Finding Network Vulnerabilities. 2 Objectives Define vulnerabilities Name the common categories of vulnerabilities Discuss common system and network vulnerabilities.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
System Security Scanning and Discovery Chapter 14.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Network Security Testing Techniques Presented By:- Sachin Vador.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Computer Security and Penetration Testing
Lesson 19: Configuring Windows Firewall
SELECTING AND IMPLEMENTING VULNERABILITY SCANNER FOR FUN AND PROFIT by Tim Jett and Mike Townes.
ISA 3200 SUMMER 2010 Chapter 4: Finding Network Vulnerabilities.
Network security policy: best practices
Security+ Guide to Network Security Fundamentals, Fourth Edition
Port Scanning.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Penetration Testing Security Analysis and Advanced Tools: Snort.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Using Windows Firewall and Windows Defender
What is FORENSICS? Why do we need Network Forensics?
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 4 Finding Network Vulnerabilities By Whitman, Mattord, & Austin© 2008 Course Technology.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Honeypot and Intrusion Detection System
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Linux Networking and Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Retina Network Security Scanner
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Guide to Network Security 1 st Edition Chapter Nine Network Vulnerability Assessment.
Computer Security By Duncan Hall.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Role Of Network IDS in Network Perimeter Defense.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network Devices and Firewalls Lesson 14. It applies to our class…
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools Ch7 Part III Principles of Information Security, Fourth Edition.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Defining your requirements for a successful security (and compliance
Network security Vlasov Illia
Topic 5 Penetration Testing 滲透測試
Chapter 7. Identifying Assets and Activities to Be Protected
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
Security Testing Methods
6. Application Software Security
Presentation transcript:

Finding Network Vulnerabilities

2 Objectives Define vulnerabilities Name the common categories of vulnerabilities Discuss common system and network vulnerabilities Locate and access sources of information about emerging vulnerabilities Identify the names and functions of the widely available scanning and analysis tools Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 2

3 Introduction To maintain secure networks, information security professionals must be prepared to identify system vulnerabilities, whether by hiring system assessment experts or by conducting self- assessments using scanning and penetration tools Network security vulnerability is defect in product, process, or procedure that, if exploited, may result in violation of security policy, which in turn might lead to loss of revenue, loss of information, or loss of value to the organization Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 3

4 Common Vulnerabilities Common vulnerabilities fall into two broad classes: Defects in software or firmware Weaknesses in processes and procedures Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 4

5 Defects in Software or Firmware Buffer overruns (or buffer overflows) arise when quantity of input data exceeds size of available data area (buffer) Injection attacks can occur when programmer does not properly validate user input and allows an attacker to include input that, when passed to a database, can give rise to SQL injection vulnerabilities Network traffic is vulnerable to eavesdropping because a network medium is essentially an open channel Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 5

6 Defects in Software or Firmware (continued) How can security professionals remain abreast of all the vulnerabilities? First and perhaps foremost, they must know: –Organization’s security policies –Software and hardware the organization uses Information security professionals should regularly consult these public disclosure lists: –Vendor announcements –Full disclosure mailing lists –CVE: the common vulnerabilities and exposures database Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 6

7 Vendor Announcements Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 7

8 BugTraq Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 8

9 Weaknesses in Processes and Procedures Just as hazardous as software vulnerabilities More difficult to detect and fix because they typically involve the human element Often arise when policy is violated or processes and procedures that implement policy are inadequate or fail To ensure security policy is implemented, organizations should hold regular security awareness training and regularly review policies and their implementation Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 9

10 Scanning and Analysis Tools To truly assess risk within computing environment, technical controls must be deployed using strategy of defense in depth Scanners and analysis tools can find vulnerabilities in systems, holes in security components, and unsecured aspects of the network Scanners, sniffers, and other such vulnerability analysis tools are invaluable because they enable administrators to see what attackers see Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 10

11 Scanning and Analysis Tools (continued) Scanning tools are typically used as part of an attack protocol Attack protocol is a series of steps or processes used by attacker, in logical sequence, to launch attack against target system or network This may begin with a collection of publicly available information about a potential target, a process known as footprinting Attacker uses public Internet data sources to perform searches to identify network addresses of the organization Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 11

12 Footprinting Most important information for footprinting purposes is IP address range Another piece of useful information is name, phone number, and address of the technical contact This research is augmented by browsing the organization’s Web pages since Web pages usually contain information about internal systems, individuals developing Web pages, and other tidbits, which can be used for social engineering attacks Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 12

13 Footprinting (continued) To assist in footprint intelligence collection process, an enhanced Web scanner can be used that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and addresses Sam Spade – Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 13

14 Sam Spade Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 14

15 Fingerprinting Next phase of attack protocol is data- gathering process called fingerprinting, a systematic survey of all of the target organization’s Internet addresses that is conducted to identify network services offered by hosts in that range Fingerprinting reveals useful information about internal structure and operational nature of the target system or network Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 15

