3.1.2. Teoria Introdutria: SAINT SATAN Security Administrator Tool for Analyzing Networks SAINT Word Wide Digital Security Inc SAINT SATAN SATAN WWW Gopher anonymous FTP CERT, Computer Emergency Response Team CIAC Computer Incident Advisory Capability SATAN SAINT 3.1.2.1. A Interface e Opes do Sistema SATAN HTTP browser PERL HTTP SATAN hosts hosts SATAN host SATAN patch 3.1.2.2. Nveis de Pesquisa SATAN hosts showmount tcpscan WWW Gopher FTP udpscan finger rusers boot Yellow Pages tcpscan udpscan NFS rsh ypbind xhost FTP. SATAN host Remote Procedure Call Domain Name System hosts e-mail HINFO showmount hosts host rlogin anonymous FTP WWW Gopher e-mail SATAN SATAN daemon ruserd rpcinfo rpcinfo bootparam boot diskless Network Information Service finger 3.1.2.3. Estrutura de Funcionamento SATAN kernel kernel HTTP SATAN hosts hosts satan.cf SATAN hosts hosts hosts HTML browser PERL HTML SATAN Network File System Network Information Service 3.1.2.4. Arquivos de Regras .satan Hosttype banners telnetd ftpd sendmail Drop Services hosts SATAN Todo script PERL script Trust hosts SATAN 3.1.2.5. Scripts de Teste scripts SATAN scripts PERL boot.satan bootparam diskless boot dns.satan nslookup finger.satan daemon hosts hosts ftp.satan anonymous FTP .forward nfs-chk.satan portmapper rex.satan daemon rexd rpc.satan portmapper rcpinfo p rsh.satan host host SATAN .rhosts hosts.equiv rusers.satan hosts showmount.satan tcpscan.satan tcp_scan tftp.satan hosts /etc/passwd udpscan.satan udp_scan xhost.satan yp-chk.satan ypbind.satan 3.1.2.6. A Descoberta dos Alvos nslookup fping, ping fping hosts Fping ping fping hosts host request timeout fping ping HOST1 robin-round host host host unreachable SATAN fping hosts fping hosts broadcast 3.1.2.7. Subsistema de Aquisio de Dados hosts host host TCP_SCAN UDP_SCAN host banner SATAN host host tftpd rexd Assigned Numbers backdoors hacker Resource For Crackers 3.1.2.8. Relaes de Confiana SATAN hosts host login root 3.1.3. Implementao Prtica 3.1.3.1. Instalao do Aplicativo Passo 1: login saint-3.0.1.beta1.tar.gz saint /home/seguranca home/seguranca saint-3.0.1, prompt shell Observao 1: saint-3.0.1 README Passo 2: saint-3.0.1 Passo 3: saint-3.0.1 prompt 3.1.3.2. Execuo Passo 7: SAINT Passo 8: data-base Data Management
Figura 3.1-1 Data Management Saint Passo 9: host Target Selection Observa o 2: heavy Start Scan Figura 3.1-2 Target Selection Saint Passo 10: SAINT host Continue with Report and Analysis Figura 3.1-3 Saint Data Collection Saint Passo 11: host hosts Figura 3.1-4 Data Analysis Tabela of Contents Saint Passo 12: host data-base Data Management Figura 3.1-5 Data Analysis Host Tabelas Saint Passo 13: host host Figura 3.1-6 Data Analysis Results Saint Passo 14: host Figura 3.1-7 Vulnerability Solutions Saint 3.2. Nessus 3.2.1. Objetivo:
3.2.2. Teoria Introdutria: Nessus nessusd kernel plug-ins rules scanner Smart Service Recognition Internet Assigned Number Authority 3.2.3. Implementao Prtica 3.2.3.1. Instalao do Aplicativo Passo 1: login nessus.tar nessus /home/seguranca home/seguranca nessus, prompt shell Observao 1: nessus README Passo 2: nessus Observao 2: Passo 3: root /root/nessus/lib Passo 4: /sbin/ldconfig 3.2.3.2. Execuo Passo 5: Passo 6: daemon Passo 7: Observao 3: ./nessusd, ./nessus Passo 8: Observao 4: /etc/*nessus.keys /etc/*nessus.ssr Passo 9: Figura 3.2-1 Informaes do Servidor Passo 10: Figura 3.2-2 Tipos de Plug-ins - Nessus Passo 11: Prefs Figura 3.2-3 Customizao de determinados Servios - Nessus Passo 12: Scan Options port scanner Figura 3.2-4 Nessus Setup Scan Options - Nessus Passo 13: Target Selection DNS zone transfer Start the scan Observao 5: Read File... Figura 3.2-5 Nessus Setup Target Selection - Nessus Passo 14: User passphrase Observao 6: Credits Figura 3.2-6 Nessus Setup User - Nessus 3.2.3.3. Resultados Passo 15: Observao 6: Nessus Report Observao 7: Figura 3.2-7 Nessus Report Summary - Nessus Figura 3.2-8 Nessus Report Security Holes - Nessus 3.3. Sniffer 3.3.1. Objetivo:
3.3.2. Teoria Introdutria: switch hub sniffing sniffer ifconfig -a netstat -r sniffer one-time password one-time password one-time password 3.3.3. Implementao Prtica 3.3.3.1. Instalao do Aplicativo Passo 1: login sniffit_0_3_5.tar saint /home/seguranca home/seguranca sniffit_0_3_5, prompt shell tar -xvf sniffit_0_3_5.tar Observao 1: sniffit_0_3_5 README.FIRST Passo 2: sniffit_0_3_5 ./configure Observao 2: configure.in. makefile Passo 3: sniffit_0_3_5 prompt make 3.3.3.2. Execuo