Page 507 - StudyBook.pdf
P. 507

Infrastructure Security: System Hardening • Chapter 8  491




               Damage & Defense…  Routers and switches should always be secured to help layer security. As
                   Choose the Right Configuration?

                   an example of the real life choices that a security professional must make,
                   we will examine Cisco router passwords. These passwords can be saved in
                   one of two ways. First, there is the type 7 password, which can be quickly
                   cracked and is used if you set enable password. The second type of router
                   password is Message Digest 5 (MD5), which is used for the enable secret
                   password. This password is much more secure and can be used. MD5 is a
                   one-way hash and makes password cracking much more difficult. Read
                   more about this at www.cisco.com/warp/public/701/64.html.




                  EXERCISE 8.1

                  USING NETSTAT TO EXAMINE OPEN PORTS AND SERVICES

                      While patching and hardening can consume a large amount of time, it’s
                      also important that the results of the hardening process are verified.
                      One way to do this is to examine individual systems and analyze what is
                      running. The second method is to use a security scanner. This exercise
                      examines the first method. The tool we will examine is netstat, which is
                      a command line tool that displays a list of the active connections and
                      port numbers, and is available on Linux and Windows. Windows is used
                      for this exercise.
                         1. Open a command prompt by clicking on Start-Run. In the Dialog
                             Box type cmd.
                         2. With the command prompt open, type netstat –h. This listing will
                             give you all of the options that are possible with netstat.
                         3. Now type netstat –an. This should give a listing that looks similar
                             to what is shown below.

                 C:\>netstat -an


                 Active Connections


                   Proto  Local Address          Foreign Address         State
                   TCP    0.0.0.0:135            0.0.0.0:0               LISTENING



                                                                              www.syngress.com
   502   503   504   505   506   507   508   509   510   511   512