Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 163 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
163
Dung lượng
3,12 MB
Nội dung
2013 Information Security and Anti‐Forensics VERSION 3 MISSIONMAN P a g e | 1 Foreword Computer security is not just a science but also an art. It is an art because no system can be considered secure without an examination of how it is to be used. All components much be examined and you must know how an attacker goes about a system before you can truly understand how to best defend yourself. This is where this guide comes in; it exists for the purpose of examining these methods of attack and the implementation for attack mitigation. You will learn the common techniques used for attack and how to protect yourself from them. This guide should not be used as an in‐depth analysis of each attack, but a reference for each of the attacks that exist. P a g e | 2 Acknowledgements RogerNyght I want to thank RogerNyght for creating the Tails Guide. This amazing guide steps you through the process of installing and using Tails at home as well as the features that it hosts. For anyone thinking about using this Operating System for true anonymity and security, should read this to guide its entirety. All credits, attributions, and works go to him for this section. Thanks again! CuriousVendetta, Goodguy, RogerNyght, and All After writing this guide, it was apparent that was a bunch of errors littered throughout the thing. Thanks to everyone for spending the time going over it and performing a sanity check. It was found that I am only half as crazy as I thought. Thanks everyone! P a g e | 3 Table of Contents Chapter 1 _The CIA Triad 9 Chapter 2 _ Recommendations . 10 2.1. Learn how to chat . 12 2.2. Intro to Tails 14 2.3. Intro to Whonix 15 Chapter 3 _ Encryption 20 3.1. Encryption Dealing with Confidentiality 21 3.2. Encrypting Files or the Hard Drive 23 3.3. Securely Exchanging Messages, Data, and Signing Data 29 3.4. Steganography 34 3.5. Authentication Factors 34 3.6. Password Attacks and Account Recovery Attacks 37 3.7. Creating Secure Passwords . 37 3.8. Hashing, Hashing Collisions, and Birthday Attacks 38 3.9. Cold Boot Attacks 39 Chapter 4 _ Data 41 4.1 A Quick Word 42 4.2 Deleted Data . 42 4.3 Deleting Data Securely 44 4.4 File Slack 45 4.5 Alternate Data Streams . 47 4.6 Where to Hide Your Data 49 4.7 Changing File Headers to Avoid Detection . 49 4.8 Windows Swap Files, ReadyBoost, Temporary Internet Files and Browser Cache 51 4.9 Temporary Application Files and Recent Files Lists 53 4.10 Shellbags 58 4.11 Prefetching and Timestamps 60 4.12 Event Logs 60 4.13 Printers, Print Jobs, and Copiers . 61 P a g e | 4 4.14 Cameras, Pictures, and Metadata . 62 4.15 USB Information 65 4.16 SSD – Solid State Drives 65 4.17 Forensic Software Tools 66 Chapter 5 _ Continuity 68 5.1 Security Concerns with Backups . 69 5.2 Security Concerns with Sleep and Hibernation 69 5.3 Ensuring Information and Service Continuity 70 5.4 DoS and DDoS attacks . 71 Chapter 6 _ System Hardening 75 6.1. Uninstall Unnecessary Software . 76 6.2. Disable Unnecessary Services 76 6.3. Disable Unnecessary Accounts 77 6.4. Update and Patch Windows and Other Applications . 78 6.5. Password Protection 79 Chapter 7 _ Antivirus, Keyloggers, Firewalls, DLP’s, and HID’s 81 7.1. Antivirus 82 7.2. Hardware Keyloggers 83 7.3. Firewalls 83 7.4. DLP’s 83 7.5. HIDS’s and NID’s 84 7.6. Other Considerations 84 Chapter 8 _ Networks 85 8.1. Intro to Networking 86 8.2. Private vs. Public IP Address . 91 8.3. MAC Address . 91 8.4. Public Wireless 92 8.5. Security Protocols . 96 8.6. Virtual Private Networks 99 8.7. Chat Sites ‐ How Attackers Attack 104 8.8. Other Considerations 108 8.9. Extra: MAC Address Spoofing and ARP Attacks ‐ How they work 110 Chapter 9 _ Web Browser Security 113 P a g e | 5 9.1. Downloading and Using the Tor Browser Bundle 114 9.2. Configuring Web‐Browsers and Applications to Use Tor 115 9.3. What is Sandboxing and What is JIT Hardening, and Why Do I Care? 117 9.4. JavaScript 117 9.5. Cookie Protection and Session Hijacking Attacks 118 9.6. Caching 119 9.7. Referers 119 9.8. CSRF/CSRF Attacks (XSS Attack) 120 9.9. Protect Browser Settings 120 9.10. DNS Leaks 121 9.11. User Awareness, Accidents and System Updates . 