Security Assessment & Penetration testing Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

5-Network Defenses Dr. John P. Abraham Professor UTPA.
Paula Kiernan Senior Consultant Ward Solutions
System Security Scanning and Discovery Chapter 14.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 7 HARDENING SERVERS.
Network Security Testing Techniques Presented By:- Sachin Vador.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Essentials of Security Steve Lamb Technical Security Advisor
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
Assessing Network Security
Payment Card Industry (PCI) Data Security Standard
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Agenda 9:30 – 10:45 Assessing Network Security 10:45 – 11:00 Break 11:00 – 11:45 BS7799 How Are you Managing Security? 11:45 – 12:15 Security Assessment.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 4 Finding Network Vulnerabilities By Whitman, Mattord, & Austin© 2008 Course Technology.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 14: Configuring Server Security Compliance
Software Security Testing Vinay Srinivasan cell:
Chapter 6 of the Executive Guide manual Technology.
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Linux Networking and Security
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
TCOM Information Assurance Management System Hacking.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NetTech Solutions Protecting the Computer Lesson 10.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Module 2: Designing Network Security
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Role Of Network IDS in Network Perimeter Defense.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Network Devices and Firewalls Lesson 14. It applies to our class…
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Critical Security Controls
Configuring Windows Firewall with Advanced Security
Secure Software Confidentiality Integrity Data Security Authentication
IS4680 Security Auditing for Compliance
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Security Assessment & Penetration testing Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec

Marcus Murray, MVP Agenda  Planning Security Assessments  Gathering Information About the Organization  Penetration Testing for Intrusive Attacks  Case Study: Assessing Network Security for Northwind Traders

Marcus Murray, MVP Planning Security Assessments  Planning Security Assessments  Gathering Information About the Organization  Penetration Testing for Intrusive Attacks  Case Study: Assessing Network Security for Northwind Traders

Marcus Murray, MVP Why Does Network Security Fail? Network security fails in several common areas, including: Human awareness Policy factors Hardware or software misconfigurations Poor assumptions Ignorance Failure to stay up-to-date Human awareness Policy factors Hardware or software misconfigurations Poor assumptions Ignorance Failure to stay up-to-date

Marcus Murray, MVP Understanding Defense-in-Depth Using a layered approach:  Increases an attacker’s risk of detection  Reduces an attacker’s chance of success Guards, locks, tracking devices Application hardening OS hardening, authentication, security update management, antivirus updates, auditing Network segments, NIDS Firewalls, boarder routers, VPNs with quarantine procedures Strong passwords, ACLs, backup and restore strategy

Marcus Murray, MVP Why Perform Security Assessments? Security assessments can: Answer the questions “Is our network secure?” and “How do we know that our network is secure?” Provide a baseline to help improve security Find configuration mistakes or missing security updates Reveal unexpected weaknesses in your organization’s security Ensure regulatory compliance Answer the questions “Is our network secure?” and “How do we know that our network is secure?” Provide a baseline to help improve security Find configuration mistakes or missing security updates Reveal unexpected weaknesses in your organization’s security Ensure regulatory compliance

Marcus Murray, MVP Planning a Security Assessment Project phasePlanning elements Pre-assessment Scope Goals Timelines Ground rules Assessment Choose technologies Perform assessment Organize results Preparing results Estimate risk presented by discovered weaknesses Create a plan for remediation Identify vulnerabilities that have not been remediated Determine improvement in network security over time Reporting your findings Create final report Present your findings Arrange for next assessment

Marcus Murray, MVP Understanding the Security Assessment Scope ComponentsExample Target All servers running: Windows 2000 Server Windows Server 2003 Target area All servers on the subnets: / /24 Timeline Scanning will take place from June 3rd to June 10th during non-critical business hours Vulnerabilities to scan for RPC-over-DCOM vulnerability (MS ) Anonymous SAM enumeration Guest account enabled Greater than 10 accounts in the local Administrator group

Marcus Murray, MVP Understanding Security Assessment Goals Project goal All computers running Windows 2000 Server and Windows Server 2003 on the subnets /24 and /24 will be scanned for the following vulnerabilities and will be remediated as stated VulnerabilityRemediation RPC-over-DCOM vulnerability (MS ) Install Microsoft security updates and Anonymous SAM enumeration Configure RestrictAnonymous to: 2 on Windows 2000 Server 1 on Windows Server 2003 Guest account enabledDisable Guest account Greater than 10 accounts in the local administrator group Minimize the number of accounts on the administrators group

