We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byChristiana Martin
Modified about 1 year ago
1 Copyright © 2014 M. E. Kabay. All rights reserved. Local Area Networks CSH6 Chapter 25 “Local Area Networks” Gary C. Kessler & N. Todd Pritsky
2 Copyright © 2014 M. E. Kabay. All rights reserved. Topics Policy and Procedures Physical Site Security Physical Layer Network Operating System Issues Chapter 25 should be read in conjunction with Chapter 24 on Operating System Security. Chapter 25 includes commentary on operating systems commonly used on workstations configured on LANs.
3 Copyright © 2014 M. E. Kabay. All rights reserved. Policy and Procedures Without framework of policy and procedures, technology cannot be selected appropriately Extensive list of suggestions available in many texts and online Many chapters in CSH6 RFC 2196: Site Security Handbook http://www.ietf.org/rfc/rfc2196.txt
4 Copyright © 2014 M. E. Kabay. All rights reserved. Physical Site Security Physical access to LAN equipment is the single most dangerous vector for attack Protect equipment and transmission media against physical damage Accident Intentional attack Denial of service Business continuity planning & disaster recovery planning Require consideration of networks See CSH6 Chapters 22 and 23 See CSH6 Chapters 58 and 59
5 Copyright © 2014 M. E. Kabay. All rights reserved. Physical Layer Issues ISO OSI Model Sniffers and Broadcast LANs Attacks on the Physical Plant Modems, Dial-Up Servers, Telco Wireless LANs
6 Copyright © 2014 M. E. Kabay. All rights reserved. ISO OSI* Model The 7 layers Application (7) Presentation (6) Session (5) Transport (4) Network (3) Data Link (2) Physical (1) UPPER LAYERS LOWER LAYERS } } *International Organization for Standards Open System Interconnect
7 Copyright © 2014 M. E. Kabay. All rights reserved. OSI Data Transfer OUTPUT INPUT
8 Copyright © 2014 M. E. Kabay. All rights reserved. IBM's TCP/IP Redbook http://www.redbooks.ibm.com/pubs/pdfs/redbooks/gg243376.pdf http://www.redbooks.ibm.com/pubs/pdfs/redbooks/gg243376.pdf Part I. Core TCP/IP protocols Chapter 1. Architecture, history, standards, and trends Chapter 2. Network interfaces Chapter 3. Internetworking protocols Chapter 4. Routing protocols Chapter 5. Transport layer protocols Chapter 6. IP multicast Part 2. TCP/IP application protocols Chapter 7. Application structure and programming interfaces Chapter 8. Directory and naming protocols Chapter 9. Remote execution and distributed computing Chapter 10. File related protocols Chapter 11. Mail applications Chapter 12. The World Wide Web Chapter 13. Multimedia protocols Chapter 14. Wireless Application Protocol (WAP) Chapter 15. Network management Chapter 16. Utilities Part 3. Advanced concepts and new technologies Chapter 17. IP Version 6 Chapter 18. Multiprotocol Label Switching (MPLS) Chapter 19. Mobile IP Chapter 20. Integrating other protocols with TCP/IP Chapter 21. TCP/IP security Chapter 22. Quality of Service Chapter 23. Availability, scalability, and load balancing
9 Copyright © 2014 M. E. Kabay. All rights reserved. Sniffers and Broadcast LANs Most LANs use broadcast packets / frames Normally nodes read only designated packets / frames by destination address Nodes in promiscuous mode read all frames Sniffers capture and analyze all packets Older models were hardware – obvious Software sniffers practically invisible on network Countermeasures Cryptography the most obvious: IPSec, SSH Can put servers on switches to avoid broadcasts Special software can test timing of networks to detect sniffers
10 Copyright © 2014 M. E. Kabay. All rights reserved. TCP/IP Sniffers BUTTsniffer (Windows NT) Ethereal (Windows, Unix) Network Monitor (free with, and for, Windows NT) Sniffit (Linux, SunOS, Solaris, FreeBSD, Irix) snort (Unix) Solsniff (Solaris) tcpdump (Unix) WinDump (Windows 9x/NT) Image used with kind permission of IXXAT, Inc. http://www.ixxat.com/introduction_tcp_ip_en.html