122 9.12. Limitations 122 9.13. Extra 123 Chapter 10 _ Tails 124 10.1.1. Tail’s concept 125 10.1.2. Why can’t I use another OS / Windows in a VM? . 126 10.2.1. How to choose strong passphrases 126 10.3.1. Requirements for Tails 127 10.4.1. First steps 127 10.4.2. Using Tails as a completely amnesic system . 127 10.4.3. Using Tails with a persistent volume 128 10.5.1. Encryption of an external drive 128 10.5.2. How to mount a LUKS‐encrypted volume in Windows . 128 10.6.1. Secure deletion of a drive or partition 129 10.7.1. Using the persistent volume . 129 10.7.2. Storing files on the persistent volume 130 10.7.3. Firefox bookmark management 130 10.7.4. The password manager ‐ Passwords and Encryption Keys 131 10.7.5. Pidgin for IM/Chat/IRC 132 10.8.1. Installing software: The basics 132 10.8.2. Recommended software additions . 133 10.8.3. I2P / iMule (not recommended) 135 10.8.4. TorChat (not working) 135 P a g e | 6 10.9.1. File and folder handling in Terminal 135 10.10.1. General advice 136 Chapter 11 _ Hacking Tools 138 Fingerprinting and Reconnaissance 140 DNS Interrogation Tools: . 140 Email Tracking Tools: 140 Google hacking Tools: 140 Monitoring Web Updates Tools: 141 Traceroute Tools: 141 Website Footprinting Tools: . 141 Website Mirroring Tools: 141 WHOIS Lookup Tools: 141 Other Links: 141 Scanning Networks . 142 Banner Grabbing Tools: 142 Censorship Circumvention Tools: . 142 Custom Packet Creator: 143 Network Discovery and Mapping Tools: . 143 Packet Crafter Tool: 143 Ping Sweep Tools: . 143 Proxy Tools: 143 Scanning Tools: 144 Tunneling Tools: 144 Vulnerability Scanning Tools: 144 System Hacking 145 Anti‐Rootkits: 145 Anti‐Spywares: 145 Covering Tracks Tools: 145 Keyloggers 146 Password Cracking Tools: 146 Viruses and Worms . 147 Virus programs and Generators: 147 Viruses: 147 P a g e | 7 Worms Maker: 147 Sniffing 148 ARP Spoofing Detection Tools: 148 DHCP Starvation Attack Tools: 148 MAC Flooding Tools: 148 MAC Spoofing Tools: 148 Sniffing Tools: 148 Social Engineering . 149 DoS 149 Session Hijacking 150 Session Hijacking Tools: 150 Hacking Webservers 150 Information Gathering Tools: 150 Webserver Attack Tools: . 150 Session Hijacking Tools: 150 Vulnerability Scanning Tools: 151 Web Application Security Scanners: 151 Webserver Footprinting Tools: 151 Webserver Security Tools: 151 Hacking Web Applications 151 Session Token Sniffing: . 151 Web Application Hacking Tools: 152 Web Service Attack Tools: 152 Web Spidering Tools: 152 Webserver Hacking Tools: 152 Web Application Pen Testing Tools: 152 Web Application Security Tools: 153 SQL Injection . 153 SQLi Injection Tools: 154 Hacking Wireless Networks 154 Bluetooth Hacking Tools: 155 GPS Mapping Tools: 155 Mobile‐based Wi‐Fi Discovery Tools: 155 P a g e | 8 RF Monitoring Tools: 155 Spectrum Analyzing Tools: 155 WEP Encryption: 155 WEP/WPA Cracking Tools: 155 Wi‐Fi Discovery Tools: 156 Wi‐Fi Packet Sniffer: 156 Wi‐Fi Predictive Planning Tools: 156 Wi‐Fi Security Auditing Tools: . 156 Wi‐Fi Sniffer: . 156 Wi‐Fi Traffic Analyzer Tools: . 156 Wi‐Fi Vulnerability Scanning Tools: . 157 Evading IDS, Firewalls, and Honeypots . 157 Firewalls: . 157 Honeypot Detecting Tools: 158 Honeypot Tools: 158 Packet Fragment Generators: . 