28.06.2014 Views

CyberCop Scanner Getting Started Guide

CyberCop Scanner Getting Started Guide

CyberCop Scanner Getting Started Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Preface<br />

How to Use the <strong>Getting</strong> <strong>Started</strong> <strong>Guide</strong><br />

This <strong>Getting</strong> <strong>Started</strong> <strong>Guide</strong> is divided into three parts. The parts include the following:<br />

• Part I: <strong>Getting</strong> <strong>Started</strong><br />

• Part II: Advanced Features<br />

• Part III: Appendices<br />

The contents of the above-listed parts are described below.<br />

Part I: <strong>Getting</strong> <strong>Started</strong><br />

Chapter 1, “<strong>CyberCop</strong> <strong>Scanner</strong> in Active Security,” describes how <strong>CyberCop</strong> <strong>Scanner</strong><br />

works when it is integrated into the Active Security suite of NAI products. <strong>CyberCop</strong><br />

<strong>Scanner</strong> can be used as a standalone product. Or, it can be used with other NAI<br />

products in the Active Security suite.<br />

Chapter 2, “Installing <strong>CyberCop</strong> <strong>Scanner</strong>,” includes step-by-step instructions for<br />

installing and uninstalling <strong>CyberCop</strong> <strong>Scanner</strong>. It also includes instructions for<br />

installing the CASL interpreter. Once you complete this chapter, you will be ready to<br />

begin the tutorial chapters.<br />

Chapter 3, “<strong>Getting</strong> <strong>Started</strong>: Performing a Scan,” is the first of several tutorial chapters.<br />

Chapter 3 leads you through configuring <strong>CyberCop</strong> <strong>Scanner</strong> and performing a scan.<br />

Chapter 4, “Working With Scan Results,” explains how scan results are saved. It also<br />

teaches you how to view scan results and generate scan reports and network maps<br />

using the scan results you obtained in Chapter 3.<br />

Chapter 5, “Using Brute Force Password Guessing Functions,” teaches you about the<br />

Crack utility and the SMB Grind utility. It includes a discussion of the Crack and SMB<br />

Grind utilities and instructions on how to use them.<br />

Chapter 6, “Running IDS (Intrusion Detection Software) Tests,” includes an<br />

explanation of the IDS testing tool for testing your intrusion detection software as well<br />

as a procedure for conducting IDS tests.<br />

Chapter 7, “Using CASL Modules to Run Firewall Filter Checks,” includes<br />

instructions for running filter checks on firewalls, screening routers, and other gateway<br />

machines using module class 12000, a class of modules written in the custom audit<br />

scripting language (CASL).<br />

Chapter 8, “AutoUpdate: Updating <strong>CyberCop</strong> <strong>Scanner</strong> Files,” explains how to<br />

download the most current <strong>CyberCop</strong> <strong>Scanner</strong> update packs (i.e. compressed files)<br />

from NAI’s FTP site to your system.<br />

x<br />

Preface

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!