Red Hat NETWORK 3.6 - Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Server Red Hat NETWORK 3.6 - herunter. Red Hat NETWORK 3.6 - User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 61
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Tenable Network Security, Inc. • 7063 Columbia Gateway Drive, Suite 100, Columbia, MD 21046 • 410.872.0555 • sales@tenable.com • www.tenable.com
Copyright © 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks of Tenable
Network Security, Inc. Tenable, the Tenable logo, the Nessus logo, and/or other Tenable products referenced herein are trademarks of Tenable
Network Security, Inc., and may be registered in certain jurisdictions. All other product names, company names, marks, logos, and symbols
may be the trademarks of their respective owners.
Passive Vulnerability Scanner 3.6
Linux User Guide
September 20, 2013
(Revision 4)
The newest version of this document is available at the following URL:
http://static.tenable.com/prod_docs/PVS_3.6_Linux_user_guide.pdf
Seitenansicht 0
1 2 3 4 5 6 ... 60 61

Inhaltsverzeichnis

Seite 1 - Linux User Guide

Tenable Network Security, Inc. • 7063 Columbia Gateway Drive, Suite 100, Columbia, MD 21046 • 410.872.0555 • [email protected] • www.tenable.com C

Seite 2 - Table of Contents

Copyright © 2002-2012 Tenable Network Security, Inc. 10 Entering “i” for a new installation initiates prompts for configuration options. The fi

Seite 3

Copyright © 2002-2012 Tenable Network Security, Inc. 11 web server. To do this, only list the network CIDR blocks for which you want vulnerabi

Seite 4 - Related 3

Copyright © 2002-2012 Tenable Network Security, Inc. 12 PVS can report its data to the SecurityCenter console for centralised management. If you

Seite 5 - INTRODUCTION

Copyright © 2002-2012 Tenable Network Security, Inc. 13 Starting PVS via the “RC” script will also lint the pvs.conf script for syntax errors b

Seite 6 - PRE-INSTALLATION

Copyright © 2002-2012 Tenable Network Security, Inc. 14 # ps aux | grep pvs root 25191 22.7 26.9 384388 274704 pts/2 Sl 15:26 0:05 /opt

Seite 7 - SOFTWARE AND LICENSING

Copyright © 2002-2012 Tenable Network Security, Inc. 15 Starting Passive Vulnerability Scanner cb67c871206b18d743a5e070276bf13d /opt/pvs/bin/pvs

Seite 8 - INSTALLATION AND OPERATIONS

Copyright © 2002-2012 Tenable Network Security, Inc. 16 The PVS requires the “-c” and “-r” options each time it runs. These options tell the PVS

Seite 9 - Run the Installation Script

Copyright © 2002-2012 Tenable Network Security, Inc. 17 the pvs command was run. For example, if you were in /home/userx when you issued the abov

Seite 10

Copyright © 2002-2012 Tenable Network Security, Inc. 18 On high-speed networks with more than 20,000 systems, if the system running the PVS is

Seite 11

Copyright © 2002-2012 Tenable Network Security, Inc. 19 nessus-report-version Specifies the Nessus report file version to save the file. The defa

Seite 12

Copyright © 2002-2012 Tenable Network Security, Inc. 2 Table of Contents Introduction ...

Seite 13 - OPERATIONS

Copyright © 2002-2012 Tenable Network Security, Inc. 20 becomes available. The size of the cache will change dynamically and can be expected to g

Seite 14

Copyright © 2002-2012 Tenable Network Security, Inc. 21 > outbound-interactive-session (5) > inbound-interactive-session (6) > intern

Seite 15

Copyright © 2002-2012 Tenable Network Security, Inc. 22 time file size. realtime-syslog Specifies the IP address of a SYSLOG server to receive re

Seite 16

Copyright © 2002-2012 Tenable Network Security, Inc. 23 hosts. To prevent rediscovery of the entire network, the PVS can frequently write the lis

