Red Hat NETWORK 3.6 - Guia do Utilizador Página 1

Consulte online ou descarregue Guia do Utilizador para Servidores Red Hat NETWORK 3.6 -. Red Hat NETWORK 3.6 - User guide Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 61
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
Tenable Network Security, Inc. • 7063 Columbia Gateway Drive, Suite 100, Columbia, MD 21046 • 410.872.0555 • sales@tenable.com • www.tenable.com
Copyright © 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks of Tenable
Network Security, Inc. Tenable, the Tenable logo, the Nessus logo, and/or other Tenable products referenced herein are trademarks of Tenable
Network Security, Inc., and may be registered in certain jurisdictions. All other product names, company names, marks, logos, and symbols
may be the trademarks of their respective owners.
Passive Vulnerability Scanner 3.6
Linux User Guide
September 20, 2013
(Revision 4)
The newest version of this document is available at the following URL:
http://static.tenable.com/prod_docs/PVS_3.6_Linux_user_guide.pdf
Vista de página 0
1 2 3 4 5 6 ... 60 61

Resumo do Conteúdo

Página 1 - Linux User Guide

Tenable Network Security, Inc. • 7063 Columbia Gateway Drive, Suite 100, Columbia, MD 21046 • 410.872.0555 • [email protected] • www.tenable.com C

Página 2 - Table of Contents

Copyright © 2002-2012 Tenable Network Security, Inc. 10 Entering “i” for a new installation initiates prompts for configuration options. The fi

Página 3

Copyright © 2002-2012 Tenable Network Security, Inc. 11 web server. To do this, only list the network CIDR blocks for which you want vulnerabi

Página 4 - Related 3

Copyright © 2002-2012 Tenable Network Security, Inc. 12 PVS can report its data to the SecurityCenter console for centralised management. If you

Página 5 - INTRODUCTION

Copyright © 2002-2012 Tenable Network Security, Inc. 13 Starting PVS via the “RC” script will also lint the pvs.conf script for syntax errors b

Página 6 - PRE-INSTALLATION

Copyright © 2002-2012 Tenable Network Security, Inc. 14 # ps aux | grep pvs root 25191 22.7 26.9 384388 274704 pts/2 Sl 15:26 0:05 /opt

Página 7 - SOFTWARE AND LICENSING

Copyright © 2002-2012 Tenable Network Security, Inc. 15 Starting Passive Vulnerability Scanner cb67c871206b18d743a5e070276bf13d /opt/pvs/bin/pvs

Página 8 - INSTALLATION AND OPERATIONS

Copyright © 2002-2012 Tenable Network Security, Inc. 16 The PVS requires the “-c” and “-r” options each time it runs. These options tell the PVS

Página 9 - Run the Installation Script

Copyright © 2002-2012 Tenable Network Security, Inc. 17 the pvs command was run. For example, if you were in /home/userx when you issued the abov

Página 10

Copyright © 2002-2012 Tenable Network Security, Inc. 18 On high-speed networks with more than 20,000 systems, if the system running the PVS is

Página 11

Copyright © 2002-2012 Tenable Network Security, Inc. 19 nessus-report-version Specifies the Nessus report file version to save the file. The defa

Página 12

Copyright © 2002-2012 Tenable Network Security, Inc. 2 Table of Contents Introduction ...

Página 13 - OPERATIONS

Copyright © 2002-2012 Tenable Network Security, Inc. 20 becomes available. The size of the cache will change dynamically and can be expected to g

Página 14

Copyright © 2002-2012 Tenable Network Security, Inc. 21 > outbound-interactive-session (5) > inbound-interactive-session (6) > intern

Página 15

Copyright © 2002-2012 Tenable Network Security, Inc. 22 time file size. realtime-syslog Specifies the IP address of a SYSLOG server to receive re

Página 16

Copyright © 2002-2012 Tenable Network Security, Inc. 23 hosts. To prevent rediscovery of the entire network, the PVS can frequently write the lis

