Presentation is loading. Please wait.

Presentation is loading. Please wait.

2 Richard S. Carson and Associates Management Consulting Web-Based Products World Wide Digital Security, Inc. Backgroun d.

Similar presentations


Presentation on theme: "2 Richard S. Carson and Associates Management Consulting Web-Based Products World Wide Digital Security, Inc. Backgroun d."— Presentation transcript:

1

2

3 2 Richard S. Carson and Associates Management Consulting Web-Based Products World Wide Digital Security, Inc. Backgroun d

4 3 A suite of web-based security assessment tools used to determine a network’s vulnerability and risk, with a patent pending methodology —  Single assessment  Network  Denial of Service Our Product

5 4 Benefits of WebSaint TM  Web based delivery system – basis for minimum user impact  Dedicated computer is not needed – it is run on the web  Easy to use – complexities of installing software are removed  No costly software  Results are self explanatory – trained security professionals are not needed  Use as many times as you need under the 3-month subscription  Cost advantage in terms of product price and minimal resource impact  Product is always up-to-date with the most current vulnerabilities and threats

6 5 Our Customer The network administrator of a small to medium size enterprise who is looking for the easiest and most accurate tool to analyze network security —  Overworked  Dealing with Y2K issues  Resources limited for security

7 6 The Opportunity 1997 2002 Internet Users 50 million 175 million Electronic Commerce $8 billion$327 billion Network Security$1.3 billion $6.5 billion

8 7 The Opportunity Our niche is the Internet Security Assessment market — estimated to be $1 billion by 2002 WebSaint™ provides:  Vulnerability assessment by identifying security strengths and weaknesses  Detailed review and evaluation of a company's network, allowing the development of a baseline security policy from the data collected.  Corporate confidence that current security standards are being met.

9 8 Our Competition  Internet Security Systems, Inc.  Network Associates, Inc.  Axent Technologies, Inc.  Netect, Inc.  Security Dynamics Technologies, Inc.

10 9 Our Uniqueness in the Security Market  Patent pending, web-based delivery system  Subscription sales/easy selling approach  Focused – security assessments  Leads to consulting services

11 10 Marketing  SATAN  SAINT  WebSaint TM  Name recognition  VARs, partnerships, Joint Development Agreements  Using integrated Web and PR marketing approach  www.wwdsi.com

12 11  SATAN Released April 1995  COAST extensions released in December 1995  No updates since release  Scan of large network using SATAN prompted development of SAINT SAINT TM History

13 12 SAINT TM – The New SATAN New tests for the following:  “R” services (rlogin, rshell and rexec)  Vulnerable CGIs (e.g., webdist, phf, and test-cgi)  Vulnerable versions of IMAP and POP  SMB open shares  New backdoors (NetBus, Back Orifice)  ToolTalk service  Vulnerable versions of DNS  rpc.statd service  UDP echo and/or chargen (can be used for DoS)  Vulnerable news servers

14 13 SAINT TM – The New SATAN  Identifies Microsoft Windows (3.x, 95, 98, NT) computers (may be vulnerable to various DoS attacks)  Added a new attack level (heavy +)  Performs in a firewalled environment  Many cosmetic and functional improvements

15 14  UNIX platform (AIX, OSF, Free BSD, BSDI, IRIX, HP-UX, Linux, SunOS, System V)  20MB disk space  As much memory as you can get  Perl 5.00 or above  C compiler  Web browser  SAMBA (for SMB tests) What You Need

16 15 How it Works

17 16  Controls what hosts SAINT may probe  Controls the intensity of the probes  Specified in the configuration file  attack level and what probes are included  status file  timeouts and timeout signals  proximity variables  trusted or untrusted  targeting exceptions  workarounds (DNS, ICMP)  Some settings can be changed via command-line switches or from hypertext user interface Policy Engine

