Download presentation
Presentation is loading. Please wait.
Published byEugenia King Modified over 9 years ago
1
Utilising open source tools to map and analyse a domain based IT system
2
I. Introduction II. Method overview III. Domain detail aggregation IV. Procedure V. Visualisation VI. Conclusion © Photo: O van Ginkel
3
Introduction: Domain mapping Purpose of paper: Network mapping technique Visualisation Exposure of cyber-security risk to centrally managed Smart Grid IT infrastructure. Stouffer et al. 2014: Centralised authentication management systems preferred? …to distributed access control solutions Why? Scalability Large number of users and systems Frequent changes in access privileges I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion IV. Procedure
4
Introduction: Domain mapping Typical centralised solution Microsoft TM Active Directory and the Lightweight Directory Access Protocol (LDAP) (Howes 1997: RFC 2254) Stores all accounts Manages authentication / authorization All individuals, systems in domain Numerous concerns: centralised (Stouffer et al. 2014): Authentication servers require high security and availability Local credential caching Network infrastructure needs high reliability - prevent hindrance of authentication attempts. I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion IV. Procedure
5
Introduction: Domain mapping This study endeavours to i nvestigate a technique: Enabling a person to gain knowledge of a domain network Using a set of simple readily available software tools AdFind Nmapnslookup I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion nmap.org support.microsoft.com/kb/200525 joeware.net IV. Procedure
6
Method overview: Domain mapping Utilising the user detail exposed by an Active Directory server Simplify / speed up the process of mapping The domain network 3 Steps: 1. Query 2. Receive 3. Trace / map I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion IV. Procedure AdFindNmapftrace tracert
7
Method overview: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion IV. Procedure
8
Domain detail aggregation: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion IV. Procedure nslookup -types=any _ldap._tcp.domain.com adfind -h adserver.domain.com -b dc=domain,dc=com -f "objectcategory=computer">domainmachines.txt 4 minutes -> details of 50 000 machines of network AdFindnslookup GET AD SERVER AD SERVER DOMAIN FILTERRESULT
9
Domain detail aggregation: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion IV. Procedure Too slow? 4 minutes… Add “-dn” parameter to adfind query less detail returned but 30 seconds for domain names of 50 000 machines Further focus on Servers Limits the approximately 50 000 domain machines to 2 350 Smart Grid supporting servers can be identified and possibly be targeted
10
Domain detail aggregation: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion IV. Procedure Smart Grid Supporting Systems
11
Procedure: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation IV. Procedure V. Visualisation VI. Conclusion nmap --traceroute -sn -iL hostlist.txt -oN routes.txt Other tools evaluated: Nmap ftrace tracert
12
Procedure: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation IV. Procedure V. Visualisation VI. Conclusion Route tracing tool comparative study 1 day: MAPPED 50 000 devices Only servers: 17 minutes
13
Procedure: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation IV. Procedure V. Visualisation VI. Conclusion Latency analysis histogram (all hops: 5 300 devices) Includes intermediary devices
14
Procedure: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation IV. Procedure V. Visualisation VI. Conclusion Latency analysis histogram (final hops: 2 350 devices) D C B A Excludes intermediary devices
15
Procedure: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation IV. Procedure V. Visualisation VI. Conclusion Spatial agreement of typical final hop latency D C B A Spatial location Province Associated average latency (milliseconds) Gauteng2 Free State10 KwaZulu-Natal15 Western Cape24 Pinpoint the location of critical cyber assets within the Smart Grid environment without the necessity of a geo-IP database
16
Visualisation: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion Visualisation tools: Data design IV. Procedure RadialNetZenMapvis.js Support JSON For visualisation (Almende 2015)
17
Visualisation: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion Detail on demand added IV. Procedure
18
Visualisation: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion Mapped domain network IV. Procedure
19
Visualisation: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion Mapped domain network (zoom) IV. Procedure
20
Conclusion: Domain mapping I. Introduction II. Method overview III. Domain detail aggregation V. Visualisation VI. Conclusion Requests launched at an Active Directory Server Filtering prior to scanning and mapping of the network In 20 minutes: knowledge of critical systems, both physical and network location Ensure that Smart Grid architecture exhibits : Robustness Sufficient redundancy Communication network sustained Do not expose critical cyber assets to damage by accidental or malicious intruders IV. Procedure
21
Thank you!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.