Linux Networking and Security

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
1 Linux Networking and Security Chapter 2. 2 Configuring Basic Networking Describe how networking devices differ from other Linux devices Configure Linux.
Essential NetTools Pranay Kumar. Essential NetTools  This tool is a set of network tools useful in diagnosing networks and monitoring your computer's.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
System Security Scanning and Discovery Chapter 14.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
Intrusion Detection Systems and Practices
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Computer Security and Penetration Testing
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
COEN 252: Computer Forensics Router Investigation.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Port Scanning.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Hands-on Networking Fundamentals
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
COEN 252 Computer Forensics
Linux Networking and Security Chapter 11 Network Security Fundamentals.
Chapter 6: Packet Filtering
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
SATAN Presented By Rick Rossano 4/10/00. OUTLINE What is SATAN? Why build it? How it works Capabilities Why use it? Dangers of SATAN Legalities Future.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CIS 450 – Network Security Chapter 3 – Information Gathering.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
MIS Week 4 Site:
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
CHAPTER 9 Sniffing.
TCP/IP bai3110. Topics covered TCP/IP layers TCP UDP IP ICMP Unicast Broadcast Multicast ARP IGMP Sniffing Port scanning.
Sniffer, tcpdump, Ethereal, ntop
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Hackers and Scanners Antti Palokangas. Hackers & scanners Most of scanners are easy to use and widely distributed It is no longer a question of if, but.
Role Of Network IDS in Network Perimeter Defense.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network Devices and Firewalls Lesson 14. It applies to our class…
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Working at a Small-to-Medium Business or ISP – Chapter 8
Lab 2: Packet Capture & Traffic Analysis with Wireshark
CITA 352 Chapter 5 Port Scanning.
The Linux Operating System
Securing the Network Perimeter with ISA 2004
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
Traffic Analysis with Ethereal
Intrusion Detection Systems (IDS)
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Network hardening Chapter 14.
Protection Mechanisms in Security Management
Presentation transcript:

Linux Networking and Security Chapter 12 Network Intrusion Detection

Network Intrusion Detection Use network scanning and packet-sniffing utilities Understand basic intrusion detection systems Perform automated security audits of your Linux system

Scanners and Sniffers Cracker can employ the following techniques in order to gain access to a Linux system: Port scanning, in which packets are sent to a host to gain information about it based on its response Packet sniffing, in which every packet on the network has its header and data examined Network administrators also use these techniques to check for security weaknesses, and though some feel their use is illegitimate, it is important to stay ahead of crackers

Port Scanning A port scan enables someone to identify a network’s operating system and any services that could potentially allow greater access Port scans typically use the TCP protocol and its associated flags to gather information about the host and its network services Some port scanners use ICMP and UDP packets, which do not provide as much data as TCP, but can offer some information that TCP cannot

Port Scanning

Port Scanning The most widely used port-scanning utility is nmap, the network mapper nmap is a command-line utility that uses a variety of scanning methods nmap allows for fingerprinting hosts, greater output, and configuration of timing policy nmap can also perform a Ping scan, which reports hosts that are reachable using ICMP echo packets

Port Scanning

Port Scanning

Port Scanning

Packet Sniffing A packet sniffer allows for the examination of any or all of the traffic passing through a network cable or wireless space An Ethernet card can enable packet sniffing only if it is operating in promiscuous mode Users must be logged in as root to use this mode, so packet sniffers require root access If encryption technologies such as SSH, GPG, and stunnel are used, packet data is more secure

Packet Sniffing Three popular Linux utilities are: IPTraf displays individual network connections, with protocol and other data for each one, and it also displays statistics by protocols, certain host names, or certain IP addresses tcpdump provides information similar to IPTraf, but it also includes more detailed information about network packets Ethereal takes tcpdump a step farther in that it is a graphical network analysis tool

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Packet Sniffing

Using Intrusion Detection Software Intrusion detection is the process of noticing when someone is trying to break into (or has already broken into) a system This category of software is called intrusion detection systems (IDS) PortSentry, by Psionic, watches network ports for packets that appear to be port scans A more complex tool than PortSentry is Linux IDS, or LIDS, which can alter the Linux kernel

Using Intrusion Detection Software Big Brother provides a different level of intrusion detection than LIDS and it uses a client/server model similar to SNMP Big Brother includes a server that gathers data from clients on each network host and displays that data as a Web page Some of the 26 standard services Big Brother will manage are DNS, FTP, HTTP, POP3, SSH, Telnet, disk space and memory usage

Using Intrusion Detection Software

Using Intrusion Detection Software Suggested use of intrusion detection tools: Use nmap to scan the system after configuration to check for security holes Next use PortSentry to watch for outside hosts trying to port scan the server Use LIDS to secure your file system and processes so that anyone who is able to gain unauthorized access will have very limited power Use Big Brother to keep a constant eye on services that are provided on network servers

System Security Audits The best way to test confidence in the security of a Linux system is to perform a security audit Security audits are reviews or tests of how secure the system is and what needs to be done to improve its security A security audit could take the form of: A careful review of the security policy Use of special security-auditing software

System Security Audits One of the first security-auditing programs was called Security Administrator Tool for Analyzing Networks (SATAN) The Security Administrator’s Integrated Network Tool (SAINT) replaced SATAN SAINT uses a Web browser interface to manage an “attack” on a network and report vulnerabilities found Other security audit tools are Tiger and SARA

System Security Audits

System Security Audits

System Security Audits

Chapter Summary Port-scanning software lets anyone learn about the potentially vulnerable network access points on any networked computer Port scanners use various combinations of TCP flags, UDP packets, and Ping packets to elicit responses that inform the scanner about the services running on the targeted host When a host detects that someone is using a port scanner, software such as PortSentry can take action to prevent the completion of the port scan and block all future access by the host performing the scan

Chapter Summary The most used port-scanning software is nmap and graphical utilities are available as nmap front ends Packet sniffers use the promiscuous mode of a NIC to capture all data passing through that node of the network, including all headers and payloads; Ethereal is a powerful and popular graphical packet sniffer Packet sniffing is just one type - though the most comprehensive - of network traffic analysis; other programs such as IPTraf help network administrators analyze network traffic patterns based on protocol, point of origin or destination, and other factors

Chapter Summary The tcpdump program is a very popular network traffic analysis program that captures detailed information about network packets Intrusion detection systems (IDS) are an important part of modern network security and they watch for signs of intruders trying to access your servers and help you respond appropriately PortSentry is one piece of IDS software that detects port scans from programs like nmap; A more comprehensive package is LIDS, which alters the Linux kernel so that the root user has limited access

Chapter Summary Big Brother is a simpler IDS that watches the status of network services on multiple servers through a Web page interface Security audits using security policies or specialized software can help network administrators see potential security problems and fix them before someone else finds them One popular security-auditing software tool is SAINT and many others are available