158 Buffer Overflow 158 Chapter 12 _ Standard Acronyms 159 Chapter 13 _ Download Links 159 P a g e | 9 Chapter 1 _The CIA Triad In this guide I am going to reference a well‐known security policy that was developed to identify problem areas and the recommended solutions when dealing with information security. This policy is known as the CIA and stands for: Confidentiality, Integrity, and Availability. This triad was developed so people will think about these important aspects of security when implementing security controls. There should be a balance between these three aspects of security to ensure the proper use and control of your security solutions. Confidentiality is, as the word implies, having something be confidential or secure. In essence, privacy is security and confidentiality means that third party individuals cannot read information if they do not have access to it. Data to think about keeping confidential is data stored on a computer (temporary data, data saved, etc.), data stored for backup, data in transit, and data intended for another person. Confidentiality will be the main focus point of this article as it is most often referred to as the most important aspect of security. The I in CIA stands for Integrity and is specifically referring to data integrity. Integrity is the act of ensuring that data was not modified or deleted by parties that are not authorized to do so. It also ensures that if the data was changed, that the authorized person can make changes that should not have been made in the first place. Simply, if you send a message to someone, you want to make sure that the person does not receive a message that was altered during transit. Integrity also confirms that you are in fact speaking to who you think you are speaking to (for example: we download an add‐on from the website, you want to make sure that you are downloading from that website and not an unscrupulous third‐party). Finally, the A stands for Availability and ensures that when you need the data it is available to you. Not only does data have to be available to you, but it has to be reasonably accessible. There's no point in security controls if you cannot access the data! This component is a concern, but for the average end user, there is not much that can be done to ensure availability when dealing with webpages, or IRC servers or anything else managed by a third party host. For this reason we will not be discussing Availability except for backing up your data in this guide. P a g e | 148 Sniffing This section has several tools that employ several methods for capturing data. ARP Poisoning, DHCP Starvation Attacks, and MAC address spoofing tools are some methods that are used. Another method not included on this list is a DNS zone transfer, which can be done using Windows command line. These tools will not help you if you are not familiar with basic networking. ARP Poisoning Tools: Cain & Abel: http://www.oxid.it/cain.html Ufasoft Snif: http://ufasoft.com/sniffer/ WinArpAttacker: http://www.xfocus.org/index.html ARP Spoofing Detection Tools: XArp: http://www.chrismc.de/development/xarp/index.html macof: http://www.monkey.org Yersinia: http://www.yersinia.net/download.htm Dhcpstarv: http://dhcpstarv.sourceforge.net/ Gobbler: http://gobbler.sourceforge.net/ DHCP Starvation Attack Tools: DHCPstarv: http://dhcpstarv.sourceforge.net/ Gobbler: http://gobbler.sourceforge.net/ MAC Flooding Tools: Yersinia: http://www.yersinia.net/ MAC Spoofing Tools: SMAC: http://www.klcconsulting.net/smac/index.html#download Sniffing Tools: Ace Password Sniffer: http://www.effetech.com/aps/ RSA NetWitness Investigator: http://www.emc.c0m/security/rsa‐ netwitness.htm#lfreeware P a g e | 149 Big‐Mother: http://www.tupsoft.com/download.htm EtherDetect Packet Sniffer: http://www.etherdetect.com/download.htm dsniff: http://monkey.org/~dugsong/dsniff/ EffeTech HTTP Sniffer: http://www.effetech.com/download/ Ntop: http://www.ntop.org/products/ntop/ Ettercap: http://ettercap.sourceforge.net/downloads.html Wireshark: http://www.wireshark.org/ Social Engineering Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. One type of social engineer term used in hacking is Phishing and Spear Phishing. Social engineer is not usually done by using tools, but by using the person to gain access to a system. Tools: Netcraft Toolbar: http://toolbar.netcraft.com/install PhishTank: http://www.phishtank.com/ ReadNotify: