Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |

Similar presentations


Presentation on theme: "Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |"— Presentation transcript:

1 Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | ondrej@sevecek.com | www.sevecek.com |

2 Motto  Thou shalt never assume The Rogue Warrior's Eight Commandment of SpecWar Richard Marcinko US Navy Seal

3 Current Threats

4 Attackers  External  don’t know anything about your environment  can try brute force passwords at most  vulnerability scanning  Internal  most severe threat  know their environment  have already at least some level of access  can steal data they are authorized to read

5 Protection: External Attackers  Firewalls  Antispam/Antimalware  Software Updates  Account Lockout

6 Current threats  Assuming  Physical security  computers  data  Passwords  cracking, keyloggers  Eavesdropping  wired/wireless networks  Spam/malware  directed attacks  Remote Access  from unsecure computers  Data theft by authorized readers  currently one of the most underestimated problem

7 Current Threats

8 Vulnerabilities  Examples:  My wife crossing a road  PKI misconfiguration in a bank  Hidden accounts after virus attack  Malicious mail from home vs. from work

9 Protection: Assumptions  Never assume anything  Be careful  Know your enemy  Don’t do anything you don’t understand

10 Current Threats

11 Machines  Servers  rack security  Data storage  Client computers  desktops, notebooks  usually caching data  Peripherals  Remote offices

12 Network  Wireless  AirPCap  Wired  USB Ethernet switch + netbook

13 Vulnerabilities  Computers easily accessed by a lot of people  employees  maintenance staff  theft from branch offices  Attacks  stealing the whole machine  stealing the data only  Physical access = local administrator

14 Protection: Physical access  Limit physical access  Place computers/storage into secure locations  +hardware locks, cables  Define security boundaries  data stolen  passwords compromised  Encryption  BitLocker, TrueCrypt

15 Protection: BitLocker  Provide password on startup  prevents other from becoming an administrator  Use TPM  Trusted Policy Module  stores the password on mother board  checks signatures of BIOS, CMOS, MBR, Boot Sector, loader etc.  Windows 7 Enterprise/Ultimate

16 Current Threats

17 Vulnerabilities  Keyloggers  software  hardware  Cache  Cracking

18 Local Password Storage  Full-text passwords  IE autocomplete  password “lockers”  fingerprint readers  service/scheduled-tasks accounts  Password hashes  local user accounts  all domain accounts on Domain Controllers  password caches

19 Password Cracking  Windows MD4 Hashes  local storage  LAN network capture  PPTP VPN  Offline  Rainbow Tables  severe up to 7 characters (minutes)

20 Protection: Passwords  Use smart cards vs. fingerprints  convenient (3-5 characters PIN)  still secure than passwords  Require strong passwords  Procedures, policies and audit  Never type sensitive passwords on insecure computers  Training

21 Protection: Comparable Algorithm Strengths (SP800-57) StrengthSymetricRSAECDSASHA 80 bit2TDEARSA 1024ECDSA 160SHA-1 112 bit3TDEARSA 2048ECDSA 224SHA-224 128 bitAES-128RSA 3072ECDSA 256SHA-256 192 bitAES-192RSA 7680ECDSA 384SHA-384 256 bitAES-256RSA 15360ECDSA 512SHA-512

22 Protection: Smart Cards AlgoritmusPorovnání 10 znaků heslo US-ASCII70 bit SHA-180 bit RSA 2048112 bit SHA-256128 bit AlgoritmusNáročnostDoba 10 znaků heslo US-ASCII12 500 let SHA-11024x lepší2 600 000 let RSA 20484 398 046 511 104x lepší11 000 biliónů let SHA-2562^58x lepší-

23 Protection: Password Policies  For the whole domain only  Windows 2003 Domain Function Level and older  For individual groups/users  Granular Password Policies  Windows 2008 Domain Functional Level and newer  Non-complex password example  login: Ondrej  password: #.J@mES-BonD58

