Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009

Slides:



Advertisements
Similar presentations
Introduction To The Course Network Architecture Hervey Allen Chris Evans Phil Regnauld September 3 - 4, 2009 Santiago, Chile.
Advertisements

Cyber Attack Scenario Overview Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
System and Network Security Practices COEN 351 E-Commerce Security.
COEN 252: Computer Forensics Router Investigation.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Security Guidelines and Management
Secure Registry Operations Framework Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Disruption Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
IT Audit 2006 Deborah Joyner, Marjorie Tucker, Kay Simpson, Dawn Rountree, Kathy Jones.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Footprinting and Scanning
Role Of Network IDS in Network Perimeter Defense.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Privilege Escalation Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Final Project: Advanced Security Blade IPS and DLP blades.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Lab 12 – Cisco Firewall.
SIEM Rotem Mesika System security engineering
CISOs Guide To Communicating WNCRY.
Final Project: Advanced security blade
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Footprinting and Scanning
Disruption Baseline, Monitor, Detect, Analyze, Respond, & Recover
Footprinting (definition 1)
Leverage What’s Out There
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Introduction to Networking
Introduction to Networking
Footprinting and Scanning
CompTIA Security+ Study Guide (SY0-401)
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Protecting Your Maps and Data when using ArcGIS Server
Implementing and Auditing the Critical Controls
Network Security and Monitoring
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Information Security Awareness
Lecture 3: Secure Network Architecture
Network hardening Chapter 14.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Firewall Installation
Designing IIS Security (IIS – Internet Information Service)
Protection Mechanisms in Security Management
Session 20 INST 346 Technologies, Infrastructure and Architecture
6. Application Software Security
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile

Overview Reconnaissance & Enumeration Hands-on Cyber Attacks Concepts, Examples, Motivations Hands-on Cyber Attacks Concept Establishing a Baseline Demonstration of the Attack Monitoring & Detection Analyzing the Attack Response & Recovery Enacting Mitigation Actions Port Scanning DNS Zone Transfer

Reconnaissance & Enumeration Reconnaissance and Enumeration is the act of scanning a network to determine its layout, hosts, services, users, and other information which may be useful in a cyber attack

Reconnaissance & Enumeration Some Examples: Network mapping – scanning a network to determine what hosts are present Port Scanning – scanning a network or hosts to determine what services (ports) are open and what applications are running behind those ports Website Crawling – gleaning useful information from publicly available websites Cold Calling – asking your personnel sensitive questions Running Process Lists – determining what programs are running and on what hosts User Accounts – determining what user accounts are available on a host

Reconnaissance & Enumeration Why are these attacks important to you? Network attacks are often preceded by these actions and may be an indicator of a future attack These attacks may not actually affect your network These attacks may serve as a “smoke screen” Prioritize accordingly

Reconnaissance & Enumeration Cyber Attack - Port Scanning -

Attacker’s View

Multiple Protocol SYN Packets Your View Multiple Protocol SYN Packets Open Port Found

R&E Cyber Attack – Port Scanning Hosts on the network frequently have ports open that allow the host to communicate with other hosts on the network and offer services e.g. Port 22 is SSH, Port 80 is WWW Port scanning is the act of scanning a host or hosts to determine what ports are open and closed

R&E Cyber Attack – Port Scanning Malicious actors use this technique to: Determine what applications are remotely accessible on the host Determine version or other useful information for those applications Why? Build target lists for specific attacks Curiosity

R&E Cyber Attack – Port Scanning Port scanning uses standard network protocols to query a host to find open ports and information This attack targets hosts that are remotely accessible and have services that are also remotely accessible

R&E Cyber Attack – Port Scanning Monitor Detect Respond Recover Analyze Baseline

R&E Cyber Attack – Port Scanning Establish a Baseline for What’s Normal for Your Network: Do you have applications that regularly scan your network (e.g. vulnerability assessment tools)? Do you have administrators that regularly scan your network looking for rogue devices? Use this baseline to compare what you currently see to what you expect Any differences are a good indication of something going on!

R&E Cyber Attack – Port Scanning Attack Demonstration

R&E Cyber Attack – Port Scanning Monitoring & Detection Router ACLs & Logging Log Analysis Log Management Cisco Configuration Elements

R&E Cyber Attack – Port Scanning Monitoring & Detection Configure your network to detect port scanning Monitor your detection tool(s) Establish a Baseline EX: Syslog-ng EX: Cisco IOS Logging EX: Port Scan ACL EX: SWATCH

R&E Cyber Attack – Port Scanning Attack Demonstration (This time you can see how your network views the attack)

R&E Cyber Attack – Port Scanning Analysis - what did your detection tools report? Is this really an attack? Router ACL Logging Log Analysis Where is attack coming from? Are any IPs or Ports of particular interest? Are there any recent attacks targeting these applications, operating systems, etc? Are there any patterns?

