A ttack B ox D esign 7/11/01 D0G of WAR. Blake ~Internet Consultant~ Security Audits & WAN / LAN...

Preview:

Citation preview

Attack Box Design7/11/01

D0Gof

WAR

 

Blake~Internet Consultant~

Security Audits & WAN / LAN Infrastructure Designs

Netspan@hotmail.com

San Jose (408) 907-5003 / San Francisco (415) 561-9374

1. Introduction2. Attack Box Design:

-CUJ0 OS Selection Hardware Selection OS Layout Baseline Software Load Lock & Load: Extended Toolz Selection - Layout of the Lab -Zombies -Those Evil Web Servers -Fighting Back, ‘Rooting the Attacker’

-P0IS0N -Conceptual: The Death Star Design 3. Overview of Security Audits 4. Closing

Building an Attack Box

From the Ground Up….

‘CUJ0’

OS Selection For Tools

WINDOWS (98 / NT / Win2k)

LINUX

BSD

SOLARIS

Single OS vs Multiboot

Hardware SelectionVia Piece-Meal

(which Manufacturers, Sizing, etc ???)Motherboard, Processor(s)

RAM

Hard Drives

Floppy

NIC Cards

CD Rom / CD Burner

External Modem

Printer

Total Cost =

Hardware Selection: (cont’d)

Laptops

Used Hardware(Where to look for Cheap Stuff)

Multiboot Options

MBRWindows Boot.ini

Lilo bootFreeBSD multiboot

BootMagicSystem Commander

MSTBoot Bootit NGVMWare

OS Load Order

Which one first ???

The Problems with Installations

Partitions

PrimaryExtendedLogicalVirtual

Formatting

Layout on the Hard DrivesSizing & Resizing

Baseline

Software Loads

Different Configurations

Partition Imaging of Different Loads

Drive Imaging

Storage

TOOLZSelection

Integration

Testing

Evaluation

Parsing the Code

Making you own Scripts & Toolz

Layout of the Lab for Testing Toolz

Master File Server

Attack, Victim, & Monitoring Boxes

Network Equipment & Configurations

Fractional / T1

DSL

Cable Modem

Dial-up

Routers / Switches / Hubs

Firewalls

Sniffers / Network IDS

Other Types of Attack Boxes

(cont’d)

Automated vs ‘Hands-on’

Vulnerability Scanners

Other Types of Attack Boxes

(cont’d)

Zombies

Other Types of Attack Boxes

(cont’d)

Those

Evil Web Servers

FIGHTING BACK

‘Rooting the Attacker’

Other Types of Attack Boxes

(cont’d)

‘P0IS0N’The Honeypot with an Attitude

(A Box That Bites Back)

Other Types of Attack Boxes

(cont’d)

‘The Death Star Design’

PERFORMING SECURITY AUDITS

Discussion

END

Recommended