COMP3371 Cyber Security Richard Henson University of Worcester November 2015.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

DMZ (De-Militarized Zone)
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
System Security Scanning and Discovery Chapter 14.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Web Server Administration TEC 236 Securing the Web Environment.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Firewalls and Intrusion Detection Systems
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
EC-Council’s Certified Ethical Hacker (CEH) Richard Henson May 2012.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 7: Using Windows Servers to Share Information.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Honeypot and Intrusion Detection System
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Topic 5: Basic Security.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Role Of Network IDS in Network Perimeter Defense.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Computer Security Sample security policy Dr Alexei Vernitski.
COMP1321 Digital Infrastructures Richard Henson University of Worcester April 2016.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
COMP3123 Internet Security Richard Henson University of Worcester November 2011.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Security fundamentals
Chapter 40 Internet Security.
COMP3371 Cyber Security Week 10
Instructor Materials Chapter 7 Network Security
Introduction to Networking
Firewalls.
COMP1321 Digital Infrastructures
COMP3371 Cyber Security Week 8
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

COMP3371 Cyber Security Richard Henson University of Worcester November 2015

Week 7: Prevention Strategies n Objectives:  Relate B2B and B2C hesitancy over use of the www to ignorance about the PKI  Use high level Information Security policy to drive change in an organisation  Identify potential internal and external threats to company data  Use vulnerability/penetration testing to check access to the network from outside

Global Use of SSL/PKI n According to recent figures, nearly all top companies in the US are now using SSL/PKI for secure communications:  top 40 e-commerce sites  all Fortune 500 companies with a web presence n Conclusion: technology tried and tested; has become industry-standard n Problem  is technology implemented correctly?  who bothers to check?

Security and Online trading n "Online shopping gets a bad rap in the press, but most of the stories reported are anecdotal tales of companies that haven't put successful defensive measures in place“ n "Web businesses running proper screening of customer information are suffering very little, with average fraud losses held to just over 1%.” n “Fraud control is clearly possible online, although many companies do not implement stringent screening and prevention measures.”

Why are security problems STILL arising? n Repeating research findings:  SSL/PKI reliable n However…  Many companies not applying strict security measures such as SSL/PKI are: »being defrauded »skewing the statistics for more responsible online traders n ````````````````Solution?

Encryption alone is not enough! n The other aspect of SSL/PKI is the establishment of trust between online vendors and customers  usually achieved by providing a digital certificate system: »verifies the identity at each end of the communication link »thereby authenticating the server/user n The savvy user knows about digital certificates and expects to be able to view them online

Security Differences between B2B and B2C n ASSUMING THAT business sets themselves up properly for online trading  use server certificates for their servers  use SSL to ensure data is encrypted  train users to be aware of danger signs n A B2B customer using the web will (SHOULD!!!) understand implications of security messages from the browser

Organisational Data Security Strategy: Where to start? n Can’t START with technology  needs to start with ISSUES that need addressing n Should be primarily “top down”  concerned with policies, not technical matters…  can be supplemented by “bottom up” approach n Technologies can be used to put policies into practice  degree of success in the latter depends on: »communication of policies »understanding of technologies

Information Security Policy matters n Who will quantify the threats?  Head of IT?  External Consultant?  both? n Who will suggest strategies to mitigate against those threats?  as above? n Who will make the policies?  Senior Management »with guidance…

Creating a Policy n The same principles apply as with the introduction of ANY change in organisational policy  MUST come from the top!!! n Problem: senior management genereally don’t understand IT… n Big responsibility on the IT manager to convince senior management:  that policy (change) is necessary!  that the organisation won’t suffer financially  the consequences of NOT implementing such a change

Going beyond a Creating a Policy… n According to the latest BERR figures, the majority of businesses say they have an information security policy  but is it implemented??? n One possible approach to making sure policy gets through to all parts of an organisation is to implement a quality standard  e.g. ISO27001… also ISACA, IASME, others

Role of the Adviser/Consultant n Specialist knowledge of Information Security in organisations n Aware of the need to convince senior management that the cost involved in achieving a quality standard is worthwhile n In an SME:  the adviser can provide moral, intellectual, and evidential support for the IT manager’s position n In a microbusiness:  there is no IT manager…  adviser will usually be supporting the most IT- literate employee against a sceptical senior mgt…

How achieving a quality standard could help with business strategy n Whatever the business:  any new work will have a cost  that cost needs to be qualified n More cost means less profit…  what is the ROI of achieving a high level of information security (assurance)?

