Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Software

Free Open-Source vs. Commercial Security Tools? 234

sahirh asks: "I work as a penetration tester and recently started writing a whitepaper on the benefits of free, open-source security tools over commercial tools. Through my own experiences, I've found that many free tools such as Nessus and Kismet are more reliable and have better features than expensive commercial alternatives like ISS Internet Scanner or Airopeek. I've also noticed that tools like Ettercap have no commercial alternative. Further, the flexibility offered by the open-source nature of such tools is a great benefit. I'd like to ask for Slashdot's experiences and opinions on why you don't need to spend thousands of dollars on an expensive tool to perform a professional security assessment." Update: 02/07 11:15pm EDT by C : Thanks to all who wrote in to let us know the proper URL to the Kismet site.
This discussion has been archived. No new comments can be posted.

Free Open-Source vs. Commercial Security Tools?

Comments Filter:
  • by kiwidefunkt ( 855968 ) on Monday February 07, 2005 @03:05PM (#11599226) Homepage
    Ethereal [ethereal.com], nmap [insecure.org], and snort [snort.org] always get the job done for me.
  • Huh? (Score:1, Informative)

    by ajaf ( 672235 ) on Monday February 07, 2005 @03:07PM (#11599254) Homepage
    I don't use commercial applications. I don't use programs for my security tests. I do the tests myself everyday.
  • Go to SANS training. (Score:5, Informative)

    by Matey-O ( 518004 ) <michaeljohnmiller@mSPAMsSPAMnSPAM.com> on Monday February 07, 2005 @03:08PM (#11599269) Homepage Journal
    $3200 spent in a snort bootcamp made the need to buy a $120,000 IDS box moot.

    We were reviewing everal six-figure pieces of equipment and found the same thing - we knew they saw traffic they didn't like, but we didn't know WHY.

    Now that everybody uses snort rules, the training is still helpful to show you WHAT you're seeing and IF it's truly bad or just another false positive.

    FWIW, why get the snort stuff one vendor removed? Just go straight to the source.
  • Agreed. I usually throw in tripwire [tripwire.org] too from the start, it makes things easier later on.
  • OSSTMM (Score:2, Informative)

    by randori82 ( 797156 ) on Monday February 07, 2005 @03:10PM (#11599297)
    Even a great methodology is open source [osstmm]
  • VIsa / MC Compliance (Score:5, Informative)

    by jfroot ( 455025 ) <darmok@tanagra.ca> on Monday February 07, 2005 @03:11PM (#11599306) Homepage
    One reason that many companies need to use a commercial security tool is because of Visa and Mastercard CISP [visa.com] and SDP [mastercardintl.com]compliance.

    In order to comply you must have various levels of security testing done and certified by an approved vendor [visa.com].
  • besides the obvious (Score:5, Informative)

    by JeanBaptiste ( 537955 ) on Monday February 07, 2005 @03:13PM (#11599328)
    snort, ethereal, nmap, etc

    one commercial one that I _really_ like is Languard Network Scanner from GFI.

    While it is closed source, it has 30-day full functionality, and has limited functionality after that. Still even with the 'limited' functionality, it provides the full scanning capabilities, it just doesn't let you use some of the features that I never use anyways (scheduling, etc).

    I'd really recommend giving it a try, its pretty slick.
  • by Anonymous Coward on Monday February 07, 2005 @03:14PM (#11599344)
    b/c this is what the majority of hackers/crackers are out there using...
    use the tools they use...not that commercial products dont have any value to them. perhaps just use OSS first then supplement that with some commercial solutions.

    www.packetstormsecurity.com is a good place to start also.
  • by niekko ( 780219 ) on Monday February 07, 2005 @03:15PM (#11599354)
    Same here. And about the open vs. commercial, I've been using both Ethereal and Network General's Sniffer and in my opinion Ethereal is way much better starting from the simple GUI.
  • Re:Snort (Score:2, Informative)

    by SquadBoy ( 167263 ) on Monday February 07, 2005 @03:19PM (#11599392) Homepage Journal
    Sourcefire. Martin Roesch's company. It gives you, the admin, the goodness of Snort and OSS tools and gives your bosses a contract to feel all warm and fuzzy about. Pretty much a win-win. I love my Sourcefire boxen and they cost less than the other commercial IDSes.
  • by Homology ( 639438 ) on Monday February 07, 2005 @03:23PM (#11599438)
    Ethereal, nmap, and snort always get the job done for me.

