1 / 52

EE579T Network Security 5: Vulnerability Assessment

EE579T Network Security 5: Vulnerability Assessment . Prof. Richard A. Stanley. Thought for the Day. “The network is the computer.” Sun Microsystems. Is this quote for real or is it for marketing?. What is typical PC bus speed? What sort of network data transfer rates can be attained?

amity
Download Presentation

EE579T Network Security 5: Vulnerability Assessment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. EE579TNetwork Security5: Vulnerability Assessment Prof. Richard A. Stanley WPI

  2. Thought for the Day “The network is the computer.” Sun Microsystems WPI

  3. Is this quote for real or is it for marketing? • What is typical PC bus speed? • What sort of network data transfer rates can be attained? • What does this mean for the future of networked computing? WPI

  4. Overview of Tonight’s Class • Review last week’s lesson • Look at network security in the news • Course project discussions • Vulnerability assessment WPI

  5. Last Week... • Authentication is critical to achieving network security, and is harder because the user is at a distance from the computer • Encryption is key to authentication • Symmetric • Asymmetric • VPN’s provide a way to create a private “tunnel” through a public network • Not a panacea WPI

  6. Network Security Last Week-1 • Anna Kournikova hits the Internet • Email worm exploits Outlook address book • Hits millions of users, over 20 large corporations in Australia alone • Why? • Is Kournikova a common name? • Are people that curious? • Did someone suspect the picture was off-color? • You are a systems administrator--how do you protect against this sort of thing? WPI

  7. Network Security Last Week- 2 • Kournikova hacker • Traced by Exite@home • Lives in Friesland, Netherlands • 20-year old male • “Wanted to demonstrate how easy it was to write a virus.” • Maximum sentence guideline in Netherlands is 4 years, prosecutor can ask for more • How did he do it? WPI

  8. How He Did It Rocket science, this is not WPI

  9. Network Security Last Week- 3 • Tax prep site e1040 shut down Monday • site's encryption software had been turned off during site maintenance • Social Security numbers and passwords of site users were left exposed • Hackers chip into Intel Web site • “Smoked Crew” defaced an Intel sub-domain, leaving a short message greeting other hackers • Hackers got in through a well-publicized IIS4/NT4 flaw WPI

  10. Network Security Last Week-4 • University computers remain hacker havens • Systems "naked," exposed without firewalls • perfect foils for hackers (i.e. zombies) • Iomega research asserts 25% of computer users have lost data to viruses, hackers • Omni Consulting Group study reveals that network security breaches cost companies close to 6% of their annual gross revenue, on the average WPI

  11. Network Security Last Week-5 • Hacker fear scares EPA offline for 2 weeks • Federal Net privacy mandate riles health care industry • industry unifies in opposition to HIPAA privacy regulations, saying it will cost $22 billion to bring systems in compliance • Love Bug variant “Cartolina” sending European postcards WPI

  12. What do all these security issues have in common? WPI

  13. Course Projects • Teams • Topics • Schedule Let’s sort this out now. WPI

  14. How To Rob a Bank • Just walk in and demand the money • Where is the bank? • How do you know there is any money? • Where to park the getaway car? • Are there any guards or surveillance devices? • Will you need a disguise? • What kinds of things might go wrong? • What if they say “NO?” WPI

  15. Success Requires Planning • Whether robbing a bank or breaching network security, you need to plan ahead • Planning ahead is known as vulnerability assessment • Acquire the target (case the joint) • Scan for vulnerabilities (find the entry points) • Identify poorly protected data (shake the doors) WPI

  16. Information in Plain Sight • Lots of valuable information is just lying around waiting to be used • telephone directories • company organization charts • business meeting attendee lists • promotional material • The Internet has made having a company web page the measure of being “with it” WPI

  17. Target: FBI WPI

  18. WPI

  19. WPI

  20. WPI

  21. WPI

  22. WPI

  23. WPI

  24. WPI

  25. WPI

  26. ? WPI

  27. WPI

  28. WPI

  29. You get the idea • There is a lot of information out there, and it is readily available to anyone • Good intelligence usually consists of open source material properly collated • Law enforcement used to have special access to this sort of information--now it’s out on the ‘net • Network access speeds up the rate at which good intelligence can be collected WPI

  30. Determine Your Scope • Check out the target’s web page • physical locations • related companies or entities • merger/acquisition news • phone numbers, contact information • privacy or security policies • links to other related web servers • check the HTML source code WPI

