Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 Guide de l'utilisateur

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Logiciel Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0. Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 User guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer

Résumé du contenu

Page 1 - User Guide

Passive Vulnerability Scanner 4.0 User Guide September 18, 2014 (Revision 12)

Page 2 - Table of Contents

10 Once completed, an “Update Complete” dialog will be displayed indicating that PVS has been updated to version 4.0. Select the “Finish” button to

Page 3

11 Upgrading PVS on Mac OS X Before upgrading, the PVS services must be stopped. Failure to do so may result in errors. See the “Starting and Stop

Page 4

12 The next screen displays the End User License Agreement (EULA). The text of the agreement can be copied and pasted into a separate document file

Page 6 - Pre-Installation

14 Click “Install” to begin the upgrade: Next, the installation process will ask for authentication for permission to install the software. The in

Page 7 - Upgrading

15 The installation will then be completed. Immediately after the successful upgrade of PVS, the Installer will automatically launch the Safari br

Page 9

17 Initial Installation This section describes the steps required for an initial installation of PVS on Linux, Mac OS X, and Windows platforms. Linu

Page 10

18 Unless otherwise noted, perform all commands as a local administrator user. When UAC is enabled, right click on the installer program and select

Page 11 - Upgrading PVS on Mac OS X

19 The InstallShield Wizard will walk you through the installation process and any required configuration. At any point prior to completion, configu

Page 12

2 Table of Contents Introduction ...

Page 14

21 The installation process will then verify the path where the PVS binaries will be installed. Clicking on “Change…” will allow you to specify a cu

Page 15

22 The final screen of the PVS installation configuration options provides the opportunity to go back to make any edits to information supplied on

Page 16

23 Once PVS has been installed, it will determine if WinPcap is already installed on the system. If the current version of WinPcap is installed and

Page 18

25 You must agree to the WinPcap end-user license agreement in order to complete the installation: WinPcap can be configured to start during boot t

Page 19

26 Once the license has been agreed to and the configuration option specified, click “Install” to complete the process. After WinPcap is installed,

Page 20

27 Double click on the Install PVS.pkg file to launch the Installer: This will launch the Tenable PVS Installer, which will walk you through the in

Page 22

29 Click “Install” to begin the installation: Next, the installation process will ask for authentication for permission to install the software. T

Page 23

3 Define Unknown or Customized Ports ... 53 PVS Re

Page 24

30 The installation will then be completed. Immediately after the successful installation of PVS, the Installer will automatically launch the Safa

Page 26 - Mac OS X Installation

32 Starting and Stopping PVS for Mac OS X The preferred method to start and stop the PVS service on Mac OS X is to use the “PVS Preferences” tab und

Page 27

33 This will open the InstallShield Wizard. Follow the directions in this wizard to completely remove PVS. If you select “Yes”, the PVS program and

Page 28

34 After the initial login, a quick setup process begins. The first step is to change the default admin password. At a minimum, the new password mus

Page 29

35 selected. The “Monitored Network IP Addresses and Ranges” option determines the IP address ranges that PVS will monitor. The “Excluded Network IP

Page 30

36 PVS version, Web Server Version, HTML client version, links to support and documentation, and license and feed status can be viewed by selecting

Page 31

37 The notification icon will change from blue to red making the user aware that there are unread alerts in the notification area. Each individual n

Page 32 - Removing PVS

38 The “Sort Hosts” drop-down provides an option to sort the host either by hostname or by the count of severity items found on the hosts. These sor

Page 33 - Removing PVS for Mac OS X

39 Name Description Bugtraq ID Filter the results of discovered vulnerabilities based on their Bugtraq identification. CPE Filter the results of dis

Page 34

4 The Passive Vulnerability Scanner is Real-Time ... 74 Appendix 2

Page 35 - Using the PVS Interface

40 See Also Filter the results of the discovered vulnerabilities based on the text available in the “See Also” field of the plugin. Solution Filter

Page 36

41 The Applications tab provides a list of discovered applications and their affected vulnerabilities. The summary page displays a list sorted by t

Page 37 - Monitoring

42 Users The Users screen provides a list of the available users on the PVS server. This screen is only available to Administrator level users. User

Page 38

43 The Activation Code and manual plugin update buttons are only used when using PVS in a stand-alone mode (not attached to a SecurityCenter). The A

Page 39

44 Monitored Network IP Addresses and Ranges Specifies the network(s) to be monitored. The default setting is to monitor all IPv4 addresses with the

Page 40

45 PVS Web Server Idle Session Timeout This setting is the number of minutes after which a web session becomes idle. The default setting for this ti

Page 41 - Results

46 New Asset Discovery Interval PVS listens to network traffic and attempts to discover when a new host has been added. To do this, the PVS constant

Page 42 - Configuration

47 Command Line Operation The PVS engine provides many options to update and configure PVS from the command line in both Windows and Linux versions.