http://www.readnotify.com/ Social Engineering Toolkit (SET): https://www.trustedsec.com/downloads/social‐ engineer‐toolkit/ DoS Tools: BLANK ‐ ALREADY LISTED IN GUIDE: P a g e | 150 Session Hijacking Packet Crafting Tools: Colasoft Packet Builder: http://www.colasoft.com/packet_builder/ Session Hijacking Tools: Burp Suite: http://portswigger.net/burp/download.html Ettercap: http://sourceforge.net/projects/ettercap/files/latest/download?source=dlp WhatsUp Gold Engineer's Toolkit: http://www.whatsupgold.com/products/download/network_management.aspx?k_id=p ing‐sweep‐tool Hunt: http://packetstormsecurity.com/files/download/21968/hunt‐l.5bin.tgz Juggernaut: http://www.securiteam.com TamperlE: http://www.bayden.com/TamperlE/ Cookie Cadger: https://www.cookiecadger.com/?page_id=19 Hacking Webservers Hacking Web Passwords Tools: Brutus: http://www.hoobie.net/brutus/brutus‐download.html THC‐Hyrda: https://www.thc.org/thc‐hydra/ Information Gathering Tools: ActiveWhois: http://www.johnru.com/ Webserver Attack Tools: Metasploit: http://www.metasploit.com/download/ Session Hijacking Tools: Burp Suite: http://portswigger.net/burp/download.html Hamster: http://erratasec.blogspot.in/2009/03/hamster‐20‐and‐ferret‐20.html P a g e | 151 Vulnerability Scanning Tools: Nessus: http://www.tenable.com/products/nessus Web Application Security Scanners: N‐Stalker Web Application Security Scanner: http://www.nstalker.com/products/editions/free/ Webserver Footprinting Tools: httprecon: http://www.computec.ch/projekte/httprecon/?s=download ID Serve: http://www.grc.com Webserver Security Tools: Arirang: http://www.monkey.org/~pilot/arirang/ N‐Stalker Web Application Security Scanner: http://www.nstalker.com/products/editions/free/ Infiltrator: http://www.infiltration‐systems.com/download.shtml WebCruiser: http://sec4app.com/download.htm Nscan: http://nscan.hypermart.net Retina CS: http://www.beyondtrust.com/Landers/TY‐Page‐ RetinaCSCommunity/index.html NetlQ Secure ConfigurationManager: https://www.netiq.com/products/secure‐ configurationmanager/ Hacking Web Applications Cookie Poisoning: OWASP Zed Attack Proxy: https://code.google.com/p/zaproxy/downloads/detail?name=ZAP_2.0.0_Windows.exe &can=2&q= Session Token Sniffing: Wireshark: http://www.wireshark.org/ P a g e | 152 Web Application Hacking Tools: Teleport Pro: http://www.tenmax.com/teleport/pro/download.htm BlackWidow: http://softbytelabs.com/us/downloads.html CookieDigger: http://www.mcafee.com/apps/free‐ tools/termsofuse.aspx7urh/us/downloads/freetools/cookiedigger.aspx GNU Wget: ftp://ftp.gnu.org/gnu/wget/ Web Service Attack Tools: soapUl: http://www.soapui.org/ XMLSpy: http://www.altova.com/xmlspy.html Web Spidering Tools: Burp Spider: http://blog.portswigger.net/2008/ll/mobp‐all‐new‐burp‐spider.html WebScarab: https://www.0wasp.0rg/index.php/Categ0ry:0WASP_WebScarab_Pr0ject Webserver Hacking Tools: UrIScan: http://www.microsoft.com/web/gallery/install.aspx?appsxml=&appid=UrlScan%3bUrlSc an Nikto: http://www.cirt.net/nikt02 Web Application Pen Testing Tools: BeEF: http://beefproject.com/ XSS‐Proxy: http://sourceforge.net/projects/xss‐proxy/files/latest/download sqlbftools: http://packetst0rmsecurity.c0m/files/d0wnl0ad/43795/sqlbft00ls ‐l.2.tar.gz Softerra LDAP Browser: http://www.ldapadministrator.com/download.htm Hibernate: http://www.hibernate.org/downloads NHibernate: http://nhforge.org/ Soaplite: http://soaplite.com/download.html cURL: http://curl.haxx.se/download.html WSDigger: http://www.mcafee.com/apps/free‐ tools/termsofuse.aspx?url=/us/downloads/freetools/wsdigger.aspx Sprajax: https://www.0wasp.0rg/index.php/Categ0ry:0WASP_Sprajax_Pr0ject P a g e | 153 Web Application Security Tools: KeepNI: http://www.keepni.com/ WSDigger: http://www.mcafee.com/apps/free‐ tools/termsofuse.aspx?url=/us/downloads/freetools/wsdigger.aspx Arachni: http://arachni‐scanner.com/latest XSSS: http://www.sven.de/xsss/ Vega: http://www.subgraph.com/vega_download.php Websecurify: https://code.google.com/p/websecurify/downloads/detail?name=Websecurify%20Suite %201.0.0.exe&can=2&q= OWASP ZAP: https://code.google.com/p/zaproxy/downloads/detail?name=ZAP_2.0.0_Windows.exe &can=2&q= NetBrute: http://www.rawlogic.com/netbrute/ skipfish: https://c0de.g00gle.c0m/p/skipfish/ X5s: http://xss.codeplex.com/downloads/get/115610 SecuBat Vulnerability Scanner: http://secubat.codeplex.com/ SPIKE Proxy: http://www.immunitysec.com/resources‐freesoftware.shtml Ratproxy: https://c0de.g00gle.c0m/p/ratpr0xy/ Wapiti: http://wapiti.sourceforge.net/ SQL Injection SQL Injection is one of the many web attack mechanisms used by hackers to steal data from organizations. It is perhaps one of the most common application layer attack techniques used today. It is the type of attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form to allow them to gain access to the data held within your database. SQLi Detection Tools: HP Weblnspect: http://www.hpenterprisesecurity.com/products/hp‐fortify‐software‐ securitycenter/hp‐webinspect SQLDict: http://ntsecurity.nu/toolbox/sqldict/ HP Scrawlr: https://h30406.www3.hp.com/campaigns/2008/wwcampaign/l‐ 57C4K/index.php SQL Block Monitor: http://sql‐tools.net/blockmonitor/ Acunetix Web Vulnerability Scanner: http://www.acunetix.com/vulnerability‐scanner/ P a g e | 154 GreenSQL Database Security: http://www.greensql.com/content/greensql‐ databasesecurity#&sliderl=l Microsoft Code Analysis Tool .NET (CAT.NET): http://www.microsoft.com/enus/download/details.aspx?id=5570 NGS SQuirreL Vulnerability Scanners: http://www.nccgroup.com/en/our‐ services/security‐testingaudit‐compliance/information‐security‐software/ngs‐squirrel‐ vulnerability‐scanners/ WSSA ‐ Web Site Security Scanning Service: http://www.beyondsecurity.com/sql‐ injection.html N‐Stalker Web Application Security Scanner: http://www.nstalker.com/products/editions/free/ SQLi Injection Tools: Absinthe: http://www.darknet.org.uk/2006/07/absinthe‐blind‐sql‐injection‐ toolsoftware/ Blind Sql Injection Brute Forcer: h ttp://c0de.g00gle.c0m/p/bsqlbf‐v2/ sqlmap: http://sqlmap.org/ SQL Injection Digger: http://sqid.rubyforge.org Pangolin: http://nosec.org/en/evaluate/ SQLPAT: http://www.cqure.net/wp/tools/password‐recovery/sqlpat/ FJ‐lnjector Framework: http://sourceforge.net/projects/injection‐fwk/ Exploiter (beta): http://www.ibm.com/developerworks/rational/downloads/08/appscan_exploiter/ SQLIer: http://bcable.net/project.php7sqlier SQL Power Injector: http://www.sqlpowerinjector.com/download.htm Havij: http://www.itsecteam.com SQL Brute: http://www.gdssecurity.c0m/l/t.php BobCat: http://www.northern‐monkee.co.uk/pub/bobcat.html Sqlninja: http://sqlninja.sourceforge.net/download.html Hacking Wireless Networks AirPcap ‐Enabled Open Source tools: Cain and Abel: http://www.oxid.it/cain.html Aircrack: http://www.airpcap.nl/ Airpcap: http://www.airpcap.nl/ Kismet: http://www.kismetwireless.net/ P a g e | 155 Bluetooth Hacking Tools: BH Bluejack: http://croozeus.com/blogs/?p=33 Bluediving: http://bluediving.sourceforge.net/ Blooover: http://trifinite.org/trifinite_stuff_blooover.html BTScanner: http://www.pentest.co.uk/downloads.html?cat=downloads§ion=01_bluetooth CIHwBT: http://sourceforge.net/projects/cih‐with‐bt/files/ Super Bluetooth Hack: http://gallery.mobile9.eom/f/317828/ GPS Mapping Tools: WIGLE: http://wigle.net/gps/gps/main/download/ Skyhook: http://www.skyhookwireless.com/location‐technology/sdk.php WeFi: http://www.wefi.com/download/ Mobile‐based Wi‐Fi Discovery Tools: WiFi Manager: http://kmansoft.com/ WiFiFoFum ‐ WiFi Scanner: http://www.wififofum.net/downloads RF Monitoring Tools: DTC‐340 RFXpert: http://www.dektec.com/Products/Apps/DTC‐340/index.asp KOrinoco: http://korinoco.sourceforge.net/ NetworkManager: https://wiki.gnome.org/Projects/NetworkManager xosview: http://xosview.sourceforge.net/ Spectrum Analyzing Tools: AirSleuth‐Pro: http://nutsaboutnets.com/airsleuth‐spectrum‐analyzer/ BumbleBee‐LX Handheld Spectrum Analyzer: http://www.bvsystems.com/Products/Spectrum/BumbleBee‐LX/bumblebee‐lx.htm