SlideShare a Scribd company logo
Anthony Hasse
IT Security Handbook
2
Table of Contents
System Scanners
Network Scanners
Wireless Discovery
Packet Analyzer
Attacks
Defenses
Password Cracking
Cryptography
3
System Scanners
Secunia- Scans systemand reports any out of date software. Will auto update most software
but some items will require a manual update. This is used to protect your systems against
vulnerabilities that could be found in older versions of software.
http://secunia.com/vulnerability_scanning/personal/
This easy to use program brings up a report of all the programs on your computer that need to
be updated. You simply have to click on the picture and it will update that program to the most
recent version
4
Microsoft Malicious Software Removal Tool-Scans your computer for any malicious software
and removes it. This is a great way to find out if there are any programs running on your system
that could be malicious.
http://www.microsoft.com/security/pc-security/malware-removal.aspx
www.2-spyware.com
Shavlik Patch Scanner- Checks the systemto make sure that it has all the current patches. This
is necessary for security because the patches are put out to fix vulnerabilities that have been
found in previous versions. This should be checked on a regular basis.
http://www.shavlik.com/products/protect/
Root-kit Revealer- Scans your systemfor hidden rootkit viruses. A rootkit is used to hide the
existence of other viruses and continue to give the attacker administrative privileges.
5
http://technet.microsoft.com/en-us/sysinternals/bb897445.aspx
MBSA Scanner (Microsoft Baseline Security Analyzer)- This scanner scans your system for
security updates and any less secure settings in windows. This scan will let you know if you are
using weak passwords, any passwords do not expire, windows firewall is not set up properly, or
if you have multiple administrative accounts. This is a good gauge of how well your basic
security properties are set up.
http://www.microsoft.com/en-us/download/details.aspx?id=7558
This window shows an example of the home screen for the MBSA. It has a simple step by step
system to scan your system. As well as a detailed report after the systemhas been scanned
www.petri.com
Angry IP Scanner- This scans all the ports on your network and gives you a readout of the
standing of each port. It will tell you which ports are open and what programs are running on
the ports. If there is a program running on a port that you do not recognize you can find out if it
is possibly malicious and close that port off.
http://angryip.org/download/#windows
6
Risk Assessment Tool- This tool is an easy to use program where you can input all the assets of
your network and assign a dollar value to the loss expectancy. This program eliminates the
need to create a Spreadsheet and input all the calculations and link the columns. It
automatically calculates all the information as you input it.
Network Scanners
Nessus Penetration Scanner- Scans a target machine for a various number of vulnerabilities.
This is the most popular scanning tool used in the IT field. Scans for improperly configured
systems, default passwords, and open vulnerable ports.
http://www.tenable.com/products/nessus
hackertarget.com
7
Nmap Scanner- used to discover hosts and services on a network. It creates a network map that
can be used to determine what systems can be attacked. Nmap creates special packets that it
sends to the host and it analyzes the response.
http://nmap.org/download.html
Network Diagram- Similar to Nmap it creates a diagram of how the target network is set up.
Wireless Discovery
Netstumbler- A tool that is used to find wireless networks that are broadcasting. It can be used
to find areas of poor reception in a wireless network. Netstumbler can also be used to discover
rogue access points.
Kismet- Kismet is a very robust tool that can be used with wireless networks. First off it can be
used to passively detect wireless access points and clients. Doing it passively means that the
networks cannot detect it searching for them. It can also be used as an IDS by detecting other
sniffing tools that are attempting to discover the network. Kismet can also collect packets from
the network and dump them into a file that is readable by a program such as wireshark.
Aircrack- Aircrack is another fully functioning wireless tool in that it discovers access points,
collects packets and it also has the capabilities of cracking WEP/WPA passwords for wireless
networks.
Packet Analyzer
Wireshark- Wireshark is a packet analyzer. It captures raw packets that are traversing across
the network and makes them viewable to the user. The user can analyze the data and can often
gain a significant amount of information. Anything from usernames and passwords to credit
card information could be seen by analyzing the packets captured by wireshark. Even
information that is send over VOIP can be collected and played back.
https://www.wireshark.org/download.html
8
en.wikipedia.org
Attacks
CPUHog- CPUHog is a tool that can be opened by a user and will take up the total available
usage in a core on the processor. Because most modern PC’s use multiple core processors this
tool would not be as detrimental as it once was.
Defenses
HoneyPot- A honey pot is a systemthat is set up to look appealing to an attacker. These
systems are used to distract an attacker from your real system by offering an easier target. The
HoneyPot systems are usually set up with many vulnerabilities in order to lure the target into
attacking it.
https://app.box.com/shared/c1qix05ymg
9
HoneyNet- Similar to a HoneyPot a HoneyNet is a fake network that is created to dupe an
attacker into thinking they have found an extremely vulnerable network.
Password Cracking
Cain and Abel- Cain and Abel uses multiple techniques to crack various passwords. You can use
a straight brute force attack which will be the most time consuming. You can also use a
dictionary attack which Cain and Abel provides a good word list to use. There is also the
possiblility to use a Rainbow table attack. Cain and Abel provides a tool to create a rainbow
table to use in the attack.
http://www.oxid.it/cain.html
John the Ripper- John the ripper is a Linux password cracking tool. It can use brute force as well
as dictionary attacks against various hashes. There is also a lot of personalization you can use
with John the ripper which makes it a very powerful tool.
Cryptography
True Crypt- TrueCrypt is an on the fly encryption utility. It has the capabilities to create a virtual
encrypted disk within a file or encrypt a partition or even the entire storage device.
Unfortunately the creators of TrueCrypt announced that it would no longer be maintained.
http://truecrypt.sourceforge.net/
AxCrypt- AxCrypt is a security tool that can be used to encrypt files and folders. It uses a
password as well as an optional key-file. Once the file is encrypted it changes the thumbnail to
the AxCrypt icon providing a nice little layer of security.
10
http://www.axantum.com/axcrypt/Downloads.aspx
Text Hide- Text Hide is a utility to hide sensitive information inside an image. The program uses
the unused space in an image file to store encrypted information.
http://www.softpedia.com/get/Security/Encrypting/Text-Hide.shtml

