Download presentation
Presentation is loading. Please wait.
Published byElmer Cook Modified over 9 years ago
1
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | ondrej@sevecek.com | www.sevecek.com |
2
Motto Thou shalt never assume The Rogue Warrior's Eight Commandment of SpecWar Richard Marcinko US Navy Seal
3
Current Threats
4
Attackers External don’t know anything about your environment can try brute force passwords at most vulnerability scanning Internal most severe threat know their environment have already at least some level of access can steal data they are authorized to read
5
Protection: External Attackers Firewalls Antispam/Antimalware Software Updates Account Lockout
6
Current threats Assuming Physical security computers data Passwords cracking, keyloggers Eavesdropping wired/wireless networks Spam/malware directed attacks Remote Access from unsecure computers Data theft by authorized readers currently one of the most underestimated problem
7
Current Threats
8
Vulnerabilities Examples: My wife crossing a road PKI misconfiguration in a bank Hidden accounts after virus attack Malicious mail from home vs. from work
9
Protection: Assumptions Never assume anything Be careful Know your enemy Don’t do anything you don’t understand
10
Current Threats
11
Machines Servers rack security Data storage Client computers desktops, notebooks usually caching data Peripherals Remote offices
12
Network Wireless AirPCap Wired USB Ethernet switch + netbook
13
Vulnerabilities Computers easily accessed by a lot of people employees maintenance staff theft from branch offices Attacks stealing the whole machine stealing the data only Physical access = local administrator
14
Protection: Physical access Limit physical access Place computers/storage into secure locations +hardware locks, cables Define security boundaries data stolen passwords compromised Encryption BitLocker, TrueCrypt
15
Protection: BitLocker Provide password on startup prevents other from becoming an administrator Use TPM Trusted Policy Module stores the password on mother board checks signatures of BIOS, CMOS, MBR, Boot Sector, loader etc. Windows 7 Enterprise/Ultimate
16
Current Threats
17
Vulnerabilities Keyloggers software hardware Cache Cracking
18
Local Password Storage Full-text passwords IE autocomplete password “lockers” fingerprint readers service/scheduled-tasks accounts Password hashes local user accounts all domain accounts on Domain Controllers password caches
19
Password Cracking Windows MD4 Hashes local storage LAN network capture PPTP VPN Offline Rainbow Tables severe up to 7 characters (minutes)
20
Protection: Passwords Use smart cards vs. fingerprints convenient (3-5 characters PIN) still secure than passwords Require strong passwords Procedures, policies and audit Never type sensitive passwords on insecure computers Training
21
Protection: Comparable Algorithm Strengths (SP800-57) StrengthSymetricRSAECDSASHA 80 bit2TDEARSA 1024ECDSA 160SHA-1 112 bit3TDEARSA 2048ECDSA 224SHA-224 128 bitAES-128RSA 3072ECDSA 256SHA-256 192 bitAES-192RSA 7680ECDSA 384SHA-384 256 bitAES-256RSA 15360ECDSA 512SHA-512
22
Protection: Smart Cards AlgoritmusPorovnání 10 znaků heslo US-ASCII70 bit SHA-180 bit RSA 2048112 bit SHA-256128 bit AlgoritmusNáročnostDoba 10 znaků heslo US-ASCII12 500 let SHA-11024x lepší2 600 000 let RSA 20484 398 046 511 104x lepší11 000 biliónů let SHA-2562^58x lepší-
23
Protection: Password Policies For the whole domain only Windows 2003 Domain Function Level and older For individual groups/users Granular Password Policies Windows 2008 Domain Functional Level and newer Non-complex password example login: Ondrej password: #.J@mES-BonD58
24
Current Threats
25
Vulnerabilities Free network access No network traffic encryption People ignore warnings ARP poisoning
26
Protection: Eavesdropping Implement IPSec/SSL encryption Always encrypt WiFi not only require authentication Implement 802.1x for network access Implement ARP protection Train people
27
Protection: 802.1x Switch PC Printer PC
28
Current Threats
29
Secure Socket Layer / IPSec Web Server Client Certificate Public key Private key
30
Public key Secure Socket Layer Web Server Client Certificate Public key Private key Random Data
31
Attacking SSL Web Server Client Certificate Public key Private key Attacker False Certificate Public key Private key
32
SSL Certificate prices Verisign – 1999 300$ year Thawte – 2003 150$ year Go Daddy – 2005 30$ year GlobalSign – 2006 250$ year StartCom – 2009 free
33
SSL Assurance Email loopback confirmation Requires just a valid email address No assurance about the target identity
34
EV browsers BrowserVersion Internet Explorer7.0 Opera9.5 Firefox3 Google Chrome- Apple Safari3.2 Apple iPhone3.0
35
EV Certificate prices Verisign – 1999 1500$ year Thawte – 2003 600$ year Go Daddy – 2005 100$ year GlobalSign – 2006 900$ year StartCom – 2009 50$ year
36
TMG Forward SSL Inspection
37
No SSL Inspection
38
TMG CA Not Trusted
40
Web Server Certificate
41
TMG CA Trusted on the Client
42
Current Threats
43
Vulnerabilities No real prevention against spam Spam created anonymously no traces/auditing Directed attacks cannot be automatically recognized Users tend to use same passwords for more services Stability and performance
44
Spam Threats Phishing Hoax think something do something online do something physically! Personal reputation after forwarding
45
Malware Threats Virus must be first detected after infection! Backdoors just download the real infection does antimalware know what exactly it was? Reinstallation of the whole environment!
46
Protection: Spam and malware Train people Implement antispam/antimalware Words/Open Relay Lists etc. SenderID
47
Current Threats
48
Vulnerabilities Prone to keylogger attacks when used with passwords Can be connected from quite anywhere insecure home computers, internet cafes Some protocols not secure PPTP – passwords hashes offline cracking
49
Client VPN Comparison VPNConnection requirementsLogon Client Availability Authentic. RDP TCP 3389 server certificate (not required) random keys (D-H) certificate private key (2048bit) Windows XP password smart card RDS/TS Gateway TCP 443 server certificate random keys (D-H) certificate private key (2048bit) Windows XP password smart card PPTPGRE + TCP 1723 depends on password quality vulnerable to offline cracking MS-DOS password smart card L2TP IPSec ESP + UDP 500/4500 server certificate client computer certificate random keys (D-H) certificate private key (2048bit) Windows 98 password smart card SSTP TCP 443 server certificate random keys (D-H) certificate private key (2048bit) Windows Vista password smart card
50
Protection: Remote Access Use RDP when possible sends only keystrokes and mouse receives only pictures Use L2TP or SSTP IPSec or SSL encrypts the channel with strong random private keys (2048 bit etc.) IPSec requires and limits connection to those who have client computer certificate Implement VPN Quarantine
51
LAN DirectAccess Client DA Server
52
Current Threats
53
Vulnerabilities Authorized users can read print copy send emails upload FTP/SSL/VPN
54
Protection: Authorized users Procedures Limit public online access and services Limit use of removable hardware Use some Rights Management software Data Leakage Protection
55
Current Threats
56
Takeaway Anything you don’t have under your direct control is insecure Don’t use insecure computers Use strong passwords or rather smart cards Encrypt data and transmissions Never trust email
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.