Solved

Security Monitoring

Posted on 2013-12-03
3
370 Views
Last Modified: 2013-12-04
I am tasked to come up with a security tool to perform server and workstation monitoring and penetration testing as well as periodic vulnerability scanning for our network. I need to come up with those product to recommend and be able to download and test them/eval before I do so. Please help.
0
Comment
Question by:SydNal2009
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 25

Accepted Solution

by:
madunix earned 400 total points
ID: 39694315
I personally use Kali and BT Linux for Exploits, also Nmap is a good tool to scan for open ports, additionally my own scripts(perl/python). BackTrack and Kali are Linux distro with a lot of security tools, check also
1.      Nessus (Linux if you can) http://www.nessus.org/nessus/
2.      Nikto (Linux) http://www.cirt.net/nikto2
3.      Paros proxy (Linux if you can) http://www.parosproxy.org/index.shtml
4.      Ike-scan (Linux) http://www.nta-monitor.com/tools/ike-scan/
5.      SARA (Security Auditor's Research Assistant) (Linux) http://www-arc.com/sara/
6.      MBSA (discutable) http://technet.microsoft.com/en-us/security/cc184923.aspx
7.      BT http://www.linux-magazine.com/w3/issue/77/BackTrack.pdf
8.      skipfish http://code.google.com/p/skipfish/
9.      Mcafee http://www.mcafee.com/us/downloads/free-tools/index.aspx
10.    Kali http://www.kali.org/
11.    Meta http://www.metasploit.com/

Have a look at the existing list in the Penetration Testing Execution Standard's Technical Guidelines:
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
0
 
LVL 2

Assisted Solution

by:Krokodili
Krokodili earned 25 total points
ID: 39694355
here is the master of the security tools:
http://www.kali.org/downloads/

use its wiki for help/tutorial.
0
 
LVL 25

Assisted Solution

by:Mohammed Khawaja
Mohammed Khawaja earned 75 total points
ID: 39694360
Look at solutions from Tenable (www.tenable.com)
0

Featured Post

Business Impact of IT Communications

What are the business impacts of how well businesses communicate during an IT incident? Targeting, speed, and transparency all matter. Find out more in this infographic.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Allow X-Forwarded-For Headers to Site or No? 3 101
Server 2008-R2 lost password 19 111
NFS Improper UID & NFS Exported Share Read Access 7 92
remote desktop user rights 5 92
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

736 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question