Download presentation
Presentation is loading. Please wait.
Published byGordon Baldwin Modified over 9 years ago
1
OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services Harden Internetwork Connection Devices Harden DNS and BIND Servers Harden Web Servers Harden File Transfer Protocol (FTP) Servers Harden Network News Transfer Protocol (NNTP) Servers Harden Email Servers Harden Conferencing and Messaging Servers
2
OV 4 - 2 Copyright © 2005 Element K Content LLC. All rights reserved. Internetwork Devices SwitchesRoutersFirewalls
3
OV 4 - 3 Copyright © 2005 Element K Content LLC. All rights reserved. Unnecessary Network Protocols Transport protocols NetBEUI NWLink AppleTalk Service protocols NNTP FTP Others
4
OV 4 - 4 Copyright © 2005 Element K Content LLC. All rights reserved. Firmware Updates
5
OV 4 - 5 Copyright © 2005 Element K Content LLC. All rights reserved. Internetwork Device Vulnerabilities SNMP Telnet Router configuration Finger Small server IP filter Default ports IP source routing ICMP redirect RIP v1
6
OV 4 - 6 Copyright © 2005 Element K Content LLC. All rights reserved. A DMZ DMZ Web server
7
OV 4 - 7 Copyright © 2005 Element K Content LLC. All rights reserved. An Intranet Employee handbook
8
OV 4 - 8 Copyright © 2005 Element K Content LLC. All rights reserved. An Extranet Company A Company C Company B
9
OV 4 - 9 Copyright © 2005 Element K Content LLC. All rights reserved. A VLAN Point-to-point connection Point-to-point connection Point-to-point connection Point-to-point connection VLAN switch
10
OV 4 - 10 Copyright © 2005 Element K Content LLC. All rights reserved. NAT 192.168.12.100 NAT Server 192.168.12.20 192.168.12.30 24.96.83.120
11
OV 4 - 11 Copyright © 2005 Element K Content LLC. All rights reserved. Network Media Types Coax Twisted pair Fiber-optic
12
OV 4 - 12 Copyright © 2005 Element K Content LLC. All rights reserved. Network Media Vulnerabilities Coax vulnerabilities Twisted-pair vulnerabilities Fiber-optic vulnerabilities General vulnerabilities
13
OV 4 - 13 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices Protect the devices while maintaining connectivity Follow hardening guidelines Requirements will vary
14
OV 4 - 14 Copyright © 2005 Element K Content LLC. All rights reserved. DNS everythingforcoffee.com www.everythingforcoffee.com 192.168.1.2 www.everythingforcoffee.com 192.168.1.2.com.org
15
OV 4 - 15 Copyright © 2005 Element K Content LLC. All rights reserved. DNS and BIND Vulnerabilities Spoofing Hijacking Cache corruption Input validation Environment variables Zone transfers Rogue client registrations
16
OV 4 - 16 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening DNS and BIND Protect the zone information while maintaining service availability Follow hardening guidelines Requirements will vary
17
OV 4 - 17 Copyright © 2005 Element K Content LLC. All rights reserved. HTTP Web client Web server
18
OV 4 - 18 Copyright © 2005 Element K Content LLC. All rights reserved. Web Server Authentication Web client Web server
19
OV 4 - 19 Copyright © 2005 Element K Content LLC. All rights reserved. Web Server Authentication Methods Address-based Anonymous Basic Digest Integrated Certificates
20
OV 4 - 20 Copyright © 2005 Element K Content LLC. All rights reserved. Web Server Vulnerabilities Format string Improper input validation CGI scripts Code outside web root Web server applications Weak authentication Clear text transmissions HTML source code Buffer overflows
21
OV 4 - 21 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Web Servers Protect data and server while maintaining website access Follow hardening guidelines Requirements will vary
22
OV 4 - 22 Copyright © 2005 Element K Content LLC. All rights reserved. FTP FTP client
23
OV 4 - 23 Copyright © 2005 Element K Content LLC. All rights reserved. FTP Vulnerabilities Basic authentication Anonymous and blind FTP Unnecessary services Clear text transmissions Firewall configuration “Glob” “Bounce” File sharing exploitation
24
OV 4 - 24 Copyright © 2005 Element K Content LLC. All rights reserved. SSH Password Password is encrypted Session is secured 011001 slogin
25
OV 4 - 25 Copyright © 2005 Element K Content LLC. All rights reserved. SFTP SSH encryption FTP client
26
OV 4 - 26 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening FTP Servers Protect the server and data while maintaining service Follow hardening guidelines Requirements will vary
27
OV 4 - 27 Copyright © 2005 Element K Content LLC. All rights reserved. NNTP Subscriber
28
OV 4 - 28 Copyright © 2005 Element K Content LLC. All rights reserved. NNTP Vulnerabilities NNTP Anonymous access Password privacy Data privacy Email integration
29
OV 4 - 29 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening an NNTP Server Prevent unauthorized postings and data loss while maintaining service Follow hardening guidelines Requirements will vary NNTP
30
OV 4 - 30 Copyright © 2005 Element K Content LLC. All rights reserved. SMTP Email clientEmail server
31
OV 4 - 31 Copyright © 2005 Element K Content LLC. All rights reserved. Email Vulnerabilities Email worms Malicious code 8.3 file names Data buffers Spam Hoaxes SMTP relays
32
OV 4 - 32 Copyright © 2005 Element K Content LLC. All rights reserved. PGP Public email security Encrypt message contents and encrypt key Digital signing
33
OV 4 - 33 Copyright © 2005 Element K Content LLC. All rights reserved. S/MIME Security for email attachments Various attachment file formats Encryption and digital signing
34
OV 4 - 34 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Email Servers Protect server and mail data while supporting email users Follow hardening guidelines Requirements will vary
35
OV 4 - 35 Copyright © 2005 Element K Content LLC. All rights reserved. Conferencing and Messaging Vulnerabilities Sniffing Eavesdropping Privacy Social engineering
36
OV 4 - 36 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Conferencing and Messaging Servers Protect server and data, prevent spoofing, maintain service availability Follow hardening guidelines Requirements will vary
37
OV 4 - 37 Copyright © 2005 Element K Content LLC. All rights reserved. Reflective Questions 1.Which internetwork connection device do you think is most important to secure? 2.Which provides a greater security threat to your organization: your border router or your email infrastructure?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.