Presentation is loading. Please wait.

Presentation is loading. Please wait.

FORESEC Academy FORESEC Academy Security Essentials (III)

Similar presentations


Presentation on theme: "FORESEC Academy FORESEC Academy Security Essentials (III)"— Presentation transcript:

1 FORESEC Academy FORESEC Academy Security Essentials (III)

2 FORESEC Academy Agenda  The need for host-based ID  Host-based ID Methodology  Unix host-based ID Tools  Windows host-based ID Tools

3 FORESEC Academy Need for Host-based ID  Very fast networks  Switched networks  Encrypted networks  Backdoors in local network  Insider on network  Network-based IDS may miss attack  Don't trust corporate security that much

4 FORESEC Academy Very Fast Networks  The current limits for network-based IDS boxes are about 80 MB/sec fully loaded  A 200 MHz Pentium bus would only partially increase this  Bandwidth at large sites will probably always exceed network detection and processing speed  HIDS does not face bandwith challenges, but does present deployment issues

5 FORESEC Academy Switched Networks  Network-based intrusion detection systems rely on promiscuous mode for their NICs; this is not possible with switched networks  Intrusion detection in the switch is the future direction, not really here yet  Spanning ports and network taps provide semi-effective options

6 FORESEC Academy Switched Network Diagram In a switched network, a virtual circuit is created between two peers across the switch fabric. Each port on the switch only supports the circuits to that host.

7 FORESEC Academy Spanning Port Switched Networks Sensors can be placed on a spanning port, but can usually only monitor one VLAN at a time. This does not work very well in practice.

8 FORESEC Academy Network Taps

9 FORESEC Academy Encrypted Networks  NIDS sensors can't analyze what they can't read  The use of encryption for network traffic is growing  Encryption can be used by attackers to hide their traffic  Traffic must be read before/after the encryption process  NIDS and HIDS can work together to address these challenges

10 FORESEC Academy Host-based Intrusion Detection Methodology  Host-based systems monitor their network connections and file system status. For this to work, we have to acquire the aggregate logs of ALL critical systems at a minimum  Local processing/alerting may be done, but data is generally sent to a central location for parsing  When potential problems are found, alerts are raised

11 FORESEC Academy Host-based Intrusion Detection Methodology (2) 1)A connects to B 3) Logserver records A-> B connection, checks ruleset, A -> B is OK, waits. 2) B logs connection and informs Logserver

12 FORESEC Academy Unix Host-based Intrusion Detection  TCPWrappers  Port Sentry  Syslog  Swatch  Tripwire

13 FORESEC Academy TCPWrappers  Monitors and filters incoming TCP network service requests  Valuable logging tool  Where to get it - ftp://ftp.porcupine.org/pub/security/index.html - Currently included in most Unix / Linux distributions

14 FORESEC Academy Without TCPWrappers All incoming TCP requests serviced

15 FORESEC Academy With TCPWrappers All requests checked and logged

16 FORESEC Academy Host Deny ALL : ALL # Deny everything, add back with /etc/hosts.allow

17 FORESEC Academy Host Allow ALL:.nnnn.abc.org, 192.168.2, friend.somewhere.edu sshd: trustedhost.somewhere.org

18 FORESEC Academy Paranoid Mode  Default for TCPWrappers -Checks both forward and reverse DNS lookup -Both answers must match or connection is dropped -Adds a layer of security against spoofing

19 FORESEC Academy Brief DNS Review ( TCPWrappers Paranoid mode)

20 FORESEC Academy TCPWrappers in Action (Intrusion detection AND prevention)

21 FORESEC Academy TCPWrappers Threat List  Outsider attack from network  Outsider attack from telephone  Insider attack from local network  Insider attack from local system  Attack from malicious code

22 FORESEC Academy Psionic Port Sentry (TCPWrappers with an attitude)  Runs on TCP and UDP  Stealth scan detection for Linux  SYN/half-open, FIN, NULL, X-MAS and oddball packet stealth scans  Port Sentry will react to a port scan attempt by blocking the host in real-time  Will remember hosts that connected previously

23 FORESEC Academy Psionic Port Sentry Log  Jul 3 11:30:20 shepherd portsentry[418]: attackalert: SYN/Normal scan from host:node10453.a2000.nl/24.132.4.83 to TCP port: 143  Jul 3 11:30:20 shepherd portsentry[418]: attackalert: Host 24.132.4.83 has been blocked viawrappers with string: "ALL: 24.132.4.83“  Jul 3 11:30:20 shepherd portsentry[418]:attackalert: Host 24.132.4.83 has been blocked viadropped route using command: "/sbin/route add –host24.132.4.83 gw 333.444.555.666"

24 FORESEC Academy Syslog  Unix system logger can be on a local system or other system  TCPWrappers logs to Syslog by default  Logs can offer valuable information, but they can also be compromised  Swatch or other tools can monitor syslog and raise alerts


Download ppt "FORESEC Academy FORESEC Academy Security Essentials (III)"

Similar presentations


Ads by Google