Maximum security: A hacker's guide to protecting your internet site and network

My acknowledgments are brief. First, I would like to acknowledge the folks at Sams, particularly Randi Roger, Scott Meyers, Mark Taber, Blake Hall, Eric Murray, Bob Correll, and Kate Shoup. Without them, my work would resemble a tangled, horrible mess. They are an awesome editing team and their expertise is truly extraordinary. Next, I extend my deepest gratitude to Michael Michaleczko, and Ron and Stacie Latreille. These individuals offered critical support, without which this book could not have been written. Also, I would like to recognize the significant contribution made by John David Sale, a network security specialist located in Van Nuys, California. His input was invaluable. A similar thanks is also extended to Peter Benson, an Internet and EDI Consultant in Santa Monica, California (who, incidentally, is the current chairman of ASC X12E). Peter's patience was (and is) difficult to fathom. Moreover, I forward a special acknowledgment to David Pennells and his merry band of programmers. Those cats run the most robust and reliable wire in the southwestern United States.

pdf670 trang | Chia sẻ: banmai | Lượt xem: 3435 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu Maximum security: A hacker's guide to protecting your internet site and network, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
e projects that are in the design phase and design/implementation of network security products. NOTE: Mr. Murray also has been the technical editor and advisor on many books on Internet-related technologies. Independent Consultant Redwood City, CA 94061 Contact: Eric Murray E-mail: ericm@lne.com URL: Feist Systems Feist Systems is an ISP and System Integrator that can provide safe connections to the Internet as well as enhance your LAN/WAN security through a variety of services provided by skilled industry professionals. Feist Systems 110 S. Main Street, Suite 1000 Wichita, KS 67202 Contact: Bruce Marshall Phone: 316-337-8688 Fax: 316-833-5231 E-mail: bkmarsh@feist.com URL: Finlayson Consulting Secure Net applications, cryptographic applications, security advisory consulting. Finlayson Consulting 1884 Columbia Road, NW #1004 Washington, DC 20009 Contact: Ross A. Finlayson Phone: 202-387-8208 E-mail: raf@tomco.net URL: Galaxy Computer Services, Inc. Firewall implementation (various flavors of UNIX) in a heterogeneous environment. Penetration testing and risk assessment, client-server application security in the Windows NT environment, network security product--the Information Diode&tm;--an accreditable, one-way only path from low to high networks. Galaxy Computer Services, Inc. 17831 Shotley Bridge Place Olney, MD 20832-1670 Contact: George Romas Phone: 301-570-4647 Fax: 301-924-8609 E-mail: gromas@gcsi.com, George_Romas@msn.com Gemini Computers Inc. Gemini products provide trustworthy support for secure system applications using the Al certified foundation of the Gemini Trusted Network Processor (GTNP) with integrated encryption. Trustworthiness is based on trusted end-to-end encryption technologies supporting the legal foundation of the electronic world in compliance with applicable standards, guidelines, and laws. Gemini Computers Inc. P.O. Box 222417 Carmel, CA 93922-2417 Contact: Dr. Tien F. Tao, President Phone: 408-373-850 Fax: 408-373-5792 E-mail: tft@geminisecure.com URL: GlobalCenter ISP offering dial-up, dedicated, and server co-location services, security consulting on firewalls, security policies, encryption, virtual private networks, spam detection and cancellation, junk e-mail filtering, abuse prevention. GlobalCenter 1224 E. Washington Street Phoenix, AZ 85034 Contact: Jim Lippard Phone: 602-416-6122 Fax: 602-416-6111 E-mail: jl@primenet.com Grand Designs, Ltd./ConfluX.net The principals each have over 20 years experience in the areas of networking and software engineering. We have experience with secure networking and systems security including work for military subcontracts. Our ConfluX.net unit offers secure Internet access (that is, virtual private networks) and Web hosting. Grand Designs, Ltd./ConfluX.net 4917 Evergreen Way, Suite 10 Everett, WA 98203 Contact: John Painter or William Heaton Phone: 206-710-9006 E-mail: info@gdltd.com, info@conflux.net URL: Gregory R. Block UNIX/NT security and networking consultant, ten years of experience in the field, tiger- team analyses, firewalls, topology, design and implementation at all levels. Finger for PGP key and mail for further information. Gregory R. Block 48A Hendon Lane London, N3 1TT UK E-mail: gblock@lemon.net Hyperon Consulting Hyperon Consulting is a high-technology company that provides advanced Internet and electronic commerce security solutions to industry. CISSP certified and familiar with banking regulations. Hyperon Consulting 3422 Old Capitol Trail, Suite 1245 Wilmington, DE 19808 Contact: James Molini Phone: 302-996-3047 Fax: 302-996-5818 URL: IC Tech Systems consultants and integrators. Specializing in midrange system integration. IC Tech 131 Willow Pond Way Penfield, NY 14526 Contact: Vadim Mordkovich Phone/Fax: 716-388-1877 E-mail: ictech@frontiernet.net URL: www.frontiernet.net/~ictech I.T. NetworX Ltd. Specialist Internet/intranet security on UNIX and Windows NT. Services offered: firewalls, penetration testing, design, consultancy, products, freeware configuration. Since 1984. I.T. NetworX Ltd. 67 Merrion Square Dublin 2 Ireland Contact: Michael Ryan Phone: +353-1-6768866 and +353-87-444024 Fax: +353-1-6768868 E-mail: mike@NetworX.ie Integrity Sciences, Inc. Integrity Sciences, Inc. provides consulting and software engineering services for secure networks, focusing on strong password authentication protocols immune to network attack. Integrity Sciences, Inc. Westboro, MA 01581 Contact: David Jablon Phone: 508-898-9024 E-mail: dpj@world.std.com URL: International Network Services Offering a full suite of consulting services including risk assessment, requirements development, perimeter security, host and Web server security, penetration testing and