March 20051 March 29, 2005 DCE Panel Members Dr. Drew Hamilton, Auburn University Rick Toliver, Teledyne Solutions Inc. Joe Popinski, Information Engineering.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.
IP Masquerading Homes and Businesses: When you only have one IP but you have LOTS of machines.
Introduction To The Course Network Architecture Hervey Allen Chris Evans Phil Regnauld September 3 - 4, 2009 Santiago, Chile.
Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Module 5: Configuring Access for Remote Clients and Networks.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
How topology decisions affect speed/availability/security/cost/etc. Network Topology.
Firewall Configuration Strategies
Security+ Guide to Network Security Fundamentals
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 24 NTFS Permissions and Sharing Printers 1.
Lesson 19: Configuring Windows Firewall
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
© 2003 Cisco Systems, Inc. All Rights Reserved. Cisco Confidential Non-Disclosure Agreement Required WRT54G3G Linksys 3G Broadband Router.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
19 Jun 2001New Jersey Infragard1 Basic Linux/System Security Bill Stearns, Senior Research Engineer Institute for Security Technology Studies, Investigative.
Alabama Supercomputer Authority A partnership of … and.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Network Operating Systems versus Operating Systems Computer Networks.
Solutions for BDMHS  JF&C is a highly qualified company that performs a wide variety if technical services in the Chicago land area to business, government.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Securing Wired Local Area Networks(LANs)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
CANVAS REPORT/rvispute 16/4/2016 CANVAS Report for CTF Event at USAFA on 4/25/2007 Subject :Penetration Tools for Front Range Pen Test Exercise By Rajshri.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Retina Network Security Scanner
NetTech Solutions Common Connectivity Problems Lesson Eight.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Module 12: Implementing ISA Server 2004 Enterprise Edition: Back-to-Back Firewall Scenario.
MojaveFS Lookup Vlad Dascalu, 351C3 – U.P. Bucharest Jason Hickey, Cristian Ţăpuş, David Noblet California Institute of Technology.
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SoCal Cybersecurity Community College Consortium
CSCE 548 Student Presentation By Manasa Suthram
IFIP-UNU ADVANCED COURSE ON NETWORKING AND SECURITY Module II-Wireless Communications Section 5 Access Points.
Top 5 Open Source Firewall Software for Linux User
Secure Software Confidentiality Integrity Data Security Authentication
FTP - File Transfer Protocol
Joe, Larry, Josh, Susan, Mary, & Ken
Introduction to Networking
CANVAS Report for CTF Event at USAFA on 4/25/2007
Digital Pacman: Firewall Edition
IS4680 Security Auditing for Compliance
Securing web applications Externally
Presentation transcript:

March March 29, 2005 DCE Panel Members Dr. Drew Hamilton, Auburn University Rick Toliver, Teledyne Solutions Inc. Joe Popinski, Information Engineering Southeastern Software Engineering Conference 2005

March 20052

3 Committee and Judges Judges Dr. Drew Hamilton, Auburn University Dr. John Wu, Auburn University Don Reifer, Refier Consulting, Inc. DCE Committee Paul DePriest, IE Joe Popinski, IE Don Reifer, RCI Jason Bradford, RSA Rick Toliver, TSI SA Hale, TSI Eadie Warboys, TBE Del Hart, UAH Drew Hamilton, AU John Wu, AU Matt Pierce, Adtran Chris Stanford, TSI Lisa Rich, ASU George Starcher, Cinram

March DCE Overview Goal – Run a realistic exercise to educate the community on: –Best practices –Vulnerabilities –Technology Operational Scenario –Teams will be provided access to the network –Teams will not be supervised –Judges will roam once the exercise is underway –Teams will be scored –The team with the most points will be declared the “WINNER” Ground Rules Do not launch a Denial of Service attack Do not ARP-cache-poison our servers Do not install kernel level root kits on targets Do not connect to an external network (wired or wireless) Once you gain access, do not close the security hole Do not change passwords Do not attack your competitor’s machines No internet connectivity or tools will be provided No physical access to the target machines will be provided

March Scoring Guidelines GoalMax. points Map the target network by IP address, Operating System, and identify network services provided. 10 Add a Web page to Web Server in DMZ. Add link form existing home page.5 Add entry to the DNS tables and make new entries active5 Identify all user accounts on each machine1 per acct Identify all user passwords on each machine1 per password Identify Firewall configuration5 Obtain root shell on a target machine3 per machine* Create an account on a target machine3 per machine* Install “backdoor” software on target machine. Software must operate properly.5 per machine Find and identify the “Special Device” on the network20 Obtain “Golden” file from each target machineInstant Prize

March What it takes Equipment usage from sponsoring companies Volunteer time, hundreds of hours Planning well in advance Coordination with SE2 DCE Publicity with community Dedication by all involved Special Thanks to Cisco, Green Hills Software and Arxceo

March The Target System This was not your father’s network –Multiple networks –Layered defense Router/switch External web server DMZ Firewall Servers (Linux & Win) Golden Files Special Device (2) –Password protection –VLANs

March The Network

March Team #1 - Raiders of the Lost Arc – UAH Brooks Mattox, Roy Cole Team #2 – Athens State Combat Team Paul Koon, David Fitsimmons, Miroslav Sadilek Team # 3 – Auburn Orange Kevin Richard, Alan Hunt, Adam Hathcock, Daniel Kolenich Team #4 – Auburn Blue Will Fletcher, Dave Baxter, Bill Cleveland, Daniel Box The Participants

March Results Summary All day session The defensive team was in charge of the target network –Spent a lot of time and effort configuring, building and testing the system All of the participants: –Worked hard –Achieved the goals of the exercise –Learned a lot from each other –Had fun The results were: –Raiders of Lost Arc, first –Auburn Blue, second –Auburn Orange, third –Athens State, fourth Thanks go to many vendors for use of their equipment

March Winning Team with Judges

March Many Thanks Supporting Companies Judges –Dr. Drew Hamilton, Auburn University –Dr. John Wu, Auburn University –Don Reifer, RCI Participants

March Five Questions 1.What was learned about network vulnerabilities? If so, what vulnerabilities? 2.What did we learn about network protection technology and techniques? If so, what technologies and techniques were most applicable? 3.Did the DCE motivate us to shore up network security practices? If so, in what areas should effort be expended (intrusion detection, firewalls, etc.)?

March Panel Questions? 4.What lessons did we learn relative to conducting another DCE at next year’s conference? 5.What can we do to make the exercise more exciting next year (put up $, invite professionals, etc.)?

March Conclusions Hopefully, the exercise served to demonstrate that expertise in network security is needed by both government and private industry! Perhaps there are things that we can learn from the exercise Maybe, it’s time to embrace new ideas