11 Copyright © 2014 M. E. Kabay. All rights reserved. Sniffer Detectors: AntiSniff® L0pht Heavy Industries – hackers Released AntiSniff in 1999 Notes below from Nomad review at http://www.nmrc.org/pub/review/antisniff-b2.html http://www.nmrc.org/pub/review/antisniff-b2.html Pro Accurate detection of promiscuous mode Ethernet cards Alerts sent via email – also includes visual and audio alerts AntiSniff sessions can be stored for later use/analysis
12 Copyright © 2014 M. E. Kabay. All rights reserved. Limitations of AntiSniff® Comments from Nomad: NT version runs at high priority and is resource-intensive – need dedicated machine Can only work properly checking Ethernet cards on the same segment as the system running AntiSniff Again, this is not a flaw, but due to the nature of networking in general. It will work in a switched environment with a smart hub No SNMP support
13 Copyright © 2014 M. E. Kabay. All rights reserved. Attacks on the Physical Plant Wiretapping cables (use shielding, testing) Van Eck phreaking (use TEMPEST standard for shielding or obfuscation) Removal of end-of-cable resistors (causes noise and DoS) Twisted-pair LANs (10BaseT Ethernet) susceptible to tapping at punch-down junction boxes Generally protect cabling against tampering Protect servers against unauthorized physical access
14 Copyright © 2014 M. E. Kabay. All rights reserved. Modems, Dial-Up Servers, Telco Modems can bypass perimeter protection May be installed without authorization Users often have modems on laptops linked into network Bypass firewalls etc. Allow easy outbound a ccess Auto-answer modems allow inbound access across firewalls Dial-up servers allow centralized control of modem communications Modems becoming less important today because of high-speed Internet connectivity 300 baud modem c. 1980
15 Copyright © 2014 M. E. Kabay. All rights reserved. Wireless LANs Overview of Wireless LANs Wired Equivalent Privacy (WEP) Web for Authentication
16 Copyright © 2014 M. E. Kabay. All rights reserved. Overview of Wireless LANs Data carried on radio-frequency radiation more easily intercepted than data on physical wires Typical range measured in meters or more Infrared transmission doesn’t go through walls IEEE 802.11 Standards for Wireless Networking Direct-Sequence Spread Spectrum (DSSS) Frequency-Hopping Spread Spectrum (FHSS) Without codes/patterns, seems like noise to eavesdropper See CSH6 Chapter 5
17 Copyright © 2014 M. E. Kabay. All rights reserved. Wired Equivalent Privacy Optional encryption 40-bit RC4 by default (inadequate today) 128-bit version available for some products Vendors have defined additional encryption similar to virtual private networks (VPNs) Use public key cryptography (PKC) & support public key infrastructure (PKI) E.g., MS Point-to-Point Encryption used in Point-to-Point Tunneling Protocol (PPTP) Some provide authentication E.g., RADIUS (Remote Access Dial-In User Service) Not generally interoperable
18 Copyright © 2014 M. E. Kabay. All rights reserved. WEP for Authentication Adds extra layer to userID/password normally used Wireless device must have same encryption key as LAN’s access point Wireless access points (WAPs) usually also able to Define access control lists (ACLs) based on Media access control (MAC) addresses
19 Copyright © 2014 M. E. Kabay. All rights reserved. Network Operating System Issues Overview of Network OS Topics Windows 9x NT/2000, XP, Vista, 7 UNIX MacOS
20 Copyright © 2014 M. E. Kabay. All rights reserved. OS Desktop Market Shares http://www.netmarketshare.com/operating-system-market-share.aspx?qprid=10&qpcustomd=0
21 Copyright © 2014 M. E. Kabay. All rights reserved. OS Mobile Device Market Shares
22 Copyright © 2014 M. E. Kabay. All rights reserved. Overview of Network OS Topics LAN environment has changed since 1990s At that time, desktops ran applications under Windows Network ran Novell Netware for file sharing By late 2000s, networking commonplace for all desktop OSs (Windows, *nix, MacOS…)
