IT security and pentesting tools on FreeBSD
Frank Leonhardt
frank2 at fjl.co.uk
Sun Dec 29 15:37:01 UTC 2013
On 29/12/2013 13:36, Polytropon wrote:
> To expand my "daily work", I'd like to explore which tools
> exist on FreeBSD for pentesting and "overall IT security
> diagnostics". The following questions are primarily directed
> to those participants of the mailing list who do similar
> work and/or research and like to share their suggestions.
>
> Having primarily used Linux for this specific purpose, I'd
> like to try to find comparable (or maybe the same) tools
> on the base of FreeBSD which I prefer as a system for work.
> What tools in the ports collections can be used, which offer
> the same functionality? My goal is to migrate as much of
> the "pentesting toolset" to FreeBSD as possible.
>
> I'm already using FreeBSD tools like nmap, tcpdump, iftop or
> Wireshark, but I bet there are more that I should have
> a look at. I'm especially interested in tools to scan for
> WLAN traffic and to demonstrate weak encryption to customers
> (e. g. for those who insist that WEP is "ultimately secure"
> or that "a hidden SSID makes them unhackable"). Diagnostics
> should cover as many layers as possible, it doesn't even
> matter if this versatility is distributed across a set of
> different programs, that's okay.
>
> Those are fields where no special hardware compatibility
> is required. I'm aware that especially cellphone communications
> using a smartphone, connected to USB, may be more tricky on
> FreeBSD than on Linux where it doesn't seem to be a problem
> to make a "GSM scanner". SDR is probably a similarly compli-
> cated topic when FreeBSD is involved... but in regards of
> hardware I want to use, I've already learned the lessen to
> first check, _then_ buy. :-)
>
> A side question, if I may ask: I'm typically using a second
> LAN or WLAN adapter for on-site diagnostics for customers.
> To make it easier to check _their_ logs for my "actions",
> I'd like to give it an "obvious" MAC address, something like
> EE:EE:EE:EE:EE:EE (which is quite easy to spot in log files).
> Is this possible (and trivial) for LAN and WLAN interfaces
> on a FreeBSD host?
>
> For those hesitating to reply: I'm still one of the good guys.
> You may reply off-list in case the questions list is not the
> right place to expose that kind of knowledge. ;-)
>
>
You work for the NSA and I claim my $50!
I developed an MSc course in "ethical hacking" a few years ago, and I
used FreeBSD throughout (not Linux). The big ones you missed off the
list are SARA (Security Auditor's Research Assistant) and Metasploit.
SARA was an NMAP-type scanner that looked for vulnerabilities (including
the NVD Database). Unfortunately it's no longer being updated :-( And
you also have ot port it to FreeBSD yourself - so trivial I don't even
remember doing it.
I still use SARA, but should probably be looking at OpenVAS, which
forked from Nessus when the latter was still open-source. I haven't
actually compiled it for FreeBSD, but I don't see it being difficult. I
should add to this that I work with proprietary, paid-for, software most
of the time - I don't get to choose (and some of it is written by people
I know, and they need to make a living).
Metasploit is very good for demonstrating to clients that there really
is a problem. I don't think there's a FreeBSD port, but if your
technical knowledge is good enough for penetration testing then this is
hardly going to be a problem (i.e. just compile it and fix any errors
that come up). I've used it extensively on FreeBSD.
For snooping WLAN, Kismet is the old favourite but if you just want to
break WEP, Aircrack-ng works better (IMHO). I'm pretty sure there's a
port for it under net management. Note that WPA is NOT secure - it just
takes longer to crack than WEP (two hours vs. twenty seconds). This is
NOT something I'd be interested in discussing further on an open list -
all people need to know is that they need new keys every hour.
As to the MAC address, easy. Something like:
ifconfig bge1 link EE:EE:EE:EE:EE:EE
It'll either work, or it won't work.
Regards, Frank.
P.S. Buy my book - Handbook of Electronic Security and Forensics ;-)
P.P.S. Possibly don't, it's more academic than the name suggests.
More information about the freebsd-questions
mailing list