18 17  Specified by User  one host  class C subnet  Generated by inference engine when processing facts generated by data acquisition module  Saves time by checking whether hosts are actually alive first  fping (default)  tcp_scan on common ports (firewall) Target Acquisition

19 18  Executes probes based on target’s scanning level  light  normal  heavy  heavy plus  Written in Perl or shell script  Output written to database in common tool record format Data Acquisition

20 19  Rules applied in real-time  Results are either  new facts for inference engine  new probes for data acquisition module  new targets for target acquisition module  Actually six separate engines controlled by own rule base  todo – what probe to perform next  hosttype – deduces system classes  facts – deduces potential vulnerabilities  services – translates cryptic daemon banners and/or port numbers to user- friendly names  trust – classifies data collected on NFS, DNS, NIS, and other cases of trust  drop – what to ignore Inference Engine

21 20  Facts – data generated by data acquisition module and inference engine  All-hosts – all hosts seen  Todo – all things it did Database Format

22 21  Target – name of host record refers to  Service – base name of tool or service being probed  Status – if host was reachable  Severity – how serious was the vulnerability  Trustee – who trusts another target (user@host)  Trusted – who the trustee trusts (user@host)  Canonical Service Output  for non-vulnerability records, the reformatted version of the network service  for vulnerability records, the name of the tutorial  Text – additional information for reports Database Format – Facts

23 22  Host name  IP address  Proximity from original host  Attack level host has been probed with  Was subnet expansion on? (1 = yes, 0 = no)  Time scan was done Database Format – All-hosts

24 23  Host name  Tool to be run next  Arguments for tool Database Format – Todo

25 24  Requires an HTML browser  Documentation  Data management  Data gathering  Viewing results –vulnerabilities –host information –trust  Also can be run from the command line User Interface

26 25 SAINT TM Vulnerabilities  DNS vulnerabilities  FTP vulnerabilities  Hacker program found  HTTP CGI access  IMAP version  INN vulnerabilities  NFS export to unprivileged programs  NFS export via portmapper  Open SMB shares  Remote shell access  REXD access  Sendmail vulnerabilities  SSH vulnerabilities  TFTP file access  Unrestricted modem  Unrestricted NFS export  Writable FTP home directory Red — Services that are vulnerable to attack. Hackers exploiting these services may cause substantial harm.

27 26 SAINT TM – Vulnerabilities Yellow — Services that may directly or indirectly assist a hacker in determining passwords or other critical information.  NIS password file access  Unrestricted X server access

28 27  Excessive finger information  HTTP CGI info  NetBIOS over the Internet  POP server  POP version  Possible DoS (fraggle) problem  Remote login on the Internet  Remote shell on the Internet  Rexec on the Internet  Statd vulnerability  Rstatd vulnerability  Rusersd vulnerability  Sendmail info  Windows detected Brown — Services that may not be vulnerable but the configuration and/or version may make them vulnerable. Further investigation on the part of the system administrator may be necessary. SAINT TM Vulnerabilities

29 28 SAINT TM Vulnerabilities Green — Services that do not have any vulnerabilities apparent through remote assessment. (However, if passwords have been compromised, these services may prove to be vulnerable to exploitation by local users).

30 29  System Administrators  Security Administrators  Requires some knowledge of UNIX  Requires installation and configuration of software  What about the less technical, less UNIX savvy administrator?...... Who Uses It?

31 30  Web browser  Internet connection  E-mail address What You Need

32 31 How it Works  Customer requests scan via Web page  Customer receives e-mail containing URL for custom page  Customer uses custom page to start scan  Customer receives a second e-mail after the scan completes containing a new URL for the results  Customer can perform an unlimited number of scans within the subscription period

33 32 Getting off the ground... We’d like to hear your comments and ideas.

