Software Audit Tools For Mac

  1. Software Audit Tools For Macbook Pro
  2. Software Audit Tools For Mac Download

SOFTWARE DEVELOPED BY DESCRIPTION; Auditr: Twocanoes: Audit Preference Pane and Log Reader for OS X. Disk Arbitrator: Aaron Burghardt: Blocks the mounting of file systems, complimenting a write blocker in disabling disk arbitration. Epoch Converter: Blackbag Technologies: Converts epoch times to local time and UTC. FTK Imager CLI for Mac OS. FreeAgent accounting software is based in the U.K. And originally designed for British businesses, but they also have versions customized for U.S. And global businesses, and the software has full multicurrency support. Like any good cloud-based software, FreeAgent works like a breeze on the Mac platform, and its iOS app is a fan favorite.

Security Auditing Tools for the Macintosh

In today’s media you only hear about hackers rummaging through data stealing important information. You hear about how your security becomes more and more insecure. All these hackers are hitting websites, stealing passwords and credit card numbers. Yes, it’s true a lot of this doesn’t pertain to the MacOS. It’s the Windows and UNIX servers being hacked. Yet it does happen. Administrators don’t take the right precautions to ensure their customers are secure. The customer is thought to be dumb. It is believed that not all people know enough to have a secure password, (i.e., one with more than 4 characters and containing numbers).

There really aren’t any ‘security’ tools for the Macintosh to ensure secure passwords. Just lots of text files and reports by hackers on how it’s insecure. We will review two programs created by hackers, which can be used for security purposes, and can be used by a hacker. The reason we are reviewing these hackers programs is to bring to light that you need to know the tools that hackers are using to ensure your own security. Get the programs before the wrong people do and use them on your unsuspecting computers. We will review these programs from a system administrators’ point of view.

MagicKey (known as ‘MK’) is an application made by the programmer, ‘System Cowboy.’ MK is a password-auditing tool for AppleTalk. The application audits the AppleTalk users file for weak passwords, the method it uses to discover these weaknesses is called �Brute Force

The program will attempt a combination of words and letters to try to match the encrypted data. If your mac is on a network sharing information, it is utilizing the AppleTalk protocol. If you use the mac to access the internet, malicious users could access it remotely using this program. Even on your own network you have to be ensured security. Start by ensuring secured passwords. If this application does pick up one of your users passwords, turn off their account until you talk to them and instruct a change of password.

MacPork, another popular program, quickly checks servers for known vulnerabilities and reports them.

If the vulnerability results in a password file found, it will display it to prove the insecurity. There are many programs like this written for the UNIX platform to check servers. MacPork is the first complete application to do so for the MacOS. You can audit your whole network from this application, even your PC and UNIX machines. Once you identify a hole in your network, the next step is to fix it. To began with get the most recent version. If it’s already the most recent version, disable the function and contact the creator of the service to find out more information.

Software

There are hundreds of other mac programs on the net that are used by hackers, but the administrators have not even taken a look at them. We are not warranting that hacker tools are all good, there are still the malicious ones out there. Be careful when experimenting and always run Anti-Virus software. The two programs listed above are guaranteed clean of viruses, so take a look and experiment with them when you have a chance. Feel free to bookmark this page along with all the other SecureMac.com pages because these resources will never become outdated.

New Mac OS X version of MacAnalysis 2.2.4

MacAnalysis is a security auditing suite for your Macintosh to perform and help implement a security standard for your computer/network by performing a full security check of network protocols, open services, port scans, vulnerable CGI scripts and much more. There has never been such a complete package to help maintain a secure network by running security audits for the MacOS! This will scan your Macintosh, Unix, Windows, and Hardware for any vulnerable security holes!

What is security auditing? Quick and simple, security auditing is the act of testing the security to see how it stands up to potential intruders. SecureMac.com has always preached that to understand how to secure your computers better you must understand a little about hacking. Try to hack your own computers before the hackers do. With MacAnalysis you can test your computers to see how well they are secured or how easily they are hackable (:

By running MacAnalysis it will determine potential holes in the computer and with the results you may upgrade and fix the problem with the suggested solutions, if you are unsure of the procedure to do so you may contact your system administrator or other network/computer experts.

You will see below is the results of one of our scans to a remote host (note this host is not SecureMac.com so you do not need to run the tests against our servers!! )

Services/Protocols Holes

S_TELNET:23 is active (Risk: Low)
Resume: Uses insecure plaintext password authentication.
Vulnerable to brute-force password guessing
Fix: Use a tcp wrapper and compile a hosts.allow and hosts.deny file.

Mac

S_BIND:53 is active (Risk: Very High)
Resume: Your server respond to an IQUERY and NXT request, this vulnerability can lead to a root compromise
Fix: Restrict access to 53/tcp to local clients and nameservers.Restrict incoming traffic to nameservers to your local network.

S_LCONF:98 is active (Risk: High)
Resume: Several vulnerabilities exist in the linuxconf server
Fix: Disable the service or use a tcp wrapper and compile a hosts.allow and hosts.deny file.

