1 Colorado University Guest Lecture: Vulnerability Assessment Chris Triolo Spring 2007.

Slides:



Advertisements
Similar presentations
Patch Management Patch Management in a Windows based environment
Advertisements

OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
Lesson 3-Hacker Techniques
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
SECURITY EVALUATION OF AN ORGANIZATION TA Md Morshedul Islam.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
System Security Scanning and Discovery Chapter 14.
Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Security Issues and Challenges in Cloud Computing
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Vulnerability Analysis Borrowed from the CLICS group.
Vulnerability Scanning at NU Robert Vance NUIT-Telecom & Network Services.
Network Security Testing Techniques Presented By:- Sachin Vador.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Vulnerability Scanning Xiaozhen Xue Dept. of Computer Science Texas Tech University, USA Akbar Siami Namin Dept. of Computer.
Penetration Testing.
Port Scanning.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
1 Oppliger: Ch. 15 Risk Management. 2 Outline Introduction Formal risk analysis Alternative risk analysis approaches/technologies –Security scanning –Intrusion.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Honeypot and Intrusion Detection System
Software Security Testing Vinay Srinivasan cell:
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
Penetration Testing Training Day Penetration Testing Tools and Techniques – pt 1 Mike Westmacott, IRM plc Supported by.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Cisco Router Hacking Group 8 Vernon Guishard Kelvin Aguebor ECE 4112.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Information Security What is Information Security?
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Wireless Intrusion Prevention System
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Module 04: 1 Introduction to Computer Security and Information Assurance Objectives Describe major OS functions Recognize OS related threats Apply major.
Web Security Firewalls, Buffer overflows and proxy servers.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 3 Network Security Threats Chapter 4.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lecture 13 Page 1 CS 236 Online Intrusion Detection Systems CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Seminar On Ethical Hacking Submitted To: Submitted By:
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Managing Secure Network Systems
Foot Printing / Scanning Tools Lect 4 – NETW 4006
Secure Software Confidentiality Integrity Data Security Authentication
Answer the questions to reveal the blocks and guess the picture.
Security in Networking
A Patch A Day Keeps The Malware Away
Intrusion Detection system
Intrusion.
Presentation transcript:

1 Colorado University Guest Lecture: Vulnerability Assessment Chris Triolo Spring 2007

2 What is a vulnerability? Vulnerability – a flaw or weakness in an operating system or application, which could lead to unauthorized access Exploit (n.) – a tool or technique that takes advantage of a security vulnerability

3 Three Flavors of Vulnerabilities Coding Errors –Example: Buffer Overflows Implementation Errors –Example: Open File shares Human Errors –Example: Social Engineering, malware Analogy –Rear gas tank on Ford Pinto –Mechanic neglect –Filling up the gas tank

4 Common Vulnerabilities Information Leaks Buffer overflows Special characters Authentication flaws Race conditions

5 Hacker Methodology: Anatomy of an Attack Foot Printing Foot Printing Scanning / Probing Scanning / Probing Gaining Access Gaining Access Escalating Privilege Escalating Privilege Exploiting Installing Backdoors Installing Backdoors Denial of Service Denial of Service

6 Vulnerability Assessments Why would you want to do this? Consideration: –Dangerous!!! These tools are usually designed to not crash anything, but it’s possible. Don’t make assumption that it won’t hurt, and make sure appropriate contacts are ready in case of problems. Permission –People get really touchy about someone scanning their network even if it’s not malicious. An administrator will shoot first, and examine supposed motives later.

7 The Plan Vulnerability Assessment vs. Scanning vs. Pentesting When to Scan? –Time and Frequency Where to Scan from? –Inside or Outside the network

8 The Plan Goals –Find the vulnerabilities! You need to find them all, miscreants only need one. Exploit or not Exploit –Why would you want to exploit the hole? –Why wouldn’t you want to exploit the hole? –Is it really necessary?

9 The Findings Interpretation and reporting the findings –Manual Verification False positives are a big problem. False negatives are a bigger problem. Some reported holes aren’t a problem in your environment –Compiling reports Use pre-canned, vendor reports Business Unit/Sector

10 Minimizing the Total Cost of Security $ Business Risk Annual Loss Expectancy Security Spending Cost of Countermeasures Total Cost of Security $ Diminishing Returns

11 Three Common Logic Errors in Risk Decision Making World is Flat Vulnerability Single Computer Binary Best Practices World is Round Risk Community of Computers Analog, Synergistic Essential Practices

12 The Findings –Vendor Severity Ratings Vulnerabilities will come in a number of classes –Remote vs Local –Information leak –DOS –Command Execution –System prioritization Business Criticality Severity of Findings Current Level of protection Risk = Asset(value) x Vulnerability(severity) x Threat(likelihood)

13 Tool Types Ping Scanner Protocol Scanner Port Scanner OS Scanner Patch Scanner Web / CGI Scanner Web Hole Scanner Host based Scanner Vulnerability Scanner

14 Commercial Tools ISS –Internet Security Scanner Foundstone –FoundScan / Foundstone Enterprise Qualys –On-demand Scanning (1 IP free) Watchfire –Web application Scanner

15 Open Source Tools Nessus –Full Vulnerability Scanner Nmap –Ping Sweeps, Port scans, OS discovery Nikto –Web / CGI scanner X-probe –OS Fingerprinting Enum –Open File shares

16 Nmap Port Scanning Ping Sweeping OS Detection Service/version Detection Firewall/IDS Evasion and Spoofing

17 Nessus Full Vulnerability Scanner Ping Sweeping Port Detection (incorporates Nmap) OS and version detection –Some Licensing restrictions

18 Recommended Reading Hacking Exposed – The Book and the web site Open Source Security Tools: Practical Guide to Security Applications Web sites: – – Art of Intrusion – Kevin Mitnick Shadow Crew Podcasts Spam Kings – Brian McWilliams

19 Recommended Reading Nmap Guide Underground Economy-Priceless CYMRU