Marcus Murray, MVP Types of Security Assessments Vulnerability scanning: Focuses on known weaknesses Can be automated Does not necessarily require expertise Focuses on known weaknesses Can be automated Does not necessarily require expertise Penetration testing: Focuses on known and unknown weaknesses Requires highly skilled testers Carries tremendous legal burden in certain countries/organizations Focuses on known and unknown weaknesses Requires highly skilled testers Carries tremendous legal burden in certain countries/organizations IT security auditing: Focuses on security policies and procedures Used to provide evidence for industry regulations Focuses on security policies and procedures Used to provide evidence for industry regulations

Marcus Murray, MVP Using Vulnerability Scanning to Assess Network Security Develop a process for vulnerability scanning that will do the following: Detect vulnerabilities Assign risk levels to discovered vulnerabilities Identify vulnerabilities that have not been remediated Determine improvement in network security over time Detect vulnerabilities Assign risk levels to discovered vulnerabilities Identify vulnerabilities that have not been remediated Determine improvement in network security over time

Marcus Murray, MVP Using Penetration Testing to Assess Network Security Steps to a successful penetration test include: Determine how the attacker is most likely to go about attacking a network or an application 1 1 Determine how an attacker could exploit weaknesses 3 3 Locate assets that could be accessed, altered, or destroyed 4 4 Locate areas of weakness in network or application defenses 2 2 Determine whether the attack was detected 5 5 Determine what the attack footprint looks like 6 6 Make recommendations 7 7

Marcus Murray, MVP Understanding Components of an IT Security Audit Process Technology Implementation Documentation Operations Start with policy Build process Apply technology Start with policy Build process Apply technology Security Policy Model Policy

Marcus Murray, MVP Implementing an IT Security Audit Compare each area to standards and best practices Security policy Documented procedures Operations What you must do What you say you do What you really do

Marcus Murray, MVP Reporting Security Assessment Findings Organize information into the following reporting framework: Define the vulnerability Document mitigation plans Identify where changes should occur Assign responsibility for implementing approved recommendations Recommend a time for the next security assessment Define the vulnerability Document mitigation plans Identify where changes should occur Assign responsibility for implementing approved recommendations Recommend a time for the next security assessment

Marcus Murray, MVP Gathering Information About the Organization  Planning Security Assessments  Gathering Information About the Organization  Penetration Testing for Intrusive Attacks  Case Study: Assessing Network Security for Northwind Traders

Marcus Murray, MVP What Is a Nonintrusive Attack? Examples of nonintrusive attacks include: Information reconnaissance Port scanning Obtaining host information using fingerprinting techniques Network and host discovery Information reconnaissance Port scanning Obtaining host information using fingerprinting techniques Network and host discovery Nonintrusive attack: The intent to gain information about an organization’s network in preparation for a more intrusive attack at a later time

Marcus Murray, MVP Information Reconnaissance Techniques Common types of information sought by attackers include: System configuration Valid user accounts Contact information Extranet and remote access servers Business partners and recent acquisitions or mergers System configuration Valid user accounts Contact information Extranet and remote access servers Business partners and recent acquisitions or mergers Information about your network may be obtained by: Querying registrar information Determining IP address assignments Organization Web pages Search engines Public discussion forums Querying registrar information Determining IP address assignments Organization Web pages Search engines Public discussion forums

Marcus Murray, MVP Countermeasures Against Information Reconnaissance Only provide information that is absolutely required to your Internet registrar Review your organization’s Web site content regularly for inappropriate information Create a policy defining appropriate public discussion forums usage Use addresses based on job roles on your company Web site and registrar information

Marcus Murray, MVP What Information Can Be Obtained by Port Scanning? Port scanning tips include: Start by scanning slowly, a few ports at a time To avoid detection, try the same port across several hosts Run scans from a number of different systems, optimally from different networks Start by scanning slowly, a few ports at a time To avoid detection, try the same port across several hosts Run scans from a number of different systems, optimally from different networks Typical results of a port scan include: Discovery of ports that are listening or open Determination of which ports refuse connections Determination of connections that time out Discovery of ports that are listening or open Determination of which ports refuse connections Determination of connections that time out