23 Copyright © 2014 M. E. Kabay. All rights reserved. General Considerations for NW Security (1) 1.Strong passwords & effective password policies 2.Disable/uninstall unused services 3.Keep OS up to date by version & patches 4.Define users, groups, domain trust relations 5.Secure running applications 6.Limit use of root logon to need – and local only 7.Limit guest, demo, anonymous accounts 8.Put boot/system files on separate partitions, drives, I/O controllers from application programs and data 9.Audit servers I II III IV V VI VII VIII IX
24 Copyright © 2014 M. E. Kabay. All rights reserved. General Considerations for NW Security (2) 10.Monitor log files 11.Remove floppy, CD, DVD drives from servers after use 12.Implement industry best practices for securing OS 13.Use vulnerability assessment tools regularly 14.Use intrusion detection tools 15.When using SNMP, block external access to SNMP 16.Don’t make your OS version & processor type public info X XI XII XIII XIV XV XVI
25 Copyright © 2014 M. E. Kabay. All rights reserved. Windows 9x Windows OSs susceptible to Exploitation of NETBIOS file & print sharing Abuse of resource sharing through TCP/IP when network has Internet access Windows challenge-handshake authentication protocol (CHAP) Used for sending passwords But same challenge used for 15 minutes Thus possible capture/replay by intruder with physical access & sniffer BackOrifice & NetBus: remote-control tools Password crackers can break.PWL password files PW-protected screensaver? Reboot! Use 3 rd party secure bootlocks
26 Copyright © 2014 M. E. Kabay. All rights reserved. NT/2000 Windows 2000 Millennium Edition has same weaknesses as 9x Stronger: Windows NT Server NT Workstation 2000 Server Many hacking tools available for these versions as well Vulnerabilities in Internet Explorer (IE) & Office products weaken OS Ideally, disable all Active Scripting and ActiveX options in Restricted Sites Zone of IE
27 Copyright © 2014 M. E. Kabay. All rights reserved. NT/2000 (2) NT/2000: Simple recommendations for basic security Format drives using NTFS, not FAT Use long file names & disable DOS 8.3 naming Disable Everyone group Rename administrator account Turn auditing on (off by default) W2K: Enable Encrypting File System (EFS) Automatic encryption of disk data Should enable recovery of keys
28 Copyright © 2014 M. E. Kabay. All rights reserved. Windows NT Audit Tools (1) netstat examines open ports Event Viewer examines application, security, and system logs. net start, net user, net group, net local group display running services, users, groups, and local groups dumpel converts Event Viewer logs to ASCII files NetMon displays network traffic netsvc displays local and remote running services and drivers addusers displays users and groups findgrp displays local and domain groups for a user
29 Copyright © 2014 M. E. Kabay. All rights reserved. Windows NT Audit Tools (2) local and global show all members of specific local or global groups dommon displays trusted domains xcacls examines the file Access Control Lists (ACL) perms examines the ACLs associated with a user sysdiff displays changes in the Registry and file system regdmp creates an ASCII version of the Registry ralist lists a domain's Remote Access Servers (RAS) rasusers lists users authorized for dial-in access
30 Copyright © 2014 M. E. Kabay. All rights reserved. Windows XP: Better Security EFS, firewall, Data Execution Prevention But original release included raw sockets Permits program to manipulate TCP/IP communications directly Without use of normal application program interfaces (APIs) that apply security Allowed external control Steve Gibson warned (2001) of serious risk from script kiddies for denial of service applications See http://www.informit.com/articles/article.aspx?p=27289 http://www.informit.com/articles/article.aspx?p=27289 MS removed raw sockets in Service Pack 2 (SP2) Steve Gibson http://www.grc.com