audits, and customer training and security awareness programs. International Network Services 300 Crown Colony Drive, Fifth Floor Quincy, MA 02169 Contact: Harold Long, Managing Director Phone: 617-376-2450 Fax: 617-376-2458 E-mail: hlong@ins.com URL: InterNet Guide Service Inc. InterNet Guide Service is a consulting and coaching firm specializing in Internet strategy, security, and digital commerce. Member of NCSA, certified IBM firewall expert. InterNet Guide Service Inc. 55A Richardson Street Billerica, MA 01821 Contact: Eric S. Johansson Phone: 508-667-4791 E-mail: esj@harvee.billeric.ma.us Internet Information Services, Inc. (IIS) IIS provides a full range of security expertise to businesses that want to outsource the management of their network security. This includes firewall design and integration, virtual private network design and integration, site security evaluation, security policy development and security systems design and implementation. Internet Information Services, Inc. (IIS) 7979 Old Georgetown Road Bethesda, MD 20814 USA Contact: Robert Tewes Phone: 301-718-1770 Fax: 301-718-1770 E-mail: roberttewes@iis.net URL: www.iis.net Internet Security Systems, Inc. (ISS) ISS is the pioneer and leading supplier of network security assessment tools, providing comprehensive auditing, monitoring, and response software. The company's flagship product, Internet Scanner, is the leading commercial attack simulation and security audit tool used by organizations worldwide. Internet Security Systems, Inc. (ISS) 41 Perimeter Center East, Suite 660 Atlanta, GA 30071 USA (Corporate Headquarters) Contact: Paul Graffeo Phone: 770-395-0150 Fax: 770-395-1972 E-mail: info@iss.net URL: Interpact, Inc./Infowar.Com Only if you really care about security, we offer security design, architecture, modeling, and penetration testing. We have clients on three continents and work for governments and the largest corporations. Interpact, Inc./Infowar.Com 11511 Pine Street Seminole, FL 33772 Contact: Winn Schwartai Phone: 813-393-6600 Fax: 813-393-6361 E-mail: winn@infowar.com URL: Jeff Flynn & Associates Holistic network security services: needs assessment, security awareness, training, physical security, logical security, analysis, design, configuration, deployment, testing, investigation, firewalls, encryption, authentication, intrusion detection. Jeff Flynn & Associates 19 Perryville Irvine, CA, 92620 Contact: Jeff Flynn Phone: 551-6398 Jerboa, Inc. UNIX, firewalls (all vendors), product reviews, consulting, topology, policy development, product integration, compatibility testing, training, seminars, business planning, Web technologies, encryption, and tunneling. Jerboa, Inc. P.O. Box 382648 Cambridge, MA 02238 Contact: Ian Poynter, Diana Kelley Phone: 617-492-8084 Fax: 617-492-8089 E-mail: info@jerboa.com URL: Kinchlea Computer Consulting UNIX/network security experts (most platforms), firewalls, security audits, security consultation. Vancouver Islands' security experts. We are small but highly knowledgeable and professional. Kinchlea Computer Consulting 3730 Denman Road Denman Island, BC, Canada, V0R 1T0 Contact: Dave Kinchlea, President Phone: 250-335-0907 Fax: 250-335-0902 E-mail: kcc@kinch.ark.com URL: Kinetic, Inc. Internet-related open systems and computer security consulting. UNIX security audits, firewall design, secure off-site Web management/housing facilities. Kinetic, Inc. Park Place West, Suite 315 6465 Wayzata Boulevard Minneapolis, MN 55426-1730 Contact: Scott Hoffer Phone: 612-225-8533 Fax: 612-225-8508 E-mail: 411@kinetic.com URL: Lawrence J. Kilgallen VMS security. Lawrence J. Kilgallen Box 397081 Cambridge, MA 02139-7081 Phone: 617-498-9606 E-mail: Kilgallen@eisner.decus.org Learning Tree International Learning Tree provides 4-day hands-on courses on UNIX security, Windows NT security, Internet/intranet security, and firewalls, plus over 130 other information technology topics. Call for a free course catalog! Learning Tree International 1805 Library Street Reston, VA 20190-5630 Contact: Linda Trude Phone: 800-843-8733 Fax: 800-709-6405 E-mail: uscourses@learningtree.com URL: Livermore Software Labs LSLI is the maker of the PORTUS Secure Firewall for AIX, HP, Solaris, and Apple. It is a Houston-based network-consulting firm. Livermore Software Labs 2825 Wilcrest, Suite 160 Houston, Texas 77042-3358 Contact: Jay Lyall Voice Mail: 713-974-3274 Phone: 800-240-5754 Fax: 713-978-6246 E-mail: portusinfo@lsli.com URL: Lurhq Corporation Lurhq is a network security organization specializing in firewalls, Web-server security, electronic commerce implementations, and penetration testing. We offer many security services and customize these services for your unique security requirements! Lurhq Corporation Myrtle Beach, SC Contact: Kristi Sarvis, Sales Coordinator E-mail: info@lurhq.com URL: Maxon Services Network Security systems integrator/consultant, Windows NT, UNIX, CISCO, Check Point Firewall 1, Security Dynamics Ace Server. Maxon Services 8550 Marie-Victorin Brossard, Quebec Canada, J4X 1A1 Contact: Eric Tremblay Phone: 514-466 2422 Fax: 514-466 2113 URL: Metamor Technologies, Ltd. Metamor Technologies is a project-oriented consulting company helping companies through technical transitions. Firewall, commerce, and security reviews are just some of the exciting services offered by our Internet technology division. Visit our Web page for a full tour! Metamor Technologies, Ltd. 1 North Franklin, Suite 1500 Chicago, IL, 60606 Contact: Paul Christian Nelis Phone: 312-251-2000 Fax: 312-251-2999 E-mail: nelis@metamor.com URL: Milkyway Networks Corporation Milkyway Networks is a leading provider of network security solutions for enterprise networks. Milkyway's firewall product comes with a factory hardened operating systems ensuring one of the most secure firewalls on the market. In addition to firewalls the company provides products for secure remote access and an auditing tool to probe your network for potential security weakness. Milkyway has a U.S. office in Santa Clara with its corporate offices in Ottawa, Canada. Milkyway Networks