Potential Financial Benefits of Information Assurance n Need to be sold to senior mgt…  less risk of losing valuable (even strategically important…) data »less likely to get embarrassing leaks, which could even get to the media (!) »less likely to fall foul of the law (!)  an ever growing set of examples of businesses who have done both of the above »evidence that they lost customers and share price dropped…

Role of Adviser/Consultant n Needs to have good credentials to be credible:  plenty of experience in this area  contacts in the industry  good track record for: »knowledgeability »keeping up to date »communication of knowledge  needs to be able to put technical problems into terms that non-technologists can understand…. »very many technical “solutions” available that would be unnecessary if systems and procedures were properly implemented

Protection against the Threats n Internal threats?  should be addressed directed through implementation of IS policy n External Threats?  Normally addressed through: »1. vulnerability scanning »2. action taken from vulnerability reports

Information Security Strategy n Identify and quantify ALL potential security threat:  BOTH internal »Policy should already exist! »Most likely will need updating  AND external »May have been neglected as the Internet creeped into the network! n Need to set out a policy that, if implemented correctly, WILL effectively secure data

What and Why of “Footprinting” n Definition:  “Gathering information about a “target” system” n Could be Passive (non-penetrative) or active  Find out as much information about the digital and physical evidence of the target’s existence as possible »need to use multiple sources… »may (“black hat” hacking) need to be done secretly

Rationale for “passive” Footprinting n Real hacker may be able to gather what they need from public sources  organisation needs to know what is “out there” n Methodology:  start by finding the URL (search engine) »e.g.  from main website, find other external-facing names »e.g. staffweb.worc.ac.uk

Information Gathered without Penetration Testing n Domain Names n User/Group names n System Names n IP addresses n Employee Details/Company Directory n Network protocols used & VPN start/finish n Company documents n Intrusion detection system used

Website Connections & History n History: use  The Wayback Machine n Connections: use robtex.com n Business Intelligence:  sites that reveal company details  e.g.

More Company Information… n “Whois” & CheckDNS.com:  lookups of IP/DNS combinations  details of who owns a domain name  details of DNS Zones & subdomains n Job hunters websites:  e.g.  

People Information n Company information will reveal names n Use names in  search engines  Facebook  LinkedIn n Google Earth reveals:  company location(s)

Physical Network Information (“active” footprinting or phishing) n External “probing”  should be detectable by a good defence system… (could be embarrassing!) n e.g. Traceroute:  Uses ICMP protocol “echo” »no TCP or UDP port  reveals names/IP addresses of intelligent hardware: »e.g. Routers, Gateways, DMZs

Footprinting n Using the system to find the organisation’s names structure  “passive” monitor s sent »IP source address »structure of name  “active” sending programs : »test whether addresses actually exist »test restrictions on attachments

Phishing to extract user data (not intelligence gathering) n Send user a message with a link or attachment  link is a form which tries to get their personal data  attachment contains malware which will infect their system n Phishing a bit obvious to professionals… »wouldn’t be used by network infiltrators trying to hide their tracks

Utilizing Google etc. (“passive”) n Google: Advanced Search options: n Uses [site:] [intitle:] [allintitle:] [inurl:]  In each case a search string should follow  e.g. “password” n Maltego  graphical representations of data

Network Layers and Hacking n Schematic TCP/IP stack interacting at three of the 7 OSI levels (network, transport, application): TELNETFTP NFSDNS SNMP TCP UDP IP SMTP X XX X X X ports

