisory Capability
SATAN SAINT
3.1.2.1. A Interface e Opes do Sistema
SATAN
HTTP
browser PERL
HTTP
SATAN
hosts
hosts
SATAN
host
SATAN
patch
3.1.2.2. Nveis de Pesquisa
SATAN
hosts
showmount
tcpscan WWW Gopher FTP udpscan
finger rusers boot Yellow Pages
tcpscan udpscan NFS rsh
ypbind xhost FTP.
SATAN host
Remote Procedure Call
Domain Name System
hosts
e-mail HINFO
showmount
hosts host
rlogin
anonymous FTP WWW Gopher e-mail
SATAN
SATAN
daemon ruserd
rpcinfo rpcinfo
bootparam boot
diskless
Network Information Service
finger
3.1.2.3. Estrutura de Funcionamento
SATAN kernel
kernel
HTTP
SATAN
hosts
hosts
satan.cf
SATAN
hosts
hosts
hosts
HTML browser
PERL
HTML
SATAN
Network File System Network Information
Service
3.1.2.4. Arquivos de Regras
.satan
Hosttype banners
telnetd ftpd sendmail
Drop
Services hosts
SATAN
Todo
script PERL
script
Trust hosts
SATAN
3.1.2.5. Scripts de Teste
scripts SATAN
scripts PERL
boot.satan
bootparam
diskless boot
dns.satan
nslookup
finger.satan daemon
hosts
hosts
ftp.satan anonymous FTP
.forward
nfs-chk.satan portmapper
rex.satan daemon rexd
rpc.satan portmapper rcpinfo p
rsh.satan host host SATAN
.rhosts
hosts.equiv
rusers.satan
hosts
showmount.satan
tcpscan.satan
tcp_scan
tftp.satan hosts /etc/passwd
udpscan.satan
udp_scan
xhost.satan
yp-chk.satan
ypbind.satan
3.1.2.6. A Descoberta dos Alvos
nslookup
fping, ping
fping hosts
Fping ping
fping hosts
host request
timeout fping ping HOST1
robin-round host
host
host
unreachable
SATAN fping hosts
fping
hosts
broadcast
3.1.2.7. Subsistema de Aquisio de Dados
hosts
host
host
TCP_SCAN UDP_SCAN
host
banner
SATAN
host
host
tftpd rexd
Assigned Numbers
backdoors hacker
Resource For Crackers
3.1.2.8. Relaes de Confiana
SATAN
hosts
host
login root
3.1.3. Implementao Prtica
3.1.3.1. Instalao do Aplicativo
Passo 1:
login saint-3.0.1.beta1.tar.gz
saint /home/seguranca
home/seguranca saint-3.0.1,
prompt shell
Observao 1:
saint-3.0.1
README
Passo 2: saint-3.0.1
Passo 3:
saint-3.0.1
prompt
3.1.3.2. Execuo
Passo 7:
SAINT
Passo 8: data-base
Data Management

Figura 3.1-1 Data Management Saint
Passo 9: host
Target Selection
Observa o 2:
heavy
Start Scan
Figura 3.1-2 Target Selection Saint
Passo 10: SAINT host
Continue with Report and Analysis
Figura 3.1-3 Saint Data Collection Saint
Passo 11:
host
hosts
Figura 3.1-4 Data Analysis Tabela of Contents Saint
Passo 12:
host
data-base
Data Management
Figura 3.1-5 Data Analysis Host Tabelas Saint
Passo 13: host
host
Figura 3.1-6 Data Analysis Results Saint
Passo 14:
host
Figura 3.1-7 Vulnerability Solutions Saint
3.2. Nessus
3.2.1. Objetivo:




3.2.2. Teoria Introdutria:
Nessus
nessusd kernel
plug-ins
rules
scanner
Smart Service Recognition
Internet Assigned Number
Authority
3.2.3. Implementao Prtica
3.2.3.1. Instalao do Aplicativo
Passo 1:
login nessus.tar nessus
/home/seguranca
home/seguranca nessus,
prompt shell
Observao 1:
nessus
README
Passo 2: nessus
Observao 2:
Passo 3: root
/root/nessus/lib
Passo 4: /sbin/ldconfig
3.2.3.2. Execuo
Passo 5:
Passo 6: daemon
Passo 7:
Observao 3:
./nessusd,
./nessus
Passo 8:
Observao 4:
/etc/*nessus.keys /etc/*nessus.ssr
Passo 9:
Figura 3.2-1 Informaes do Servidor
Passo 10:
Figura 3.2-2 Tipos de Plug-ins - Nessus
Passo 11: Prefs
Figura 3.2-3 Customizao de determinados Servios - Nessus
Passo 12: Scan Options
port scanner
Figura 3.2-4 Nessus Setup Scan Options - Nessus
Passo 13: Target Selection
DNS zone transfer
Start the scan
Observao 5: Read File...
Figura 3.2-5 Nessus Setup Target Selection - Nessus
Passo 14: User
passphrase
Observao 6: Credits
Figura 3.2-6 Nessus Setup User - Nessus
3.2.3.3. Resultados
Passo 15:
Observao 6: Nessus Report
Observao 7:
Figura 3.2-7 Nessus Report Summary - Nessus
Figura 3.2-8 Nessus Report Security Holes - Nessus
3.3. Sniffer
3.3.1. Objetivo:




3.3.2. Teoria Introdutria:
switch hub
sniffing
sniffer
ifconfig -a
netstat -r
sniffer
one-time password
one-time password
one-time password
3.3.3. Implementao Prtica
3.3.3.1. Instalao do Aplicativo
Passo 1:
login sniffit_0_3_5.tar
saint /home/seguranca
home/seguranca sniffit_0_3_5,
prompt shell
tar -xvf sniffit_0_3_5.tar
Observao 1:
sniffit_0_3_5
README.FIRST
Passo 2: sniffit_0_3_5
./configure
Observao 2:
configure.in.
makefile
Passo 3:
sniffit_0_3_5
prompt
make
3.3.3.2. Execuo

Passo 3:
./sniffit i
Observao 3:
README.FIRST







3.4. COPS
3.4.1. Objetivo:




3.4.2. Teoria Introdutria:
Bourne shell
shell scripts
/etc/rc* cron(tab)
/home
alias sendmail
3.4.3. Implementao Prtica
3.4.3.1. Instalao do Aplicativo
Passo 1:
login cops_104.tar saint
/home/seguranca
home/seguranca cops_104,
prompt shell
Observao 1:
cops_104
README
Passo 2: cops_104
Observao 2:
README.FIRST, README.1, README.2.SH e
README 3.
makefile
Passo 3:
cops_104
prompt
Observao 3: cops
script

3.4.3.2. Execuo
Passo 3:
Passo 4: suid.cnk
./suid.cnk

You might also like