Presentation is loading. Please wait.

Presentation is loading. Please wait.

A ttack B ox D esign 7/11/01 D0G of WAR. Blake ~Internet Consultant~ Security Audits & WAN / LAN Infrastructure Designs San Jose (408)

Similar presentations


Presentation on theme: "A ttack B ox D esign 7/11/01 D0G of WAR. Blake ~Internet Consultant~ Security Audits & WAN / LAN Infrastructure Designs San Jose (408)"— Presentation transcript:

1 A ttack B ox D esign 7/11/01 D0G of WAR

2 Blake ~Internet Consultant~ Security Audits & WAN / LAN Infrastructure Designs Netspan@hotmail.com San Jose (408) 907-5003 / San Francisco (415) 561-9374

3 1. Introduction 2. Attack Box Design: -CUJ0 OS Selection Hardware Selection OS Layout Baseline Software Load Lock & Load: Extended Toolz Selection - Layout of the Lab -Zombies -Those Evil Web Servers -Fighting Back, ‘Rooting the Attacker’ -P0IS0N -Conceptual: The Death Star Design 3. Overview of Security Audits 4. Closing

4 Building an Attack Box From the Ground Up…. ‘CUJ0’

5 OS Selection For Tools WINDOWS (98 / NT / Win2k) LINUX BSD SOLARIS Single OS vs Multiboot

6 Hardware Selection Via Piece-Meal (which Manufacturers, Sizing, etc ???) Motherboard, Processor(s) RAM Hard Drives Floppy NIC Cards CD Rom / CD Burner External Modem Printer Total Cost =

7 Hardware Selection: (cont’d) Laptops Used Hardware (Where to look for Cheap Stuff)

8 Multiboot Options MBR Windows Boot.ini Lilo boot FreeBSD multiboot BootMagic System Commander MSTBoot Bootit NG VMWare

9 OS Load Order Which one first ??? The Problems with Installations

10 Partitions Primary Extended Logical Virtual Formatting Layout on the Hard Drives Sizing & Resizing

11 Baseline Software Loads Different Configurations Partition Imaging of Different Loads Drive Imaging Storage

12 TOOLZ Selection Integration Testing Evaluation Parsing the Code Making you own Scripts & Toolz

13 Layout of the Lab for Testing Toolz Master File Server Attack, Victim, & Monitoring Boxes

14 Network Equipment & Configurations Fractional / T1 DSL Cable Modem Dial-up Routers / Switches / Hubs Firewalls Sniffers / Network IDS

15 Other Types of Attack Boxes (cont’d) Automated vs ‘Hands-on’ Vulnerability Scanners

16 Other Types of Attack Boxes (cont’d) Zombies

17 Other Types of Attack Boxes (cont’d) Those Evil Web Servers

18 FIGHTING BACK ‘ R ooting the A ttacker’

19 Other Types of Attack Boxes (cont’d) ‘P0IS0N’ The Honeypot with an Attitude (A Box That Bites Back)

20 Other Types of Attack Boxes (cont’d) ‘The Death Star Design’

21 PERFORMING SECURITY AUDITS Discussion

22 END


Download ppt "A ttack B ox D esign 7/11/01 D0G of WAR. Blake ~Internet Consultant~ Security Audits & WAN / LAN Infrastructure Designs San Jose (408)"

Similar presentations


Ads by Google