Corporation 4655 Old Ironsides Drive Suite 490 Santa Clara, CA, 95054 Contact: Jeff Sherwood, Vice-President Sales Phone: 408-566-0800 Fax: 408-566-0810 E-mail: info@milkyway.com URL: www.milkyway.com Milvets System Technology, Inc Systems integration of network security products. Reseller agreements with market- leading firewall vendors. Specializing in UNIX- and NT-based systems. Milvets System Technology, Inc 4600 Forbes Boulevard, Suite 104 Lanham, MD 20706 Contact: Greg Simpson Phone: 301-731-9130 Fax: 301-731-4773 E-mail: simpson@milvets.com, Milvets@milvets.com Miora Systems Consulting, Inc. (MSC) Miora Systems Consulting helps organizations improve their computer and information security posture and their disaster recovery readiness. We are an affiliate of the National Computer Security Association. Services include security assessments, penetration testing, firewall verification, virus assessments, disaster-recovery planning, pbs and war- dialing attacks, security-policy development, and others. Miora Systems Consulting, Inc. (MSC) P.O. Box 6028 8055 W. Manchester Avenue Suite 450 Playa del Rey, CA, 90296 Contact: Michael Miora Phone: 310-306-1365 Fax: 310-305-1493 E-mail: mmiora@miora.com URL: MTG Management Consultants IT management and security. Criminal justice systems specialists. MTG Management Consultants 1111 3rd Avenue Suite 2700 Seattle, WA 98101 Contact: Scott Colvin Phone: 206-442-5010 Fax: 206-442-5011 URL: Myxa Corporation Myxa is a technology-services company that deals with UNIX, client/server, and networking (intra and Internet), including firewalls and security. We've helped companies design, implement, and manage their systems and networks since 1976. Myxa Corporation 654 Red Lion Road, Suite 200 Huntingdon Valley, PA 19006 Contact: Timothy M. Brown Phone: 215-947-9900 Fax: 215-935-0235 E-mail: sales@myxa.com URL: NetPartners Internet Solutions, Inc. NetPartners' mission is to bring sophisticated Internet technology to the mass business market. Products include Firewall-1, Raptor, BorderWare, Sidewinder, Gauntlet, ISS, Compaq, Cisco, Interscan, SUN. NetPartners is also the manufacturer of WebSENSE--an advanced Internet content screening system that allows businesses and educational institutions to monitor and/or eliminate network traffic to Internet sites deemed inappropriate or otherwise undesirable for business use. NetPartners Internet Solutions, Inc. 9210 Sky Park Court First Floor San Diego , CA 92123 Contact: Jeff True Phone: 619-505-3044 Fax: 619-495-1950 E-mail: jtrue@netpart.com URL: Network Evolutions, Incorporated NEI is an international technology consulting firm that provides enterprise-wide network design services, network security audits, and intranet/Internet firewall implementation services. Network Evolutions, Incorporated 1850 Centennial Park Drive, Suite 625 Reston, Virginia 20191 Contact: David Kim, President Phone: 703-476-5100 Fax: 703-476-5103 E-mail: kim@netevolve.com URL: New Edge Technologies I am a computer network security consultant with 17 years of hard-core diverse experience in telephony, electronic communications systems, licensing systems, network security, encryption techniques, and analysis. New Edge Technologies United States Contact: Donald R. Martin E-mail: grey@earth.usa.net URL: Newline Network security and performance analysis, penetration testing, monthly security reviews and briefings. Newline 969 La Felice Lane Fallbrook, CA 92028 Contact: Steve Edwards Phone: 619-723-2727 Fax: 619-731-3000 E-mail: sedwards@newline.com NH&A Anti-virus, security, and network management. NH&A 577 Isham Street, Suite 2-B New York City, NY 10034 Contact: Norman Hirsch Phone: 212-304-9660 Fax: 212-304-9759 E-mail: nhirsch@nha.com URL: NorthWestNet, Inc. Managed firewall services (UNIX and NT), vulnerability assessment services, security incident response team (SIRT) services, virtual private networking (VPN) services, security awareness training. NorthWestNet, Inc. 15400 SE 30th Place, Suite 202 Bellevue, WA 98007 Contact: Security Engineering Manager Phone: +1 (425)-649-7400 Fax: +1 (425)-649-7451 E-mail: info@nwnet.net URL: Omnes FireWall-1, penetration testing, security audits, tiger teams, encryption, and virtual private networks, Firewall-1 CCSE training. Omnes 5599 San Felipe, Suite 400 Houston, TX 77056 555 Industrial Boulevard, Sugarland, TX 77478, Contact: Nassim Chaabouni, Network Security Consultant Phone: 281-285 8151 Fax: 281-285 8161 E-mail: Chaabouni@houston.omnes.net URL : Onsight, Inc. Consulting/training firm in Chicago/midwest with heavy background in host and network security, firewalls, and encryption. Onsight, Inc. 2512 Hartzell Evanston, IL 60201 Contact: Brian Hatch Phone: 847-869-9133 Fax: 847-869-9134 E-mail: bri@avue.com URL: Plum Lake Alchemy UNIX, WWW, and security consulting. Raptor Eagle Firewall specialists. Plum Lake Alchemy 1000 Kiely Boulevard #66 Santa Clara, CA 95051 Contact: Matthew Wallace Phone: 408-985-2722 E-mail: matt@ender.com URL: R.C. Consulting, Inc. Provides enterprise-level security consulting for Windows NT environments, particularly where those environments are intended to interact with the Internet. Executive briefings on existing or future security products/strategies tailored to your specific requirements in person, or via e-mail/phone/vidphone. Host and moderator of the NTBugTraq mailing list, dedicated to examining security exploits and bugs in Windows NT. R.C. Consulting, Inc. Kenrei Court, R.R. #1 Lindsay, Ontario, K9V 4R1 Canada Contact: Russ Cooper Phone: 705-878-3405 Fax: 705-878-1804 E-mail: Russ.Cooper@rc.on.ca URL: Rampart Consulting Independent consulting in Internet security policy and security assessment. Firewall installation, UNIX system and network management, DNS administration, SMTP consulting and general system training. Rampart Consulting 1-285 Rangely Drive Colorado Springs, CO 80921 Contact: Dan Lowry Phone: 719-481-9394 E-mail: danlow@earthlink.net URL: www.earthlink.net/~danlow Realogic, Inc. UNIX/NT firewalls, security audits, penetration testing, MS certified, provides service to mid to large