More Related Content

PPT
Honeypots - Tracking the Blackhat Community
PDF
'Malware Analysis' by PP Singh
PPT
Malware Analysis Made Simple
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
PPTX
Introduction to Malware Analysis
PPTX
Malware analysis
PPT
Reconnaissance & Scanning
PPTX
Basic Dynamic Analysis of Malware
Honeypots - Tracking the Blackhat Community
'Malware Analysis' by PP Singh
Malware Analysis Made Simple
Malware Analysis 101 - N00b to Ninja in 60 Minutes at BSidesLV on August 5, ...
Introduction to Malware Analysis
Malware analysis
Reconnaissance & Scanning
Basic Dynamic Analysis of Malware

What's hot (20)

DOCX
Introduction to trojans and backdoors
PPTX
Hacker bootcamp
PPTX
Network Security Nmap N Nessus
PPTX
Hunting rootkit from dark corners of memory
PPTX
Information security & EthicalHacking
PPTX
WiFi security
PPTX
( Ethical hacking tools ) Information grathring
PPTX
Hunting Ghost RAT Using Memory Forensics
PPT
Freeware Security Tools You Need
PPT
Backdoor
PPTX
Reverse engineering malware
PPT
Attacking Automatic Wireless Network Selection
PPTX
Network sniffers & injection tools
PPT
Analysis Of Adverarial Code - The Role of Malware Kits
PPT
Hacking and its Defence
PPT
Module 8 System Hacking
PPTX
Basic malware analysis
PPTX
Basic Malware Analysis
PDF
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
PPTX
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Introduction to trojans and backdoors
Hacker bootcamp
Network Security Nmap N Nessus
Hunting rootkit from dark corners of memory
Information security & EthicalHacking
WiFi security
( Ethical hacking tools ) Information grathring
Hunting Ghost RAT Using Memory Forensics
Freeware Security Tools You Need
Backdoor
Reverse engineering malware
Attacking Automatic Wireless Network Selection
Network sniffers & injection tools
Analysis Of Adverarial Code - The Role of Malware Kits
Hacking and its Defence
Module 8 System Hacking
Basic malware analysis
Basic Malware Analysis
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Ad

Similar to Security Handbook (20)

PDF
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
DOCX
FBI & Secret Service- Business Email Compromise Workshop
DOCX
Security tools
DOCX
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
DOCX
Top 10 Kali Linux Iconic Tools for Cybersecurity Enthusiasts.docx
PDF
Project in malware analysis:C2C
PPTX
IDS+Honeypots Making Security Simple
PDF
Computer security
PPT
PPT
Sectools
PPTX
Final project.ppt
PDF
Cyber Defense Forensic Analyst - Real World Hands-on Examples
PPT
Security & ethical hacking p2
ODP
2600 av evasion_deuce
DOCX
unit 2 Intoduction to Tools and Platforms.docx
PPTX
Malware 101 by saurabh chaudhary
PPTX
scanning and analysis tools Fuzz testing
DOCX
Hacking
DOCX
Hacking
PDF
Wireless hacking tools.jpeg
Pentesting Tools to Find Bugs Before Hackers | CyberPro Magazine
FBI & Secret Service- Business Email Compromise Workshop
Security tools
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Top 10 Kali Linux Iconic Tools for Cybersecurity Enthusiasts.docx
Project in malware analysis:C2C
IDS+Honeypots Making Security Simple
Computer security
Sectools
Final project.ppt
Cyber Defense Forensic Analyst - Real World Hands-on Examples
Security & ethical hacking p2
2600 av evasion_deuce
unit 2 Intoduction to Tools and Platforms.docx
Malware 101 by saurabh chaudhary
scanning and analysis tools Fuzz testing
Hacking
Hacking
Wireless hacking tools.jpeg
Ad

