29
Dynamic policies o Change as system security state/load changes o GAA architecture Extended access control lists Pre-, mid- and post-conditions, request- result conditions Speak about security posture, system states, authentication mechanisms, etc. Intrusion scenario o Reconnaissance, scanning, break-in and misuse, maintaining access, covering tracks o Reconnaisance: low-tech, Web-based Summary From the Last Lecture

Summary From the Last Lecture

  • Upload
    toya

  • View
    43

  • Download
    0

Embed Size (px)

DESCRIPTION

Summary From the Last Lecture. Dynamic policies Change as system security state/load changes GAA architecture Extended access control lists Pre-, mid- and post-conditions, request-result conditions Speak about security posture, system states, authentication mechanisms, etc. - PowerPoint PPT Presentation

Citation preview

Page 1: Summary From the Last Lecture

Dynamic policieso Change as system security state/load changesoGAA architecture

Extended access control lists Pre-, mid- and post-conditions, request-result

conditions Speak about security posture, system states,

authentication mechanisms, etc. Intrusion scenarioo Reconnaissance, scanning, break-in and

misuse, maintaining access, covering trackso Reconnaisance: low-tech, Web-based

Summary From the Last Lecture

Page 2: Summary From the Last Lecture

Domain Name System What does DNS do? How does DNS work? Types of information an attacker can

gather:o Range of addresses usedo Address of a mail servero Address of a web servero OS informationo Comments

Page 3: Summary From the Last Lecture

Interrogating DNS – Zone Transfer

$ nslookupDefault server:evil.attacker.comAddress: 10.11.12.13

server 1.2.3.4Default server:dns.victimsite.comAddress: 1.2.3.4

set type=anyls –d victimsite.com

system1 1DINA 1.2.2.11DINHINFO “Solaris 2.6 Mailserver”1DINMX 10 mail1

web 1DINA 1.2.11.271DINHINFO “NT4www”

Dangerous

Page 4: Summary From the Last Lecture

Protecting DNS Provide only necessary informationo No OS info and no comments

Restrict zone transfers o Allow only a few necessary hosts

Use split-horizon DNS

Page 5: Summary From the Last Lecture

Split-horizon DNS Show a different DNS view to external

and internal users Internal

DNS

Employees

ExternalDNS

External users

Web server

Mailserver

InternalDB

Page 6: Summary From the Last Lecture

Reconnaissance Tools Tools that integrate Whois, ARIN, DNS

interrogation and many more services:o Applicationso Web-based portals

http://www.network-tools.com

Dangerous

Page 7: Summary From the Last Lecture

At The End Of Reconnaissance

Attacker has a list of IP addresses assigned to the target network

He has some administrative information about the target network

He may also have a few “live” addresses and some idea about functionalities of the attached computers

Page 8: Summary From the Last Lecture

Phase 2: Scanning Detecting information useful for break-ino Live machineso Network topologyo Firewall configurationo Applications and OS typeso Vulnerabilities

Page 9: Summary From the Last Lecture

Network Mapping Finding live hostso Ping sweepo TCP SYN sweep

Map network topology o Traceroute

Sends out ICMP or UDP packets with increasing TTL

Gets back ICMP_TIME_EXCEEDED message from intermediate routers

Page 10: Summary From the Last Lecture

Traceroute

A R1

R2

R3

db

www

mail

1. ICMP_ECHO to www.victim.comTTL=1

1a. ICMP_TIME_EXCEEDED from R1

victim.com

A: R1 is my first hop to www.victim.com!

Page 11: Summary From the Last Lecture

Traceroute

A R1

R2

R3

db

www

mail

2. ICMP_ECHO to www.victim.comTTL=2

2a. ICMP_TIME_EXCEEDED from R2

victim.com

A: R1-R2 is my path to www.victim.com!

Page 12: Summary From the Last Lecture

Traceroute

A R1

R2

R3

db

www

mail

3. ICMP_ECHO to www.victim.comTTL=3

3a. ICMP_TIME_EXCEEDED from R3

victim.com

A: R1-R2-R3 is my path to www.victim.com!