34 33 Detailed SAINT TM Vulnerabilities

35 34 SAINT TM Red Services (1of 5)  DNS vulnerabilities  Impact: unauthorized access (remote) and/or denial of service  Resolution: patch or updated version  FTP vulnerabilities  Impact: unauthorized access (remote or local)  Resolution: patch, updated version, restrict access  Hacker program found  Impact: host has been compromised  Resolution: remove program, remove hacker  HTTP CGI access  Impact: execute arbitrary commands (remote or local)  Resolution: remove/disable CGI

36 35 SAINT TM Red Services (2of 5)  IMAP version  Impact: unauthorized access (remote)  Resolution: patch, updated version, restrict access  INN vulnerabilities  Impact: unauthorized access (remote)  Resolution: patch, updated version  NFS export to unprivileged programs  Impact: unauthorized file access (read/write), program execution  Resolution: restrict access, block router ports (2049, 111)  NFS export via portmapper  Impact: unauthorized file access (read/write)  Resolution: restrict access, block router ports (2049, 111)

37 36 SAINT TM Red Services (3of 5)  Open SMB shares  Impact: unauthorized file access (read/write)  Resolution: disable SMB over Internet, restrict access  Remote shell access  Impact: unauthorized remote shell/login from arbitrary hosts  Resolution: restrict access  REXD access  Impact: unauthorized REXD remote access from arbitrary hosts  Resolution: disable service, restrict access  Sendmail vulnerabilities  Impact: unauthorized access (remote)  Resolution: patch, updated version

38 37 SAINT TM Red Services (4of 5)  SSH vulnerabilities  Impact: unauthorized use of credentials (local)  Resolution: updated version  TFTP file access  Impact: unauthorized access (remote)  Resolution: disable service, restrict access  Unrestricted modem  Impact: unauthorized access (remote) of modem  Resolution: restrict access  Unrestricted NFS export  Impact: unauthorized file access (read/write)  Resolution: restrict access, block router ports (2049, 111)

39 38  Writeable FTP home directory  Impact: unauthorized file access (read/write/execute)  Resolution: restrict access SAINT TM Red Services (5of 5)

40 39  NIS password file access  Impact: access to NIS password file by arbitrary hosts  Resolution: restrict access  Unrestricted X server access  Impact: unrestricted X server access from arbitrary hosts  Resolution: restrict access SAINT TM Yellow Services

41 40 SAINT TM Brown Services (1 of 4)  Excessive finger information  Impact: releases excess account information  Resolution: disable service, restrict access  HTTP CGI info  Impact: provides information about server  Resolution: remove/disable CGI  NetBIOS over the Internet  Impact: unauthorized file access (read/write)  Resolution: disable service  POP server  Impact: unauthorized access (passwords in the clear)  Resolution: disable service, use more secure version

42 41 SAINT TM Brown Services (2 of 4)  POP version  Impact: unauthorized access (remote)  Resolution: patch, updated version, restrict access  Possible DoS (fraggle) problem  Impact: denial of service (intermediary and victim)  Resolution: router configuration  Remote login on the Internet  Impact: unauthorized shell access (with no password)  Resolution: disable service, restrict access  Remote shell on the Internet  Impact: unauthorized remote shell/login from arbitrary hosts  Resolution: restrict access

43 42 SAINT TM Brown Services (3 of 4)  Rexec on the Internet  Impact: unauthorized program execution (remote)  Resolution: disable service, restrict access  Sendmail info  Impact: provides information about users  Resolution: Disable EXPN and VRFY commands  Statd vulnerability  Impact: unauthorized access (remote/local)  Resolution: patch, disable service  Rstatd vulnerability  Impact: provides information about host’s performance  Resolution: disable service

44 43 SAINT TM Brown Services (4 of 4)  Rusersd vulnerability  Impact: provides information about users  Resolution: disable service  Windows detected  Impact: operating system may be vulnerable to denial of service  Resolution: patch, disable unnecessary services


Download ppt "2 Richard S. Carson and Associates Management Consulting Web-Based Products World Wide Digital Security, Inc. Backgroun d."

Similar presentations


Ads by Google