16 Port Scanners Nmap, most popular port scanner Port scanning utilities (port scanners) are tools used by both attackers and defenders to identify computers that are active on a network, as well as ports and services active on those computers, functions and roles the machines are fulfilling, and other useful information The more specific the scanner is, the better and more useful the information it provides is, but a generic, broad-based scanner can help locate and identify rogue nodes on the network Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 16

17 Port Scanners (continued) Port is a network channel or connection point in a data communications system Within TCP/IP, TCP and UDP port numbers differentiate multiple communication channels used to connect to network services being offered on same device In all, there are 65,536 port numbers in use for TCP and another 65,536 port numbers for UDP Ports greater than 1023 typically referred to as ephemeral ports and may be randomly allocated to server and client processes Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 17

18 Port Scanners (continued) Why secure open ports? Open port is an open door and can be used by attacker to send commands to a computer, potentially gain access to a server, and possibly exert control over a networking device The general policy statement is to remove from service or secure any port not absolutely necessary to conducting business Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 18

19 Firewall Analysis Tools Understanding exactly where organization’s firewall is located and what existing rule sets do are very important steps for any security administrator Several tools that automate remote discovery of firewall rules and assist administrator (or attacker) in analyzing rules to determine exactly what they allow and what they reject – Firwalkhttp://packetstormsecurity.org/UNIX/audit/firewalk/ – hpinghttp:// Slide 19

20 Firewall Analysis Tools (continued) Administrators wary of using same tools attackers use should remember: –Regardless of the nature of the tool used to validate or analyze firewall’s configuration, it is the intent of the user that dictates how information gathered will be used –To defend a computer or network, it is necessary to understand ways it can be attacked; thus, a tool that can help close up an open or poorly configured firewall helps network defender minimize risk from attack Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 20

21 Operating System Detection Tools Identifying target computer’s operating system is very valuable to attacker Once the operating system is known, it is easy to determine all vulnerabilities to which it might be susceptible XProbehttp://sourceforge.net/projects/xprobe Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 21

22 Vulnerability Scanners Passive vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software – sive-vulnerability-scanning.html NeVOhttp://windowsitpro.com/article/articleid/40422/pas sive-vulnerability-scanning.html – world_r.html RNAhttp://blog.tenablesecurity.com/2006/07/network_ world_r.html Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 22

23 Vulnerability Scanners (continued) Active vulnerability scanners scan networks for highly detailed information by initiating network traffic in order to identify security holes –These scanners identify exposed usernames and groups, show open network shares, and expose configuration problems and other vulnerabilities in servers – GFI LANguardhttp:// – security-audit-tool/ SPIKEhttp:// security-audit-tool/ – SIKE-SPIKE Proxyhttp:// – Nessushttp://

24 Vulnerability Scanners (continued) Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 24

25 Vulnerability Validation Often, an organization requires proof that system is actually vulnerable to certain attacks May require such proof to avoid having system administrators attempt to repair systems that are not broken or because they have not yet built satisfactory relationship with vulnerability assessment team Class of scanners exists that exploit remote machine and allow vulnerability analyst (penetration tester) to create accounts, modify Web pages, or view data Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 25

26 Packet Sniffers Network tool that collects copies of packets from network and analyzes them Sometimes called a network protocol analyzer Can provide network administrator with valuable information for diagnosing and resolving networking issues In the wrong hands, sniffer can be used to eavesdrop on network traffic Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 26

27 Wireless Security Tools Wireless connection, while convenient, has many potential security holes Security professional must assess risk of wireless networks Wireless security toolkit should include ability to sniff wireless traffic, scan wireless hosts, and assess level of privacy or confidentiality afforded on wireless network Firewalls & Network Security, 2nd ed. - Chapter 4

28 Penetration Testing Penetration test involves using all techniques and tools available to attacker in order to attempt to compromise or penetrate an organization’s defenses Penetration testing can be performed by internal group (so called “red teams”) or outsourced to external organization A variable of the penetration test, whether performed internally or outsourced, is amount of information provided to the red team Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 28

29 Penetration Testing (continued) Three categories of testing: –Black box: red team is given no information whatsoever about the organization and approaches the organization as external attacker –Gray box: red team is given some general information about the organization such as general structure, network address ranges, software and versions –White box: red team has full information on the organization and its structure Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 29

30 Chapter Summary To maintain secure networks, information security professionals must be prepared to systematically identify system vulnerabilities Often done by performing self-assessment using scanning and penetration tools testing Common vulnerabilities fall into two classes: –Defects in software or firmware –Weaknesses in processes and procedures Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 30

31 Chapter Summary (continued) Information security professionals should regularly consult vendor announcements, full disclosure mailing lists, and the common vulnerabilities and exposures (CVE) database To assess risk within a computing environment, network professionals must use tools such as intrusion detection systems (IDPS), active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers (sniffers) Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 31

32 Chapter Summary (continued) Many organizations use penetration test to assess their security posture on a regular basis Penetration test team (red team) uses all techniques and tools available to attackers in order to attempt to compromise or penetrate an organization’s defenses Firewalls & Network Security, 2nd ed. - Chapter 4 Slide 32