Tools Google, et. al. Also, Ive tended to focus on Windows-based - - PowerPoint PPT Presentation

tools
SMART_READER_LITE
LIVE PREVIEW

Tools Google, et. al. Also, Ive tended to focus on Windows-based - - PowerPoint PPT Presentation

Tools Here is a list of potentially useful tools and utilities with Computer Security which to fight the onslaught of viruses, worms, Trojan horses, and other malware. Dont consider it in any way a complete list! There are lots of


slide-1
SLIDE 1

Computer Security

Tools

4/11/2006 Bryan J. Higgs, 2006 2

Tools

  • Here is a list of potentially useful tools and utilities with

which to fight the onslaught of viruses, worms, Trojan horses, and other malware.

  • Don’t consider it in any way a complete list! There are lots
  • f other tools out there, which you can find easily via

Google, et. al.

  • Also, I’ve tended to focus on Windows-based tools (with

some mention of Unix/Linux-based tools), because most of you have Windows machines. Also, I don’t really have access to a Unix/Linux machine.

4/11/2006 Bryan J. Higgs, 2006 3

Resources

  • Malware: Fighting Malicious Code, by Ed Skoudis, Lenny Zeltser, Prentice Hall

PTR, 2003, ISBN: 0131014056

  • Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective

Defenses by Ed Skoudis, Prentice Hall PTR , 2001, ISBN: 0130332739

  • How to Break Web Software : Functional and Security Testing of Web

Applications and Web Services, by Mike Andrews, James A. Whittaker,

Addison-Wesley Professional, 2006, ISBN: 0321369440

  • The Software Vulnerability Guide (Programming Series) (Programming

Series) (Paperback), by Herbert H Thompson, Scott G Chase, Charles River

Media, 2005, ISBN: 1584503580

  • Web Security, Privacy and Commerce, 2nd Edition (Paperback), by

Simson Garfinkel, O'Reilly Media, Inc., 2002, ISBN: 0596000456

  • Hands-On Ethical Hacking and Network Defense (Paperback), by Michael
  • T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081

Use a Powerful Editor to be Able to Look at Lots of Different File Formats

slide-2
SLIDE 2

4/11/2006 Bryan J. Higgs, 2006 5

The TextPad Editor

http://www.textpad.com/

Safer Browsing

4/11/2006 Bryan J. Higgs, 2006 7

The Mozilla Firefox Browser

http://www.mozilla.com/firefox/

Safer eMail

slide-3
SLIDE 3

4/11/2006 Bryan J. Higgs, 2006 9

The Mozilla Thunderbird Mail Client

http://www.mozilla.com/thunderbird/

4/11/2006 Bryan J. Higgs, 2006 10

The Mozilla Thunderbird Mail Client

Anti-Virus Protection

4/11/2006 Bryan J. Higgs, 2006 12

AVG Anti-Virus

http://free.grisoft.com/doc/2/lng/us/tpl/v5

slide-4
SLIDE 4

Firewall

4/11/2006 Bryan J. Higgs, 2006 14

ZoneAlarm Firewall

http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?dc=12bms&ctry=US&lang=en&lid=dbtopnav_zaav

Anti-Spyware

4/11/2006 Bryan J. Higgs, 2006 16

Spybot Search & Destroy

http://www.safer-networking.org/

slide-5
SLIDE 5

4/11/2006 Bryan J. Higgs, 2006 17

Ad-Aware

http://www.lavasoft.de/software/adaware/

4/11/2006 Bryan J. Higgs, 2006 18

Microsoft Windows Defender

http://www.microsoft.com/athome/security/spyware/software/default.mspx

4/11/2006 Bryan J. Higgs, 2006 19

SpyCatcher Express

http://www.tenebril.com/consumer/spyware/spycatcher-express.php

Tracing HTTP and Other Protocols

slide-6
SLIDE 6

4/11/2006 Bryan J. Higgs, 2006 21

The Ethereal Network Protocol Analyzer

http://www.ethereal.com/

4/11/2006 Bryan J. Higgs, 2006 22

The IEHttpHeaders Browser Plug-in

http://www.blunck.info/iehttpheaders.html

4/11/2006 Bryan J. Higgs, 2006 23

The IEHttpHeaders Browser Plug-in

4/11/2006 Bryan J. Higgs, 2006 24

The Paros HTTP Proxy

http://www.parosproxy.org/index.shtml

slide-7
SLIDE 7

Checking the Security of Web Site SSL

4/11/2006 Bryan J. Higgs, 2006 26

SSLDigger

http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/ssldigger.htm

4/11/2006 Bryan J. Higgs, 2006 27

SSLDigger

Security/Vulnerability Scanners

slide-8
SLIDE 8

4/11/2006 Bryan J. Higgs, 2006 29

The Nessus Security Scanner

http://www.nessus.org/

  • Nessus is a vulnerability scanner, originally for Unix/Linux

systems.

  • It is being ported to other systems, such as MacOS and

Windows.

  • There is a version of Nessus for Windows called NeWT.

4/11/2006 Bryan J. Higgs, 2006 30

NeWT

http://www.tenablesecurity.com/products/newt.shtml

4/11/2006 Bryan J. Higgs, 2006 31

Microsoft Baseline Security Analyzer

http://www.microsoft.com/technet/security/tools/mbsahome.mspx

4/11/2006 Bryan J. Higgs, 2006 32

Port Scanning Tools

  • Nmap (http://www.insecure.org/nmap/)
  • Foundstone Vision

(http://www.foundstone.com/index.htm?subnav=resources/navigation.ht m&subcontent=/resources/proddesc/vision.htm )

  • Foundstone Fport

(http://www.foundstone.com/index.htm?subnav=resources/navigation.ht m&subcontent=/resources/proddesc/fport.htm )

  • Foundstone Superscan

(http://www.foundstone.com/index.htm?subnav=resources/navigation.ht m&subcontent=/resources/proddesc/superscan.htm )

  • Others…
slide-9
SLIDE 9

4/11/2006 Bryan J. Higgs, 2006 33

Foundstone Vision

4/11/2006 Bryan J. Higgs, 2006 34

Foundstone Superscan

That’s Just a Sample!

There are lots more out there…