Fortune corporations throughout the western states. TIS, AltaVista, Firewall- I, and BorderWare. MS-Proxy, MS-IIS, MS-Commerce Server specialist. Offices throughout U.S. and Europe. Realogic, Inc. 801 Montgomery Street, Suite 200 San Francisco, CA 94133 Contact: Kelly Gibbs Phone: 415-956-1300 Fax: 415-956-1301 E-mail: k.gibbs@realogic.com URL: Ritter Software Engineering Advanced patented and patent-pending ciphering technologies with very significant advantages in particular applications. Also providing custom cipher designs, implementations, and consulting. Ritter Software Engineering 2609 Choctaw Trail Austin, Texas 78745 Contact: Terry Ritter, P.E. Phone/Fax: 512-892-0494 E-mail: ritter@io.com URL: Saffire Systems Saffire Systems specializes in secure software development, consulting, and systems integration. Saffire Systems provides engineering services (architecture, design, implementation, and testing), evaluation support services, secure network evaluations, and Windows NT security training. Saffire Systems P.O. Box 11154 Champaign, IL 61826-1154 Contact: Michelle A. Ruppel Phone: 217-359-7763 Fax: 217-356-7050 E-mail: maruppel@prairienet.org SecTek, Inc. SecTek provides services in following areas: INFOSEC, COMPSEC, physical security, access control, risk assessments, penetration tests, firewall design/implementation, intrusion detection, intranets. SecTek, Inc. 208 Elden Street, Suite 201 Herndon, VA 22070 Contact: Bruce Moore Phone: 703-834-0507 Fax: 703-834-0214 E-mail: wmoore@sectek.com URL: Secure Networks Inc. SNI is a security research house whose primary focus is the development of security auditing tools. SNI's premier product is Ballista, an advanced network auditing tool. SNI also provides security audits to both commercial and government clients. Secure Networks Inc. 40 703 6th Avenue S.W. Calgary, Alberta, t2p-0t9 Contact: Alfred Huger Phone: 403-262-9211 Fax: 403-262-9221 E-mail: ahuger@secnet.com URL: or SecureNet Engineering, Inc. Providing information technology and security consulting services to government, financial, and technological industries. SecureNet Engineering, Inc. P.O. Box 520 Folsom, CA, 95763-0520 Contact: Thomas H. McCreary Phone: 916-987-1800, 800-240-9863 E-mail: mccreary@pacbell.net Security First Technologies, Inc. Developers of secure networks for government and industry for over 10 years, B1 security, CMW, trusted operating systems, UNIX, Windows NT, secure network design and implementation, security auditing, penetration studies, authentication and encryption software products (VirtualVault, HannaH, Troy). Mr. Kalwerisky is the author of "Windows NT: Guidelines for Audit, Security, and Control," Microsoft Press, 1994. Security First Technologies, Inc. 3390 Peachtree Road, Suite 1600 Atlanta, Georgia, 30326 Contact: Jeff Kalwerisky, VP Consulting Services Phone: 404-812-6665 Fax: 404-812-6616 E-mail: jeffk@s-1.com URL: Sequent Computer Systems BV UNIX, firewalls, networking, Internet, intranet, auditing, tiger teams, security, cryptology, security policy. Sequent Computer Systems BV Rijnzathe 7 De Meern, Utrecht, 3454PV The Netherlands Contact: Hans Van de Looy Phone: +31 30 6666 070 Fax: +31 30 6666 054 E-mail: hvdl@sequent.com URL: SmallWorks, Inc. SmallWorks is a software-development and consulting group specializing in standards- based Internet security packages, including but not limited to firewalls, IPSEC implementations, and high-security Internet connectivity solutions. A partial list of our clients includes Tivoli Systems, Sterling Commerce, Cisco Systems (SmallWorks developed the TACACS+, CiscoSecure UNIX Server for Cisco Systems). SmallWorks, Inc. 4501 Spicewood Springs Road Suite #1001 Austin, TX 78759 Contact: Steve Bagwell, Director of Sales Phone: 512-338-0619 Fax: 512-338-0625 E-mail: steve@smallworks.com URL: Soundcode, Inc. Soundcode, Inc. provides the latest in data security and electronic (digital) signature software for the Internet, intranets, and personal computers. With Point 'n Crypt Professional for one-click file lock-up, sending, and storage, Point 'n Sign for the one- click signing of electronic documents, and scCryptoEngine, a powerful programming engine for both encryption and digital signatures, Soundcode makes computer privacy easy. Soundcode, Inc. 11613 124th Avenue NE, Suite G-317 Kirkland, WA 98034-8100 Contact: Pete Adlerberg Voice: 206-828-9155 Fax: 206-329-4351 Toll-Free: 888-45-SOUND E-mail: pete@soundcode.com URL: Strategic Data Command Inc. Firewalls, risk analysis, security management, and design. Strategic Data Command Inc. 2505 Parker St. Berkeley, CA 94704 USA Contact: Lawrence Suto Phone: 510-502-9224 Technical Reflections Security design and implementation on systems such as UNIX and Windows NT/95. Securing Web servers for electronic transactions. We also participate in tiger and attach teams to help secure sites via firewalls and other security policies. Technical Reflections 6625 Fox Road Marcy, NY 13403 Contact: Joe Riolo Phone: 315-865-5639 Fax: 315-336-6514 Technologic, Inc. Manufacturers of the Interceptor&tm; firewall, Internet security consulting, virtual private networking, security audits, and penetration testing. "Can your network keep a secret?"TM Technologic, Inc. 1000 Abernathy Road, Suite 1075 Atlanta, GA 30328 Contact: Eric Bleke Phone: 770-522-0222 Fax: 770-522-0201 E-mail: info@tlogic.com URL: Triumph Technologies, Inc. Triumph Technologies' Internet Security Division is focused on providing enterprise- wide security solutions. We utilize only the best security products and technologies. We offer services which include: turn-key firewall solutions (UNIX/NT), enterprise security assessments, IP addressing re/designing, and integration of specialized products such as SMTP mail content management. Triumph Technologies, Inc. 3 New England Executive Park Burlington, MA 01803 Contact: Mitchell Hryckowian Phone: 617-273-0073 Fax: 617-272-4855 E-mail: info@security.triumph.com URL: Tucker Network Technologies, Inc. Network and telecommunications consulting and integration firm specializing in LAN/WAN, network