Marcus Murray, MVP Port-Scanning Countermeasures Port scanning countermeasures include: Implement defense-in-depth to use multiple layers of filtering Plan for misconfigurations or failures Run only the required services Implement an intrusion-detection system Expose services through a reverse proxy

Marcus Murray, MVP What Information Can Be Collected About Network Hosts? Types of information that can be collected using fingerprinting techniques include: IP and ICMP implementation TCP responses Listening ports Banners Service behavior Remote operating system queries IP and ICMP implementation TCP responses Listening ports Banners Service behavior Remote operating system queries

Marcus Murray, MVP Countermeasures to Protect Network Host Information Fingerprinting source Countermeasures IP, ICMP, and TCP Be conservative with the packets that you allow to reach your system Use a firewall or inline IDS device to normalize traffic Assume that your attacker knows what version of operating system is running, and make sure it is secure Banners Change the banners that give operating system information Assume that your attacker knows what version of operating system and application is running, and make sure it is secure Port scanning, service behavior, and remote queries Disable unnecessary services Filter traffic coming to isolate specific ports on the host Implement IPSec on all systems in the managed network

Marcus Murray, MVP Penetration Testing for Intrusive Attacks  Planning Security Assessments  Gathering Information About the Organization  Penetration Testing for Intrusive Attacks  Case Study: Assessing Network Security for Northwind Traders

Marcus Murray, MVP What Is Penetration Testing for Intrusive Attacks? Examples of penetration testing for intrusive attack methods include: Automated vulnerability scanning Password attacks Denial-of-service attacks Application and database attacks Network sniffing Automated vulnerability scanning Password attacks Denial-of-service attacks Application and database attacks Network sniffing Intrusive attack: Performing specific tasks that result in a compromise of system information, stability, or availability

Marcus Murray, MVP What Is Automated Vulnerability Scanning? Automated vulnerability scanning makes use of scanning tools to automate the following tasks: Banner grabbing and fingerprinting Exploiting the vulnerability Inference testing Security update detection Banner grabbing and fingerprinting Exploiting the vulnerability Inference testing Security update detection

Marcus Murray, MVP Scale/Performance Basis: Fully patched remote Windows XP SP1 on a busy 100-Mbps LAN CheckDuration (seconds) Network Resources (bytes) Windows vulnerabilities91 MB Weak passwords163.2 MB IIS vulnerabilities2130 KB SQL vulnerabilities5200 KB Security Updates (/nosum)46.5 MB Total3611 MB Security Updates (/sum)1064 MB

Marcus Murray, MVP What Is a Password Attack? Two primary types of password attacks are: Brute-force attacks Password-disclosure attacks Brute-force attacks Password-disclosure attacks Countermeasures to protect against password attacks include: Require complex passwords Educate users Implement smart cards Create policy that restricts passwords in batch files, scripts, or Web pages Require complex passwords Educate users Implement smart cards Create policy that restricts passwords in batch files, scripts, or Web pages

Marcus Murray, MVP What Is a Denial-of-Service Attack? DoS attacks can be divided into three categories: Flooding attacks Resource starvation attacks Disruption of service Flooding attacks Resource starvation attacks Disruption of service Denial-of-Service (DoS) attack: Any attempt by an attacker to deny his victim’s access to a resource Note: Denial-of-service attacks should not be launched against your own live production network

Marcus Murray, MVP Countermeasures for Denial-of-Service Attacks DoS attackCountermeasures Flooding attacks Ensure that your routers have anti-spoofing rules in place and rules that block directed broadcasts Set rate limitations on devices to mitigate flooding attacks Consider blocking ICMP packets Resource starvation attacks Apply the latest updates to the operating system and applications Set disk quotas Disruption of service Make sure that the latest update has been applied to the operating system and applications Test updates before applying to production systems Disable unneeded services

Marcus Murray, MVP Understanding Application and Database Attacks Common application and database attacks include: Buffer overruns: Write applications in managed code SQL injection attacks: Validate input for correct size and type

