<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Auditing Tools in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478382#M760352</link>
    <description>Hi Greg,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you only have Unix boxes, ESM/Axent is a good tool.&lt;BR /&gt;If your network is also including some Novell/NT servers, Bindview offers more functionalities for those, while also offering HP-UX support with the last version.&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;&lt;BR /&gt;Dan&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 04 Jan 2001 07:36:59 GMT</pubDate>
    <dc:creator>Dan Hetzel</dc:creator>
    <dc:date>2001-01-04T07:36:59Z</dc:date>
    <item>
      <title>Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478380#M760350</link>
      <description>Any recommendations for tools to perform a security audit of HP-UX 10.x and 11.x systems?&lt;BR /&gt;&lt;BR /&gt;I'm interested in OS-level security issues, and I need to produce some reports.&lt;BR /&gt;&lt;BR /&gt;I'll certainly use 'crack' and probably the ISS scanner from the porting archives, but I'm interested in something that'll give me stuff like a list of setuid files, files that are world writable, etc.  Now my examples are pretty easy to script, but I'm looking for something that will give me a whole bunch of those types of things in one shot.&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Wed, 03 Jan 2001 17:07:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478380#M760350</guid>
      <dc:creator>Greg Vaidman</dc:creator>
      <dc:date>2001-01-03T17:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478381#M760351</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Try using tiger. It is a good auditing tool.&lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim &lt;BR /&gt;Brainbench MVP for Unix Admin&lt;BR /&gt;&lt;A href="http://www.brainbench.com" target="_blank"&gt;http://www.brainbench.com&lt;/A&gt;</description>
      <pubDate>Thu, 04 Jan 2001 06:04:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478381#M760351</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2001-01-04T06:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478382#M760352</link>
      <description>Hi Greg,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you only have Unix boxes, ESM/Axent is a good tool.&lt;BR /&gt;If your network is also including some Novell/NT servers, Bindview offers more functionalities for those, while also offering HP-UX support with the last version.&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;&lt;BR /&gt;Dan&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Jan 2001 07:36:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478382#M760352</guid>
      <dc:creator>Dan Hetzel</dc:creator>
      <dc:date>2001-01-04T07:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478383#M760353</link>
      <description>If you contact HP (Account Support Engineer), there is a proprietary tool called Medusa, which can be run to give a comprehensive security report, detailing a number of exposures, as well as offering solutions.</description>
      <pubDate>Thu, 04 Jan 2001 11:41:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478383#M760353</guid>
      <dc:creator>John Peckitt</dc:creator>
      <dc:date>2001-01-04T11:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478384#M760354</link>
      <description>Greg:&lt;BR /&gt;&lt;BR /&gt;The last issue of SANS Newsbites has an article:&lt;BR /&gt;&lt;BR /&gt;" --2 January 2001  Vulnerability Scanners Fail To Find Common&lt;BR /&gt;                   Vulnerabilities&lt;BR /&gt;Network Computing magazine laboratory tests show that all of the popular&lt;BR /&gt;security vulnerability testing software packages failed a test in which&lt;BR /&gt;they were analyzing systems with seventeen known "NASTY"&lt;BR /&gt;vulnerabilities.  A table is included showing the results by&lt;BR /&gt;vulnerability assessment product, operating system, vulnerability. The&lt;BR /&gt;bottom line: relying on a single vulnerability assessment tool is&lt;BR /&gt;dangerous.&lt;BR /&gt;&lt;A href="http://img.cmpnet.com/nc/1201/graphics/f1-detect-results.pdf" target="_blank"&gt;http://img.cmpnet.com/nc/1201/graphics/f1-detect-results.pdf&lt;/A&gt; "&lt;BR /&gt;&lt;BR /&gt;you might want to check it out.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Jan 2001 13:48:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478384#M760354</guid>
      <dc:creator>Kofi ARTHIABAH</dc:creator>
      <dc:date>2001-01-04T13:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478385#M760355</link>
      <description>Steven,&lt;BR /&gt;Tiger hasn't been updated since '94, at least in versions that I could find.&lt;BR /&gt;&lt;BR /&gt;Dan,&lt;BR /&gt;I knew about ESM from Axent, but it's going to blow the budget in this particular scenario (2 days of consulting).&lt;BR /&gt;&lt;BR /&gt;Kofi,&lt;BR /&gt;Interesting article.  I certainly know the danger of relying solely on 1 tool, but because of time constraints, a few tools, rather than a lot of manual effort, will have to do.&lt;BR /&gt;&lt;BR /&gt;John,&lt;BR /&gt;I'll have to follow up on Medusa.  I haven't found any web links, but I'll see if I can get some more info from HP.  &lt;BR /&gt;&lt;BR /&gt;All,&lt;BR /&gt;Thanks!</description>
      <pubDate>Thu, 04 Jan 2001 15:47:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478385#M760355</guid>
      <dc:creator>Greg Vaidman</dc:creator>
      <dc:date>2001-01-04T15:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478386#M760356</link>
