Copyright 2001 Marchany1 Auditing Networks, Perimeters and Systems Introduction
Copyright 2001 Marchany2 Who should be here Unix Sys Admins NT Sys Admins Auditors In general, just really cool people!
Copyright 2001 Marchany3 The Audit Track Goal Auditors – need to know a little bit of techie to be able to perform a meaningful audit Sys Admins – need to think a little more like auditors Everybody! – Think like an attacker!
Copyright 2001 Marchany4 Randy Marchany VA Tech Computing Center Blacksburg, VA SANS 2001 Applying Risk Analysis Techniques to Information Systems
Copyright 2001 Marchany5 Unit 1: Pay Me Now or Pay Me Later Why we need to check our infrastructure
Copyright 2001 Marchany6 Why Bother? This section will give you some concrete examples of what can happen if you don’t have basic security rules at your site. Every one of these attacks could have been prevented ahead of time with minimal effort. The cost to fix it afterwards was much higher!
Copyright 2001 Marchany7 Pay Me Now or Pay Me Later E = D + R –E = amount of time you’re exposed –D = amount of time it takes to detect an attack –R = amount of time it takes to react to an attack Easiest way to calculate the cost of an Incident –Multiply average hourly wage * Time * People
Copyright 2001 Marchany8 The Top 10 Vulnerabilities BIND (Unix/Linux/NT/Win2K) CGI programs (www servers) RPC (Tooltalk) (Unix/linux/NT/Win2K) Microsoft IIS – RDS and others (NT/Win2K) Sendmail (Unix/Linux) Sadmind and mountd (Unix/Linux) Global file sharing (NetBios, NFS, Appleshare) Weak/no passwords, demo/guest accounts IMAP/POP buffer overflow Default SNMP community strings (Network)
Copyright 2001 Marchany9.77%Webdist#2, #4 15.5%IMAP#9 12.4%Qpopper#9.52%Innd 26.1%Tooltalk#3, #6 10.8%RPC_mountd#3, #6 18.1%BIND#1 12.2%WWW# Hosts scannedTOTAL Percent VulnerabilityTop 10 #
Copyright 2001 Marchany10 The Top 10 Internet Threats for 2000 Available at You should check your systems for these vulnerabilities The fix is simple. Apply Patches or ServicePaks. Your sysadmins/netadmins should check your system(s) for the top 10 threats. –Bindview Hackershield – NT systems –SARA, SAINT – Unix/Linux freeware tools
Copyright 2001 Marchany11 References –Top 10 threats, Defeating Ddos, etc. –Early Warning Vulnerability list –Federal Search & Seizure Guidelines
Copyright 2001 Marchany12 Course Revision History