Manual de seguridad

Page 8

5 - Descripción de algunas herramientas de control y seguimiento de accesos........................................................................................................ 5-1 5.1 - tcp-wrappers................................................................................ 5-1 5.2. - Netlog........................................................................................ 5-4 5.2.1. 5.2.2. 5.2.3. 5.2.4. 5.2.5.

-

Tcplogger .......................................................................................................... 5-4 Udplogger.......................................................................................................... 5-5 Icmplogger ........................................................................................................ 5-5 Etherscan .......................................................................................................... 5-6 nstat.................................................................................................................. 5-7

5.3. - argus ......................................................................................... 5-7 5.4. - tcpdump..................................................................................... 5-8 5.5. - SATAN (Security Administrator Tool for Analyzing Networks).............. 5-9 5.6. - ISS (Internet Security Scanner) ....................................................5-10 5.7. - Courtney ...................................................................................5-10 5.8. - Gabriel ......................................................................................5-10 5.9. - tcplist........................................................................................5-11 5.10. - nocol (Network Operations Center On-Line) ..................................5-11

6. - Herramientas que chequean la integridad del sistema .................. 6-1 6.1. - COPS (Computer Oracle and Password System)................................ 6-1 6.2. - Tiger.......................................................................................... 6-2 6.3. - Crack ......................................................................................... 6-3 6.4. - Tripwire ..................................................................................... 6-3 6.5 .- chkwtmp .................................................................................... 6-4 6.6. - chklastlog ................................................................................... 6-4 6.7.- spar............................................................................................ 6-4 6.8.- lsof (List Open Files) ..................................................................... 6-4 6.9. - cpm (Check Promiscuous Mode)..................................................... 6-5 6.10. - ifstatus ..................................................................................... 6-5 6.11. - osh (Operator Shell) ................................................................... 6-6 6.12. - noshell ..................................................................................... 6-6 6.13. - trinux ....................................................................................... 6-7 7.- Herramientas para Windows NT ..................................................... 7-1 7.1. - Monitor de eventos ...................................................................... 7-1 7.2. - Monitor de red ............................................................................ 7-1 7.3. - Monitor de Performance................................................................ 7-1 7.3.1. - Errores de permisos de accesos ......................................................................... 7-2 7.3.2. - Errores de logon ................................................................................................ 7-2

7.4 - Paquetes para Windows NT............................................................ 7-2

7.4.1. - Windows NT Resource Kit .................................................................................. 7-2 7.4.2 - Internet Scanner................................................................................................. 7-2 7.4.3 – ScanNT .............................................................................................................. 7-2 7.4.4 – NetXRay ............................................................................................................. 7-3 7.4.5 - Suck Server ........................................................................................................ 7-3 7.4.6 - Red Button ......................................................................................................... 7-3

Seguridad en Redes

viii


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.