19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

126<br />

Part III: Hacking Network Hosts<br />

✓ A hacker can set up back-door access into your network.<br />

✓ A hacker can attack specific hosts by exploiting local vulnerabilities<br />

across the network.<br />

Before assessing your network infrastructure security, remember to do the<br />

following:<br />

✓ Test your systems from the outside in, the inside out, and the inside in<br />

(that is, on and between internal network segments and demilitarized<br />

zones [DMZs]).<br />

✓ Obtain permission from partner networks to check for vulnerabilities<br />

on their systems that can affect your network’s security, such as open<br />

ports, lack of a firewall, or a misconfigured router.<br />

Choosing Tools<br />

As with all ethical hacking, your network security tests require the right<br />

tools — you need port scanners, protocol analyzers, and vulnerability assessment<br />

tools. Great commercial, shareware, and freeware tools are available. I<br />

describe a few of my favorite tools in the following sections. Just keep in mind<br />

that you need more than one tool because no tool does everything you need.<br />

If you’re looking for easy-to-use security tools with all-in-one packaging, you<br />

get what you pay for most of the time — especially for the Windows platform.<br />

Tons of security professionals swear by many free security tools, especially<br />

those that run on Linux and other UNIX-based operating systems. Many of<br />

these tools offer a lot of value — if you have the time, patience, and willingness<br />

to learn their ins and outs. It’d behoove you to compare the results of<br />

the free tools with that of their commercial counterparts. I’ve definitely found<br />

some discrepancies.<br />

Scanners and analyzers<br />

These scanners provide practically all the port scanning and network testing<br />

you need:<br />

✓ Cain & Abel (www.oxid.it/cain.html) for network analysis and ARP<br />

poisoning<br />

✓ Essential NetTools (www.tamos.com/products/nettools) for a wide<br />

variety of network scanning functionality<br />

✓ NetScanTools Pro (www.netscantools.com) for dozens of network<br />

security assessment functions, including ping sweeps, port scanning,<br />

and SMTP relay testing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!