© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 1 Implementing Secure Converged Wide Area Networks (ISCW)

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Switched Networks Routing and Switching.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
System Security Scanning and Discovery Chapter 14.
Forces that Have Brought the world to it’s knees over the centuries.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Chapter 7 HARDENING SERVERS.
Implementing Secure Converged Wide Area Networks (ISCW)
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 1 Implementing Secure Converged Wide Area Networks (ISCW)
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 1 Implementing Secure Converged Wide Area Networks (ISCW)
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 19: Configuring Windows Firewall
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Controls for Information Security
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Hacking Web Server Defiana Arnaldy, M.Si
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 6: Packet Filtering
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Honeypot and Intrusion Detection System
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
1 Version 3.0 Module 11 TCP Application and Transport.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Information Systems Security Operations Security Domain #9.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Small Business Security Keith Slagle April 24, 2007.
Enterprise Network Security Accessing the WAN – Chapter 4.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Footprinting and Scanning
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Filip Chytrý Everyone of you in here can help us improve online security....
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Enumeration.
Working at a Small-to-Medium Business or ISP – Chapter 8
Footprinting and Scanning
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Footprinting and Scanning
Chapter 3: Windows7 Part 4.
Lesson 16-Windows NT Security Issues
Learning objectives By the end of this unit you should: Explain
– Chapter 3 – Device Security (B)
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
6. Application Software Security
Presentation transcript:

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 1 Implementing Secure Converged Wide Area Networks (ISCW)

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 2 Lesson 1 – Module 5 – ‘Cisco Device Hardening’ Thinking Like a Hacker

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 3 Module Introduction (1)  The open nature of the Internet makes it increasingly important for businesses to pay attention to the security of their networks. As organisations move more of their business functions to the public network, they need to take precautions to ensure that attackers do not compromise their data, or that the data does not end up being accessed by the wrong people.  Unauthorised network access by an outside hacker or disgruntled employee can wreak havoc with proprietary data, negatively affect company productivity, and stunt the ability to compete.  Unauthorised network access can also harm relationships with customers and business partners who may question the ability of companies to protect their confidential information, as well as lead to potentially damaging and expensive legal actions.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 4 Module Introduction (2)  "If you know yourself but not your enemy, for every victory gained you will also suffer a defeat." Sun Tzu – The Art of War Before learning how to defend against attack, you need to know how a potential attacker operates. The theme of the first few lessons in this module is therefore, “know thine enemy”.  This module will help you to understand how hackers operate and what attack strategies they can employ. Once you know the nature of the threat, you will be better able to implement the full set of security features contained in Cisco IOS software to provide security for your network.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 5 Module Introduction (3)  The module describes the best practices for securing router administrative access using mechanisms such as: password security features, failed login attempt handling, and role-based command-line interface (CLI).  You will learn how to: mitigate attacks using access lists; how to design and implement a secure management system including secure protocols such as Secure Shell (SSH), Simple Network Management Protocol version 3 (SNMPv3), and authenticated Network Time Protocol (NTP).  Also discussed are the most ubiquitous authentication, authorisation, and accounting (AAA) protocols - RADIUS and TACACS+, and explanations of the differences between them.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 6 Objectives  At the completion of this first lesson, you will be able to: Describe the steps taken by a potential network hacker to gain unauthorised access Explain the detailed information that a hacker is looking to learn, and how this may be used to compromise network security Describe the basic steps that need to be taken to mitigate network attacks

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 7 Seven Steps to Hacking a Network  Seven steps for compromising targets and applications: Step 1 — Perform footprint analysis (reconnaissance) Step 2 — Detail the information Step 3 — Manipulate users to gain access Step 4 — Escalate privileges Step 5 — Gather additional passwords and secrets Step 6 — I nstall back doors Step 7 — Leverage the compromised system

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 8 Hacking a Network  The goal of any hacker is to compromise the intended target or application  Hackers begin with little or no information about the intended target, but by the end of their analysis, they will have accessed the network and will have begun to compromise their target  Their approach is always careful and methodical— never rushed and never reckless  The seven-step process outlined in the previous slide is a good representation of the method that hackers use – and a starting point for an analysis of how to defeat it

