Download presentation
Presentation is loading. Please wait.
1
Network Security and Monitoring
Some network vulnerabilities and threats Reconnaissance Monitoring
2
Network Vulnerabilities
Technology vulnerabilities Operation system vulnerabilities Configuration vulnerabilities Etc
3
TCP/IP Vulnerabities Many TCP/IP based applications have inherent vulnerabilities TFTP Telnet Use more secure apps (SSH, etc) Some standard TCP/IP applications are used for reconnaissance and attacks SNMP ICMP
4
Reconnaissance What is reconnaissance?
Reconnaissance is the process of acquiring information about your network While it usually precedes an attack the point where reconnaissance stops and attacks begin isn’t always clear What type of information are they seeking? Network topology Device type and OS Addressing Services and assets Personnel/account passwords
5
Reconnaissance Social engineering Enumeration
Footprinting/Fingerprinting
6
Network Enumeration Network Enumeration is the discovery of hosts/devices on a network. May be accomplished by use of overt discovery protocols such as ICMP and SNMP May also use port scans of various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host and solicit host specific banners.
7
Fingerprinting Passive fingerprinting uses tools to analyze communications to and from a remote host while it goes about it's normal business.
8
Fingerprinting Active fingerprinting tools rely on stimulus-response.
Different Operating Systems respond to packets (stimulus) in different ways. The source will send certain packets to the target then analyze the target’s response to identify the operating system.
9
IP Spoofing Attacker can use IP spoofing to impersonate the identify of a trusted host or decoy Typically limited to injection of data or commands, since replies to a spoofed address will not reach the attacker
10
Some Layer 2 Threats CDP/LLDP Reconnaissance
MAC Address Table Flooding Attack CAM table overflow attack VLAN Attacks Switch spoofing/insertion – create trunk DHCP Attacks DHCP spoofing or starvation (DOS)
11
Some Protection methods
802.1x – device authentication Supplicant Authenticator Authenticating Server
12
Some Protection methods
Telnet/SSH authentication AAA - Authentication, Authorization, Accounting Local database Remote Authentication Dial-In User Service (RADIUS) Terminal Access Controller Access Control System (TACACS)
13
Other Vulnerabilities
Telnet/SSH authentication AAA - Authentication, Authorization, Accounting Local database Remote Authentication Dial-In User Service (RADIUS) Terminal Access Controller Access Control System (TACACS)
14
Monitoring Use attacker utilities Attack your own network SNMP
SNMP agent – community strings SNMP manager MIB Traps
15
Monitoring Port mirroring (SPAN)
Allows station to receive frames intended for others Local or remote IPS/IDS Packet analyzer
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.