tools - rivier university...• hands-on ethical hacking and network defense (paperback), by michael...

9
Computer Security Tools 4/11/2006 Bryan J. Higgs, 2006 2 Tools • Here is a list of potentially useful tools and utilities with which to fight the onslaught of viruses, worms, Trojan horses, and other malware. • Don’t consider it in any way a complete list! There are lots of other tools out there, which you can find easily via Google, et. al. • Also, I’ve tended to focus on Windows-based tools (with some mention of Unix/Linux-based tools), because most of you have Windows machines. Also, I don’t really have access to a Unix/Linux machine. 4/11/2006 Bryan J. Higgs, 2006 3 Resources Malware: Fighting Malicious Code, by Ed Skoudis, Lenny Zeltser, Prentice Hall PTR, 2003, ISBN: 0131014056 Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis, Prentice Hall PTR , 2001, ISBN: 0130332739 How to Break Web Software : Functional and Security Testing of Web Applications and Web Services, by Mike Andrews, James A. Whittaker, Addison-Wesley Professional, 2006, ISBN: 0321369440 The Software Vulnerability Guide (Programming Series) (Programming Series) (Paperback), by Herbert H Thompson, Scott G Chase, Charles River Media, 2005, ISBN: 1584503580 Web Security, Privacy and Commerce, 2nd Edition (Paperback), by SimsonGarfinkel, O'Reilly Media, Inc., 2002, ISBN: 0596000456 Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor to be Able to Look at Lots of Different File Formats

Upload: others

Post on 23-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tools - Rivier University...• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor

Computer Security

Tools

4/11/2006 Bryan J. Higgs, 2006 2

Tools• Here is a list of potentially useful tools and utilities with

which to fight the onslaught of viruses, worms, Trojan horses, and other malware.

• Don’t consider it in any way a complete list! There are lots of other tools out there, which you can find easily via Google, et. al.

• Also, I’ve tended to focus on Windows-based tools (with some mention of Unix/Linux-based tools), because most of you have Windows machines. Also, I don’t really have access to a Unix/Linux machine.

4/11/2006 Bryan J. Higgs, 2006 3

Resources• Malware: Fighting Malicious Code, by Ed Skoudis, Lenny Zeltser, Prentice Hall

PTR, 2003, ISBN: 0131014056

• Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis, Prentice Hall PTR , 2001, ISBN: 0130332739

• How to Break Web Software : Functional and Security Testing of Web Applications and Web Services, by Mike Andrews, James A. Whittaker, Addison-Wesley Professional, 2006, ISBN: 0321369440

• The Software Vulnerability Guide (Programming Series) (Programming Series) (Paperback), by Herbert H Thompson, Scott G Chase, Charles River Media, 2005, ISBN: 1584503580

• Web Security, Privacy and Commerce, 2nd Edition (Paperback), by Simson Garfinkel, O'Reilly Media, Inc., 2002, ISBN: 0596000456

• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081

Use a Powerful Editor to be Able to Look at Lots of Different File Formats

Page 2: Tools - Rivier University...• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor

4/11/2006 Bryan J. Higgs, 2006 5

The TextPad Editor http://www.textpad.com/

Safer Browsing

4/11/2006 Bryan J. Higgs, 2006 7

The Mozilla Firefox Browser http://www.mozilla.com/firefox/

Safer eMail

Page 3: Tools - Rivier University...• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor

4/11/2006 Bryan J. Higgs, 2006 9

The Mozilla Thunderbird Mail Client http://www.mozilla.com/thunderbird/

4/11/2006 Bryan J. Higgs, 2006 10

The Mozilla Thunderbird Mail Client

Anti-Virus Protection

4/11/2006 Bryan J. Higgs, 2006 12

AVG Anti-Virus http://free.grisoft.com/doc/2/lng/us/tpl/v5

Page 4: Tools - Rivier University...• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor

Firewall

4/11/2006 Bryan J. Higgs, 2006 14

ZoneAlarm Firewall http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?dc=12bms&ctry=US&lang=en&lid=dbtopnav_zaav

Anti-Spyware

4/11/2006 Bryan J. Higgs, 2006 16

Spybot Search & Destroy http://www.safer-networking.org/

Page 5: Tools - Rivier University...• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor

4/11/2006 Bryan J. Higgs, 2006 17

Ad-Aware http://www.lavasoft.de/software/adaware/

4/11/2006 Bryan J. Higgs, 2006 18

Microsoft Windows Defender http://www.microsoft.com/athome/security/spyware/software/default.mspx

4/11/2006 Bryan J. Higgs, 2006 19

SpyCatcher Express http://www.tenebril.com/consumer/spyware/spycatcher-express.php

Tracing HTTP and Other Protocols

Page 6: Tools - Rivier University...• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor

4/11/2006 Bryan J. Higgs, 2006 21

The Ethereal Network Protocol Analyzer http://www.ethereal.com/

4/11/2006 Bryan J. Higgs, 2006 22

The IEHttpHeaders Browser Plug-in http://www.blunck.info/iehttpheaders.html

4/11/2006 Bryan J. Higgs, 2006 23

The IEHttpHeaders Browser Plug-in

4/11/2006 Bryan J. Higgs, 2006 24

The Paros HTTP Proxy http://www.parosproxy.org/index.shtml

Page 7: Tools - Rivier University...• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor

Checking the Security of Web Site SSL

4/11/2006 Bryan J. Higgs, 2006 26

SSLDiggerhttp://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/ssldigger.htm

4/11/2006 Bryan J. Higgs, 2006 27

SSLDigger

Security/Vulnerability Scanners

Page 8: Tools - Rivier University...• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor

4/11/2006 Bryan J. Higgs, 2006 29

The Nessus Security Scanner http://www.nessus.org/

• Nessus is a vulnerability scanner, originally for Unix/Linux systems.

• It is being ported to other systems, such as MacOS and Windows.

• There is a version of Nessus for Windows called NeWT.

4/11/2006 Bryan J. Higgs, 2006 30

NeWThttp://www.tenablesecurity.com/products/newt.shtml

4/11/2006 Bryan J. Higgs, 2006 31

Microsoft Baseline Security Analyzer http://www.microsoft.com/technet/security/tools/mbsahome.mspx

4/11/2006 Bryan J. Higgs, 2006 32

Port Scanning Tools• Nmap (http://www.insecure.org/nmap/)

• Foundstone Vision (http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/vision.htm )

• Foundstone Fport(http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/fport.htm )

• Foundstone Superscan(http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/superscan.htm )

• Others…

Page 9: Tools - Rivier University...• Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 Use a Powerful Editor

4/11/2006 Bryan J. Higgs, 2006 33

Foundstone Vision

4/11/2006 Bryan J. Higgs, 2006 34

Foundstone Superscan

That’s Just a Sample!

There are lots more out there…