Distributed Network Security Using Free Tools in University Environments Jeff Bollinger, CISSP, GSEC Doug Brown, CISSP, GSEC University of North Carolina.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
Disaster Recovery Planning Because It’s Time! Copyright Columbia University and Bentley College, This work is the intellectual property of the author.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Copyright Brian T. Huntley and Tim Antonowicz 2007 This work is the intellectual property of the authors. Permission is granted for this material to be.
CCSU’s E-portfolio Initiative and the IT Career Ladder Jo Kinnard, Ph.D. Clayton College and State University, Morrow, GA.
Office of the Vice President Copyright Notice Copyright Greg Hedrick, Matthew Wirges This work is the intellectual property of the author. Permission.
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
System Security Scanning and Discovery Chapter 14.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Nessus – A Vulnerability Scanning Tool SUNY Technology Conference June 2003.
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
Computer Security and Penetration Testing
SM3121 Software Technology Mark Green School of Creative Media.
Stephen S. Yau CSE , Fall Security Strategies.
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
Copyright C. Grier Yartz This work is the intellectual property of the author. Permission is granted for this material to be shared.
Copyright Copyright Alayna Wadleigh and Blaine Hensley This work is the intellectual property of the author. Permission is granted for this material.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
INDIANAUNIVERSITYINDIANAUNIVERSITY Automated Network Isolation at Indiana University David A. Greenberg Information Technology Security and Policy Office.
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
Copyright John “Four” Flynn This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Department Of Computer Engineering
Building a Campus Dshield Randy Marchany IT Security Lab VA Tech Blacksburg, VA 24060
| University of Missouri Copyright ©2007 MOREnet and The Curators of the University of Missouri Statenet Security on the cheap and easy Beth.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Haute Software: Juggling Open Source and Vendor Software Jeshua Pacifici, Manager, Learning Systems Kim Gausepohl, Assistant Manager, Online Course Systems.
Unified Messaging at Williams College A Cost Model Analysis By Mark Berman Copyright Mark Berman, This work is the intellectual property of the author.
Classroom Technologies Re-organization Copyright Kathy Bohnstedt, This work is the intellectual property of the author. Permission is granted for.
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
Considerations for Patch Management – an RFP Extensive RFP Extensive RFP Pain in the Butt Pain in the Butt 10 Minutes to tell you about it 10 Minutes to.
Port Scanning.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
NetReg – Virus Killer? Spam Stopper? Copyright – 2006This work is the intellectual property of the authors. Permission is granted for this material to.
COEN 252 Computer Forensics
Honeypot and Intrusion Detection System
March 26, 2003The Navigo Project Hans C. Masing, The University of Michigan Lance D. Speelmon, Indiana University An IMS and OKI Compliant Open Source.
Linux Networking and Security
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Effective Distribution of Academically Licensed Software ©2008 Brent West. This work is the intellectual property of the author. Permission is granted.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan Copyright Kevin Sullivan, Pittsburgh Supercomputing.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Copyright Joel Rosenblatt 2010
CITA 352 Chapter 5 Port Scanning.
Adapting Enterprise Security to a University Environment
Intro to Ethical Hacking
Project for OnLine Instructional Support (POLIS)
6. Application Software Security
Presentation transcript:

Distributed Network Security Using Free Tools in University Environments Jeff Bollinger, CISSP, GSEC Doug Brown, CISSP, GSEC University of North Carolina at Chapel Hill Copyright Jeff Bollinger This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Introduction Access to free tools are ubiquitous and only require the investment of time and a few pieces of hardware. Vendor supplied tools are expensive (initial costs, license fees, maintenance fees, support fees, etc.) and many are not typically customizable or easily scriptable. Given a campus with decentralized or departmental computing, security and incident response is in the hands of everyone – making the process distributed.

Why Free Tools? ( they’re free, right?) Most free tools offer free community support (mailing lists, websites, etc) Open source free tools give the administrator the ability to customize and tailor the results to the needs of the organization. It’s what the bad guys use! Its important to understand what you’re being attacked with so you can recognize the attack/recon signatures. "To know your enemy, you must become your enemy... Keep your friends close and your enemies closer." - Sun Tzu

Trade Off Invest Time or Money? Any security software package is an investment, the question is, what is your organization prepared to invest? Depending on the complexity of the tools, you will need someone who can understand and deploy them. This may require additional training, or some free time to allow your analysts to experiment. You must trust your tools.

Process Preparation Identification Containment Eradication Recovery Lessons Learned

Preparation The preparation phase of the incident handling process is often overlooked but is the most important step. Everyone can participate in this process.

Preparation - Host Cataloguing Host cataloguing: keeping a body of information on multiple hosts on the network. Nbtscan Nmap –sP (Ping Sweep)

Preparation - Vulnerability Assessment Nessus Can crash systems! Great reporting functions (*.html, *.txt, *.xml, etc.) Highly customizable –provides the ability for other administrators to log in and run scans against their own systems. Constantly updated Automatic updates through a cron job (nessus- update-plugins)

Identification

Identification - Intrusion Detection Snort Passive Fiber Tap or Mirror Port Useful as forensic tool High False Positives Steep Learning Curve Very easy and quick to write custom signatures as soon as their needed.

Identification – Checking the Ports Nmap Quick Port scanner New flags* (-sV) can actually show which version of common software you’re running by making an active connection to its port. * version 3.45

Identification – Checking the Ports Netcat Allows you to silently connect to remote ports to try and see what might be running from them. Easy to script when looking at a wide range of IP addresses.

Identification – Checking the Ports Amap Another tool that allows you to check the versions of software running on a particular port. A little more elegant than Netcat, Amap will actually send binary data to a host to try and make it return information on what is running on a particular port

Containment

Penalty Box Isolation VLAN with no router interface Gives administrators time to clean their systems in a safe network environment. Good neighbor ACLs (RFC 1918) DHCP Lease disabling/forced expiration Source Blocking* Configurable unresolved ARP Threshold

Eradication

Fport Shows a port listing matched with a PID of services running on a Windows host. PSKill Can force the killing of an unwanted process. Vision Nice GUI similar to Fport AV Solutions (free removal tools) Custom coding

Recovery

Nmap can tell you which systems have been cleaned. Administrators can you their Fport output for your verification. Custom scan tools can help you probe for any leftovers.

Lessons Learned

The most important step in the Incident Handling process. There really are not any tools for this particular step, but this is a good opportunity to tweak their settings and prepare them for the next big incident. How well did they perform? What were their shortcomings? How can we more effectively use them in the future? What access do we give other administrators to our tools, and how can we justify it? Was our communication with other groups appropriate?

Conclusion Staying current with security tools and being aware of developments within the security community gives you and the other administrators an opportunity to keep up with attack trends and other threats. Free tools provide a substantial ROI, and help to increase the technical ability of your staff. Distribution of duties is critical for a decentralized campus computing infrastructure. Put your trust in other administrators and they will do the same for your security group.

Thank you Contact Jeff at unc.edu Doug at unc.edu

Downloads Nbtscan ( ) Nmap ( ) Nessus ( ) Snort ( ) Netcat ( )

Downloads (Cont.) Amap ( ) Fport ( ) PSKill ( ) Vision ( )