Solved

Security Monitoring

Posted on 2013-12-03
3
367 Views
Last Modified: 2013-12-04
I am tasked to come up with a security tool to perform server and workstation monitoring and penetration testing as well as periodic vulnerability scanning for our network. I need to come up with those product to recommend and be able to download and test them/eval before I do so. Please help.
0
Comment
Question by:SydNal2009
3 Comments
 
LVL 25

Accepted Solution

by:
madunix earned 400 total points
ID: 39694315
I personally use Kali and BT Linux for Exploits, also Nmap is a good tool to scan for open ports, additionally my own scripts(perl/python). BackTrack and Kali are Linux distro with a lot of security tools, check also
1.      Nessus (Linux if you can) http://www.nessus.org/nessus/
2.      Nikto (Linux) http://www.cirt.net/nikto2
3.      Paros proxy (Linux if you can) http://www.parosproxy.org/index.shtml
4.      Ike-scan (Linux) http://www.nta-monitor.com/tools/ike-scan/
5.      SARA (Security Auditor's Research Assistant) (Linux) http://www-arc.com/sara/
6.      MBSA (discutable) http://technet.microsoft.com/en-us/security/cc184923.aspx
7.      BT http://www.linux-magazine.com/w3/issue/77/BackTrack.pdf
8.      skipfish http://code.google.com/p/skipfish/
9.      Mcafee http://www.mcafee.com/us/downloads/free-tools/index.aspx
10.    Kali http://www.kali.org/
11.    Meta http://www.metasploit.com/

Have a look at the existing list in the Penetration Testing Execution Standard's Technical Guidelines:
http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
0
 
LVL 2

Assisted Solution

by:Krokodili
Krokodili earned 25 total points
ID: 39694355
here is the master of the security tools:
http://www.kali.org/downloads/

use its wiki for help/tutorial.
0
 
LVL 25

Assisted Solution

by:Mohammed Khawaja
Mohammed Khawaja earned 75 total points
ID: 39694360
Look at solutions from Tenable (www.tenable.com)
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Different types of mobile security tests 3 107
Has my website been infiltrated? 21 65
deny local logon 12 91
PCI scan - CIFS NULL Session Permitted 10 103
Read about achieving the basic levels of HRIS security in the workplace.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question