Seite 17 - Generating a Report

Copyright © 2002-2012 Tenable Network Security, Inc. 24 options { report-threshold 3; failure-threshold 10; interface "eth0"; interface

Seite 18 - CONFIGURATION

Copyright © 2002-2012 Tenable Network Security, Inc. 25 In the above picture, three sessions labeled A, B, and C are shown communicating to, fr

Seite 19

Copyright © 2002-2012 Tenable Network Security, Inc. 26 By default, these settings are disabled and must be manually edited in the pvs.conf fil

Seite 20

Copyright © 2002-2012 Tenable Network Security, Inc. 27 occurred at least once. For connections outside of the focus network, the PVS will only l

Seite 21

Copyright © 2002-2012 Tenable Network Security, Inc. 28 then list the detected interactive or encrypted session as a vulnerability. The PVS has

Seite 22

Copyright © 2002-2012 Tenable Network Security, Inc. 29 To prevent the PVS from having to relearn the network each time it starts, a file can be

Seite 23

Copyright © 2002-2012 Tenable Network Security, Inc. 3 What is a Passive Vulnerability Scanner ID? ...

Seite 24 - FOCUS NETWORK

Copyright © 2002-2012 Tenable Network Security, Inc. 30 destined for one or more addresses on the Internet. 00006 Inbound Interactive Sessions Th

Seite 25

Copyright © 2002-2012 Tenable Network Security, Inc. 31 Restarting the Passive Vulnerability Scanner Once new passive plugins or operating system

Seite 26

Copyright © 2002-2012 Tenable Network Security, Inc. 32 cvsstemporal metasploit CANVAS : D2ExploitPack CORE : true CVSSTEMPORAL : CVSS2#E:F/RL:O

Seite 27

Copyright © 2002-2012 Tenable Network Security, Inc. 33 nooutput For plugins that are written specifically to be used as part of a dependency wit

Seite 28 - ROUTES AND HOP DISTANCE

Copyright © 2002-2012 Tenable Network Security, Inc. 34 seealso If one or more URLs are available, this keyword can be used to display them. Mult

Seite 29

Copyright © 2002-2012 Tenable Network Security, Inc. 35 hs_sport=143 name=IMAP Banner description=An IMAP server is running on this port. Its ban

Seite 30 - PLUGINS

Copyright © 2002-2012 Tenable Network Security, Inc. 36 Case Insensitive Example There is a tool called SmartDownLoader that uploads and download

Seite 31 - Plugin Keywords

Copyright © 2002-2012 Tenable Network Security, Inc. 37 regex=^User-Agent: Mozilla/.* \(.*rv:(1\.3|1\.4a) Match patterns that begin with the “^”

Seite 32

Copyright © 2002-2012 Tenable Network Security, Inc. 38 The Passive Vulnerability Scanner can Match Binary Data The PVS also allows matching agai

Seite 33

Copyright © 2002-2012 Tenable Network Security, Inc. 39 In each of these cases, the plugin would not match if the patterns contained in these “no

Seite 34 - Plugin Libraries

Copyright © 2002-2012 Tenable Network Security, Inc. 4 Appendix 4: Non-Tenable License Declarations and Patent ...

Seite 35

Copyright © 2002-2012 Tenable Network Security, Inc. 40 Notice that plugin 1019 has the following field: dependency=1018. This field indicates th

Seite 36 - Case Insensitive Example

Copyright © 2002-2012 Tenable Network Security, Inc. 41 related from causing millions of events. For example, the plugins for the Sasser worm onl

Seite 37

Copyright © 2002-2012 Tenable Network Security, Inc. 42 dependency=1277 hs_sport=79 track-session=10 realtimeonly name=App Subversion - Successfu

Seite 38 - Negative Matches

Copyright © 2002-2012 Tenable Network Security, Inc. 43 and Windows command shells occurring in services that should not have those command shell

Seite 39 - Time Dependent Plugins

Copyright © 2002-2012 Tenable Network Security, Inc. 44 One could argue that the “pregexi” statement could be expanded to include the trailing s