management, Internet policy, infrastructures, firewalls, security, and access. Tucker Network Technologies, Inc. P.O. Box 429 50 Washington Street South Norwalk, CT 06856-0429 Contact: Tucker McDonagh, Managing Director Phone: 203-857-0080 Fax: 203-857-0082 E-mail: tucker@tuckernet.com Visionary Corporate Computing Concepts UNIX, firewall solutions, research and penetration testing, risk assessments, intrusion detection, remote system monitoring, emergency problem handling, consulting, and outsourcing. Visionary Corporate Computing Concepts 712 Richland Street Suite F Columbia, SC, 29201 USA Contact: Matthew Caldwell Phone: 803-733-7333 Fax: 803-733-5888 E-mail: matt.caldwell@vc3.com URL: Wang I-Net Government Services Wang I-Net offers the XTS-300&tm; NSA-evaluated B3 Trusted Computer System, the Secure Automated Guard Environment (SAGE&tm;), and trusted application development services. Wang I-Net Secure Systems customers include the NSA, DoD, Army, Air Force, Navy, State Department, FBI, DOE, IRS, NATO, governments of UK, Canada, and Norway, and several contractors. Wang I-Net Government Services 7900 Westpark Drive MS 700 McLean, VA 22102-4299 Contact: K.M. Goertzel Phone: 703-827-3914 Fax: 703-827-3161 E-mail: goertzek@wangfed.com URL: NOTE: Wang Federal is one of the leading providers of TEMPEST protection technology. Wang Federal's TEMPEST products prevent eavesdropping of electronic emissions that leak from your monitor (or computer). Zot Consulting I have over 17 years of experience on the Internet. I do pure Internet consulting for firewalls, Web and information servers, database connectivity, and company security for small and Fortune 100 companies. Zot Consulting 808 SE Umatilla Street Portland, OR 97202 Contact: Zot O'Connor Phone: 503-231-3893 Fax: 503-236-5177 E-mail: zot@crl.com URL: C A Hidden Message About the Internet On the CD-ROM accompanying this book, you'll find a directory called message. Within it are two files: message.pgp and keys.asc. message.pgp is a small file, encrypted in 1024-bit PGP, that contains a hidden message. keys.asc is an ASCII file containing the PGP key generated for the hidden message. Your mission is to crack this hidden message by determining the passphrase used to encrypt it. This is not as difficult as it seems; it requires ingenuity rather than any particular cracking tool. Following is a single line of clear text; your job is to determine the significance of that text. Having done so, you can crack the encrypted text. The public key used was root@netherworld.net. The passphrase is composed of the significant strings you derive from the clear text. (These are not difficult to decode; their meanings are actually quite obvious if you apply yourself.) The clear text fields are separated by semicolons. That means the passphrase is a series of text strings. Examples of such text strings might be any of the following: • A line from a Shakespearean play • A time, place, or person • A name Each string will be in perfectly understandable English. Piece them together in order, and you will have the passphrase. This will serve as the private key necessary to decrypt the message. Here is a powerful hint, and the only one I will give: The field separator (semicolon) represents one space, one dash, and one space. Thus, fields separated by semicolons in the following clear text represent phrases separated by a space, a dash, and a space. So if the hidden message was apples oranges pears, it would be written this way: apples - oranges - pears The message contained within that file is very serious. It relates a critical point about the Internet--one that even many security experts might have missed. That point will undoubtedly be a matter of some debate. Good luck. Clear text: 4X755(4X230.4);abydos;072899;9:11;13:17 D What's on the CD-ROM On the Maximum Security CD-ROM, you will find some of the sample files that have been presented in this book along with a wealth of other applications and utilities. NOTE: Refer to the readme file on the CD-ROM for the latest listing of software. Also, in the readme file, you will find instructions on how to install one or more HTML presentations. In particular, there is an HTML presentation that will link you to most Web sites mentioned throughout this book. Windows Software The following network utilities for Windows are on the CD-ROM. This listing provides contact information for each company and a description of its product. DataGuard 1.3 Demo Release DataGuard allows secure and rapid enciphering of files and directories. Data encrypted in this way can be sent using standard e-mail programs via public networks (such as the Internet); secure data transmission is guaranteed. The use of efficient, optimized algorithms reduces high performance losses in the system due to the encryption and decryption process without endangering security. Requires Windows 95 or NT 4.0. Secure Link Services AG Ruchstuckstrasse 6, 8306 Brüttisellen, Switzerland Voice: +41 1 805 53 53 Fax: +41 1 805 53 10 E-mail: info@sls.net URL: File Lock Series File Lock 95 Lite uses the Standard or Enhanced encryption method to protect any information that is for your eyes only, such as a personal diary or finance information. File Lock 95 Standard includes two additional encryption methods: the RUBY and the Diamond. This is ideal for business-related information protection. File Lock Wizard for Windows 95 is the easiest of the File Lock series. It comes complete with three encryption algorithms with four compression algorithms. It is the best in data protection for the home PC user. These products require Windows 95 or NT and are fully functional trial versions with a limited number of days. D & L Computing P.O. Box 6141 Huntsville, AL, 35824 Voice: 205-772-3765 Fax: 205-772-8119 E-mail: DLComputing@Juno.com, DLCSales@Juno.Com URL: SAFEsuite SAFEsuiteTM is a family of network security assessment tools designed to audit, monitor, and correct all aspects of network security. Internet Scanner is the fastest, most comprehensive, proactive UNIX and Windows NT security scanner available. It