24 Current Threats

25 Vulnerabilities  Free network access  No network traffic encryption  People ignore warnings  ARP poisoning

26 Protection: Eavesdropping  Implement IPSec/SSL encryption  Always encrypt WiFi  not only require authentication  Implement 802.1x for network access  Implement ARP protection  Train people

27 Protection: 802.1x Switch PC Printer PC

28 Current Threats

29 Secure Socket Layer / IPSec Web Server Client Certificate Public key Private key

30 Public key Secure Socket Layer Web Server Client Certificate Public key Private key Random Data

31 Attacking SSL Web Server Client Certificate Public key Private key Attacker False Certificate Public key Private key

32 SSL Certificate prices  Verisign – 1999  300$ year  Thawte – 2003  150$ year  Go Daddy – 2005  30$ year  GlobalSign – 2006  250$ year  StartCom – 2009  free

33 SSL Assurance  Email loopback confirmation  Requires just a valid email address  No assurance about the target identity

34 EV browsers BrowserVersion Internet Explorer7.0 Opera9.5 Firefox3 Google Chrome- Apple Safari3.2 Apple iPhone3.0

35 EV Certificate prices  Verisign – 1999  1500$ year  Thawte – 2003  600$ year  Go Daddy – 2005  100$ year  GlobalSign – 2006  900$ year  StartCom – 2009  50$ year

36 TMG Forward SSL Inspection

37 No SSL Inspection

38 TMG CA Not Trusted

39

40 Web Server Certificate

41 TMG CA Trusted on the Client

42 Current Threats

43 Vulnerabilities  No real prevention against spam  Spam created anonymously  no traces/auditing  Directed attacks cannot be automatically recognized  Users tend to use same passwords for more services  Stability and performance

44 Spam Threats  Phishing  Hoax  think something  do something online  do something physically!  Personal reputation after forwarding

45 Malware Threats  Virus must be first detected after infection!  Backdoors just download the real infection  does antimalware know what exactly it was?  Reinstallation of the whole environment!

46 Protection: Spam and malware  Train people  Implement antispam/antimalware  Words/Open Relay Lists etc.  SenderID

47 Current Threats

48 Vulnerabilities  Prone to keylogger attacks  when used with passwords  Can be connected from quite anywhere  insecure home computers, internet cafes  Some protocols not secure  PPTP – passwords hashes offline cracking

49 Client VPN Comparison VPNConnection requirementsLogon Client Availability Authentic. RDP TCP 3389 server certificate (not required) random keys (D-H) certificate private key (2048bit) Windows XP password smart card RDS/TS Gateway TCP 443 server certificate random keys (D-H) certificate private key (2048bit) Windows XP password smart card PPTPGRE + TCP 1723 depends on password quality vulnerable to offline cracking MS-DOS password smart card L2TP IPSec ESP + UDP 500/4500 server certificate client computer certificate random keys (D-H) certificate private key (2048bit) Windows 98 password smart card SSTP TCP 443 server certificate random keys (D-H) certificate private key (2048bit) Windows Vista password smart card

50 Protection: Remote Access  Use RDP when possible  sends only keystrokes and mouse  receives only pictures  Use L2TP or SSTP  IPSec or SSL  encrypts the channel with strong random private keys (2048 bit etc.)  IPSec requires and limits connection to those who have client computer certificate  Implement VPN Quarantine

51 LAN DirectAccess Client DA Server

52 Current Threats

53 Vulnerabilities  Authorized users can  read  print  copy  send emails  upload FTP/SSL/VPN

54 Protection: Authorized users  Procedures  Limit public online access and services  Limit use of removable hardware  Use some Rights Management software  Data Leakage Protection

55 Current Threats

56 Takeaway  Anything you don’t have under your direct control is insecure  Don’t use insecure computers  Use strong passwords or rather smart cards  Encrypt data and transmissions  Never trust email


Download ppt "Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |"

Similar presentations


Ads by Google