There's no shortage of free and open source security tools to help you stay on top of desktop security and fix Windows flaws.
You're no doubt being pressured from every possible angle (business partners, customers, industry bodies, the government, etc.) to keep your Windows systems secure, yet you continue to struggle to get the money needed to buy the best services for keeping enterprise systems in check. I see this scenario time and again.
What can you do about it? Well, you can drown your sorrows, or you can move ahead with some well-known freebie alternatives that can not only help you get by, but also move forward with Windows security testing. Here are some free open source security tools you should know about for finding and addressing Windows flaws:
Brutus -- A Web, FTP, Telnet, etc. password cracker that's old and often unstable, but it still works in many situations.
Cain & Abel -- A password cracker and network analyzer that's great for showing how weak passwords, Voice over Internet Protocol conversations and other content travel in clear text.
THC-Hydra -- Password cracker similar to Brutus that's great for cracking weak passwords running on Windows desktop services.
Port and vulnerability scanners
Microsoft Baseline Security Analyzer -- Good overall scanner for uncovering the very basic Windows flaws.
Nexpose Community -- Commercial-powered vulnerability scanner for up to 32 hosts without the commercial price tag.
SuperScan -- Graphical user interface-based port scanner that helps when looking for live hosts and open ports.
Web and SQL Server security tools
SQLPing -- SQL Server discovery tool with built-in password cracking.
Open source security tools for Wi-Fi
Aircrack-ng -- Oldie but goodie WEP and WPA-PSK cracking program.
Hashcat -- Graphics processing unit-based cracking tool for Wi-Fi Protected Access (WPA) and WPA Version 2.
Reaver -- Wi-Fi Protected Setup (WPS) attack tool for exploiting the new side-channel flaw in WPA.
Miscellaneous open source security tools
Metasploit -- Exploit framework that allows you to exploit vulnerabilities you uncover with vulnerability scanners to show tangible evidence of what can happen.
More on open source security tools:
Social Engineer Toolkit -- Tools for human hacking to bring out the worst in your users.
Sysinternals -- Toolset that allows you to get to the innards of Windows unlike any others.
The bottom line on open source security tools
Keep in mind that this is not a comprehensive list, but rather a grouping of free and open source security tools that can be used for testing Windows flaws. Most of these tools are being kept up to date by their authors and/or the community -- an often-overlooked, yet important, characteristic of security testing tools. Also, some are more enterprise-ready than others, so your mileage will no doubt vary.
Finding Windows flaws will still take time when using free and open source security tools, but that doesn't mean they're not worth using. If these tools don't offer quite enough, there are cheap commercial security testing tools for Windows environments from companies such as TamoSoft, Northwest Performance Software and Elcomsof Proactive Software.
Any amount of security testing and controls is much better than the alternative. Finding Windows flaws is critical, but so is your analysis of the results. Experience goes a long way here, regardless of how you uncover the flaws. This list of free and open source security tools is just a starting point for putting you ahead of the curve.
ABOUT THE AUTHOR:
Kevin Beaver is an information security consultant, expert witness, author and professional speaker at Atlanta-based Principle Logic LLC. With over 23 years of experience in the industry, he specializes in performing independent security assessments revolving around minimizing information risks. Beaver has authored/co-authored 10 books on information security, including The Practical Guide to HIPAA Privacy and Security Compliance and Hacking For Dummies. In addition, he's the creator of the Security On Wheels information security audio books and blog, providing security learning for IT professionals on the go. You can reach him through his website www.principlelogic.com, on LinkedIn or follow him on Twitter at @kevinbeaver.
This was first published in March 2012