TCP & UDP ports n Hackers use these to get inside firewalls etc. n Essential to know the important ones:  20, 21 ftp80 http389 Ldap  22 ssh88 Kerberos443 https  23 telnet 110 pop3636 Ldap/SSL  25 smtp135 smb  53 dns137-9 NetBIOS  60 tftp161 snmp

Reconnaissance/Scanning n Three types of scan:  Network (already mentioned) »identifies active hosts  Port »send client requests until a suitable active port has been found…  Vulnerability »assessment of devices for weaknesses that can be exploited

Scanning Methodology n Check for Live Systems n Check for open ports n “Banner Grabbing” n Scan for vulnerabilities n Draw Network diagram(s) n Prepare proxies…

Legality and Vulnerability Scanning n Depends on whether you have asked!  running tests like this requires equipment and an experts time  would charge for the service, so… yes, would be normal! n Hacker wouldn’t want organisation to know  wouldn’t ask!  illegal but gambles on not being caught!

Ethical Hacking Principles n Hacking is a criminal offence in the UK  covered through The Computer Misuse Act (1990)  tightened in 2006 n Can only be done ”legally” by a trained (or trainee) professional  a computing student would be considered in this context under the law

Ethical Hacking principles n Even if it legal, doesn’t mean it is ethical! n Professionals only hack without permission if there is reason to believe a law is being broken  if not… they must ask permission  otherwise definitely unethical (and illegal… “gaining access without permission”)

“Scanning” Methodology n Check for Live Systems n Check for open ports n “Banner Grabbing”  e.g.  e.g. bad html request n Scan for vulnerabilities n Draw Network diagram(s) n Prepare proxies…

Proxy Hacking (or Hijacking) n Attacker creates a copy of the targeted web page on a proxy server  uses methods like: »keyword stuffing »linking to the copied page from external sites… n Artificially raises search engine ranking  authentic page will rank lower… »may even be seen as duplicated content, in which case a search engine may remove it from its index

Typical Types of External Attacks - 1 n Exhaustive  “brute force” attacks using all possible combinations of passwords to gain access n Inference  taking educated guesses on passwords, based on information gleaned n TOC/TOU (Time of check/use)  1. use of a “sniffer” to capture log on data  2. (later) using captured data & IP address in an attempt to impersonate the original user/client

Typical Types of External Attacks - 2 n Three other types of attacks that firewalls should be configured to protect against:  denial of service (DOS) attacks  distributed denial of service (DDOS) attacks  IP Spoofing (pretence that the data is coming from a “safe” source IP address

Blocking TCP ports with a Firewall n Very many TCP and UDP ports:  are tightly bound to application services  1024 – more loosely bound to services  – are private, or “dynamic” n In practice, any port over 1023 could be assigned dynamically to a service… n One of the more useful features of a firewall is that ports can be configured, and therefore data flow can be monitored and controlled

Blocking TCP ports with a Firewall n Generally, TCP ports should be:  EITHER open for a service (e.g. HTTP on port 80)  OR… blocked if no service, to stop opportunists n But if the firewall only allows “official services” this can cause problems for legitimate users  e.g. if port 25 is blocked, data cannot be sent

Protecting Against TCP/IP Attacks, Probes and Scans n TCP/IP protocol stack has been largely unchanged since the early 1980's:  more than enough time for hackers to discover their weaknesses  often attack through a particular TCP port

TCP Port 21: FTP (File Transfer Protocol) n FTP servers excellent  BUT by their very nature they open up very big security holes  those that allow anonymous logins are used: »to launch attacks on the server itself, by connecting to the C: drive and downloading viruses or overwriting/deleting files »to store pirated files and programs n Precaution:  configure FTP servers NOT to accept anonymous logins  only allow access to port 21 through the firewall to that particular server

TCP Port 23: Telnet n Telnet is really good for providing access to servers and other devices  accessing a server via Telnet is very much like being physically located at the server console n Protecting against Telnet is simple:  block ALL access to port 23 from the outside  block perimeter networks to the inside n Protecting internal servers from attack from the inside:  configure them to accept telnet connections from very few sources  block port 23 completely…

