| As I've mentioned throughout this book, there are a lot of software packages related to security. This section lists various free security products that anyone involved with security issues should be aware of. Free SoftwareCOPSThe Computer Oracle and Password System (COPS) is a security program that tries to identify security risks on a UNIX system. It checks for empty passwords in /etc/passwd, world-writable files, misconfigured ftp sites, and so on. To obtain a copy, go to the anonymous ftp site. ftp.cert.org CgichkA Web vulnerability tool that searches for a series of intersecting directories and files on a particular site. www.sourceforge.net/projects/cgichk Coroner's ToolkitComputer forensics software that can be used after a break-in for a post-mortem analysis of a UNIX system. www.porcupine.org/forensics/ CrackUse Crack, by Alec Muffett, to test for bad passwords. (However, don't run Crack on systems you are not responsible for supporting. Otherwise, you could find yourself out of a job!) Get your copy at the anonymous ftp site. info.cert.org/pub/tools/crack DsniffA collection of tools for network auditing and penetration testing. monkey.org/~dugsong/dsniff FirewalkFirewalk analyzes IP packet responses to determine gateway ACL filters. www.es2.net/research/firewalk GNUPGA complete replacement for PGP. It does not use the patented IDEA algorithm and it can be employed without any restriction. www.gnupg.org Hping2This is a command-line-oriented TCP/IP packet assembler/analyzer. www.hping.org IP FilterIP Filter is a TCP/IP packet filter. coombs.anu.edu.au/ipfilter Klaxon & TocsonIntrusion-detection tools used to identify unusual activity (i.e., udp, tcp). Klaxon is extremely useful in detecting ISS and SATAN port scanner attacks. Tocson is useful in detecting TCP SYN probe attempts. www.eng.auburn.edu/users/doug/second.html L0phtCrackL0phtCrack is a password auditing tool. The new release is faster and has better reporting. For example, it reports the number and percentage of cracked passwords. www.@stake.com/research/lc LsofLsof displays all open files on a UNIX system. Get your copy at the anonymous ftp site. vic.cc.purdue.edu NessusNessus project was started to provide the Internet community with free security auditing tools.This site has several projects and software programs available. www.nessus.org NPASSWDThis password changer proactively checks for bad passwords and refuses them. Get your copy at the anonymous ftp site. ftp.cc.utexas.edu/pub/npasswd OpenSSHA free version of the SSH protocol. www.openssh.com/ OPIEThis is a free redistributable kit that drops into most UNIX systems, replacing the login and FTP daemon with versions that use the OTP for user authentication. www.inner.net/opie/ SATAN (System Administrator's Tool for Analyzing Networks)SATAN, written by Wietse Venema and Dan Farmer, probes systems from the network in the same way an actual hacker would. You can use it to test the security of a single system or many systems on a network. Get your copy at the anonymous ftp site. www.porcupine.org/pub/security/index.html SNORTOpen Source Network Intrusion Detection System. www.snort.org SocksThis package allows various Internet services (such as gopher, ftp, and telnet) to be used through a firewall. To get your copy, connect to the anonymous ftp site. www.socks.nec.com/ Solaris Security ToolkitSolaris Security Tookit. www.sun.com/security/jass SwatchThe Swatch package monitors and filters log files and executes a specified action based on a specified log pattern. Get your copy at the anonymous ftp site. oit.ucsb.edu/~eta/swatch/ TCP WrapperThis package allows a UNIX system administrator to control access to various network services through the use of an access control list. It also provides logging information about wrapped network services and can be used to prevent or monitor network attacks. Get your copy at the anonymous ftp site. ftp://ftp.porcupine.org/pub/security/index.html TIS Firewall ToolkitThis software package can be used to build and maintain a system to protect a network from unwanted network activities. Look for it at the anonymous ftp site. www.fwtk.org TigerTiger checks for known security vulnerabilities at UNIX workstations. It is similar to COPS, but more extensive. Get your copy at the anonymous ftp site. www.net.tamu.edu/ftp/security/TAMU TitanTitan is a collection of programs which fix or tighten the security configurations at the time of installation on a UNIX system. www.fish.com/titan TripwireTripwire monitors for changes in system binaries. It is available at the anonymous ftp site. www.tripwire.com/ TTY-WatcherTTY-Watcher monitors, logs, and interacts with all system TTYs. To get a copy, go to the anonymous ftp site. ftp://ftp.cerias.purdue.edu/pub/tools/unix/sysutils/ttywatcher/ OPIEUp-to-date downward-compatible S/Key. inner.net/opie/ |