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 9 Footprint Analysis (Reconnaissance)  Web pages, phone books, company brochures, subsidiaries, etc  Knowledge of acquisitions  nslookup command to reconcile domain names against IP addresses of the company’s servers and devices  Port scanning to find open ports and operating systems installed on hosts  traceroute command to help build topology  WHOIS queries

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 10 How to Defeat Footprinting  Keep all sensitive data off-line (business plans, formulas, and proprietary documents)  Minimise the amount of information on your public website  Examine your own website for insecurities  Run a ping sweep on your network  Familiarise yourself with one or more of the five Regional Internet Registries – such as ARIN for North America – to determine network blocks.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 11 Detail the Information  Find your server applications and versions: What are your web, FTP, and mail server versions? Listen to TCP and UDP ports and send random data to each Cross-reference information to vulnerability databases to look for potential exploits  Exploit selected TCP ports, for example: Windows NT, 2000, and XP file sharing using SMB protocol which uses TCP port 445. In Windows NT, SMB runs on top of NetBT using ports 137, 138 (UDP), and 139 (TCP).

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 12 Software Tools  Hackers can use some of the tools listed here. All of these tools are readily available to download, and security staff should know how these tools work.  Netcat: Netcat is a featured networking utility that reads and writes data across network connections using the TCP/IP protocol.  Microsoft EPDump and Remote Procedure Call (RPC) Dump: These tools provide information about Microsoft RPC services on a server: The Microsoft EPDump application shows what is running and waiting on dynamically assigned ports. The RPC Dump (rpcdump.exe) application is a command-line tool that queries RPC endpoints for status and other information on RPC..  GetMAC: This application provides a quick way to find the MAC (Ethernet) layer address and binding order for a computer running Microsoft Windows 2000 locally or across a network..  Software development kits (SDKs): SDKs provide hackers with the basic tools that they need to learn more about systems.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 13 Manipulate Users to Gain Access  Social engineering is a way to manipulate people inside the network to provide the information needed to access the network. A computer is not required!! Social engineering by telephone Dumpster diving Reverse social engineering Recommended reading: “The Art of Deception: Controlling the Human Element of Security” Mitnik, KD and Simon, WL; Wiley; New Ed edition (17 Oct 2003)  There is a great deal of anecdotal evidence that this is one of the most successful techniques……

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 14 Password Cracking  Hackers use many tools and techniques to crack passwords: Word lists Brute force Hybrids The yellow Post-It stuck on the side of the monitor, or in top of desk drawer…..  Password cracking attacks any application or service that accepts user authentication, including those listed here: NetBIOS over TCP (TCP 139) Direct host (TCP 445) FTP (TCP 21) Telnet (TCP 23) SNMP (UDP 161) PPTP (TCP 1723) Terminal services (TCP 3389)

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 15 Escalate Privileges  After securing a password for a user account and user-level privileges to a host, hackers attempt to escalate their privileges.  The hacker will review all the information he or she can see on the host: Files containing user names and passwords Registry keys containing application or user passwords Any available documentation (for example, )  If the host cannot be seen by the hacker, the hacker may launch a Trojan application such as W32/QAZ to provide it.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 16 Gather Additional Passwords and Secrets  Hackers target: The local security accounts manager database The active directory of a domain controller  Hackers can use legitimate tools including pwdump and lsadump applications.  Hackers gain administrative access to all computers by cross-referencing user names and password combinations

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 17 Install Back Doors and Port Redirectors  Back doors: Back doors provide: A way back into the system if the front door is locked A way into the system that is not likely to be detected  Back doors may use reverse trafficking: Example: Code Red  Port redirectors: Port redirectors can help bypass port filters, routers, and firewalls and may even be encrypted over an SSL tunnel to evade intrusion detection devices.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 18 Leverage the Compromised System  Back doors and port redirectors let hackers attack other systems in the network  Reverse trafficking lets hackers bypass security mechanisms  Trojans let hackers execute commands undetected  Scanning and exploiting the network can be automated  The hacker remains behind the cover of a valid administrator account  The whole seven-step process is repeated as the hacker continues to penetrate the network

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 19 Best Practices to Defeat Hackers  Keep patches up to date  Shut down unnecessary services and ports  Use strong passwords and change them often  Control physical access to systems  Curtail unexpected and unnecessary input  Perform system backups and test them on a regular basis  Warn everybody about social engineering  Encrypt and password-protect sensitive data  Use appropriate security hardware and software  Develop a written security policy for the company

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L1 20