Wi‐Spy: http://www.metageek.net/products/wi‐spy/ WEP Encryption: Aircrack: http://www.airpcap.nl/ Cain and Abel: http://www.oxid.it/cain.html WEP/WPA Cracking Tools: Aircrack: http://www.airpcap.nl/ P a g e | 156 Cain and Abel: http://www.oxid.it/cain.html Wi‐Fi Discovery Tools: inSSIDer: http://www.metageek.net/products/inssider/ Netsurveyor: http://www.performancewifi.net/performance‐ wifi/products/netsurveyor‐networkdiscovery.htm Vistumbler: http://www.vistumbler.net/ WirelessMon: http://www.passmark.com/products/wirelessmonitor.htm WiFi Hopper: http://www.wifihopper.com/download.html AirCheck Wi‐Fi Tester: http://www.flukenetworks.com/enterprise‐ network/networktesting/AirCheck‐Wi‐Fi‐Tester AirRadar 2: http://www.koingosw.com/products/airradar.php Wi‐Fi Packet Sniffer: OmniPeek: http://www.wildpackets.com/products/omnipeek_network_analyzer Sniffer Portable Professional Analyzer: http://www.netscout.com/products/enterprise/Sniffer_Portable_Analyzer/Sniffer_Port able_Professional_Analyzer/Pages/default.aspx Capsa WiFi: http://www.colasoft.com/download/products/capsa_free.php ApSniff: http://www.monolith81.de/apsniff.html Wireshark: http://www.wireshark.org/download.html Wi‐Fi Predictive Planning Tools: TamoGraph Site Survey: http://www.tamos.com/products/wifi‐site‐survey/wlan‐ planner.php Wi‐Fi Security Auditing Tools: AirMagnet WiFi Analyzer: http://www.flukenetworks.com/enterprise‐ network/wirelessnetwork/AirMagnet‐WiFi‐Analyzer Wi‐Fi Sniffer: Kismet: http://www.kismetwireless.net/ Wi‐Fi Traffic Analyzer Tools: Network Traffic Monitor & Analyzer CAPSA: http://www.javvin.com/packet‐traffic.html Observer: http://www.networkinstruments.com/products/observer/index.php?tab=download P a g e | 157 Ufasoft Snif: http://ufasoft.com/sniffer/ vxSniffer: http://www.cambridgevx.com/vxsniffer.html Wi‐Fi Vulnerability Scanning Tools: Nessus: http://www.tenable.com/products/nessus Nexpose Community Edition: http://www.rapid7.com/products/nexpose/compare‐ downloads.jsp WiFish Finder: http://www.airtightnetworks.com/home/resources/knowledge‐ center/wifishfinder.html OSWA: http://securitystartshere.org/page‐downloads.htm WiFiZoo: http://c0mmunity.c0rest.c0m/~h0ch0a/wifiz00/index.html#d0wnl0ad Evading IDS, Firewalls, and Honeypots An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. A firewall is a software or hardware‐based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. A honeypot is a trap set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers. Firewall Evasion Tools: Atelier W eb Firewall Tester: http://www.atelierweb.com/products/firewall‐tester/ Freenet: https://freenetproject.org/ GTunnel: http://gardennetworks.org/download Hotspot Shield: http://www.anchorfree.com/hotspot‐shield‐VPN‐download‐ windows.php Proxifier: http://www.proxifier.com/ Vpn One Click: http://www.vpnoneclick.com/download/index.html Firewalls: Comodo Firewall: http://personalfirewall.comodo.com/ Online Armor: http://www.online‐armor.com/products‐online‐armor‐free.php P a g e | 158 Honeypot Detecting Tools: Hping3: http://www.hping.org/hping3.html Nessus: http://www.tenable.com/products/nessus Send‐Safe Honeypot Hunter: http://www.send‐safe.com/honeypot‐hunter.html Honeypot Tools: Argos: http://www.few.vu.nl/argos/?page=2 Glastopf: http://glastopf.org/ Honeyd: http://www.honeyd.org/ KFSensor: http://www.keyfocus.net/kfsensor/ Symantec Decoy Server: http://www.symantec.com/press/2003/n030623b.html Tiny Honeypot: http://freecode.com/projects/thp LaBrea: http://labrea.sourceforge.net/labrea‐info.html PatriotBox: http://www.alkasis.com/?action=products&pid=6 Kojoney: http://kojoney.sourceforge.net/ HoneyBOT: http://www.atomicsoftwaresolutions.com/honeybot.php Google Hack Honeypot: http://ghh.sourceforge.net/ WinHoneyd: http://www2.netvigilance.com/winhoneyd HI HAT: http://hihat.sourceforge.net/ Packet Fragment Generators: Multi‐Generator (MGEN): http://cs.itd.nrl.navy.mil/work/mgen/index.php Net‐lnspect: