01.20

Tugas Lab 8.4.3 Performing a Vulnerability Analysis

Sonya Leoni
06491/2008

CAUTION: This lab may violate legal and organizational security policies. The security analyzer downloaded in this lab should only be used for instructional purposes in a lab environment. Before using a security analyzer on a live network, check with your instructor and network administration staff regarding internal policies concerning the use of these tools.
Objectives
  • Download and install security analyzer software.
  • Test a host to determine potential security vulnerabilities.
Background / Preparation
Security analyzers are valuable tools used by network administrators and auditors to identify network and
host vulnerabilities. There are many vulnerability analysis tools, also known as security scanners, available to test host and network security. In this lab, you will download and install the Microsoft Baseline Security Analyzer (MBSA). MBSA is designed to identify potential security issues related specifically to Microsoft operating systems, updates, and applications. It also identifies unnecessary services that may be running, as well as any open ports. MBSA runs on Windows Server and Windows XP systems and scans for common security misconfigurations and missing security updates for the operating system as well as most versions of Internet Information Server (IIS), SQL Server, Internet Explorer (IE), and Office products. MBSA offers specific recommendations to correct potential problems. This lab can be done individually or in teams of two. The following resources are required:
  • Computer running Windows XP Professional to act as the test station.
  • High-speed Internet connection for downloading MBSA (unless pre-installed).
  • Computer must be attached to the integrated router switch or a standalone hub or switch.
  • Optionally, you can have a server running a combination of DHCP, HTTP, FTP, and Telnet (preconfigured).
Step 1: Download and install MBSA
  1. Open a browser and go to the MBSA web page at: http://www.microsoft.com/technet/security/tools/mbsa2/default.mspx Jawab :
  • Command-line and Graphical User Interface (GUI) options
  • Scan local computer, remote computer, or groups of computer
  • Scan against Microsoft’s maintained list of updates (on Microsoft.com) or local server running Software Update Services 1.0
  • Scan for common security configuration vulnerabilitie
  • Scan for missing security updates
  • View reports in MBSA Graphical User Interface or Command Line Interface
  • Compatibility with SMS 2.0 and 2003 Software Update Services Feature Pac
  • Support for single processor and multiprocessor configurations
  • Localized to English, French, German, and Japanese although MBSA 1.2.1 can scan a machine of any local
  1. What is the latest version of MBSA available Answers will vary. Currently 2.0.1
  2. What are some of the features MBSA provides?  Answers will vary – From website: “detect common security misconfigurations and missing security updates on your computer systems”
  3. Scroll down the page and select the desired language to begin the download process.
  4. Click Continue to validate the copy of Microsoft Windows you are running.
  5. Click Download Files below and select the file you want to download. (The English setup file is MBSASetup-EN.msi). Click the Download button on the right of this file. How many megabytes is the file to download?  Answers will vary, approximately. Jawab : 11,5 MB
  6. When the File Download – Security Warning dialog box displays, click Save and download the file to a specified folder or the desktop. You can also run it from the download website.
  7. Once the download is complete, make sure all other applications are closed. Double-click the downloaded file. Click Run to start the Setup program, and then click Run if you are prompted with a Security Warning. Click Next on the MBSA Setup screen.
  8. Select the radio button to accept the license agreement and click Next. Accept the defaults as the install progresses, and then click Finish. Click OK on the final MBSA Setup screen, and close the folder to return to the Windows desktop.
Step 2: Build the network and configure the hosts
  1. Connect the host computer(s) to the integrated router, a hub, or a switch as shown in the topology diagram. Host-A is the test station where MBSA will be installed. The server is optional.
  2. Set the IP configuration for the host(s) using Windows XP Network Connections and TCP/IP properties. If the host is connected to the integrated router, configure it as a DHCP client; otherwise go to Step 1d.
  3. If the host is connected to a hub or switch and a DHCP server is not available, configure it manually by assigning a static IP address.
Which IP address and subnet mask does Host-A and the server (optional) have? Answer will vary – 192.168.1.X and 255.255.255.0. Default gateway is not required but could be set to 192.168.1.1 (the default IP address of the integrated router, if present).
Jawab :   IP Address : 192.168.24.09
Subnet Mask : 255.255.255.0

