home *** CD-ROM | disk | FTP | other *** search
- Network Computing
- January 15, 1997, Issue: 801
- Section: Features -- State of Security
-
-
- Been Attacked? Congratulations!
-
- By
-
- The hacker's job is actually pretty easy. He has a wide variety of
- inexpensive tools and known system vulnerabilities to work from. He need
- find only one mistake, while you need to protect hundreds of attack
- points. To make matters worse, you may not even know when you've
- been breached by an attack. Networks generate massive amounts of
- traffic data, and anyone doing harm will try to leave as few tracks as
- possible.
-
- If you work alone, you'll find it very difficult to assess your vulnerabilities.
- You can buy expertise from a consultant or use some of the available
- tools for analyzing your current situation.
-
- For general IP network and host vulnerability scanning, the Security
- Administrator's Tool for Analyzing Networks (SATAN), freely available
- from Eindhoven University of Technology at ftp://ftp.win.tue.nl/
- pub/security/index.html provides a good assessment and is easy to use.
- Unfortunately, SATAN is falling behind; its problem database is simply
- not updated often enough.
-
- On a per-host basis, Haystack Labs' highly regarded Stalker suites
- analyze Unix systems as well as firewalls, while its Webstalker Pro
- watches over World Wide Web hosts. These products, like many
- Unix-based alternatives, make heavy use of log file analysis to identify
- unscrupulous behavior.
-
- RealSecure from Internet Security Systems is a real-time, network-based
- attack analyzer, combining a network sniffer and attack signature
- recognition. RealSecure issues alerts or makes log entries when an
- intrusion is detected, scanning for hundreds of known attacks to any host
- visible on the monitored segments. The recognition engine is periodically
- updated with new patterns.
-
- If an attack is detected, RealSecure terminates the connection between
- hosts by spoofing packets on behalf of each of the hosts involved, using
- RST packets to conduct an abortive release of a TCP connection.
-
- You might be thinking: "This would be very helpful to hack a network
- with." Indeed, many legitimate tools can be put to illegitimate use. If
- SATAN exposes holes in your network to you, it can expose them to
- someone else, too. So now you have to protect yourself from the tools.
-
- A number of anti-SATAN tools exist, such as Courtney from the
- Department of Energy's Computer Incident Advisory Capability (CIAC)
- (ciac.llnl.gov/ciac) or Los Altos Technologies' Gabriel
- (www.lat.com/gabe.htm)
-
- In addition, a security-assessment tool, a network analyzer and a
- password verifier are a few examples of products that you should use
- yourself, just because others may use them against you.
-
- Copyright « 1997 CMP Media Inc.