본문 바로가기

Working/IT Security

Guideline on Network Security Testing




NIST
(National Institute of Standards and Technology)의 Computer Security Resorce Center 기술자료인 Special Publications 800시리즈 문서입니다.

첨부된 자료는 아래와 같은 일반적인 네트워크 구성 환경을 가정하에 네트워크 보안성 테스트 가이드 및 관련 툴에 대한 소개 등을 다루고 있다.
사용자 삽입 이미지

실제 실무 기술상의 테크닉을 다루고 있지는 않으나 개괄적인 개념의 이해 및 관련 툴을 이용하여 어떤 취약점을 테스트하는지에 대한 이해를 돕는 자료라 할 수 있다.

아래는 본 문서의 목차이다.

1. Introduction.....................................................................................................................1-1
1.1 Purpose and Scope........................................................................................................1-1
1.2 Definitions.....................................................................................................................1-2
1.3 Audience.......................................................................................................................1-3
1.4 Document Organization.................................................................................................1-3
2. Security Testing and the System Development Life Cycle..........................................2-1
2.1 System Development Life Cycle....................................................................................2-1
2.1.1 Implementation Stage....................................................................................................2-2
2.1.2 Operational Stage..........................................................................................................2-3
2.2 Documenting Security Testing Results..........................................................................2-3
2.3 Roles and Responsibilities.............................................................................................2-4
2.3.1 Senior IT Management/Chief Information Officer (CIO).................................................2-4
2.3.2 Information Systems Security Program Managers (ISSM).............................................2-4
2.3.3 Information Systems Security Officers (ISSO)...............................................................2-5
2.3.4 System and Network Administrators..............................................................................2-5
2.3.5 Managers and Owners...................................................................................................2-5
3. Security Testing Techniques..........................................................................................3-1
3.1 Roles and Responsibilities for Testing...........................................................................3-1
3.2 Network Scanning..........................................................................................................3-2
3.3 Vulnerability Scanning....................................................................................................3-3
3.4 Password Cracking........................................................................................................3-6
3.5 Log Reviews...................................................................................................................3-7
3.6 File Integrity Checkers...................................................................................................3-8
3.7 Virus Detectors...............................................................................................................3-9
3.8 War Dialing...................................................................................................................3-10
3.9 Wireless LAN Testing (“War Driving”)..........................................................................3-10
3.10 Penetration Testing......................................................................................................3-11
3.11 Post-Testing Actions....................................................................................................3-16
3.12 General Information Security Principles.......................................................................3-17
3.13 Summary Comparisons of Network testing Techniques..............................................3-19
4. Deployment Strategies for Security Testing.................................................................4-1 v
SP 800-42 GUIDELINE ON NETWORK SECURITY TESTING
4.1 Determine the Security Category of the Information System.........................................4-1
4.2 Determine Cost of Performing Each Test Type per System..........................................4-2
4.3 Identify Benefits of Each Test Type per System............................................................4-2
4.4 Prioritize Systems for Testing........................................................................................4-2
Appendix A. Terminology...................................................................................................A-1
Appendix B. References.....................................................................................................B-1
Appendix C. Common Testing Tools.................................................................................C-1
C.1 File Integrity Checkers........................................................................................................C-1
C.2 Network Sniffers.................................................................................................................C-2
C.3 Password Crackers............................................................................................................C-3
C.4 Scanning and Enumeration Tools......................................................................................C-4
C.5 Vulnerability Assessment Tools.........................................................................................C-6
C.6 War Dialing Tools...............................................................................................................C-7
C.7 Wireless Networking Tools.................................................................................................C-8
C.8 Host Based Firewalls..........................................................................................................C-9
Appendix D. Example Usage Of Common Testing Tools................................................D-1
D.1 Nmap.................................................................................................................................D-1
D.2 L0pht Crack........................................................................................................................D-8
D.3 LANguard..........................................................................................................................D-9
D.4 Tripwire............................................................................................................................D-11
D.5 Snort................................................................................................................................D-16
D.6 Nessus............................................................................................................................D-21
Appendix E. Index...............................................................................................................E-1