 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,

Slides:



Advertisements
Similar presentations
Overview The TCP/IP Stack. The Link Layer (L2). The Network Layer (L3). The Transport Layer (L4). Port scanning & OS/App detection techniques. Evasion.
Advertisements

Intrusions. Disclaimer Some techniques and tools mentioned in this class could be: – Illegal to use – Dangerous for others – they can crash machines and.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
1 Firewalls. 2 References 1.Mark Stamp, Information Security: Principles and Practice, Wiley Interscience, Robert Zalenski, Firewall Technologies,
1 Reading Log Files. 2 Segment Format
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Scanning Determining if the system is alive IP Scanning Port Scanning War Dialing.
Firewalls and Intrusion Detection Systems
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Information Networking Security and Assurance Lab National Chung Cheng University COUNTER HACK Chapter 6 Scanning Information Networking Security and Assurance.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Computer Security and Penetration Testing
Reconnaissance Tools Tools that integrate Whois, ARIN, DNS interrogation and many more services: – Applications – Web-based portals
ICMP: Ping and Trace CCNA 1 version 3.0 Rick Graziani Spring 2005.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Authorization and Policy. Is principal P permitted to perform action A on object O? – Authorization system will provide yes/no answer Authorization.
Port Scanning.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
Ana Chanaba Robert Huylo
 Find out initial information ◦ Open Source ◦ Whois ◦ Nslookup  Find out address range of the network ◦ ARIN (American registry for internet numbers)
Information Gathering Lesson 4. Steps for Gathering Information Find out initial information Open Source Whois Nslookup Find out address range of the.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Chapter 6: Packet Filtering
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
CIS 450 – Network Security Chapter 3 – Information Gathering.
1 CSCD434 Lecture 8 Spring 2014 Scanning Activities Network Mapping and Scanning.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
 network appliances to filter network traffic  filter on header (largely based on layers 3-5) Internet Intranet.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Chapter 2 Scanning Last modified Determining If The System Is Alive.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Lab 1: Reconnaissance, Network Mapping, and Vulnerability Assessment Reconnaissance Scanning Network Mapping Port Scanning OS detection Vulnerability.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Chapter 9 Firewalls. The Need for Firewalls Putting a Web server on the Internet without a firewall is dangerous –Remember in CNIT 123 how a firewall.
1 CSCD434 Lecture 7 Spring 2012 Scanning Activities Network Mapping and Scanning.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Footprinting and Scanning
Hands-On Ethical Hacking and Network Defense
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Scanning.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Intrusions.
Port Scanning James Tate II
Footprinting and Scanning
Port Scanning (based on nmap tool)
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Footprinting and Scanning
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions, request-result conditions  Speak about security posture, system states, authentication mechanisms, etc.  Intrusion scenario o Reconnaissance, scanning, break-in and misuse, maintaining access, covering tracks o Reconnaisance: low-tech, Web-based

 What does DNS do?  How does DNS work?  Types of information an attacker can gather: o Range of addresses used o Address of a mail server o Address of a web server o OS information o Comments

$ nslookup Default server:evil.attacker.com Address: server Default server:dns.victimsite.com Address: set type=any ls –d victimsite.com system1 1DINA DINHINFO “Solaris 2.6 Mailserver” 1DINMX 10 mail1 web1DINA DINHINFO “NT4www” Dangerous

 Provide only necessary information o No OS info and no comments  Restrict zone transfers o Allow only a few necessary hosts  Use split-horizon DNS

 Show a different DNS view to external and internal users Internal DNS Employees External DNS External users Web server Mail server Internal DB

 Tools that integrate Whois, ARIN, DNS interrogation and many more services: o Applications o Web-based portals  Dangerous

 Attacker has a list of IP addresses assigned to the target network  He has some administrative information about the target network  He may also have a few “live” addresses and some idea about functionalities of the attached computers

 Detecting information useful for break-in o Live machines o Network topology o Firewall configuration o Applications and OS types o Vulnerabilities

 Finding live hosts o Ping sweep o TCP SYN sweep  Map network topology o Traceroute  Sends out ICMP or UDP packets with increasing TTL  Gets back ICMP_TIME_EXCEEDED message from intermediate routers

A A R1R1 R1R1 R2R2 R2R2 R3R3 R3R3 dbdb dbdb www mail 1. ICMP_ECHO to TTL=1 1a. ICMP_TIME_EXCEEDED from R1 victim.com A: R1 is my first hop to