Seite 40 - New Keywords

Copyright © 2002-2012 Tenable Network Security, Inc. 45 The following example shows how to create a custom plugin to detect users logging into m

Seite 41

Copyright © 2002-2012 Tenable Network Security, Inc. 46 The statement above ensures that they are posting to the host “login.myspace.com”. Final

Seite 42

Copyright © 2002-2012 Tenable Network Security, Inc. 47 0xde1d7f362734c4d71ecc93a23bb5dd4c and 0x747f029fbf8f7e0ade2a6198560c3278 A PVS plugin c

Seite 43

Copyright © 2002-2012 Tenable Network Security, Inc. 48 match=for HR data regarding Jane Mcintyre The two example plugins above (IDs 9005 and 90

Seite 44

Copyright © 2002-2012 Tenable Network Security, Inc. 49 P0f2 TCP Options N NOP option Wnnn window scaling option, value nnn (or * or

Seite 45

Copyright © 2002-2012 Tenable Network Security, Inc. 5 INTRODUCTION This document describes the Passive Vulnerability Scanner 3.6 architecture, i

Seite 46

Copyright © 2002-2012 Tenable Network Security, Inc. 50 ABOUT TENABLE NETWORK SECURITY Tenable Network Security, the leader in Unified Sec

Seite 47

Copyright © 2002-2012 Tenable Network Security, Inc. 51 APPENDIX 1: EXAMPLE PVS.CONF CONFIGURATION FILE options { # When adding new port, app

Seite 48 - FINGERPRINTS

Copyright © 2002-2012 Tenable Network Security, Inc. 52 # than 1024 MB. It can be set to a number less than 1024 MB. max-packet-cache-siz

Seite 49 - FOR FURTHER INFORMATION

Copyright © 2002-2012 Tenable Network Security, Inc. 53 dependency 1149; dependency 1150; dependency 1151; # snmp dependency

Seite 50

Copyright © 2002-2012 Tenable Network Security, Inc. 54 dependency 1133; dependency 1134; dependency 1135; #################

Seite 51

Copyright © 2002-2012 Tenable Network Security, Inc. 55 # would be marked as 'Client Side Port Usage'. # connections-to-servic

Seite 52

Copyright © 2002-2012 Tenable Network Security, Inc. 56 APPENDIX 2: WORKING WITH SECURITYCENTER ARCHITECTURE The PVS operates under the control

Seite 53

Copyright © 2002-2012 Tenable Network Security, Inc. 57 In the above example, a filter is applied to only display events that have been correla

Seite 54

Copyright © 2002-2012 Tenable Network Security, Inc. 58 APPENDIX 3: WORKING WITH NESSUS It is possible to view a PVS report from within the Nessu

Seite 55

Copyright © 2002-2012 Tenable Network Security, Inc. 59 > generate-html-reports > nsr-report-file > xml-report-file > realtime-pl

Seite 56 - MANAGING IDS EVENTS

Copyright © 2002-2012 Tenable Network Security, Inc. 6 > highlight all interactive and encrypted network sessions > detect when new hosts

Seite 57

Copyright © 2002-2012 Tenable Network Security, Inc. 60 APPENDIX 4: NON-TENABLE LICENSE DECLARATIONS AND PATENT Below you will find 3rd party sof

Seite 58

Copyright © 2002-2012 Tenable Network Security, Inc. 61 The word 'cryptographic' can be left out if the rouines from the library bei

Seite 59

Copyright © 2002-2012 Tenable Network Security, Inc. 7 SOFTWARE AND LICENSING Download or Obtain the Software To install the PVS, obtain the cor

Seite 60 - RELATED 3

Copyright © 2002-2012 Tenable Network Security, Inc. 8 INSTALLATION AND OPERATIONS UPGRADING FROM PVS 3.X Red Hat If you have used a PVS RPM to

Seite 61

Copyright © 2002-2012 Tenable Network Security, Inc. 9 Unless otherwise noted, perform all commands as the system’s root user. Install the PVS

Kommentare zu diesen Handbüchern

Keine Kommentare