      <description>There are various ways to get suid/guid information on files etc. There is a command in hp/ux "ncheck" I believe if you input the following command it will tell you what files have sticky bit set. EXAMPLE: ncheck -s. Also do a man page on the "find" command you can also find "suid" information on files using the correct find command string.</description>
      <pubDate>Thu, 04 Jan 2001 18:45:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478386#M760356</guid>
      <dc:creator>Account Not Used</dc:creator>
      <dc:date>2001-01-04T18:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478387#M760357</link>
      <description>Hi greg&lt;BR /&gt;the following will check the passwd file for root level users and the second attached file checks many system areas for security problems.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;Paula&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt; -----------------CUT HERE-------------------&lt;BR /&gt;#! /bin/sh                                                                      &lt;BR /&gt;##############################################################                  &lt;BR /&gt;# PJFC 11/1999                                                                  &lt;BR /&gt;#                                                                               &lt;BR /&gt;# Script to check the /etc/passwd file for users with                           &lt;BR /&gt;# root level access (0 in field 3)                                              &lt;BR /&gt;# two delivery options are given, a mail to and a cat to a file                 &lt;BR /&gt;#############################################################                   &lt;BR /&gt;cd /sysadmin                                                                    &lt;BR /&gt;rm /sysadmin/rootalert                                                          &lt;BR /&gt;for id in `awk 'FS=":" {if(($3 == 0 &amp;amp;&amp;amp; $1 != "root" )) \                        &lt;BR /&gt;print $1}' /etc/passwd`                                                         &lt;BR /&gt;do                                                                              &lt;BR /&gt;# mail -s "Root access alert" paula@avro.co.uk &amp;lt;&amp;lt; EOF                           &lt;BR /&gt;cat &amp;lt;&amp;lt; EOF &amp;gt;&amp;gt; rootalert                                                         &lt;BR /&gt;*******************************************************                         &lt;BR /&gt;*                                                                               &lt;BR /&gt;*   ALERT! Login ID `echo ${id}` has ROOT UID                                   &lt;BR /&gt;*   `date "+detected On Date  :%D Time   :%r"`                                  &lt;BR /&gt;*                                                                               &lt;BR /&gt;*******************************************************                         &lt;BR /&gt;EOF                                                                             &lt;BR /&gt;done                                                                            &lt;BR /&gt;-----------------CUT HERE-------------------</description>
      <pubDate>Thu, 04 Jan 2001 20:40:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478387#M760357</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2001-01-04T20:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478388#M760358</link>
      <description>As i understand you are probably looking for a Policy Compliance Manager. A tool which can give you an overview of the security settings in the systems and file permissions etc. &lt;BR /&gt;We use a tool called March Security Manager, from March Information systems limited. This product not only evaluates the security, it also has a feature of freeezing the checksums so that a quick periodic review can be dome only on the files which have changed since last review. It can review multiple systems from a single console etc.</description>
      <pubDate>Fri, 12 Jan 2001 03:41:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478388#M760358</guid>
      <dc:creator>Vinit Adya</dc:creator>
      <dc:date>2001-01-12T03:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478389#M760359</link>
      <description>Thanks all.  I was able to complete an audit of three systems in two days, using a combination of crack, iss, nmap, and a few of my own scripts.&lt;BR /&gt;&lt;BR /&gt;compiling some of these tools brought me back some memories, i'll tell you that!</description>
      <pubDate>Fri, 12 Jan 2001 17:45:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478389#M760359</guid>
      <dc:creator>Greg Vaidman</dc:creator>
      <dc:date>2001-01-12T17:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: Security Auditing Tools</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478390#M760360</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;use the ESM - Enterprise Security Manager by Axent Technologies. This tool is the best to management and auditing your servers in check the file permissons, password contents, auditing logs, etc. Check teh site &lt;A href="http://www.axent.com" target="_blank"&gt;http://www.axent.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Fernando.</description>
      <pubDate>Mon, 05 Mar 2001 13:30:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-auditing-tools/m-p/2478390#M760360</guid>
      <dc:creator>Fernando Madureira_1</dc:creator>
      <dc:date>2001-03-05T13:30:37Z</dc:date>
    </item>
  </channel>
</rss>