A A R1R1 R1R1 R2R2 R2R2 R3R3 R3R3 dbdb dbdb www mail 2. ICMP_ECHO to TTL=2 2a. ICMP_TIME_EXCEEDED from R2 victim.com A: R1-R2 is my path to

A A R1R1 R1R1 R2R2 R2R2 R3R3 R3R3 dbdb dbdb www mail 3. ICMP_ECHO to TTL=3 3a. ICMP_TIME_EXCEEDED from R3 victim.com A: R1-R2-R3 is my path to

A A R1R1 R1R1 R2R2 R2R2 R3R3 R3R3 dbdb dbdb www mail 4. ICMP_ECHO to TTL=4 4a. ICMP_REPLY from victim.com A: R1-R2-R3-www is my path to

A A R1R1 R1R1 R2R2 R2R2 R3R3 R3R3 dbdb dbdb www mail Repeat for db and mail servers victim.com A: R1-R2-R3-www is my path to R1-R2-R3-db is my path to db.victim.com R1-R2-R3-mail is my path to mail.victim.com  Victim network is a star with R3 at the center

 Cheops o Linux application o ng.sourceforge.net/Automatically performs ping sweep and network mapping and displays results in GUI Dangerous

 Filter out outgoing ICMP traffic o Maybe allow for your ISP only  Use Network Address Translation (NAT) NAT box A B C D Internal hosts with / Request Request Reply Reply

 For internal hosts to go out o B sends traffic to o NAT modifies the IP header of this traffic  Source IP: B  NAT  Source port: B’s chosen port Y  random port X o NAT remembers that whatever comes for it on port X should go to B on port Y o Google replies, NAT modifies the IP header  Destination IP: NAT  B  Destination port: X  Y

 For public services offered by internal hosts o You advertise your web server A at NAT’s address ( and port 80) o NAT remembers that whatever comes for it on port 80 should go to A on port 80 o External clients send traffic to :80 o NAT modifies the IP header of this traffic  Destination IP: NAT  A  Destination port: NAT’s port 80  A’s service port 80 o A replies, NAT modifies the IP header  Source IP: A  NAT  Source port: 80  80

 What if you have another Web server C o You advertise your web server A at NAT’s address ( and port 55) – not a standard Web server port so clients must know to talk to a diff. port o NAT remembers that whatever comes for it on port 55 should go to C on port 80 o External clients send traffic to :55 o NAT modifies the IP header of this traffic  Destination IP: NAT  C  Destination port: NAT’s port 55  C’s service port 80 o C replies, NAT modifies the IP header  Source IP: C  NAT, source port: 80  55

 Finding applications that listen on ports  Send various packets: o Establish and tear down TCP connection o Half-open and tear down TCP connection o Send invalid TCP packets: FIN, Null, Xmas scan o Send TCP ACK packets – find firewall holes o Obscure the source – FTP bounce scans o UDP scans o Find RPC applications Dangerous

 Set source port and address o To allow packets to pass through the firewall o To hide your source address  Use TCP fingerprinting to find out OS type o TCP standard does not specify how to handle invalid packets o Implementations differ a lot

 Nmap o Unix and Windows NT application and GUI o o Various scan types o Adjustable timing Dangerous

 Close all unused ports  Remove all unnecessary services  Filter out all unnecessary traffic  Find openings before the attackers do  Use smart filtering, based on client’s IP

 Find out firewall rules for new connections  We don’t care about target machine, just about packet types that can get through the firewall o Find out distance to firewall using traceroute o Ping arbitrary destination setting TTL=distance+1 o If you receive ICMP_TIME_EXCEEDED message, the ping went through

 Filter out outgoing ICMP traffic  Use firewall proxies o This defense works because a proxy recreates each packet including the TTL field

 The attacker knows OS and applications installed on live hosts o He can now find for each combination  Vulnerability exploits  Common configuration errors  Default configuration  Vulnerability scanning tool uses a database of known vulnerabilities to generate packets  Vulnerability scanning is also used for sysadmin

 SARA o  SAINT o  Nessus o Dangerous

 Close your ports and keep systems patched  Find your vulnerabilities before the attackers do

 Attacker has a list of “live” IP addresses  Open ports and applications at live machines  Some information about OS type and version of live machines  Some information about application versions at open ports  Information about network topology  Information about firewall configuration