It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
| Note | Automated tools can be quite harmful to production environments. Exercise care, and design the test in a manner that will not affect production systems. |
These tools can be quite helpful and guide you toward parts of your configuration file that might need further review. A strong case could be made that new configuration files should be tested with good peer reviews and tools such as those listed below. Many general vulnerability scanners also test commonly exploited vulnerabilities for networking platforms.
-
Router Audit Tool (RAT): http://www.cisecurity.org
-
Firemon: http://www.securepassage.com
-
Wireshark (formally Ethereal): http://www.wireshark.org
-
Nmap: http://www.insecure.org
-
TeraTerm Pro: http://www.hp.vector.co.jp/authors/VA002416/teraterm.html
-
Top 100 Security Tools: http://www.sectools.org