Recently uploaded (20)

PDF
Sales and Distribution Managemnjnfijient.pdf
PDF
Entrepreneurship PowerPoint for students
PDF
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
PPTX
Principles of Inheritance and variation class 12.pptx
PDF
Daisia Frank: Strategy-Driven Real Estate with Heart.pdf
PDF
L-0018048598visual cloud book for PCa-pdf.pdf
PPTX
E-Commerce____Intermediate_Presentation.pptx
PDF
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
PDF
Blue-Modern-Elegant-Presentation (1).pdf
PPTX
The Stock at arrangement the stock and product.pptx
PDF
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
PPTX
chapter 3_bem.pptxKLJLKJLKJLKJKJKLJKJKJKHJH
PPTX
Autonomic_Nervous_SystemM_Drugs_PPT.pptx
PPTX
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
PPTX
internship presentation of bsnl in colllege
PPTX
_+✅+JANUARY+2025+MONTHLY+CA.pptx current affairs
PPTX
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
PPTX
Definition and Relation of Food Science( Lecture1).pptx
PPTX
microtomy kkk. presenting to cryst in gl
PPTX
AREAS OF SPECIALIZATION AND CAREER OPPORTUNITIES FOR COMMUNICATORS AND JOURNA...
Sales and Distribution Managemnjnfijient.pdf
Entrepreneurship PowerPoint for students
Why Today’s Brands Need ORM & SEO Specialists More Than Ever.pdf
Principles of Inheritance and variation class 12.pptx
Daisia Frank: Strategy-Driven Real Estate with Heart.pdf
L-0018048598visual cloud book for PCa-pdf.pdf
E-Commerce____Intermediate_Presentation.pptx
313302 DBMS UNIT 1 PPT for diploma Computer Eng Unit 2
Blue-Modern-Elegant-Presentation (1).pdf
The Stock at arrangement the stock and product.pptx
シュアーイノベーション採用ピッチ資料|Company Introduction & Recruiting Deck
chapter 3_bem.pptxKLJLKJLKJLKJKJKLJKJKJKHJH
Autonomic_Nervous_SystemM_Drugs_PPT.pptx
PE3-WEEK-3sdsadsadasdadadwadwdsdddddd.pptx
internship presentation of bsnl in colllege
_+✅+JANUARY+2025+MONTHLY+CA.pptx current affairs
Nervous_System_Drugs_PPT.pptxXXXXXXXXXXXXXXXXX
Definition and Relation of Food Science( Lecture1).pptx
microtomy kkk. presenting to cryst in gl
AREAS OF SPECIALIZATION AND CAREER OPPORTUNITIES FOR COMMUNICATORS AND JOURNA...