Página 17 - Generating a Report

Copyright © 2002-2012 Tenable Network Security, Inc. 24 options { report-threshold 3; failure-threshold 10; interface "eth0"; interface

Página 18 - CONFIGURATION

Copyright © 2002-2012 Tenable Network Security, Inc. 25 In the above picture, three sessions labeled A, B, and C are shown communicating to, fr

Página 19

Copyright © 2002-2012 Tenable Network Security, Inc. 26 By default, these settings are disabled and must be manually edited in the pvs.conf fil

Página 20

Copyright © 2002-2012 Tenable Network Security, Inc. 27 occurred at least once. For connections outside of the focus network, the PVS will only l

Página 21

Copyright © 2002-2012 Tenable Network Security, Inc. 28 then list the detected interactive or encrypted session as a vulnerability. The PVS has

Página 22

Copyright © 2002-2012 Tenable Network Security, Inc. 29 To prevent the PVS from having to relearn the network each time it starts, a file can be

Página 23

Copyright © 2002-2012 Tenable Network Security, Inc. 3 What is a Passive Vulnerability Scanner ID? ...

Página 24 - FOCUS NETWORK

Copyright © 2002-2012 Tenable Network Security, Inc. 30 destined for one or more addresses on the Internet. 00006 Inbound Interactive Sessions Th

Página 25

Copyright © 2002-2012 Tenable Network Security, Inc. 31 Restarting the Passive Vulnerability Scanner Once new passive plugins or operating system

Página 26

Copyright © 2002-2012 Tenable Network Security, Inc. 32 cvsstemporal metasploit CANVAS : D2ExploitPack CORE : true CVSSTEMPORAL : CVSS2#E:F/RL:O

Página 27

Copyright © 2002-2012 Tenable Network Security, Inc. 33 nooutput For plugins that are written specifically to be used as part of a dependency wit

Página 28 - ROUTES AND HOP DISTANCE

Copyright © 2002-2012 Tenable Network Security, Inc. 34 seealso If one or more URLs are available, this keyword can be used to display them. Mult

Página 29

Copyright © 2002-2012 Tenable Network Security, Inc. 35 hs_sport=143 name=IMAP Banner description=An IMAP server is running on this port. Its ban

Página 30 - PLUGINS

Copyright © 2002-2012 Tenable Network Security, Inc. 36 Case Insensitive Example There is a tool called SmartDownLoader that uploads and download

Página 31 - Plugin Keywords

Copyright © 2002-2012 Tenable Network Security, Inc. 37 regex=^User-Agent: Mozilla/.* \(.*rv:(1\.3|1\.4a) Match patterns that begin with the “^”

Página 32

Copyright © 2002-2012 Tenable Network Security, Inc. 38 The Passive Vulnerability Scanner can Match Binary Data The PVS also allows matching agai

Página 33

Copyright © 2002-2012 Tenable Network Security, Inc. 39 In each of these cases, the plugin would not match if the patterns contained in these “no

Página 34 - Plugin Libraries

Copyright © 2002-2012 Tenable Network Security, Inc. 4 Appendix 4: Non-Tenable License Declarations and Patent ...

Página 35

Copyright © 2002-2012 Tenable Network Security, Inc. 40 Notice that plugin 1019 has the following field: dependency=1018. This field indicates th

Página 36 - Case Insensitive Example

Copyright © 2002-2012 Tenable Network Security, Inc. 41 related from causing millions of events. For example, the plugins for the Sasser worm onl

Página 37

Copyright © 2002-2012 Tenable Network Security, Inc. 42 dependency=1277 hs_sport=79 track-session=10 realtimeonly name=App Subversion - Successfu

Página 38 - Negative Matches

Copyright © 2002-2012 Tenable Network Security, Inc. 43 and Windows command shells occurring in services that should not have those command shell

Página 39 - Time Dependent Plugins

Copyright © 2002-2012 Tenable Network Security, Inc. 44 One could argue that the “pregexi” statement could be expanded to include the trailing s