  31. Refine Your Search • Run down leads from the news, etc. • Search engines are a good way • FerretSoft • Dogpile • Check USENET postings • Use advance search capabilities to find links back to target • Search on wpi + security gives ~ 2900 hits WPI

  32. WPI

  33. Use the Government • EDGAR • SEC site (www.sec.gov/edgarhp.htm) • Search for 10-Q and 10-K reports • Try to find subsidiary organizations with different names • Think about what your organization has on databases available to the public WPI

  34. WPI

  35. Zero In On The Networks • InterNIC • Organization • Domain • Network • Point of contact • www.networksolutions.com • www.arin.net WPI

  36. Search for wpi.edu WPI

  37. Other Sources • InterNIC has 50-record limit, so… • ftp://rs.internic.net/domain • http://samspade.org/ssw/ • freeware • www.nwpsw.com • Netscan tools • Single copy price = $32.00 • www.ipswitch.com • WS_Ping ProPack = $37.50 WPI

  38. Example: Sam Spade WPI

  39. Query on Found Data • POC • May be (often is) POC for other domains • Query for email addresses -- here are a few from @wpi.edu Amiji, Murtaza (MA3608) murti@WPI.EDU (508) 831-5395 Baboval, John (JBJ116) jbaboval@WPI.EDU XXX-XXXX Ballard, Richard (RBS722) rick@WPI.EDU 508-831-6731 Barnett, Glenn S (GSB14) rhythm@WPI.EDU (315)475-5920 Bartelson, Jon (JB12891) jonb@WPI.EDU (508) 831-5725 (FAX) (508) 831-5483 Berard, Keith (KB2414) keithb@WPI.EDU (508)754-4502 Blank, Karin (KBJ257) blankk@WPI.EDU 203-762-0532 Blomberg, Adam (AB5417) scarpa@WPI.EDU 508-755-7699 WPI

  40. Query the DNS • Insecure DNS configuration can reveal information that should be kept confidential • Zone transfers are popular attack methodologies • nslookup often used • pipe output to a text file • review the text file at your leisure • select potential “good targets” based on data WPI

  41. Map the Network • traceroute • Unix and Win/NT • tracert in NT for file name legacy reasons • Shows hops from router to destination • Graphical tools exist, too • VisualRoute • www.visualroute.com WPI

  42. WPI

  43. Detailed Scanning • Network ping sweeps • Who is active? • Automated capabilities with some tools • ICMP queries • Reveal lots of information on systems • System time • Network mask WPI

  44. Port Scanning • Identify running services • Identify OS • Identify specific applications of a service • Very popular • Very simple • Very dangerous WPI

  45. Port Scan Types • Connect Scan--completes 3-way handshake • SYN--should receive SYN/ACK • FIN--should receive RST on closed ports • Xmas tree--sends FIN, URG, PSH; should receive RST for closed ports • Null--turns off all flags; target should send back RST for closed ports • UDP--port probably open if no “ICMP port unreachable” message received WPI

  46. Identify Running Services • Strobe • Udp_scan (from SATAN) • netcat • PortPro & Portscan • nmap • Using SYN scan is usually stealthy • Beware of DoS results WPI

  47. OS Detection • Stack fingerprinting • Different vendors interpret RFCs differently • Example: • RFC 793 states correct response to FIN probe is none • Win/NT responds with FIN/ACK • Based on responses to specific probes, possible to make very educated guesses as to what OS running • Automated tools to make this easy! • Nmap (www.insecure.ord/nmap/) WPI

  48. Automated, Graphical Tools • Can trace network topology very accurately • ID machines by IP, OS, etc. • Makes attack much easier • Cheops • www.marko.net/cheops/ • Tkined • wwwhome.cs.utwente.nl/~schoenw/scotty/ WPI

  49. Enumeration • Try to identify valid user accounts on poorly protected resource shares • Windows NT • net view • lists domains on network • can also list shared resources • nltest -- identifies PDC & BDC • SNMP • open a telnet connection WPI

  50. Summary • Attacking a network is no different from robbing a bank; you have to plan if you expect to be successful • There are three basic steps to planning, which is called vulnerability assessment: • Acquire the target (case the joint) • Scan for vulnerabilities (find the entry points) • Identify poorly protected data (enumeration) • This applies if you are inside or outside the protected perimeter! WPI

More Related