http://search.cpan.org/~sullr/Net‐lnspect/lib/Net/lnspect/L3/IP.pm NConvert: http://www.xnview.com/en/nconvert/ fping3: http://fping.org/ Buffer Overflow A buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a special case of violation of memory safety. If this happened, the attacker can use this anomaly to run specific machine instructions and send sensitive information to a third party. BoF Tools: Netcat: http://netcat.sourceforge.net/download.php P a g e | 159 LCLint: http://www.linuxjournal.com/article/3599 Code::Blocks: http://www.codeblocks.org/ eEye Retina: http://www.eeye.com/ Spike: http://spike.lazypics.de/dl_index_en.html Brute Force Binary Tester (BFB): http://bfbtester.sourceforge.net/ Immunity CANVAS: http://www.immunityinc.com/products‐canvas.shtml Immunity Debugger: http://www.immunityinc.com/products‐immdbg.shtml Splint: http://www.splint.org/download.html Flawfinder: http://www.dwheeler.com/flawfinder/ BLAST: http://mtc.epfl.ch/software‐tools/blast/index‐epfl.php Stack Shield: http://www.angelfire.com/sk/stackshield/download.html Valgrind: http://valgrind.org/downloads/current.html PolySpace C Verifier: http://www.mathworks.in/products/polyspace/ Insure++: http://www.parasoft.com/jsp/products/insure.jsp?itemld=63 /GS: http://microsoft.com BufferShield: http://www.sys‐ manage.com/PR0DUCTS/BufferShield/tabid/61/Default.aspx DefenseWall: http://www.softsphere.com/online‐help/defenceplus/ TIED: http://www.security.iitk.ac.in/index.php?page=contents/projects/tiedJibsafe/tied_libsaf eplus LibsafePlus: http://www.security.iitk.ac.in/index.php?page=contents/projects/tied_libsafe/tied_libs afeplus Comodo Memory Firewall: http://www.comodo.com/news/press_releases/16_01_08.html Clang Static Analyzer: http://clang‐analyzer.llvm.org/ FireFuzzer: https://c0de.g00gle.c0m/p/firefuzzer/ BOON: http://www.cs.berkeley.edu/~daw/boon/ The Enhanced Mitigation Experience Toolkit: http://www.microsoft.com/enus/download/details.aspx?id=29851 CodeSonar® Static Analysis Tool: http://www.grammatech.com/codesonar CORE IMPACT Pro: http://www.coresecurity.com/core‐impact‐pro P a g e | 160 Chapter 12 _ Standard Acronyms AES: Advanced Encryption Standard ARP: Address Resolution Protocol AV: Anti‐virus CGI: Common Gateway Interface DBAN: Dariks Boot and Nuke DDoS: Distributed Denial of Service DLL: Dynamic Link Library DMZ: Demilitarized Zone DoS: Denial of Service EXIF: Exchangeable Image File Format FTP: File Transfer Protocol HIDS: Host Intrusion Detection System HTTP: Hypertext Transfer Protocal IP: Internet Protocol ISP: Internet Search Provider JS: JavaScript LAN: Local Area Connection MBR: Master Boot Record MFT: Master File Table NAS: Network‐attached Storage P2P: Peer to Peer RAID: Redundant Array of Independent Disks SHA: Secure Hash Algorithm SSD: Solid State Drives TBB: Tor Browser Bundle TCP: Transmission Control Protocol URL: Uniform resource locator VLAN: Virtual Local Area Network WAN: Wide Area Network WPS: WiFi Protected Setup AP: Access Point ASLR: Address Space Layout Randomization BIOS: Basic Input Output System CIA: Confidentiality, Integrity, and Availability DCC: Direct Client to Client DHCP: Dynamic Host Configuration Protocol DLP: Data Leakage Prevention DNS: Domain Name Service DRAM: Dynamic random‐access memory FDE: Full Disk Encryption GPG: GNU Privacy Guard HPA: Host Protected Area ICMP: Internet Control Message Protocol IRC: Internet Relay Chat JIT Hardening: Just in Time Hardening KB: Kilobyte MAC Address: Media Access Control Address MD: Message Digest MiTM: Man in The Middle NIDS: Network Intrusion Detection System PGP: Pretty Good Privacy RAM: Random Access Memory SRAM: Static random‐access memory SSL: Secure Socket Layer TC: TorChat/TrueCrypt UDP: User Datagram Protocol USB: Universal Serial Bus VPN: Virtual Private Network WiFi: Wireless Fidelity XSS: Cross Site Scripting P a g e | 161 Chapter 13 _ Download Links Download Links Listed below are the programs that I mentioned throughout this guide and the associated