S_WEB:80 is active (Risk: Very High)
Version: Apache 1.3.12

Info: Root Directory Disclosure Access Vulnerability
Resume: By performing a range of //// character, an attacker can lists directory contents.

S_IMAP:143 is active (RISK: Very High)
Resume: Vulnerable to a buffer overflows that can lead to a root compromise.
Uses insecure plaintext password authentication.
Fix: Upgrade to the lastest version, or disable the service.

S_RLOGIN:513 is active (Risk: High)
Resume: Vulnerable to .rhost, sniffing and brute force attacks.
Fix: Disable the service.
In some situations you will notice that even though MacAnalysis reports that you have a particular hole open it may not be vulnerable. MacAnalysis includes the feature to investigate particular vulnerabilities. By clicking on the “Tools” menu and going down to “Security Browser” you will be able to investigate and check further if your computer will actually give out any information that a hacker could use. The screenshot below pictures the Security Browser window running a security scan on SecureMac.com, the results show that the hole is NOT active and I do not have anything to worry about.

It is ideal to use the Security Browser window when checking for a particular program/port/service that might fall vulnerable. If SecureMac.com were to run nsf then the results could be very risky!

We have many servers we keep tabs on to make sure they are not susceptible to hacks or attacks. MacAnalysis has the feature to scan multiple servers and remember the addresses for future use.

Many many security auditing features we can’t even cover in the review including brute forcing services to find vulnerable or easy crackable passwords!

MacAnalysis also includes a plethora of network information tools built in.

  • NSLookup
  • TraceIP
  • Whois
  • Ping
  • NameScan
  • Finger
  • PortScan
  • Reverse IP
  • Service Scan
  • Broadcast scan
  • System Information

The image shown is a broadcast scan in progress. We will scan a network to see if it has any open broadcast addresses. Broadcast addresses can be used by hackers to cause denial of service or DoS attacks against your network. Now you can research your own network/computers to make sure that your computer can’t be used in a DoS attack against other networks.

Network seem a little lagged? Someone might be packeting your network with ICMP packets which can cause your computer to lag offline or even crash! Keeping this utility open will help you solve the question if you are being attacked. Don’t sweat if it picks up a ICMP packet once in a while, those are common, but if it lights up for a long period of time add the ip address that it shows to your firewall if you find it appropriate (:


Updates: Keeping up with all the updates and hacks can be time consuming, we still suggest you read all the security digests and bugtraq! MacAnalysis has the feature to update the vulnerability database on the fly by clicking on one button! You will soon have all the latest security additions for MacAnalysis. Did you know MacAnalysis currently checks for over 1000 vulnerabilities? Lagoon-Software says they add new vulnerability listings often to their database and to keep on updating!

We have a computer dedicated to running security assessment tests for our networks. MacAnalysis has the option to loop the tests to they are constantly running. The logs of course are nice. One of the features that tickles me is the way it can contact you with the results.

Phones now a days except e-mail and other sorts of ways to contact. MacAnalysis will contact you by email, beeping or SMS (mobile phone) so you will always know what is going on with your computers!

Firewall

Software Audit Tools For Macbook Pro

MacAnalysis for Mac OS X offers you everything you have been waiting from a Classic Firewall, and even more. it instantly enables you to prevent attacks which are intended to you by showing a security alert report. It also allows you to block specific protocols linked to Unix/NT/Mac Servers, Trojan, DOS attacks,etc.

The Firewall Detector runs a TCP/IP stacks monitoring’s system, allowing an optimal recognition of the attack intented to you. For example, MacAnalysis can detect if one person makes a traceroute towards you, sends fragmented packets in order to trick your system’s security, performs DoS attacks, exploits trojan virus via a backdoor etc.

Software Audit Tools For Mac Download

Visual Traceroute

Basically, it’s a common traceroute function, but it has a fabulous look and style to help understand where the connections are from;it traces the path took by packets between 2 hosts by drawing lines on a world map.

General Info

MacAnalysis Mac OS X will show you general information from netstat, login, traffic reports and more giving you access to tons of information with a single click.

Now that you see how important this file is to you, feel free to download the time limited version. You may register online in seconds.

Downloads

MacAnalysis 2.1b PPC – Download Now!
MacAnalysis 2.1b PPC – SecureMac Mirror
OS X Version Here!
MacAnalysis 2.2.4 X [macanalysis.com]
MacAnalysis 2.2.4 X [securemac.com]

What Is New In MacAnalysis

  • Fixed a major bug in MacAnalysis’s launch.
  • Apple Airport are now supported
  • Added “Hide/Show” Main Window
  • Added “Auto Update”
  • Added “Content Filter”
  • It watch’s outgoing data and prevents unauthorized export of private info.
  • Improved “News” fetcher. Added date.
  • Improved the stop’s list of the Firewall.
  • Features added, bug fixed, reliability improved.
  • Added latest exploits, vulnerabilities.

Registering Online! To utilize the program to its fullest we suggest registering and it includes free updates.