Página 40 - New Keywords

Copyright © 2002-2012 Tenable Network Security, Inc. 45 The following example shows how to create a custom plugin to detect users logging into m

Página 41

Copyright © 2002-2012 Tenable Network Security, Inc. 46 The statement above ensures that they are posting to the host “login.myspace.com”. Final

Página 42

Copyright © 2002-2012 Tenable Network Security, Inc. 47 0xde1d7f362734c4d71ecc93a23bb5dd4c and 0x747f029fbf8f7e0ade2a6198560c3278 A PVS plugin c

Página 43

Copyright © 2002-2012 Tenable Network Security, Inc. 48 match=for HR data regarding Jane Mcintyre The two example plugins above (IDs 9005 and 90

Página 44

Copyright © 2002-2012 Tenable Network Security, Inc. 49 P0f2 TCP Options N NOP option Wnnn window scaling option, value nnn (or * or

Página 45

Copyright © 2002-2012 Tenable Network Security, Inc. 5 INTRODUCTION This document describes the Passive Vulnerability Scanner 3.6 architecture, i

Página 46

Copyright © 2002-2012 Tenable Network Security, Inc. 50 ABOUT TENABLE NETWORK SECURITY Tenable Network Security, the leader in Unified Sec

Página 47

Copyright © 2002-2012 Tenable Network Security, Inc. 51 APPENDIX 1: EXAMPLE PVS.CONF CONFIGURATION FILE options { # When adding new port, app

Página 48 - FINGERPRINTS

Copyright © 2002-2012 Tenable Network Security, Inc. 52 # than 1024 MB. It can be set to a number less than 1024 MB. max-packet-cache-siz

Página 49 - FOR FURTHER INFORMATION

Copyright © 2002-2012 Tenable Network Security, Inc. 53 dependency 1149; dependency 1150; dependency 1151; # snmp dependency

Página 50

Copyright © 2002-2012 Tenable Network Security, Inc. 54 dependency 1133; dependency 1134; dependency 1135; #################

Página 51

Copyright © 2002-2012 Tenable Network Security, Inc. 55 # would be marked as 'Client Side Port Usage'. # connections-to-servic

Página 52

Copyright © 2002-2012 Tenable Network Security, Inc. 56 APPENDIX 2: WORKING WITH SECURITYCENTER ARCHITECTURE The PVS operates under the control

Página 53

Copyright © 2002-2012 Tenable Network Security, Inc. 57 In the above example, a filter is applied to only display events that have been correla

Página 54

Copyright © 2002-2012 Tenable Network Security, Inc. 58 APPENDIX 3: WORKING WITH NESSUS It is possible to view a PVS report from within the Nessu

Página 55

Copyright © 2002-2012 Tenable Network Security, Inc. 59 > generate-html-reports > nsr-report-file > xml-report-file > realtime-pl

Página 56 - MANAGING IDS EVENTS

Copyright © 2002-2012 Tenable Network Security, Inc. 6 > highlight all interactive and encrypted network sessions > detect when new hosts

Página 57

Copyright © 2002-2012 Tenable Network Security, Inc. 60 APPENDIX 4: NON-TENABLE LICENSE DECLARATIONS AND PATENT Below you will find 3rd party sof

Página 58

Copyright © 2002-2012 Tenable Network Security, Inc. 61 The word 'cryptographic' can be left out if the rouines from the library bei

Página 59

Copyright © 2002-2012 Tenable Network Security, Inc. 7 SOFTWARE AND LICENSING Download or Obtain the Software To install the PVS, obtain the cor

Página 60 - RELATED 3

Copyright © 2002-2012 Tenable Network Security, Inc. 8 INSTALLATION AND OPERATIONS UPGRADING FROM PVS 3.X Red Hat If you have used a PVS RPM to

Página 61

Copyright © 2002-2012 Tenable Network Security, Inc. 9 Unless otherwise noted, perform all commands as the system’s root user. Install the PVS

Comentários a estes Manuais

Sem comentários