    Heh, recommending a security tool that OpenBSD removed because the Ethereal team does not care about security [openbsd.org]

    Mark it as BROKEN:

    Right during 3.5, it had more than
    a dozen remote holes being fixed, that we shipped with. Weeks later
    things have not improved, and there continue to be problems reported
    to bugtraq, and respective band-aids - but it is clear the ethereal
    team does not care about security, as new protocols get added, and
    nothing gets done about the many more holes that exist.

    Just because something is open source does not imply that it's secure.

  • Re:Snort (Score:3, Informative)

    by checkitout ( 546879 ) on Monday February 07, 2005 @03:36PM (#11599585)
    It gives you, the admin, the goodness of Snort and OSS tools and gives your bosses a contract to feel all warm and fuzzy about.

    Actually we found that Sentarus is a much better snort-based product. We kicked Sourcefire out after 2 weeks, they just don't get the concept of a GUI. Talk about butt ugly and unmanagable.
  • Re:Snort (Score:4, Informative)

    by gclef ( 96311 ) on Monday February 07, 2005 @03:38PM (#11599611)
    Snort's not really a pen-test tool, though.

    For pen-testing, check out the Metasploit framework [metasploit.com]. It's truly cool.

    Also, have a look for scanrand, part of paketto keiretsu (doxpara.com appears to be having trouble right now, so don't go looking right now).

    There's always the old standbys, as well, like dsniff.
  • by latroM ( 652152 ) on Monday February 07, 2005 @03:39PM (#11599618) Homepage Journal
    I work as a penetration tester and recently started writing a whitepaper on the benefits of free, open-source security tools over commercial tools.

    What if some of the developers of those F/OSS packages are paid money to code free software? MySQL comes to mind when I think commercial free software, although it isn't related to the software you search. There has been always money to be made in free software business. Your question should be about free vs. non-free.

    Quoting RMS:``Free software'' does not mean ``non-commercial''. A free program must be available for commercial use, commercial development, and commercial distribution. Commercial development of free software is no longer unusual; such free commercial software is very important.
  • Heh, recommending a security tool that OpenBSD removed because the Ethereal team does not care about security

    I was just thinking about structural ways to work around this in ethereal (like priv sep) -- in the meantime, I would point out that the biggest difference between ethereal and it's commercial equivalents is is that, with ethereal, you find out about the security problems quickly -- whereas with commercial equivalents, you might not find out for a while (if ever), and you'll probably end up paying for the upgrade to make it secure.

    Another point is that it's most often the newer disectors that contain the holes. If you're worried about security and working in a 'hostile' environment, you're probably best to disable any disector that you're not intending to use. -- in fact, that might be a good idea to do in Ethereal, generally: Disable all but the most common dissectors and wait for the user to enable them explicitly.

  • Re:Accountability (Score:2, Informative)

    by Daedala ( 819156 ) on Monday February 07, 2005 @04:29PM (#11600131)
    "Because if something does go wrong, it is the vendors fault and not yours. With free software, it is your fault."

    Um, check the EULA. Unless you've written a change into your contract, it's unlikely that the vendor actually is responsible.

    Free software relieves you of the burden of believing the vendor's got your back. For the most part, they don't.
  • by JimmytheGeek ( 180805 ) <jamesaffeld@ya h o o .com> on Monday February 07, 2005 @05:04PM (#11600478) Journal
    Amen! Go if you can.

    I dig Snort, been using it a while. The SANS training made it USEFUL. The course filled in gaps in my knowledge at a rapid rate, and I usually HATE computer training courses precisely because the bandwidth is too low.