configures easily, scans quickly, and produces comprehensive reports. Internet Scanner probes a network environment for selected security vulnerabilities, simulating the techniques of a determined intruder. Depending on the reporting options selected, Internet Scanner provides information about each vulnerability found: location, in-depth description, and suggested corrective actions. (Requires Windows NT.) Internet Security Systems, Inc. (ISS) 41 Perimeter Center East, Suite 660 Atlanta, GA, 30071 Voice: 770-395-0150 Fax: 770-395-1972 E-mail: info@iss.net URL: EtherBoy (Of the NetMan Suite) EtherBoy gives you affordable real-time multiprotocol network monitoring on your IBM- compatible PC. It provides insights and answers to a large number of network management and usage questions. Because EtherBoy is totally passive, no additional load is placed on your network resources. It is an ideal addition to your desktop-based management station, or as a laptop-based portable network probe. A unique tool that combines many security techniques into a single package, EtherBoy can: • View all traffic on your LAN. • Identify all devices on your LAN, including potential security threats. • Fully configure protocol focusing and visualization. • Define custom protocols. • Zoom in on areas of interest. • Produce reports in text, HTML, data, or rich text format. • Display real-time traffic statistics. • Monitor individual hosts and links. • Customize alarm triggers. • Obtain full protocol summaries for each link. EtherBoy will work on both the Microsoft Windows and Microsoft Windows 95 platforms. NDG Software P.O. Box 1424 Booragoon, WA, 6154, Australia Voice: +61 9 388 8814 Fax: +61 9 388 8813 E-mail: lou@ndg.com.au URL: WebBoy WebBoy is a complete Internet/intranet monitoring package. It provides statistics on standard Web traffic, including URLs accessed, cache hit ratios, Internet protocols, and user-defined protocols. To aid the security-conscious administrator, WebBoy provides a configurable alarm mechanism to enable monitoring and notification of unusual network activity. In particular, WebBoy is invaluable in summarizing top hosts, URLs, proxies, Web clients, servers, and alarms. WebBoy will work on both the Microsoft Windows and Microsoft Windows 95 platforms. NDG Software P.O. Box 1424 Booragoon, WA, 6154, Australia Voice: +61 9 388 8814 Fax: +61 9 388 8813 E-mail: lou@ndg.com.au URL: PacketBoy PacketBoy is a packet analyzer/decoder package capable of decoding many of the commonly used LAN protocols. Protocols that can be decoded include TCP/IP, IPX (Novell NetWare), AppleTalk, Banyan, and DECNET protocol suites. Multiple captures can be loaded and saved to disk. To aid the security-conscious administrator, PacketBoy provides a configurable capture trigger to automatically start packet capture when unusual or undesirable network activity occurs. It is an ideal addition to your desktop- based management station, or as a laptop-based portable network probe. Supports DOS and Windows 95. NDG Software P.O. Box 1424 Booragoon, WA, 6154, Australia Voice: +61 9 388 8814 Fax: +61 9 388 8813 E-mail: lou@ndg.com.au URL: Point 'n Crypt World 1.5 Point 'n Crypt World 1.5 is a Windows extension that allows users to quickly and easily encrypt any desktop file. It is the easiest disk/file encryption system on the market. Based on 40-bit DES-CBC mode encryption (exportable outside North America), Point 'n Crypt World puts a secure envelope around any document you want to keep private. Whether it resides on a desktop, within a file system, or needs to travel across public information highways (such as the Internet), your information will be protected. Offering easy-to-use privacy, Point 'n Crypt World is distributed to a varied group of users from novices to experts. Point 'n Crypt requires little or no tutoring. Installing and using Point 'n Crypt World is elegantly simple. The installation is brief, straightforward, and virtually foolproof. Extensive online help is included to get you over any rough spots or to learn about Point 'n Crypt World's cryptographic internals. Simply right-click any desktop file, select Encrypt, provide a passphrase, and it's done. Point 'n Crypt World is available for $29.95 from the Soundcode Web site at www.soundcode.com. For stronger encryption, check out Point 'n Crypt Professional (list price $59.95), which supports 448-bit Blowfish and 168-bit Triple DES. Soundcode, Inc. 11613 124th Avenue NE, Suite G-317 Kirkland, WA, 98034-8100 Voice: 206-828-9155 Fax: 206-329-4351 Toll-Free: 1-888-45-SOUND (76863) E-mail: pete@soundcode.com URL: GeoBoy GeoBoy is a geographical tracing tool capable of tracing and displaying routes taken by traffic traversing the Internet. GeoBoy allows you to locate Internet delays and traffic congestion. GeoBoy resolves geographical locations from a series of cache files that can be updated and customized by the user. Supports Windows 95. NDG Software P.O. Box 1424 Booragoon, WA, 6154, Australia Voice: +61 9 388 8814 Fax: +61 9 388 8813 E-mail: lou@ndg.com.au URL: NetScanTools 32 Bit v2.42 NetScanTools 32 Bit v2.42, designed by Northwest Performance Software, combines a number of UNIX network analysis utilities in a single package that runs under Microsoft Windows 95 and Microsoft Windows NT. Northwest Performance Software PO Box 148 Maple Valley, WA, 98038-0148 Voice: 253-630-7206 Fax: 253-639-9865, 425-413-0745 E-mail: sales@nwpsw.com URL: WinU 3.2 WinU is a tamper-proof replacement user interface for Windows 95 with access control, time-limit, and security features. It's easy to set up, easy to use, and virtually impossible to circumvent. This makes WinU excellent for parents who want to allow children to use only certain software on the family PC. Any program or desktop can be password- protected or time- limited. You can set up different WinU desktops, with different programs and customizations, for each member of the family. Businesses can use WinU to allow employees to run only authorized software, making other programs unavailable. WinU is also ideal for public-access computers. You can