Many times when installing an application or even an operating system,
services are installed and started without the knowledge of the installer. For
instance, some installations of UNIX start several services, such as sendmail,
FTP, rstat, rspray, and rmount, that are not normally required and may open
vulnerabilities on the system. Many installations of Windows NT include Internet
Information Server (IIS), even when it is not needed. Turnover in the system
administrator community is common, and the new system administrator may not
identify the services running on each system. Because of this, the new system
administrator may have no idea that vulnerable services are running on a system.
Penetration testing can often reveal services running on systems of which the
administrator was not aware. This information can be extrapolated to other
systems to secure similar installations.
Read the documentation to learn of any services that may be installed by the software package and test the system after the installation. New system administrators should determine what services are running on the servers for which they are responsible. In addition, system administrators should periodically scan servers with port scanners to verify no new services have been started. Finally, all unnecessary ports should be blocked at the firewall so that a remote attacker on the Internet cannot access a service that was mistakenly started.
Read the documentation to learn of any services that may be installed by the software package and test the system after the installation. New system administrators should determine what services are running on the servers for which they are responsible. In addition, system administrators should periodically scan servers with port scanners to verify no new services have been started. Finally, all unnecessary ports should be blocked at the firewall so that a remote attacker on the Internet cannot access a service that was mistakenly started.
Comments
Post a Comment