COEN 252: Computer Forensics Router Investigation.

Slides:



Advertisements
Similar presentations
ARP AND RARP ROUTED AND ROUTING Tyler Bish. ARP There are a variety of ways that devices can determine the MAC addresses they need to add to the encapsulated.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
Ch. 6 – Switch Configuration CCNA 3 version Overview Identify the major components of a Catalyst switch Monitor switch activity and status using.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
System and Network Security Practices COEN 351 E-Commerce Security.
1 Emulab Security. 2 Current Security Model Threat model: No malicious authenticated users, Bad Guys are all “outside” –Protect against accidents on the.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Forensics Book 4: Investigating Network Intrusions and Cybercrime Chapter 4: Router Forensics.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
CCENT Review. Put the following descriptions in order from Layer 7 to Layer 1 and give the name of each layer.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
1 16-Aug-15 S Ward Abingdon and Witney College Routing CCNA Exploration Semester 2 Chapter 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing Protocols.
Introduction to OSPF Campus Networking Workshop These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Routers A router is a computer Computers have four basic components:
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Workshop 1: Introduction to TCP/IP
Exterior Gateway Protocol Border Gateway Protocol (BGP) Interior Gateway Protocol Routing Information Protocol (RIP) Enhanced Interior Gateway Protocol.
Routing CCNA Exploration Semester 2 Chapter 1
Pemrograman Jaringan Routing -Aurelio Rahmadian-.
COEN 252 Computer Forensics
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Module 6 – Switch Configuration CCNA 3 Cabrillo College.
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network.
COEN 252 Computer Forensics Collecting Network-based Evidence.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
CCNA 2 Week 9 Router Troubleshooting. Copyright © 2005 University of Bolton Topics Routing Table Overview Network Testing Troubleshooting Router Issues.
Cisco Router Forensics Thomas Akin, CISSP Director, Southeast Cybercrime Institute Kennesaw State University BlackHat Briefings, USA, 2002.
SW REVERSE JEOPARDY Chapter 1 CCNA2 SW Start-up Routing table Routing table Router parts Router parts Choosing a path Choosing a path Addressing Pot.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
COEN 250 Computer Forensics Windows Life Analysis.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA.
Security fundamentals Topic 6 Securing the network infrastructure.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Router Configuration. CISCO 2500 series router.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Routing Concepts Routing & Switching.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
1 Introduction to Routers Nasir Majeed Assistant Professor PTCL Academy Islamabad.
Routers 1st semester
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
2016/2/211 資訊網路專題 Router & Practice. 2016/2/212 Router Basics Computers have four basic components: a CPU, memory, interfaces, and a bus. –A router also.
What are the two types of routes used by network administrators? Static Dynamic.
Routers and Router Configuration 2 nd semester
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Introduction to Information Security
What are the two types of routes used by network administrators?
Working at a Small-to-Medium Business or ISP – Chapter 8
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Chapter 4: Routing Concepts
Chapter 2: Basic Switching Concepts and Configuration
– Chapter 3 – Device Security (B)
router component and memory? How its work Console access
– Chapter 3 – Device Security (B)
Network hardening Chapter 14.
Lecture9: Embedded Network Operating System: cisco IOS
資訊網路專題 Router & Practice
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

COEN 252: Computer Forensics Router Investigation

Significance of Routers Targets of attacks, esp. DoS. Stepping stones for attacks. Routers store Passwords Routing tables Network block information. Tools for investigation.

Characteristics of Routers Have little storage. Most information comes from logs or is volatile. Use Non-Volatile RAM (NVRAM) Saves configuration files Use normal RAM Current routing tables Listening services Current Passwords Forensics exam needs to get the volatile data!

Gather Volatile Router Data Connect to console port. Need cable and laptop with terminal emulation software. Gather Volatile Data Record System Time Determine who is logged on

Gather Volatile Router Data Gather Volatile Data Determine the uptime and other data on the router since last boot-up Determine listening sockets Routers run a few services such as telnet that are vulnerabilities. Determining listening sockets lists all current services that might be vulnerable. For example, port 80 (http) is often used for router administration, but port 80 is not normally protected by a firewall.

Gather Volatile Router Data Gather Volatile Data Save the router configuration. Review the routing table. This detects malicious static routes. Modified by attacker at the router. Modified with Routing Information Protocol (RIP) spoofing. Check the interface configuration Lots of easy to read data.

Gather Volatile Router Data Gather Volatile Data View the ARP cache Evidence for IP or MAC spoofing

Incidence Investigation Direct Compromise Routing Table Manipulation Theft of Information Denial of Service

Incidence Investigation: Direct Compromise Many ways to access a router. Telnet, SSH, SMTP, … Physical Access. Modem Access. Investigate via listening services. Listening Services. Provide potential attack points. Password Guessing

Incidence Investigation: Direct Compromise Passwords Password cracking stealing from configuration files sniffing from net snmp, telnet, HTTP, TFTP Console Access Reboot to get access

Incidence Investigation: Direct Compromise Modem Last user did not log off. TFTP Used to store and reload configuration files. UDP, no security Attacker scans network for router and TFTP server, then guesses configuration file name, and receives it via TFTP. This gives all passwords needed to access a router. Alternatively, router uploads a changed configuration file to the TFTP server and waits for a network reload.

Incidence Investigation: Routing Table Manipulations Routers use a variety of protocols to update their routing tables. RIP Open Shortest Path First Enhanced Interior Gateway Routing Protocol (EIGRP) Interior Gateway Routing Protocol (IGRP) Some have no authentication!

Incidence Investigation: Routing Table Manipulations Review routing table with “show ip route” For recovery: Remove static routing entries. Reboot router. Switch to authenticating router updates. (Easier said than done.)

Incident Investigation Theft of Information Routers contain network topology and access control. For recovery: change all passwords avoid password reuse

Incident Investigation DoS Destruction of router’s capability to function. Resource consumption reduces functionality of router. Bandwidth consumption overwhelms the network bandwidth.

Incident Investigation DoS Recovery: Elimination of listening services Upgrade of software Access restriction Authentication

Router Authentication Routers use Access Control Lists (ACL) Restrict traffic based on packet attributes Protocol Source / Destination IP address Port TCP flag ICMP message type Time of day

Routers as Monitors Can log traffic based on ACL Logs stored at a remote site.