Marcus Murray, MVP What Is Network Sniffing? An attacker can perform network sniffing by performing the following tasks: Compromising the host Installing a network sniffer Using a network sniffer to capture sensitive data such as network credentials Using network credentials to compromise additional hosts Compromising the host Installing a network sniffer Using a network sniffer to capture sensitive data such as network credentials Using network credentials to compromise additional hosts Network sniffing: The ability of an attacker to eavesdrop on communications between network hosts

Marcus Murray, MVP Countermeasures for Network Sniffing Attacks To reduce the threat of network sniffing attacks on your network consider the following: Use encryption to protect data Use switches instead of hubs Secure core network devices Use crossover cables Develop policy Conduct regular scans Use encryption to protect data Use switches instead of hubs Secure core network devices Use crossover cables Develop policy Conduct regular scans

Marcus Murray, MVP How Attackers Avoid Detection During an Attack Common ways that attackers avoid detection include: Flooding log files Using logging mechanisms Attacking detection mechanisms Using canonicalization attacks Using decoys Flooding log files Using logging mechanisms Attacking detection mechanisms Using canonicalization attacks Using decoys

Marcus Murray, MVP How Attackers Avoid Detection After an Attack Common ways that attackers avoid detection after an attack include: Installing rootkits Tampering with log files Installing rootkits Tampering with log files

Marcus Murray, MVP Countermeasures to Detection- Avoidance Techniques Avoidance TechniqueCountermeasures Flooding log files Back up log files before they are overwritten Using logging mechanisms Ensure that your logging mechanism is using the most updated version of software and all updates Attacking detection mechanisms Keep software and signatures updated Using canonicalization attacks Ensure that applications normalize data to its canonical form Using decoys Secure the end systems and networks being attacked Using rootkits Implement defense-in-depth strategies Tampering with log files Secure log file locations Store logs on another host Use encryption to protect log files Back up log files

Marcus Murray, MVP Case Study: Assessing Network Security for Northwind Traders  Planning Security Assessments  Gathering Information About the Organization  Penetration Testing for Intrusive Attacks  Case Study: Assessing Network Security for Northwind Traders

Marcus Murray, MVP Introducing the Case-Study Scenario

Marcus Murray, MVP Defining the Security Assessment Scope ComponentsScope TargetLON-SRV1.nwtraders.msft Timeline Scanning will take place December 2 during noncritical business hours Assess for the following vulnerabilities Buffer overflow SQL injection Guest account enabled RPC-over-DCOM vulnerability

Marcus Murray, MVP Defining the Security Assessment Goals Project goal LON-SRV1 will be scanned for the following vulnerabilities and will be remediated as stated VulnerabilityRemediation SQL Injection Require developers to fix Web- based applications Buffer Overflow Have developers fix applications as required Guest account enabledDisable guest account RPC-over-DCOM vulnerability Install Microsoft security update MS04-012

Marcus Murray, MVP Choosing Tools for the Security Assessment The tools that will be used for the Northwind Traders security assessment include the following: Microsoft Baseline Security Analyzer KB824146SCAN.exe Portqry.exe Manual input Microsoft Baseline Security Analyzer KB824146SCAN.exe Portqry.exe Manual input

Marcus Murray, MVP Reporting the Security Assessment Findings Answer the following questions to complete the report: What risk does the vulnerability present? What is the source of the vulnerability? What is the potential impact of the vulnerability? What is the likelihood of the vulnerability being exploited? What should be done to mitigate the vulnerability? Give at least three options if possible Where should the mitigation be done? Who should be responsible for implementing the mitigations? What risk does the vulnerability present? What is the source of the vulnerability? What is the potential impact of the vulnerability? What is the likelihood of the vulnerability being exploited? What should be done to mitigate the vulnerability? Give at least three options if possible Where should the mitigation be done? Who should be responsible for implementing the mitigations?

Marcus Murray, MVP Session Summary Plan your security assessment to determine scope and goals Disclose only essential information about your organization on Web sites and on registrar records Educate users to use strong passwords or pass-phrases Assume that the attacker already knows the exact operating system and version and take as many steps as possible to secure those systems Keep systems up-to-date on security updates and service packs

Marcus Murray, MVP More information    

Marcus Murray, MVP Marcus Murray