31 Copyright © 2014 M. E. Kabay. All rights reserved. Vista: Child of Trustworthy Computing Initiative Vista released Jan 2007; but by end of July 2009, 22% market share (360M users) 70% market share for Windows XP (1.1B users) Major security change is User Account Control (UAC) Requires user response to allow action requiring admin privileges Run as admin Changing files in root and program files folders [Un]Installing apps, drivers, ActiveX Changing settings for Firewall, UAC, Update, user accounts, Parental Controls, Task Scheduler Restoring system files from backups Viewing or changing other user’s data
32 Copyright © 2014 M. E. Kabay. All rights reserved. Vista: Stepchild of the NSA?!? Alec Klein & Ellen Nakashima Washington Post (January 9, 2007) NSA “participated” in creation of Vista security elements Unclear extent of involvement NSA acknowledged helping to protect OS against “worms, Trojan horses and other insidious computer attackers….” Microsoft made NSA involvement public Authors Kessler & Pritsky comment, “It is left as an exercise for the reader to decide whether having a spy agency working on a premier OS is a good thing or not.” What do you think?
33 Copyright © 2014 M. E. Kabay. All rights reserved. UNIX (1) *NIX (UNIX variants) usage falling on servers: Percentage of scanned systems using *nix OS variants (Note that the ordinate should have started at zero); this graph overemphasizes the decline by omitting the bottom of the Y-axis. http://trends.builtwith.com/Server/Unix
34 Copyright © 2014 M. E. Kabay. All rights reserved. UNIX (2) UNIX security architecture Developed originally for use in trusted community – security not paramount Usual list of normal security functions Enormous list of services Extensive literature on *NIX security Apply proper security audits, vulnerability assessment to *NIX systems
35 Copyright © 2014 M. E. Kabay. All rights reserved. MacOS (1) Mac OS originally designed with little concern for security Every user is admin Sharing capabilities more complex than on Windows Therefore more risk of naïve user error Little user-level protection No default requirement for password at logon No standard password-equipped screen saver
36 Copyright © 2014 M. E. Kabay. All rights reserved. MacOS (2) Malware attacks fewer But MS Office malware works DoS attacks work Use anti-malware package! Other tools DiskLocker: password- protection of entire HD FileLock: locks on individual files Empower: applications & files MacPassword, Sesame: multilevel passwords
37 Copyright © 2014 M. E. Kabay. All rights reserved. MacOS (3) Mac-oriented security tools for networking include Intermapper: SNMP tool for AppleTalk & IP MacRadius: RADIUS for dial-in servers NetLock: encryption for sessions, passwords, logins Network Security Guard: vulnerability scanner Update versions and apply patches promptly Criminal hackers still not as frequently attacking Macs Fewer targets, less familiarity
38 Copyright © 2014 M. E. Kabay. All rights reserved. Now go and study
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Module 14: Configuring Server Security Compliance
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
IS Network and Telecommunications Risks
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Troubleshooting Windows Vista Security Chapter 4.
Module 7: Fundamentals of Administering Windows Server 2008.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Chapter 7 HARDENING SERVERS.
Hands-On Ethical Hacking and Network Defense
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Chapter 13 – Network Security
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Chapter 6 Enumeration Modified Objectives Describe the enumeration step of security testing Enumerate Microsoft OS targets Enumerate NetWare.
COEN 252 Computer Forensics
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Awareness: Applying Practical Security in Your World
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Chapter 9: Novell NetWare
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Networking Security Chapter 8 powered by dj. Chapter Objectives Explain various security threats Monitor security in Windows Vista Explain basic.
© 2017 SlidePlayer.com Inc. All rights reserved.