?
Solved

Security Monitoring

Posted on 2013-12-03
3
Medium Priority
?
377 Views
Last Modified: 2013-12-04
I am tasked to come up with a security tool to perform server and workstation monitoring and penetration testing as well as periodic vulnerability scanning for our network. I need to come up with those product to recommend and be able to download and test them/eval before I do so. Please help.
0
Comment
Question by:SydNal2009
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 25

Accepted Solution

by:
madunix earned 1600 total points
ID: 39694315
I personally use Kali and BT Linux for Exploits, also Nmap is a good tool to scan for open ports, additionally my own scripts(perl/python). BackTrack and Kali are Linux distro with a lot of security tools, check also
1.      Nessus (Linux if you can) http://www.nessus.org/nessus/
2.      Nikto (Linux) http://www.cirt.net/nikto2
3.      Paros proxy (Linux if you can) http://www.parosproxy.org/index.shtml
4.      Ike-scan (Linux) http://www.nta-monitor.com/tools/ike-scan/
5.      SARA (Security Auditor's Research Assistant) (Linux) http://www-arc.com/sara/
6.      MBSA (discutable) http://technet.microsoft.com/en-us/security/cc184923.aspx
7.      BT http://www.linux-magazine.com/w3/issue/77/BackTrack.pdf
8.      skipfish http://code.google.com/p/skipfish/
9.      Mcafee http://www.mcafee.com/us/downloads/free-tools/index.aspx
10.    Kali http://www.kali.org/
11.    Meta http://www.metasploit.com/

Have a look at the existing list in the Penetration Testing Execution Standard's Technical Guidelines:
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
0
 
LVL 2

Assisted Solution

by:Krokodili
Krokodili earned 100 total points
ID: 39694355
here is the master of the security tools:
http://www.kali.org/downloads/

use its wiki for help/tutorial.
0
 
LVL 25

Assisted Solution

by:Mohammed Khawaja
Mohammed Khawaja earned 300 total points
ID: 39694360
Look at solutions from Tenable (www.tenable.com)
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question