TCP Port 25: SMTP n programs large, complex, accessible…  Therefore an easy target…  Buffer overrun: »attacker enters more characters – perhaps including executable code - into an field (e.g. To: ) than is expected by an server –error could be generated –hackers could gain access to the server and the network  SPAM attack: »protocol design allows a message to go directly from the originator's server to the recipient's server n can ALSO be relayed by one or more mail servers in the middle n BUT… this is routinely abused by spammers –forward message to thousands of unwilling recipients

Port 25 SMTP: solution… n Buffer Overrun:  Solution: put server on a perimeter network n Spam Attack  Solution: DISABLE the relaying facility…

TCP and UDP Port 53: DNS (Domain Name Service) n One of the core protocols of the Internet  without it, domain name to IP address translation would not exist n PROBLEMS: If a site hosts DNS, attackers will try to:  modify DNS entries  download a copy of your DNS records (a process called zone transfer)

Port 53 DNS: Solution… n Solution:  configure firewall to accept connections from the outside to TCP port 53 only from your secondary DNS server »the one downstream from you e.g. your ISP  consider creating two DNS servers: one on your perimeter network, the other on the internal network: »perimeter DNS will answer queries from the outside »internal DNS will respond to all internal lookups »configure a Stateful inspection firewall to allow replies to internal DNS server, but deny connections being initiated from it

TCP Port 79: Finger n A service that enumerates all the services you have available on your network servers:  invaluable tool in probing or scanning a network prior to an attack! n To deny all this information about network services to would-be attackers, just block port 79…

TCP Ports : POP (Post Office Protocol) n POP easy-to-use…  but sadly it has a number of insecurities n The most insecure version is POP3 which runs on port 110  if the server requires POP3, block all access to port 110 except to that server  if POP3 not used, block port 110 entirely…

TCP Ports 135 and 137 NetBIOS n The Microsoft Windows protocol used for file and print sharing  last thing you probably want is for users on the Internet to connect to your servers' files and printers! n Block NetBIOS. Period!

UDP Port 161 SNMP n SNMP is important for remote management of network devices:  but also it poses inherent security risks  stores configuration and performance parameters in a database that is then accessible via the network… n If network is open to the Internet, hackers can gain a large amount of very valuable information about the network… n So… if SNMP is used:  allow access to port 161 from internal network only  otherwise, block it entirely

Denial of Service (DoS) Attacks n An attempt to harm a network by flooding it with traffic so that network devices are overwhelmed and unable to provide services. n One of the primary DOS attacks uses Ping, an ICMP (Internet Control Message Protocol) service:  sends a brief request to a remote computer asking it to echo back its IP address

“Ping” Attacks n Dubbed the "Ping of Death“ n Two forms:  the attacker deliberately creates a very large ping packet and then transmits it to a victim »ICMP can't deal with large packets »the receiving computer is unable to accept delivery and crashes or hangs  an attacker will send thousands of ping requests to a victim so that its processor time is taken up answering ping requests, preventing the processor from responding to other, legitimate requests n Protection:  block ICMP echo requests and replies  ensure there is a rule blocking "outgoing time exceeded" & "unreachable" messages

Distributed Denial of Service Attacks/IP Spoofing n Related :  A DDOS attack has occurred when attackers gain access to a wide number of PCs and then use them to launch a coordinated attack against a victim »often rely on home computers, since they are less frequently protected (they can also use worms and viruses)  If IP spoofing is used, attackers can gain access to a PC within a protected network by obtaining its IP address and then using it in packet headers

Protection against DDOS & IP Spoofing n Block traffic coming into the network that contains IP addresses from the internal network… n In addition, block the following private IP, illegal and unroutable addresses:  Illegal/unroutable: » , , , &  “Private” addresses useful for NAT, or Proxy Servers (RFC 1918): » » » n Finally, keep anti-virus software up-to-date, & firewall software patched and up-to-date