Page 43

48 /opt/pvs/etc (deprecated) Configuration files for PVS and the PVS Proxy /opt/pvs/bin Location of the PVS and PVS Proxy executables, plus several

Page 44

49 Command Line Operations for Windows This section describes some operations that are performed on the PVS server from a command line in Windows. C

Page 45

5 Introduction This document describes the Passive Vulnerability Scanner 4.0 (Patent 7,761,918 B2) architecture, installation, operation, integratio

Page 46

50 pvs-proxy Parent folder for files used/created by the PVS proxy logs Contains PVS proxy and PVS proxy service logs scans By default, PVS create

Page 47 - Command Line Operation

51 directories db This directory contains the database files relating to the configuration, reports, and users for PVS. kb This directory stores t

Page 48

52 C:\Program Files\Tenable\PVS>pvs.exe The PVS binary for Mac OS X is located at: # /Library/PVS/bin The PVS binary for Linux is located at: # /

Page 49 - File Locations

53 --config --add "custom_paramater name" "parameter value" Add a custom configuration parameter for PVS or PVS Proxy. The doubl

Page 50 - Starting and Stopping PVS

54 In the above picture, three sessions labeled A, B, and C are shown communicating to, from, and inside a focus network. In session A, the PVS only

Page 51 - Common Command Line Options

55  SSH 2001:DB8::AE59:3FC2 -> SSH Using the “connections-to-services” option lets you know that the system at 1.1.1.1 and 2001:DB8::AE59:3FC2 u

Page 52

56 Windows C:\ProgramData\Tenable\PVS\pvs\ Mac OS X /Library/PVS/var/pvs If the PVS is being managed by the SecurityCenter, it will automatically

Page 53 - Focus Network

57 Initially, the PVS has no knowledge of your network’s active hosts. The first packets that the PVS sniffs would send an alert. To avoid this, the

Page 54

58 00008 Outbound Encrypted Session The PVS has detected one or more encrypted network sessions originating from within your focus network and desti

Page 55

59 have an even number of alphanumeric characters. clientissue If a vulnerability is determined in a network client such as a web browser or an emai

Page 56 - New Host Alerting

6 Pre-Installation To ensure a streamlined installation process, it is important to ensure that the appropriate hardware, software, and licensing re

Page 57

60 see a simple pattern, the entire plugin will not match. name This is the name of the vulnerability the PVS has detected. Multiple PVS plugins can

Page 58 - Plugin Keywords

61 timed-dependency With this keyword, the functionality of the “noplugin” and “dependency” keywords is slightly modified such that the evaluation m

Page 59

62 nid=10382 cve=CVE-2000-0318 bid=1144 hs_sport=143 name=Atrium Mercur Mailserver description=The remote imap server is Mercur Mailserver 3.20. The

Page 60

63 Passive Vulnerability Scanner Network Client Detection id=1010 hs_dport=25 clientissue name=Buffer overflow in multiple IMAP clients description

Page 61 - Plugin Libraries

64 Contents of password file: root:.*:0:0:.*:.* 2) client <------------------------- server:port 80 Our match pat

Page 62 - Case Insensitive Example

65 In each of these cases, the plugin would not match if the patterns contained in these “not” statements were present. For example, in the first pm

Page 63

66 Writing Passive Vulnerability Scanner Real-Time Plugins Real-Time Plugin Model PVS real-time plugins are exactly the same as PVS vulnerability pl

Page 64 - Negative Matches

67 # Look for failed logins into an FreeBSD telnet server id=0400 hs_sport=23 dependency=1903 realtimeonly name=Failed login attempt description=PVS

Page 65 - Time Dependent Plugins

68 risk=HIGH match=!<HTML> match=!<html> match=^root:x:0:0:root:/root:/bin/bash match=^bin:x:1:1:bin: match=^daemon:x:2:2:daemon: The p

Page 66 - New Keywords

69 In this case, a user has attempted to use the “cd” command to change directories within a file system and the attempt was not allowed. This is a

Page 67

7 Obtain a License Key for SecurityCenter When using a PVS with SecurityCenter, a license key may be purchased as an upgrade to an existing Security

Page 68

70  tunneling software or applications like Tor, GoToMyPC and LogMeIn Detecting Custom Activity Prohibited by Policy The plugins provided with PVS

Page 69

71 Finally, we have a match and regex statement that detects the user’s login credentials: match=email= regex=email=.*%40[^&]+ Putting it all to

Page 70

72 dependency=2004 dependency=2005 hs_dport=25 description=POLICY - Confidential data passed outside the corporate network. The Confidential file d

Page 71

73 The PVS has the ability to identify the likely operating system of a host by looking at the packets it generates. Specific combinations of TCP pa

Page 72

74 Appendix 1: Working with SecurityCenter Architecture One mode PVS operates under is under the control of a SecurityCenter that provides it with p

Page 73 - For Further Information

75 Appendix 2: Syslog Message Formats PVS provides options to send real-time and vulnerability data as syslog messages. There are four formats of sy

Page 74 - Managing Vulnerabilities

76 plugin_id The reported PVS plugin id triggered by the reported traffic. Some examples: 0 for open port alert 2 for service connection alert 3 f

Page 75

77 Appendix 3: PVS Activation without Internet Access If your PVS installation cannot reach the Internet directly, use the following procedure to re

Page 76

78 Platform Command Red Hat Linux / CentOS # /opt/pvs/sbin/pvs --update-plugins /path/to/sc-passive.tar.gz Mac OS X # /Library/PVS/bin/pvs --update-

Page 77

79 About Tenable Network Security Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce ris

Page 78

8 # service pvs start After starting PVS, navigate to https://<ipaddress or hostname>:8835, which will display the PVS web frontend to log in

Page 79

9 This will start the upgrade process by launching the InstallShield Wizard: Clicking the “Next” button will begin the automated upgrade process. I

Commentaires sur ces manuels

Pas de commentaire