let patrons use your computers without worrying that they might change the computer's setup or delete important files. Bardon Data Systems 1164 Solano Avenue #415 Albany, CA, 94706 Voice: 510-526-8470 Fax: 510-526-1271 E-mail: bsmiler@bardon.com URL: PrivaSuite PrivaSuite encrypts any text, fax, or file in any language and any format. It can encrypt individual cells in a spreadsheet or encrypt the entire spreadsheet. PrivaSuite makes compartmentalization of information simple and fast. You can encrypt individual clauses in a contract, encrypt the whole contract, or do both--multilayer encryption is effortless with PrivaSuite. You can encrypt files saved on your hard drive or on the network for "eyes only" access and encrypt hard-copy documents so that only you and the intended recipient can read them. In short, if the information is on your computer, PrivaSuite can encrypt it with just 2-3 keystrokes, and with virtually no interruption to your workflow. The program works in Microsoft Windows 3.x and 95 and employs a 56-bit DES engine (wherever allowed) or 40-bit international engine. Aliroo Ltd. 30100 Town Center Drive, Suite 0344 Laguna Niguel, CA, 92677 Voice: 714-488-0253 Fax: 714-240-2861 E-mail: steve@aliroo.com URL: HideThat 2.0 HideThat is a fully customizable secure screen saver, utilizing your logos, pictures, and messages. Several security features are included, along with an extensive help file on PC security. HideThat works on the Microsoft Windows 95 platform. CobWeb Applications Cherry Tree Cottage Leatherhead Road Surrey, UK KT23 4SS Voice: +44 1372 459040 Fax: +44 1372 459040 E-mail: mikec@cobweb.co.uk URL: WebSENSE WebSENSE is an advanced Internet content screening system that allows organizations to monitor and eliminate network traffic to Internet sites deemed inappropriate or otherwise undesirable in their networked environment. WebSENSE is implemented as a Windows NT service running on a single Windows NT computer, eliminating the need for software to be loaded on individual user workstations. Additionally, WebSENSE supports a wide range of TCP protocols, including HTTP, Gopher, FTP, Telnet, IRC, NNTP, and RealAudio. The recommended minimum requirements are Intel 486, 16MB RAM, and Windows NT 3.51 (or greater). NetPartners Internet Solutions, Inc. 9210 Sky Park Court, 1st Floor San Diego, CA, 92123 Voice: 619-505-3044 Fax: 619-495-1950 E-mail: jtrue@netpart.com URL: Cetus StormWindows Cetus StormWindows&tm; for Windows 95 allows authorized users to add several types and degrees of protections to the desktop and system of a Windows 95 computer. Intelligent use of StormWindows security measures will allow secure use of any shared Windows 95 PC (a version for Windows NT 4 is under development). Examples of desktop protections include • Hiding all desktop icons • Hiding Start menu programs groups and links • Preventing the saving of desktop changes • Hiding all drives in My Computer • Hiding the Start menu settings folders (Control Panel and printers) and taskbar • Hiding Network Neighborhood Some of the system protections include • Disabling the MS-DOS prompt and the exiting to MS-DOS mode • Preventing warm booting (Ctrl+Alt+Del) • Blocking the running of Registration Editor and System Policy Editor • Preventing the merging of REG files into the Registry • Preventing the addition or deletion of printers • Keeping the Documents menu empty • Hiding sensitive Control Panel pages and settings StormWindows security schemes can be imported from and exported to other computers by disk. StormWindows changes do not require the use of policies. StormWindows protections would probably be most useful to someone in charge of a number of computers at a school or business, a network manager, or a parent. Access to StormWindows is password protected. Cetus Software Inc. P.O. Box 700 Carver, MA, 02330 E-mail: support@cetussoft.com URL: PGP for GroupWise PGP for GroupWise provides seamless integration between GroupWise versions 4.1 and 5.x and either the DOS or Windows versions of PGP. With the software, you can create public encryption keys, mail your keys to others, encrypt, digitally sign, decrypt, and verify digital signatures in order to maintain privacy in your Internet or intranet communications. Attached documents can by encrypted as well. Risch Consulting E-mail: mvrisch@midway.uchicago.edu URL: Windows Task-Lock Windows Task-Lock, version 4.1 (sgllock.zip) provides a simple, inexpensive, but effective way to password-protect specified applications for Windows 95 no matter how they are executed. It is easy to configure and requires little or no modifications to your current system configuration. Optional sound events, stealth mode, and password time- out are included. The administrator password is enabled for site licenses. Online help is provided. (Windows 95 required.) Posum L.L.C. P.O. Box 21015 Huntsville, AL, 35824 Fax: 205-895-8361 E-mail: 103672.2634@compuserve.com URL: Windows Enforcer Windows Enforcer, version 4.0 (enforcer.zip) protects systems that are accessible to many people and require a consistent configuration and a consistent limited selection of services such as public displays or computer labs. It is also great for child-proofing individual systems. This is accomplished by ensuring that user-specified tasks either never run, always run, or are allowed to run. It is easy to configure and requires little or no modifications to your current system configuration. Optional user-specified sounds for the startup and access-denied events are also available. Online help is provided. (Windows 3.x and Windows 95.) Posum L.L.C. P.O. Box 21015 Huntsville, AL, 35824 Fax: 205-895-8361 E-mail: 103672.2634@compuserve.com URL: UNIX Software The following utilities for UNIX are on the CD-ROM. This listing provides contact information for each company and a description of its product. Portus Secure Network Firewall Portus is an NCSA-certified high-performance application-proxy gateway. It supports all TCP/IP connections and has a UDP proxy add-on. It offers high levels of security without becoming network