PPT - UCCSC 2009

Download Report

Transcript PPT - UCCSC 2009

UCCSC 2009 - Focus on Security
An Overview of Non-Commercial Software for Network
Administrators
Doug Nomura
[email protected]
June 16 2009
Disclaimer
Don’t blame me if your workstation breaks or
something bad happens to your network
Scientist Gone Bad - this
is me!
Expectations
General overview - Only have 60 minutes!
Focus will be on tools to help detect problems
with your network
Two Hat Perspective
If you can use the tool, think how it can be
used against you!
Approach
Tool will be described
What the tool does
How can you use it
Advantages/disadvantages
Topics to be covered
Data Mining 1A
Web 2.0
Kismet
OpenVAS
Metasploit
More Topics
NMap
Web Vulnerability Scanners
Pros and Cons of the free stuff
The Future
Data Mining 1A
Data Mining 1A
Every network leaks or broadcasts information
What is allowable or acceptable by your
organization?
This section will give examples of types of
information being broadcast - allowable and
sensitive
Classic Sources of Data
Leaks
DNS & MX records
Technical forums
Job sites
Google’s
Advanced Operators
Reduce noise
Help to refine search
Operator:search term
Tutorial to advanced operators
http://www.googletutor.com/googlemanual/web-search/adding-advancedoperators/
Operators
domain:ucdavis.edu
“Exact phrase”
Intitle: Look for phrase in page
Types of information
Personal information
Technical information
Let’s look for some
personal information
Does anyone from UCD
know person?
or My Gosh - Look
at the SSN!!!
Sensitive information
deleted from this slide
Is anyone from UCSF?
Or this probably should
not be broadcast to the
world
Sensitive information
deleted from this slide
Text
Example of a technical google hack revealing
Nessus Scan Reports
Summary of Google
Hacking
Use Google to peruse your servers for
sensitive information
Clean up your mess like old scan reports
Educate users about the danger of
broadcasting information
The Pros of Google
Hacking
Find information you didn’t know was being
broadcast
It’s cheap and works
The Cons of Google
Hacking
Someone may have found the information
already
You may not find everything
Fear the Google cache!!!!!
References for Google
Hacking
See Johnny Long’s book - Google Hacking for
Penetration Testers - ISBN-10 1597491764
Any questions - just send me an email
Web 2.0
Example: Twitter
Technical
Exploitation of code
Passive enumeration
Users careless of information being
broadcast
Solution
Identify types of data not be broadcast
Educate
Users need to be made aware there are
people “watching.”
“Free” Tools
Many released under GNU/GPL
Range from simple to complex
Many have great support and documentation
Kismet
Detects presence of 802.11 APs
Sniffs traffic
IDS
kismewireless.net
Kismet
Note error messages at bottom - ignore them
Courtesy of kismetwireless.net
Why use Kismet?
Pen testing of APs
Seek out rogue APs
Survey and map 802.11 installation
Distributed IDS
Kismet Advantages
Initial cost is free
Very powerful
Customizable
plugins
Cons of Kismet
Interface
May require significant configuration
Incompatibilities
Long term cost could be high due to time spent
configuring and tweaking apps
OpenVAS
Vulnerability Assessment
Based upon Nessus 2.2
Released under GNU/GPL
openvas.org
Image Courtesy of openvas.org
Image Courtesy of openvas.org
Image Courtesy of openvas.org
OpenVAS
Runs well on Linux
Financially - free VA tool
Growing support for project
Disadvantages
Problems with some NVTs
Some difficulty non-linux platform
Metasploit
Security Framework identifies vulnerabilities
and exploits them
Intended for penetration testing and research
Customizable
metasploit.org
Metasploit
Text
Command line interface of Metasploit
Metasploit
Example vulnerability to be used on Windows 2000 machine
Metasploit
Selection of exploit
Metasploit
Access has been achieved on
remote machine
Metasploit Advantages
Growing community of users
Growing documentation
Runs well on most flavors of *nix
Excellent tool to identify and exploit
vulnerability
Metasploit Disadvantages
Do not expect all exploits nor may be up to
date with latest exploits
Lack of logging or reports
Machine running Metasploit can be
compromised
This is a very dangerous tool and may violate
policy at your institution. Use on test network
NMap - Network Mapper
Sends raw IP packets to specific host, or a
range of hosts
Determines OS, version, open ports, identifies
potential vulnerability
nmap.org
NMap
Network administrators and other IT folk
responsible for network based assets
Pen testers and other security folk
NMap
Loki:/Users/Doug root# nmap -sV 192.168.1.1-25
Starting Nmap 4.85BETA9 ( http://nmap.org ) at 2009-06-14 23:56 PDT
Interesting ports on 192.168.1.1:
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet Cisco telnetd (IOS 6.X)
443/tcp open ssl/http Cisco PIX Device Manager
MAC Address: 00:08:21:3A:29:B2 (Cisco Systems)
Service Info: OS: IOS; Device: firewall
Interesting ports on 192.168.1.2:
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp tnftpd 20061217
22/tcp open ssh OpenSSH 5.1 (protocol 1.99)
548/tcp open afp Apple AFP (name: Feline; protocol 3.2; Mac OS X 10.4/10.5)
MAC Address: 00:0D:93:32:D0:26 (Apple Computer)
Service Info: Host: Feline.local
Interesting ports on 192.168.1.4:
Not shown: 999 closed ports
PORT STATE SERVICE
VERSION
5009/tcp open airport-admin Apple AirPort admin
MAC Address: 00:03:93:1F:01:65 (Apple Computer)
Interesting ports on 192.168.1.6:
Part of a Nmap scan report
Strengths of NMap
Large base of support from user and developer
community
Mature product
Fast and versatile scanner
Extremely stable. Install and go!
Weaknesses of NMap
Some scans seem to be intrusive
Some scans have crashed hosts being
scanned
Web Vulnerability
Scanners
GNU/GPL World
Singular in purpose
Paros
Stagnant
Nikto
Web Vulnerability
Scanners
Singular purpose tools usually check for a
single type of vulnerability (i.e. XSS, SQL
injection). You would have to have a lot of
different GNU/GPL tools to encompass all
possible vulnerabilities
Web Vulnerability
Scanners
Some projects become stagnant or die due to
core developers ability to devote time to
project
Advantages of the “free”
apps
Initial cost is low
Some projects have a community of support
Documentation
A potentially powerful tool rivaling commercial
tools
Advantages of “free”
apps
Use older hardware
Great for that older machine collecting dust
Disadvantages
Project stability
UI issues
Application stability
Speed of development
Upgrades may be challenging
Geek Factor
Geek Factor
100
Geek
Factor
0
“cost”
100
What to do?
Define your needs
Determine stability and viability of project
Be willing to invest time
Be diligent
The future
Greater and easier exploitation of Web 2.0
You must educate your users about the
dangers
Handhelds will be both targets and attackers
The End
Further questions? Drop
me an email.
[email protected]