Securing Network Services

Slides:



Advertisements
Similar presentations
CCNA – Network Fundamentals
Advertisements

Lecture 7 Transport Layer
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
System Security Scanning and Discovery Chapter 14.
Computer Security and Penetration Testing
COEN 252: Computer Forensics Router Investigation.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
Web Server Administration Chapter 10 Securing the Web Environment.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1 Version 3.0 Module 11 TCP Application and Transport.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Linux Networking and Security
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Presented by Rebecca Meinhold But How Does the Internet Work?
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
CompTIA Security+ Study Guide (SY0-401)
Enumeration.
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
LINUX ADMINISTRATION
Network Wiring and Reference
Unit 4: Transport protocols
Chapter 4: Security Baselines
Port Scanning (based on nmap tool)
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Networking for Home and Small Businesses – Chapter 6
Understand Networking Services
Lecture 6: TCP/IP Networking By: Adal Alashban
Chapter 2: Basic Switching Concepts and Configuration
Working at a Small-to-Medium Business or ISP – Chapter 7
Hiding Network Computers Gateways
Client-Server Interaction
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Network Services CSCI N321 – System and Network Administration
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
I. Basic Network Concepts
Chapter 27: System Security
Working at a Small-to-Medium Business or ISP – Chapter 7
Network Services.
COP 4343 Unix System Administration
Firewalls Jiang Long Spring 2002.
PART V Transport Layer.
PART 5 Transport Layer.
Firewalls Chapter 8.
Networking for Home and Small Businesses – Chapter 6
Module 4: Packet analysis
Computer Networks Protocols
Data Communications and Networks
Presentation transcript:

Securing Network Services

Time to Internet Attack “Before you place a Unix computer on the Internet, you must make certain that no security problems have been reported with the specific software release that you intend to use. Otherwise, you may find that your machine is identified, broken into, and compromised before you even have a chance to download the latest software patch!”

/etc/services Canonical name, port number, protocol telnet 23/tcp smtp 25/tcp mail time 37/udp timeserver “Servers can run on ports that are unassigned or are assigned to other protocols.”

Startup scripts $ cd /etc/rc5.d $ ls K03rhnsd K50snmpd S10network S28autofs S91smb K05saslauthd K50snmptrapd S12syslog S56rawdevices S95atd K10cups K73ypbind S13irqbalance S56xinetd S96agent.be K10psacct K74nscd S13portmap S60vsftpd S99local K15gpm K92ip6tables S14nfslock S80sendmail S99mdmonitor K20nfs K92iptables S20random S85sshd2 S99mdmpd K24irda K95audit S24pcmcia S90crond K35winbind S00microcode_ctl S25netfs S90mysqld K40smartd S05kudzu S26apmd S91httpd

xinetd $ cd xinetd.d [frank@sappho xinetd.d]$ ls chargen daytime echo-udp klogin rsync telnet chargen-udp daytime-udp eklogin krb5-telnet services time cups-lpd echo gssftp kshell sgi_fam time-udp

telnet $ cat telnet # default: on # description: The telnet server serves telnet sessions; it uses \ # unencrypted username/password pairs for authentication. service telnet { disable = no flags = REUSE socket_type = stream wait = no user = root server = /usr/sbin/in.telnetd log_on_failure += USERID }

Services? “If you cannot explain why a service is being offered at your site, you may wish to disable it until you know what purpose it serves.”

Echo & chargen DOS “echo accepts connections on TCP port 7 or individual datagrams on UDP port 7 and echoes back everything it receives to the sender.” “chargen (character generator) sevice accepts TCP connections and UDP datagrams on port 19 and send back a character pattern.”

Don’t Be Warezed! Page 340

telnet (TCP Port 23) C:>telnet www.nku.edu “The telnet protocol poses significant risks to its users. The username, password, and all other sessions are transmitted over the Internet without encryption.” Packet sniffing using Wireshark Use ssh

Common Vulnerabilities and Exposures http://cve.mitre.org/cve/ FTP (TCP Ports 20 and 21) SMTP: Simple Mail Transfer Protocol (TCP Port 25)

SMTP “STMP servers have historically been a source of security problems for Unix systems. You should be sure that you are running the most recent version of the server, and that you monitor the appropriate web site or security mailing lists for news of newly discovered vulnerabilities. “When security flaws are announced, potential intruders are often much quicker to attack than system administrators are to upgrade.”

Domain Name System (DNS) (TCP and UDP Port 53) “An attacker who can gain control of your DNS nameserver or corrupt its contents can use it to break into your system.” Cache poisoning – using a program bug to load erroneous information. Run two nameservers; one in front of the firewall and one behind it The nameserver in front of the firewall contains only the names and IP addresses of your gateway computer.

BOOTP and DHCP (UDP Ports 67 and 68) Because there is no server authentication with DHCP, any DHCP server on the network can answer a DHCP request. An attacker can set up a rogue DHCP server that provides wrong addresses for nameservers or gateways.

SNMP: Simple Network Management Protocol (UDP Ports 161 and 162) Allows remote management of devices on your network. “With carefully constructed SNMP messages, an attacker can learn the internal structure of your network, change your network configuration, or even shut down your operation.” If you use SNMP (See page 377.)

Managing Services Securely Monitor your hosts with netstat (See pages 390-1) /usr/bin/lsof – to determine which process is listening on a port (See page 392.) Nmap to find open ports (See page 392.) Run Wireshark to monitor network traffic.

Vulnerability Scanners www.nessus.org