Page 13: Summary From the Last Lecture

Traceroute

A R1

R2

R3

db

www

mail

4. ICMP_ECHO to www.victim.comTTL=4

4a. ICMP_REPLY from www.victim.com

victim.com

A: R1-R2-R3-www is my path to www.victim.com

Page 14: Summary From the Last Lecture

Traceroute

A R1

R2

R3

db

www

mail

Repeat for db and mail servers

victim.com

A: R1-R2-R3-www is my path to www.victim.com R1-R2-R3-db is my path to db.victim.com R1-R2-R3-mail is my path to mail.victim.com Victim network is a star with R3 at the center

Page 15: Summary From the Last Lecture

Network Mapping Tools Cheopso Linux applicationo http://cheops-ng.sourceforge.net/

Automatically performs ping sweep and network mapping and displays results in GUI

Dangerous

Page 16: Summary From the Last Lecture

Defenses Against Network MappingAnd Scanning

Filter out outgoing ICMP traffico Maybe allow for your ISP only

Use Network Address Translation(NAT)

NATbox

A

B

CD

Internal hosts with 192.168.0.0/16

1.2.3.48.9.10.11

Request 1.2.3.4

Request 192.168.13.73

Reply 192.168.13.73

Reply 1.2.3.4

Page 17: Summary From the Last Lecture

How NATs Work For internal hosts to go outo B sends traffic to www.google.como NAT modifies the IP header of this traffic

Source IP: B NAT Source port: B’s chosen port Y random port X

o NAT remembers that whatever comes for it on port X should go to B on port Y

o Google replies, NAT modifies the IP header Destination IP: NAT B Destination port: X Y

Page 18: Summary From the Last Lecture

How NATs Work For public services offered by internal

hostso You advertise your web server A at NAT’s

address (1.2.3.4 and port 80)o NAT remembers that whatever comes for it on

port 80 should go to A on port 80o External clients send traffic to 1.2.3.4:80o NAT modifies the IP header of this traffic

Destination IP: NAT A Destination port: NAT’s port 80 A’s service port 80

o A replies, NAT modifies the IP header Source IP: ANAT Source port: 80 80

Page 19: Summary From the Last Lecture

How NATs Work What if you have another Web server Co You advertise your web server A at NAT’s

address (1.2.3.4 and port 55) – not a standard Web server port so clients must know to talk to a diff. port

o NAT remembers that whatever comes for it on port 55 should go to C on port 80

o External clients send traffic to 1.2.3.4:55o NAT modifies the IP header of this traffic

Destination IP: NAT C Destination port: NAT’s port 55 C’s service port 80

o C replies, NAT modifies the IP header Source IP: CNAT, source port: 80 55

Page 20: Summary From the Last Lecture

Port Scanning Finding applications that listen on ports Send various packets:o Establish and tear down TCP connectiono Half-open and tear down TCP connectiono Send invalid TCP packets: FIN, Null, Xmas

scano Send TCP ACK packets – find firewall holeso Obscure the source – FTP bounce scanso UDP scanso Find RPC applications

Dangerous

Page 21: Summary From the Last Lecture

Port Scanning Set source port and addresso To allow packets to pass through the firewallo To hide your source address

Use TCP fingerprinting to find out OS typeo TCP standard does not specify how to handle

invalid packetso Implementations differ a lot

Page 22: Summary From the Last Lecture

Port Scanning Tools Nmapo Unix and Windows NT application and GUIo http://nmap.org/o Various scan types o Adjustable timing

Dangerous

Page 23: Summary From the Last Lecture

Defenses Against Port Scanning

Close all unused ports Remove all unnecessary services Filter out all unnecessary traffic Find openings before the attackers do Use smart filtering, based on client’s IP

Page 24: Summary From the Last Lecture

Firewalk: Determining Firewall Rules

Find out firewall rules for new connections

We don’t care about target machine, just about packet types that can get through the firewallo Find out distance to firewall using tracerouteo Ping arbitrary destination setting

TTL=distance+1o If you receive ICMP_TIME_EXCEEDED

message, the ping went through

Page 25: Summary From the Last Lecture

Defenses Against Firewalking Filter out outgoing ICMP traffic Use firewall proxieso This defense works because a proxy recreates

each packet including the TTL field

Page 26: Summary From the Last Lecture

Vulnerability Scanning The attacker knows OS and applications

installed on live hostso He can now find for each combination

Vulnerability exploits Common configuration errors Default configuration

Vulnerability scanning tool uses a database of known vulnerabilities to generate packets

Vulnerability scanning is also used for sysadmin

Page 27: Summary From the Last Lecture

Vulnerability Scanning Tools SARAo http://www-arc.com/sara

SAINTo http://www.saintcorporation.com

Nessuso http://www.nessus.org

Dangerous

Page 28: Summary From the Last Lecture

Defenses Against Vulnerability Scanning

Close your ports and keep systems patched

Find your vulnerabilities before the attackers do

Page 29: Summary From the Last Lecture

At The End Of Scanning Phase Attacker has a list of “live” IP addresses Open ports and applications at live

machines Some information about OS type and

version of live machines Some information about application

versions at open ports Information about network topology Information about firewall configuration