    Richard Beijtlich wrote "Tao of Network Security Monitoring" which is a really, really good next step.(http://www.bookpool.com/.x/kzaxqc7ob1/sm/032 1246772)
    It covers the use of a variety of different types of intrusion indicators to quickly get to the meat of the matter. He's critical of the SANS course as too bit-addled. I can see what he means - you do spend 2 days (of 6) on tcpdump, vs. just one on Snort per se, but that gives you a great background to use tons of other tools. Once you have that, the other tools are easy.

    SANS also has security auditing, incident handling, firewall + VPN, and some PHB type classes.

    I'm a fanboy.
  • by arnie_apesacrappin ( 200185 ) on Monday February 07, 2005 @05:39PM (#11600871)
    He's critical of the SANS course as too bit-addled. I can see what he means - you do spend 2 days (of 6) on tcpdump, vs. just one on Snort per se, but that gives you a great background to use tons of other tools. Once you have that, the other tools are easy.

    I took the IDIC course a while back (i.e. my analyst number is less than 100) and noticed the same thing. The layout was a bit different then, but I caught myself thinking "why are we spending a day and a half reviewing TCP/IP?" After listening to the questions that some people asked, I realized that no matter how much you warn them, people just aren't prepared for the class. Having realized this themselves, the instructors adjusted the curriculum so they can drag as many people through to some level of competency.

    I did enjoy my SANS training and I wish I could find another employer that would pay for it. But if you are the kind of student that already knows the first three days of material, you may want to stay away from the track-based courses and do a mix-and-match if possible. Finally, taking a SANS course should be the beginning of your studies in an area, not the end. I see the training as a good broad base in a particular area. You must become an expert on your own.

  • by andrew71 ( 134546 ) on Monday February 07, 2005 @08:29PM (#11602582) Homepage

    I just received e-mail from Fyodor and had this bad bad news [nessus.org].

    Nobody mentioned that here.

    (and probably nobody will read that since I'm stuck at 0 :)
  • by neoThoth ( 125081 ) on Monday February 07, 2005 @09:37PM (#11602852) Homepage
    While the tool itself *is* still free Lightning has made a change in their pricing model regarding the plugins. [nessus.org]
    Check it out for yourselves, there are three feeds now. The main feed which used to be free is now on a seven day delay. While this doesn't affect a lot of the scanning efforts it is nice to know about the vulnerability that just came out.
    Often when a new serious vulnerabilty makes news a company would like to know how they are affected right away. Now they will have to wait 7 days!
    I don't think that there is anything wrong with this, I mean the developers at nessus (tenable lightning) have to eat too. But calling it free just seems sort of inaccurate now. Scanners without updated signatures work about as well as razors without the blades.
    A 'Direct Feed' is commercially available which entitles subscribers to the latest vulnerability checks. Customers who purchase a Lightning Console or NeWT Pro scanner receive access to this feed with their annual product maintenance.
    A 'Registered Feed' is available for free to the general public, but new plugins are added seven days after they are added to the 'Direct Feed'. To obtain access to the 'Registered Feed', users are required to enter contact information for tracking and also agree to Tenable's license agreement for the plugins.
    The 'GPL Feed' does not require registration, and includes plugins written by the user community. As manager of the Nessus project, Tenable continues to accept plugins written from the Nessus and NeWT user communities. Plugins accepted with a copyright under the GNU Public License will be distributed to the Direct, Registered and Public feeds at the same time.
    Pricing
    The access to the GPL feed and to the Registered Feed is free. Pricing for the 'Direct Feed' is based upon the number of Nessus or complimentary copies of NeWT in use within your organization, consultancy or service. The cost is $1200 per scanner per year. For more information, please contact Tenable's sales staff.
  • by Anonymous Coward on Monday February 07, 2005 @11:16PM (#11603448)
    Here's a good security tools resource:

    http://www.liveammo.com/LiveAmmo_Security_Tools_Di rectory.htm [liveammo.com]

    Mostly open-source tools for pentesting, although they list some commercial tools as well.
  • by PerryResearch ( 693926 ) on Monday February 07, 2005 @11:25PM (#11603489) Homepage
    Mostly open source security tools for pentesting, although there are some commercial products listed as well.

    http://www.liveammo.com/LiveAmmo_Security_Tools_Di rectory.htm [liveammo.com]

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...