chokepoint. Products include Portus Secure Network Firewall for AIX, Portus Secure Network Firewall for Solaris, Portus Secure Network Firewall Installation and Administration Guide (Acrobat file), and Portus Secure Network Firewall General Information Manual--Firewall Tutorial (Acrobat file). These are 30-day fully functional demos. Freemont Avenue Software, Inc. 2825 Wilcrest, Suite 160 Houston, TX, 77042 Voice: 713-974-3274 Fax: 713-978-6246 E-mail: portus@lsli.com Datalynx, Inc. Voice: 619-560-8112 Fax: 619-560-8114 E-mail: sales@dlxguard.com URL: SATAN (Security Administrator's Tool for Analyzing Networks) SATAN recognizes several common networking-related security problems and reports them without actually exploiting them. For each type of problem found, SATAN offers a tutorial that explains the problem and what its impact could be. The tutorial also explains what can be done about the problem. SATAN collects information that is available to everyone with access to the network. With a properly configured firewall in place, that should be near-zero information for outsiders. SATAN will inevitably find problems. Here's the current problem list: • NFS file systems exported to arbitrary hosts • NFS file systems exported to unprivileged programs • NFS file systems exported via the portmapper • NIS password file access from arbitrary hosts • Old (before 8.6.10) sendmail versions • REXD access from arbitrary hosts • X server access control disabled • Arbitrary files accessible via TFTP • Remote shell access from arbitrary hosts • Writable anonymous FTP home directory System requirements: UNIX, at least 16MB of RAM, and 50mHz. Authors: Dan Farmer and Weitse Venema Location: Strobe Strobe is a network/security tool that locates and describes all listening TCP ports on a (remote) host or on many hosts in a manner that maximizes bandwidth utilization and minimizes process resources manner. Strobe approximates a parallel finite state machine internally. In nonlinear multihost mode, it attempts to apportion bandwidth and sockets among the hosts very efficiently. This can reap appreciable gains in speed for multiple distinct hosts/routes. On a machine with a reasonable number of sockets, strobe is fast enough to port scan entire Internet subdomains. It is even possible to survey an entire small country in a reasonable time from a fast machine on the network backbone, provided the machine in question uses dynamic socket allocation or has had its static socket allocation increased very appreciably (check your kernel options). Strobe is said to be faster than ISS2.1 (a high quality commercial security scanner by cklaus@iss.net and friends) or PingWare (also commercial). Author: Julian Assange Location: SAFEsuite SAFEsuite&tm; is a family of network security assessment tools designed to audit, monitor, and correct all aspects of network security. Internet Scanner is the fastest, most comprehensive, proactive UNIX and Windows NT security scanner available. It configures easily, scans quickly, and produces comprehensive reports. Internet Scanner probes a network environment for selected security vulnerabilities, simulating the techniques of a determined intruder. Depending on the reporting options selected, Internet Scanner provides information about each vulnerability found: location, in-depth description, and suggested corrective actions. Internet Security Systems, Inc. (ISS) 41 Perimeter Center East, Suite 660 Atlanta, GA, 30071 Voice: 770-395-0150 Fax: 770-395-1972 E-mail: info@iss.net URL: NetWare The following NetWare utilities are on the CD-ROM. This listing provides contact information for each company and a description of its product. SecureConsole SecureConsole for NetWare is a fileserver console security application that adds a new level of control and accountability to the NetWare server. It restricts access for individual users or NetWare security groups to specific server commands or applications. SecureConsole also records the commands performed by each logon. SecureConsole acts like a screen saver on the console forcing the user to identify himself with a valid NetWare login and password. If the user is authorized to access the server, SecureConsole unlocks the screen but continues to verify the user's actions against his list of authorized functions and application screens. This means that different users or groups can have different levels of access. Installation of SecureConsole is simple! The software can be installed through the NetWare v4 product installation program or by copying the program to the server manually. No special NetWare queues, setup files, or license files are required, and the product is not serialized. This allows for software distribution products or batch installation to multiple fileservers. Server Systems Limited 7A Villa Marina Arcade Harris Promenade Douglas, UK Voice: 1-800-581-3502 (USA) Fax: 1-800-581-3502 (USA) Voice: +61 6 292-9988 (Australia) Fax: +61 6 292-9977 (Australia) Voice: +44 117 940-2020 (UK) Fax: +44 117 907-7448 (UK) E-mail: sales@serversystems.com, 100033,3202 (CompuServe) URL: spooflog.c and spooflog.h Author: Greg Miller Macintosh Software The following Macintosh utility is on the CD-ROM. This listing provides contact information for the company. Mac TCP Watcher Stairways Software Pty. Ltd. PO Box 1123 Booragoon, WA, 6154, Australia E-mail: support@stairways.com.au URL: Information The following information is also located on the CD-ROM. Computer Facility Security--An Overview Bret Watson & Associates c/- 6 June Rd Gooseberry Hill, Western Australia, 6076, Australia Tel: +61 041 4411 149 Fax: +61 09 454 6042 E-mail: consulting@bwa.net URL: RadLast RadLast filters Radius 1 and 2 detail files. Kinchlea Computer Consulting 3730 Denman Rd Denman Island, BC, Canada, V0R 1T0 Tel: 250-335-0907 Fax: 250-335-0902 E-mail: kcc@kinch.ark.com URL: About the Software Please read all documentation associated with a third-party product (usually contained with files named readme.txt or license.txt) and follow all guidelines.

Các file đính kèm theo tài liệu này:

  • pdf1.pdf
Tài liệu liên quan