R&E Cyber Attack – Port Scanning Response Actions aka “I’m Under Attack – What Do I Do Now?!” Prioritize – is anything else happening? If analysis indicates particular interest in an IP or Port, and a vulnerability exists, patch it or block it! Blocking source IPs is a losing game – a dedicated attacker can switch sources at the drop of a hat Too many firewall rules make things ungainly & slow If you choose to block it (and you can!), put it in for a set period of time (say 2 weeks), then remove it. This takes firewall discipline!

R&E Cyber Attack – Port Scanning Recovery Actions The attack is over – how do I prevent this again? Ask yourself “What _could_ have happened here?” Consider “whitelisting” for critical applications that only certain people need to access Other “mitigation” strategies… What is appropriate for your network & resources?

R&E Cyber Attack – Port Scanning What Other Mitigation Steps Would You Take? Please don’t make any changes right now – it may affect the other attacks we want to demonstrate! DISCUSSIONS ??

R&E Cyber Attack – Port Scanning Final Attack Demonstration

R&E Cyber Attack – Port Scanning Attack Discussion Did the mitigation steps help? How else can you protect your network? Other Thoughts Before We Move On?

Reconnaissance & Enumeration Cyber Attack - Zone Transfer -

Attacker’s View Make them work for targets….don’t give ‘em away…..

R&E Cyber Attack – Zone Transfer The DNS allows a “Zone Transfer” to keep secondary servers in sync with their master This is a normal part of DNS operations A zone transfer copies all the data in the zone file from the DNS server to the requester

R&E Cyber Attack – Zone Transfer Malicious actors use this technique to: Easily determine what domains are registered (and therefore, which ones are not) Easily determine key servers and hosts that are publicly accessible (why else would they be in the DNS?) Easily find potentially sensitive information DNS zone administrators have left in their zone files Why? Build target lists for attacks Potentially find key hosts (i.e. administrators workstation) to attack

R&E Cyber Attack – Zone Transfer Zone transfers use standard DNS protocols to transfer data from a server This attack targets authoritative DNS servers that are remotely accessible and allow zone transfers from “unverifiable” sources

R&E Cyber Attack – Zone Transfer Monitor Detect Respond Recover Analyze Baseline

R&E Cyber Attack – Zone Transfer Establish a Baseline for What’s Normal for Your Network: What servers are supposed to conduct zone transfers? Don’t forget the time component – When are zone transfers supposed to occur? Do you administrators conduct zone transfers to check the contents of their zones? Do you have applications that do this? Use this baseline to compare what you currently see to what you expect Any differences are a good indication of something going on!

R&E Cyber Attack – Zone Transfer Attack Demonstration

R&E Cyber Attack – Zone Transfer Monitoring & Detection BIND (or DNS Server) Configuration Log Analysis Installation Configuration Operation

R&E Cyber Attack – Zone Transfer Monitoring & Detection Configure your network to detect zone transfers Monitor your detection tool(s) Establish a Baseline EX: Zone Transfer Detection

R&E Cyber Attack – Zone Transfer Attack Demonstration (This time you can see how your network views the attack)

R&E Cyber Attack – Zone Transfer Analysis - what did your detection tools report? Is this really an attack? Did a zone transfer actually occur? Log Analysis Where is attack coming from?

R&E Cyber Attack – Zone Transfer Response Actions aka “I’m Under Attack – What Do I Do Now?!” Prioritize – is anything else happening? If analysis determines a zone transfer occurred to an unauthorized host, what was compromised? - If anything sensitive was compromised – take appropriate action!

R&E Cyber Attack – Zone Transfer Recovery Actions The attack is over – how do I prevent this again? Ask yourself “What _could_ have happened here?” Scrub zone file for any sensitive information… Configure DNS server to only allow zone transfers from authorized hosts (“whitelisting”) Other “mitigation” strategies… What is appropriate for your network & resources?

R&E Cyber Attack – Zone Transfer What Mitigation Steps Would You Take? Configuring BIND to allow authorized zone transfers… DISCUSSIONS ?? EX: Zone Transfer Mitigation

R&E Cyber Attack – Zone Transfer Final Attack Demonstration

R&E Cyber Attack – Zone Transfer Attack Discussion Did the mitigation steps help? How else can you protect your network? Other Thoughts Before We Move On?

? Questions? Do you have any questions about … Reconnaissance & Enumeration Detecting This Type of Attack Responding & Recovering From This Type of Attack ?