links: Truecrypt (Encryption) ‐ http://www.truecrypt.org/downloads WinRAR (Encryption) ‐ http://www.rarlab.com/download.htm GPG (Encryption) ‐ http://gnupg.org/download/index.en.html GPG for Windows (GUI) (Encryption) ‐ http://gpg4win.de/index.html Tor Browser Bundle (Internet Safety) ‐ https://www.torproject.org/download/download‐ easy.html.en TorChat (Anonymous Chat) ‐ https://github.com/prof7bit/TorChat Pidgin (Chat Program) ‐ http://pidgin.im/ Tormail (Anonymous Mail) ‐ http://jhiwjjlqpyawmpjx.onion/ Tails (Secure Operating System) ‐ https://tails.boum.org/download/index.en.html HashMyFiles (File Hash) ‐ http://www.nirsoft.net/utils/hash_my_files.html CCleaner (Privacy Eraser) ‐ http://www.piriform.com/ccleaner/download/standard PrivaZer (Privacy Eraser) ‐ http://privazer.com/download.php Bleachbit (Privacy Eraser) ‐ http://bleachbit.sourceforge.net/download DBAN (Secure Partition Delete) ‐ http://www.dban.org/download Blancco (Secure Partition Delete) ‐ http://www.blancco.com/us/download/ Rifiuti2 ‐ http://code.google.com/p/rifiuti2/ UPX (Executable Packer) ‐ http://upx.sourceforge.net/ SPLView (SPL File Viewer) ‐ http://www.lvbprint.de/html/splviewer1.html SPLViewer (SPL File Viewer) ‐ http://www.undocprint.org/_media/formats/winspool/splview.zip BatchPurifier (Meta Data Remover) ‐ http://www.digitalconfidence.com/BatchPurifier.html Exiv2 (Meta Data Viewer) ‐ http://www.exiv2.org/download.html Opanda IEXIF (Meta Data Viewer) ‐ http://www.opanda.com/en/iexif/download.htm Photoshop (Photo Editor) ‐ http://www.photoshop.com/ Paint.Net (Photo Editor) ‐ http://paint.net/ GIMP (Photo Editor) ‐ http://www.gimp.org/downloads/#mirrors USB Oblivion (Evidence Remover) ‐ https://code.google.com/p/usboblivion/ P a g e | 162 Forensic Software Tools ‐ 4.13 (DOWNLOAD PATHS NOT LISTED) LOIC (DoS Attack Tool) ‐ http://sourceforge.net/projects/loic/ TFN (DDoS Attack Tool) ‐ http://packetstormsecurity.org/distributed/tfn2k.tgz Stacheldraht (DDoS Attack Tool) ‐ http://packetstormsecurity.org/distributed/stachel.tgz Secunia PSI (Update Tool) ‐ http://secunia.com/vulnerability_scanning/personal/ SuperAntiSpyware (Spyware Remover) ‐ http://superantispyware.com/download.html Comodo (Firewall) ‐ https://personalfirewall.comodo.com/ Snort (IDS) ‐ http://www.snort.org/start/download BackTrack (Penetration Testing Tool) ‐ http://www.backtrack‐linux.org/downloads/ Wireshark (Packet Sniffer) ‐ http://www.wireshark.org/download.html Ethereal (Packet Sniffer) ‐ http://ethereal.com/download.html Omnipeek (Packet Sniffer) ‐ http://www.wildpackets.com/ Dsniff (Network Auditing) ‐ http://www.monkey.org/~dugsong/dsniff/ Cain and Able (Various Tools) ‐ http://www.oxid.it/cain.html Etherape (Packet Sniffer) ‐ http://etherape.sourceforge.net/ Netwitness Investigator (Packet Sniffer) ‐ http://www.netwitness.com/ Kismet (Packet Sniffer) ‐ http://kismetwireless.net/download.shtml NetStumbler (Packet Sniffer) ‐ http://stumbler.net/ Medieval Bluetooth Scanner (Bluetooth Scanner) – Unknown manufactures page CoreImpact (Penetration Testing) ‐ http://www.coresecurity.com/ AirSnort (Wireless Hacking) ‐ http://sourceforge.net/projects/airsnort/files/ CowPatty (Wireless Hacking) ‐ http://www.willhackforsushi.com/Cowpatty.html Reaver (Wireless Hacking) ‐ http://code.google.com/p/reaver‐wps/ ... Protects your privacy Protocol-Leak-Protection and Fingerprinting-Protection Secure And Distributed Time Synchronization Mechanism Security by Isolation Send Anonymous E-mails without registration... In this guide I am going to reference a well‐known security policy that was developed to identify problem areas and the recommended solutions when dealing with information security. This policy is known as the CIA and stands for: Confidentiality, Integrity, and Availability. This triad was developed so people will ... 5.1 Security Concerns with Backups . 69 5.2 Security Concerns with Sleep and Hibernation 69 5.3 Ensuring Information and Service Continuity 70 5.4 DoS and DDoS attacks