Security Handbook

  • 2. 2 Table of Contents System Scanners Network Scanners Wireless Discovery Packet Analyzer Attacks Defenses Password Cracking Cryptography
  • 3. 3 System Scanners Secunia- Scans systemand reports any out of date software. Will auto update most software but some items will require a manual update. This is used to protect your systems against vulnerabilities that could be found in older versions of software. http://secunia.com/vulnerability_scanning/personal/ This easy to use program brings up a report of all the programs on your computer that need to be updated. You simply have to click on the picture and it will update that program to the most recent version
  • 4. 4 Microsoft Malicious Software Removal Tool-Scans your computer for any malicious software and removes it. This is a great way to find out if there are any programs running on your system that could be malicious. http://www.microsoft.com/security/pc-security/malware-removal.aspx www.2-spyware.com Shavlik Patch Scanner- Checks the systemto make sure that it has all the current patches. This is necessary for security because the patches are put out to fix vulnerabilities that have been found in previous versions. This should be checked on a regular basis. http://www.shavlik.com/products/protect/ Root-kit Revealer- Scans your systemfor hidden rootkit viruses. A rootkit is used to hide the existence of other viruses and continue to give the attacker administrative privileges.
  • 5. 5 http://technet.microsoft.com/en-us/sysinternals/bb897445.aspx MBSA Scanner (Microsoft Baseline Security Analyzer)- This scanner scans your system for security updates and any less secure settings in windows. This scan will let you know if you are using weak passwords, any passwords do not expire, windows firewall is not set up properly, or if you have multiple administrative accounts. This is a good gauge of how well your basic security properties are set up. http://www.microsoft.com/en-us/download/details.aspx?id=7558 This window shows an example of the home screen for the MBSA. It has a simple step by step system to scan your system. As well as a detailed report after the systemhas been scanned www.petri.com Angry IP Scanner- This scans all the ports on your network and gives you a readout of the standing of each port. It will tell you which ports are open and what programs are running on the ports. If there is a program running on a port that you do not recognize you can find out if it is possibly malicious and close that port off. http://angryip.org/download/#windows
  • 6. 6 Risk Assessment Tool- This tool is an easy to use program where you can input all the assets of your network and assign a dollar value to the loss expectancy. This program eliminates the need to create a Spreadsheet and input all the calculations and link the columns. It automatically calculates all the information as you input it. Network Scanners Nessus Penetration Scanner- Scans a target machine for a various number of vulnerabilities. This is the most popular scanning tool used in the IT field. Scans for improperly configured systems, default passwords, and open vulnerable ports. http://www.tenable.com/products/nessus hackertarget.com
  • 7. 7 Nmap Scanner- used to discover hosts and services on a network. It creates a network map that can be used to determine what systems can be attacked. Nmap creates special packets that it sends to the host and it analyzes the response. http://nmap.org/download.html Network Diagram- Similar to Nmap it creates a diagram of how the target network is set up. Wireless Discovery Netstumbler- A tool that is used to find wireless networks that are broadcasting. It can be used to find areas of poor reception in a wireless network. Netstumbler can also be used to discover rogue access points. Kismet- Kismet is a very robust tool that can be used with wireless networks. First off it can be used to passively detect wireless access points and clients. Doing it passively means that the networks cannot detect it searching for them. It can also be used as an IDS by detecting other sniffing tools that are attempting to discover the network. Kismet can also collect packets from the network and dump them into a file that is readable by a program such as wireshark. Aircrack- Aircrack is another fully functioning wireless tool in that it discovers access points, collects packets and it also has the capabilities of cracking WEP/WPA passwords for wireless networks. Packet Analyzer Wireshark- Wireshark is a packet analyzer. It captures raw packets that are traversing across the network and makes them viewable to the user. The user can analyze the data and can often gain a significant amount of information. Anything from usernames and passwords to credit card information could be seen by analyzing the packets captured by wireshark. Even information that is send over VOIP can be collected and played back. https://www.wireshark.org/download.html
  • 8. 8 en.wikipedia.org Attacks CPUHog- CPUHog is a tool that can be opened by a user and will take up the total available usage in a core on the processor. Because most modern PC’s use multiple core processors this tool would not be as detrimental as it once was. Defenses HoneyPot- A honey pot is a systemthat is set up to look appealing to an attacker. These systems are used to distract an attacker from your real system by offering an easier target. The HoneyPot systems are usually set up with many vulnerabilities in order to lure the target into attacking it. https://app.box.com/shared/c1qix05ymg
  • 9. 9 HoneyNet- Similar to a HoneyPot a HoneyNet is a fake network that is created to dupe an attacker into thinking they have found an extremely vulnerable network. Password Cracking Cain and Abel- Cain and Abel uses multiple techniques to crack various passwords. You can use a straight brute force attack which will be the most time consuming. You can also use a dictionary attack which Cain and Abel provides a good word list to use. There is also the possiblility to use a Rainbow table attack. Cain and Abel provides a tool to create a rainbow table to use in the attack. http://www.oxid.it/cain.html John the Ripper- John the ripper is a Linux password cracking tool. It can use brute force as well as dictionary attacks against various hashes. There is also a lot of personalization you can use with John the ripper which makes it a very powerful tool. Cryptography True Crypt- TrueCrypt is an on the fly encryption utility. It has the capabilities to create a virtual encrypted disk within a file or encrypt a partition or even the entire storage device. Unfortunately the creators of TrueCrypt announced that it would no longer be maintained. http://truecrypt.sourceforge.net/ AxCrypt- AxCrypt is a security tool that can be used to encrypt files and folders. It uses a password as well as an optional key-file. Once the file is encrypted it changes the thumbnail to the AxCrypt icon providing a nice little layer of security.
  • 10. 10 http://www.axantum.com/axcrypt/Downloads.aspx Text Hide- Text Hide is a utility to hide sensitive information inside an image. The program uses the unused space in an image file to store encrypted information. http://www.softpedia.com/get/Security/Encrypting/Text-Hide.shtml