Security Issues in Unix OS Saubhagya Joshi Suroop Mohan Chandran.

Slides:



Advertisements
Similar presentations
Application Security Best Practices At Microsoft Ensuring the lowest possible exposure and vulnerability to attacks Published: January 2003.
Advertisements

Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Chapter One The Essence of UNIX.
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 7 HARDENING SERVERS.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
Guide To UNIX Using Linux Third Edition
Computer Security and Penetration Testing
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Application Layer. This graphic is taken from The Abdus Salam International Centre for Theoretical Physics.
Hacking Unix/Linux.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
INNOV-04 The SANS Top 20 Internet Security Vulnerabilities Michael Solomon, CISSP PMP CISM Solomon Consulting Inc. (Thanks to.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
Hands-On Ethical Hacking and Network Defense
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Mid 1960 ’ s - Multics - proposed by AT&T, Honeywell, GE & MIT; funded by DARPA Thompson & Ritchie create Unix 1978 to 84 - Bill Joy & Chuck Haley.
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
SATAN Presented By Rick Rossano 4/10/00. OUTLINE What is SATAN? Why build it? How it works Capabilities Why use it? Dangers of SATAN Legalities Future.
1 Version 3.0 Module 11 TCP Application and Transport.
The In’s and Out’s of the IIS 6.0 Migration Tool The In’s and Out’s of the IIS 6.0 Migration Tool Chris Adams Web Platform Supportability Lead Microsoft.
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Copyright 2001 Marchanyh1 Auditing Networks, Perimeters and Systems The SANS Top Ten Audit Checklists, Part 1.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Operating System Security Fundamentals Dr. Gabriel.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Cisco – Chapter 15 Application Layer closest to you as an end-user, when you are interacting with software.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
Securing the Linux Operating System Erik P. Friebolin.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Guide to Network Security 1 st Edition Chapter Eight Security of Web Applications.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Web Technology Seminar
Operating System Security
Introduction to Operating Systems
Hacking Unix/Linux.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
IIS.
Lesson 16-Windows NT Security Issues
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Security Issues in Unix OS Saubhagya Joshi Suroop Mohan Chandran

Security Management2 Contents  Current scenario –Major players –General threats –Top ten Unix threats  Taxonomy of threats  Examples  Security Management

Security Management3 Major Players  NIST, CERT, SANS Institute, CERIAS, Mitre Inc.  Database + Tools  CVE (121 vulnerabilities out of 3052 unique entries, CVE Version Number: )  ICAT (213 out of 7493 vulnerabilities)  Cassandra

Security Management4 General threats  People (malicious, ignorance)  Physical  Communications  Operations  OS flaws –Denial of Service (DoS) –Spoofing –Privilege Elevation –Repudiation –Replay Attacks –Viruses/Trojans/Worms –Disclosure of Information –Sabotage/Tampering AttacksAttacks

Security Management5 Top Ten Vulnerabilities (SANS Institute + FBI)  BIND Domain Name System  Web Server (CGI scripts)  Authentication (weak, default or no password)  Version Control Systems (buffer overflow on CVS)  Mail Transport Service (insecure SMTP & MTA)  Simple Network Management Protocol (SNMP) –Remotely manage systems, printers, routers  Open Secure Sockets Layer (SSL) –Mainly buffer overflow (POP3, IMAP, LDAP, SMTP)  Misconfiguration of Enterprise Services NIS/NFS  Databases (MySQL, POSTgreSQL, Oracle)  Kernel

Security Management6 Taxonomy codingoperationalenvironment Incorrect permission configuration condition validation Race condition Improper/inadequate Failure to handle exception synchronization Incorrect setup parameters Utility in wrong place Input validation Boundary condition Origin validation Field value correlation Access right validation Type and number of input Missing input Extraneous input syntax Source: Taimur Aslam, Taxonomy of Security Faults in Unix OS, Purdue University, 1995

Security Management7 Operational Examples codingoperationalenvironment Incorrect permission configuration condition validation Race condition Improper/inadequate Failure to handle exception synchronization Incorrect setup parameters Utility in wrong place Input validation Boundary condition Origin validation Field value correlation Access right validation Type and number of input Missing input Extraneous input syntax tftp (trivial file transfer protocol) disclosure of information  sendmail wizard mode  WIZ command  default password = “wizzywoz”

Security Management8 Synchronization Examples codingoperationalenvironment Incorrect permission configuration condition validation Race condition Improper/inadequate Failure to handle exception synchronization Incorrect setup parameters Utility in wrong place Input validation Boundary condition Origin validation Field value correlation Access right validation Type and number of input Missing input Extraneous input syntax “xterm” (window interface in X windows) mknod foo p xterm –lf foo mv foo junk ln –s /etc/passwd foo cat junk if run as root, existing files may be replaced

Security Management9 Condition Validation Example codingoperationalenvironment Incorrect permission configuration condition validation Race condition Improper/inadequate Failure to handle exception synchronization Incorrect setup parameters Utility in wrong place Input validation Boundary condition Origin validation Field value correlation Access right validation Type and number of input Missing input Extraneous input syntax /etc/exports (SunOS4.1) rcp (remote copy) Redirect characters from other user’s terminal uux rem_machine ! rmail anything & command fsck repairs file consistency -- If fsck fails during bootup, privileged shell starts as root

Security Management10 Environment Examples codingoperationalenvironment Incorrect permission configuration condition validation Race condition Improper/inadequate Failure to handle exception synchronization Incorrect setup parameters Utility in wrong place Input validation Boundary condition Origin validation Field value correlation Access right validation Type and number of input Missing input Extraneous input syntax “exec” system call executes some executable object file or data file conaining commands SunOS version 3.2 and early link with name = “-i” exec –i (becomes interactive mode

Security Management11 Security Management in UNIX  US/CERT, AUSCERT - UNIX Security Checklist (2001)  US/CERT, AUSCERT – Steps to Recover from a UNIX or NT System compromise (2000)

Security Management12 UNIX Security Checklist v2.0  The First Step  Basic Operating System  Major Services  Specific Operating Systems

Security Management13 The First Step  Update software and security Patches of the OS.  Make sure that all security mechanisms like Digital signatures and hashing schemes are up to date.  Keep track of all updates to the OS and the services.

Security Management14 Basic Operating System  Network Services  Network Administration  File System Security  Account Security  System Monitoring

Security Management15 Major Services  Name Service  Electronic Mail  Web Security  FTP – ftp and anonymous ftp  File Services  X-Windows System

Security Management16 Specific Operating Systems  BSD-Derived Operating Systems  Linux Distributions  Solaris  IRIX  HP-UX  Digital/Compaq Tru64 UNIX  AIX

Security Management17 Steps to Recover from a Compromise  Before you get Started  Regain Control  Analyze the Intrusion  Contact relevant CSIRT and other sites involved  Recover from the intrusion  Improve the security of the system and network  Reconnect to the Internet  Update your Security Policy