Network Devices and Firewalls Lesson 14. It applies to our class…

Slides:



Advertisements
Similar presentations
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Advertisements

IP Forwarding Relates to Lab 3.
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Firewalls and Intrusion Detection Systems
IS Network and Telecommunications Risks
Intrusion Detection Systems and Practices
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
COEN 252: Computer Forensics Router Investigation.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Guide to TCP/IP, Third Edition
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
COEN 252 Computer Forensics
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Chapter 6: Packet Filtering
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
COEN 252 Computer Forensics Collecting Network-based Evidence.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
CIS 450 – Network Security Chapter 3 – Information Gathering.
IP Forwarding.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Linux Networking and Security
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Chapter 9 Firewalls. The Need for Firewalls Putting a Web server on the Internet without a firewall is dangerous –Remember in CNIT 123 how a firewall.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security Benefits of Firewall Protection
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Lab #2 NET332 By Asma AlOsaimi.
© 2003, Cisco Systems, Inc. All rights reserved.
CompTIA Security+ Study Guide (SY0-401)
Computer Data Security & Privacy
Footprinting (definition 1)
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CompTIA Security+ Study Guide (SY0-401)
Introduction to Network Security
Networking and Network Protocols (Part2)
Presentation transcript:

Network Devices and Firewalls Lesson 14

It applies to our class…

Network Devices Our primary target up to this point has been the computer systems and servers connected to the network. These are not the only devices connected, however, and there are network vulnerabilities as well as network devices that can help us in or intrusion attempt. There are a number of tools useful in discovering information about the network as well as discovering some of these other network devices.

Traceroute Revisited Traceroute provides a list of the systems between you and a target host on the network. Useful because you can often determine other network devices such as firewalls and routers. The last hop before our target is often a device that is simply forwarding traffic such as a router. Countermeasures to this type of probe consist of limiting the responses to this sort of packet.

traceroute

Autonomous System Lookup Autonomous System (AS) is the term used to refer to a collection of gateways (routers) that fall under one administrative entity on the Internet. An Autonomous System Number (ASN) is a numeric identifier for networks participating in Border Gateway Protocol (BGP). BGP is the protocol in which route paths are advertised throughout the world. Without BGP, Internet traffic would not leave local networks. Traceroute originating from a BGP participating host shows the ASN information

Public Newsgroups Search for contact names discovered through ARIN (whois) queries in newsgroups (groups.google.com). Could be especially useful if person posts questions or answers to other people’s responses in groups dealing with network or security devices (you may discover what devices the organization is using). Having this type of information available to potential intruders is not a critical mistake, but it does allow them to cut down on the time they need for discovery. No possibility of “security through obscurity” if you participate in these types of newsgroups.

Service Detection Just like your computer systems and servers will be listening on certain ports for certain services, so will your network devices. Cisco routers, for example, listen to ports 1-25, 80, , 2001, 4001, 6001, 9001 If we find a device that is listening in on these, or a specific subset, we may be able to determine by just this information that the system is a Cisco router. Use operating system identification tools to verify your suspicions. One final method you can use is banner grabbing and response fingerprinting. Certain devices will utilize certain banners or provide unique responses or challenges.

Network Vulnerabilities Potential problems at several layers of the network. Phenoelit: Defcon 10: Talk by FX: “Attacking Embedded Systems” Defcon 11: Talk by FX: “More Embedded Systems”

Layer 1 exploitation Remember that layer 1 is the physical layer. So what can we do at this layer? Fiber networks hard to tap into. Ethernet 10, 100, 1000BaseT easier and common at local sites. T1 links easy since they are just twisted pair Textbook outlines a possible man-in-the-middle attack where a 1600 Cisco router is placed in between corporate router and systems (in, for example, a phone closet). Allows you to grab all data that is flowing through without being noticed – unless somebody notices the device in the closet. What does this mean for us? We will not be exploiting things at this layer but we need to understand the possibilities to explain to our clients why physical is so important.

Layer 2 Data Link layer Switches: some think the panacea for sniffing issues but… Textbook describes an exploit that can be used that will allow you to sniff traffic even though you are using a switch. ARP Redirection Address Resolution Protocol: IP addresses only make sense to the TCP/IP suite, physical network devices have their own addresses. ARP provides a dynamic mapping from an IP address to the corresponding hardware address.

Layer 3 Network Layer Issues at this layer include Sniffing (this is what it is all about) Tcpdump most popular traffic sniffer Dsniff (good for password grabbing, reassembly, monitor web usage) IPv4 and IPv6 TCP sequence number prediction Misconfigurations are a leading cause of vulnerabilities and something attackers rely on in order to penetrate a system/network.

Firewalls “A well-designed, -configured, and –maintained firewall is nearly impenetrable.” So, we go around it Exploit trust relationships Look for other weak links in the security chain Attempt to locate a dial-up connection First step an attacker will take is to locate your firewall and learn what they can about it. Firewalls, like other devices, have a signature that they provide. Port scanning the choice here as in other, similar situations. Traceroute also useful if ICMP not blocked Banner grabbing works for many proxy firewalls

Firewalls “Scanning through a firewall”, can be done, but easier said than done. Packet filtering firewalls Depend on a set of rules (ACLs?) to determine whether traffic is authorized to pass or not. How well have these rules been set up? ICMP tunneling is accomplished by wrapping real data in an ICMP header (if firewall allows ECHOs). Assumes you have a compromised host on the inside you are trying to pass data to. Application Proxy firewalls are generally pretty secure and hard to get around but they, too, can be misconfigured.

Summary What is the importance and significance of this material? Need to understand that computers and servers are not the only items connected to the network. How does this topic fit into the subject of “Security Risk Analysis”? Some of these other devices may be vulnerable and aid in attacking the network.