Step 3: Run MBSA on a host
  1. Double-click the desktop icon for MBSA or run it from Start > All Programs. When the main screen displays, which options are available? Scan a computer, Scan more than one computer, and View existing security reports.
Jawab :
    • Pick a computer to scan
    • Pick multiple computer to scan
    • Pick a security report to view
    • Help
    • About
    • Microsoft Security Web Site
Step 4: Select a computer to scan
  1. On the left side of the screen, click Pick a computer to scan. The computer shown as the default is the one on which MBSA is installed.
  2. What are the two ways to specify a computer to be scanned?  By name and by IP address.
  3. Accept the default computer to be scanned. De-select Check for IIS and SQL administrative vulnerabilities, since these services are not likely to be installed on the computer being scanned. Click Start Scan.
Step 5: View security update scan results
  1. View the security report. What are the results of the security update scan? Answer will vary. See screen below for possibilities. Missing Security Updates are indicated by a red X in the Score column. Missing Update Rollups and Service Packs are indicated by a yellow X
  2. If there are any red or yellow Xs, click How to correct this. Which solution is recommended? Answer will vary – Most often to download updates and service packs from Microsoft Update website

Step 6: View Windows scan results in the security report
  1. Scroll down to view the second section of the report that shows Windows Scan Results. Were there any administrative vulnerabilities identified? Answers will vary. See screen below for some possibilities
  2. On the Additional System Information section of the screen (below), in the Issue column for Services, click What was scanned, and click Result details under the Result column to get a description of the check that was run. What did you find? When finished, close both popup windows to return to the security report. … ..Answers will vary. Telnet and some other services may be installed and running. Port numbers will be listed
Step 7: View Desktop Application Scan Results in the Security report
  1. Scroll down to view the last section of the report that shows Desktop Applications Scan Results. Were there any administrative vulnerabilities identified? Answers will vary. See screen below for some possibilities.
  2. How many Microsoft Office products are installed? Answers will vary
  3. Were there any security issues with Macro Security for any of them? Answers will vary
Step 8: Scan a server, if available
  1. If a server with various services is available, click Pick a computer to scan from the main MBSA screen and enter the IP address of the server, and then click Start Scan. Which security vulnerabilities were identified?                                                                                           Answers will vary depending on the server. This can be a live server if the host has physical and logical access to it and organizational policies permit scanning the live network
  2. Were there any potentially unnecessary services installed? Which port numbers were they on?                                                                  Answers will vary depending on the server. Could include Telnet, HTTP, FTP, and so on, with corresponding port numbers
Step 9: Uninstall MBSA using Control Panel Add/Remove Programs
  1. This step is optional, depending on whether the host will be automatically restored later by a network process.
  2. To uninstall MBSA, click Start > Control Panel > Add/Remove Programs. Locate the MBSA application and uninstall it. It should be listed as Microsoft Baseline Security Analyzer 2.0.1. Click Remove, and then click Yes to confirm removal of the MBSA application. When finished, close all windows to return to the desktop.

Step 10: Reflection
  1. The MBSA tool is designed to identify vulnerabilities for Windows-based computers. Search the Internet for other tools that might exist. List some of the tools discovered. Answers will vary.
Jawab :
  • Client versions of Windows, including Windows
  • Windows Server, including Windows Server 2008
  • SQL Server
  • Internet Information Server (IIS)
  • Internet Explorer
  • Microsoft Office
  1. Which tools might there be for non-Windows computers? Search the Internet for other tools that might exist and list some of them here. Answers will vary.
  2. Which other steps could you take to help secure a computer against Internet attacks? Answers will vary





0 komentar: