How to Fix A Broken Window Erik Pace Birkholz, CISSP, Principal Consultant, Foundstone ©1999, 2000 Laurie Brosius.

Slides:



Advertisements
Similar presentations
Patch Management Patch Management in a Windows based environment
Advertisements

I NDULGENC E There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 7 HARDENING SERVERS.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
Enforcing Concurrent Logon Policies with UserLock.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Web Site Security Andrew Cormack JANET-CERT ©The JNT Association, 1999.
SATAN Presented By Rick Rossano 4/10/00. OUTLINE What is SATAN? Why build it? How it works Capabilities Why use it? Dangers of SATAN Legalities Future.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Security at NCAR David Mitchell February 20th, 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Safeguarding your Business Assets through Understanding of the Win32 API.
Small Business Security Keith Slagle April 24, 2007.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
TCOM Information Assurance Management System Hacking.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Security fundamentals Topic 10 Securing the network perimeter.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Security fundamentals
Chapter 7. Identifying Assets and Activities to Be Protected
Six Steps to Secure Access for Privileged Insiders and Vendors
INDULGENCE There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
HARDENING CLIENT COMPUTERS
Introduction to SQL Server 2000 Security
Answer the questions to reveal the blocks and guess the picture.
Introduction to Networking
Chapter 27: System Security
AppExchange Security Certification
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
6. Application Software Security
Presentation transcript:

How to Fix A Broken Window Erik Pace Birkholz, CISSP, Principal Consultant, Foundstone ©1999, 2000 Laurie Brosius

Part 1: Intranet Penetration Testing: Discovering network negligence Part 2: Strengthening Microsoft: When # is not an option

Background Information  Who am i?  When did I start security?  Where do I work?  What is my job?  Why do you care?  What was your inspiration for this talk?

Background Information  Who am i?  Erik Pace Birkholz, CISSP – MCSE  Contrary to popular belief, I am 27 years old.  From New Jersey, just outside of Philadelphia.  BS in Computer Science from Dickinson College, PA (est 1773)  When did I start security?  1995, NCSA - National Computer Security Association, Carlisle, PA  1997, KPMG - Information Risk Management, Manhattan, NY  1998, E&Y – National Attack and Penetration Team, Los Angeles, CA  1999, ISS – Lead Consultant, Hollywood, CA  2000, Foundstone Inc., Irvine, CA  Where do I work?  Foundstone  KNOW VULNERABILITIES

Background Information  What is my job?  Principal Consultant  Internet and Intranet Penetration tests  Instructor for Foundstone courses  Contributing Author for Hacking Exposed series

Background Information  Why do you care?  You probably don’t, but that’s ok.  In you are trying to decide if you should head off to Halvar or Chip’s talk instead.  What was your inspiration for this talk?

Inspiration / Rant Year 2001 was the year that got away. Our comfort zone crumbled. Seemingly well laid plans turned to dust. Systems crashed and networks halted as faceless network attacks tore through cyberspace.

Inspiration / Rant As a nation and an industry, we fell victim to devastating attacks that could have been avoided. Security and comfort slipped through our fingers and was gone.

Inspiration / Rant Ladies and gentleman, security has reached the board room. Management wants answers. They want solutions. Above all else they want piece of mind this won’t happen again. Purse-strings are opening; now is the time for IT to make things right. Management finally understands a simple fact that can no longer be avoided: responsibility without authority is a recipe for failure.

Inspiration / Rant C:\>net send * “Don’t expect secure networks if you haven’t empowered your internal security team.”

Inspiration / Rant Security vs. usability may finally become a balanced equation. All the usability in the world isn’t worth a damn if your internal network is a wasteland of default configurations and blank passwords.

Inspiration / Rant Security teams are now a required internal resource. Contrary to popular belief there are NOT 24 working hours in a day. Security can not be treated as a side order. The excuses need to stop - now.

10 Lessons from 2001  Secure perimeters still allow web attacks.  Laptops tend to be promiscuous, spending time in untrusted networks then coming home to the corporate LAN.  Employee’s REALLY DO get disgruntled.  Default configurations are bad, even if they are internal only.  Flat networks are bad.

 Inconsistent server configuration will hurt you.  Exploits can be scripted to replicate just like a virus.  Users WILL click on a link to a picture of Anna Kournikova.  There is NOT one tool that replaces the human element of a security expert. 10 Lessons from 2001

Responsibility without authority is impossible in the security world. C:\>net send * “Don’t expect secure networks if you haven’t empowered your internal security team.” 10 Lessons from 2001

Internal Penetration Testing  Two scenarios  CYA and documentation  Defining scope and goals  Tools of the Trade  Presentation of findings

Internal Penetration Testing  Two scenarios  Third party assessment  Foundstone  Big 5  Guardent  ISS  etc…  Internal security team  Current IT staff vs. pure security team

Two scenarios  Third party assessment  Be VERY selective  Current methodology  Established in the security community  Provides report samples  Onsite team guarantee  Biographies provided and approved

Two scenarios  Third party assessment  Be VERY selective  Provides reputable references for previous work  Guidelines and standards for data destruction  Considers YOUR company important  Will help teach you to fish

Two scenarios  Third party assessment  Use 3 rd party assessments to compliment your year round security testing  brushing teeth vs. dentist office visit  Use multiple vendors  Each assessment should be independent of the previous  Request all raw data in addition to reports

Two scenarios  Internal Security Team  Current IT staff vs. pure security team?  What is a pure security team?  Internal staff with the sole function of security  Can they exist in small companies?  Can they exist in large corporations?  Can these two teams peacefully co-exist?  Of course.

Sample structure for large corporation

Two scenarios  From here on out, lets consider the assessment team is interchangeable between internal and 3 rd party.

Stuff you already know Windows NT/2000 Domains: The Impact of Local and Domain Account Compromises NT/2000 domains, simply put, are Windows systems connected to facilitate the sharing of resources and ease of administration. The glue that binds this domain together is centralized administration of users and their access/restriction to domain resources. This administration is achieved through Domain Controllers. Domain controllers contain all the domain accounts and provide access/restriction to domain resources based on these accounts. NT/2000 systems also have local accounts that provide access to local resources. Depending on the role and configuration of the server, these resources can be exploited to gain administrative domain access. With that said, the end goal of penetrating an NT/2000 domain is achieved by compromising an administrative level domain account

Stuff you already know Domain Controllers Domain Controllers are the "treasure chest" for Windows NT/2000 accounts and passwords. If a Domain Controller is compromised at an administrative level, all usernames and encrypted password hashes for that domain will likely be stolen and cracked offline on the attackers system. This includes all administrative level domain accounts. Since Domain Controllers are the foundation of any Microsoft NT/2000 Domain. A compromise at this level almost ensures compromise of Application servers and Member servers. Additionally, due to password reuse, it is feasible that an attacker could compromise other NT/2000 Domains, Stand- alone servers, as well as non-NT/2000 operating systems.

Stuff you already know Domain Controllers Domain controllers must be single function servers. This means they should not perform or offer any other functions to the domain. The user account database is their critical resource and this must be protected at all costs. Provided the server is locked-down as a single function server offering no services beyond what is required, an attacker will need to compromise a username/password that is a member of the local Administrators group or one with administrative level privileges (ie. Domain Admins group). This can be achieved by password guessing or password reuse from other sources. With that said, the compromise of an account that has administrative domain privileges usually signifies "game over" for the domain, its systems and their resources. These accounts are stored on Domain Controllers and must be protected with the strongest passwords controls allowable by corporate policies.

Stuff you already know Application servers Application servers on the network provide access to services such as Web, FTP, SQL, Oracle, Mail and File sharing. These servers are usually the second tier of an attack against and NT/2000 domain. Generally, vulnerabilities in these services will be attacked with exploits that in many cases result in a complete compromise of the system. Unnecessary services should not be run on application servers. These services constitute a potential avenue for attack. These services, if required at all, must be kept up to date with current stable vendor patches. If an attacker gains control of an Application server, the username/passwords from that system will often provide the credentials needed to compromise a domain account that has administrative privileges. Additionally, previously established connections and trusts can be leveraged to compromise other systems. For example, web servers often contain e-commerce data, existing connections and scripted passwords to backend databases. The worst-case scenario would be an attacker gaining an administrative domain account from a Application server compromise. This can be avoided by never running services in the context of an administrative domain account on non-Domain Controllers.

Stuff you already know Member Servers Member servers (workstations, test systems, back-up servers, etc) are usually the final targets for an NT/2000 attacker with zero network knowledge. Unless an attacker is unsuccessful in the first two tiers they will most likely already have full access to all Member servers. Common targets of this type are administrative workstations and desktops of Supervisors and Executives. Accounts should not exist on these systems that would allow an attacker to gain domain level access via password reuse. An attacker that compromises a member server will have full access to all data on the system (personal & corporate) and may have access to systems administered from this system. The worst-case scenario would be an attacker gaining an administrative domain account from a Member server compromise. This can be avoided by never running services in the context of an administrative domain account on non-Domain Controllers.

Stuff you already know Critical Application Servers (Non-Domain Requirement) Critical Application Servers (Payroll/Finance/HR) typically are not required to be accessible from the domain except by a very tightly restricted group. The isolation of these servers can be exaggerated by removing them from the domain and creating strict access control lists or firewall rules for protection. Individuals who require access should be using a `static´ workstation with a defined IP address. This address will be one of the few that will be allowed remote connection to shared drives. Accounts should be unique to this system with both userid and passwords different from the primary domain. Applications running such as Peoplesoft or Oracle Financials, which require the general population the ability to connect, should be controlled by creating strict access control lists or firewall rules limiting connections only to the application server port.

Internal Penetration Testing  Two scenarios  CYA and documentation  Defining scope and goals  Tools of the Trade  Presentation of findings

CYA and Documentation BEFORE YOU BEGIN  Get signed approval  Gather contact/emergency information  Obtain critical operations information  Maintenance windows  Agree on documentation and reporting  Screenshots?

Internal Penetration Testing  Two scenarios  CYA and documentation  Defining scope and goals  Tools of the Trade  Presentation of findings

Defining Scope and Goals  Define specific goals for assessment  What defines success?  Identify vs. exploit?  Should systems be tagged?  Are screenshots enough?  Create timelines  Active assessment?

LIMITS? Out of scope? Not for hackers  Reading in attempt to gain passwords  Attacking workstations to gain network credentials  Attacking administrative workstations to gain admin access  Searching.txt and.doc files on workstations  Searching.txt and.doc files on production systems  Sniffing traffic  Keystroke loggers  Intentional denial of service  The bad guys can/may/will do these things.

Internal Penetration Testing Internal vs. External What is the difference? less or no access controls test systems trust relationships

Internal Penetration Testing  Two scenarios  CYA and documentation  Defining scope and goals  Tools of the Trade  Presentation of findings

Internal Penetration Testing  Footprint  Host Identification  Service Identification  Service Enumeration  Host Enumeration  Network Map  HSV Scans  Vulnerability Mapping/Exploitation

Internal Penetration Testing Footprint Goal: identify ranges and domains

Internal Penetration Testing Footprint Identify domains net view /domain

Internal Penetration Testing Footprint Identify IP ranges  SNMP  DNS  ICMP

Internal Penetration Testing  Footprint  Host Identification  Service Identification  Service Enumeration  Host Enumeration  Network Map  HSV Scans  Vulnerability Mapping/Exploitation

Internal Penetration Testing Host Identification Identify Hosts  TCP  ICMP Fscan - Foundstone

Internal Penetration Testing Host Identification Identify domain members using the NET command net view /domain:

Internal Penetration Testing  Footprint  Host Identification  Service Identification  Service Enumeration  Host Enumeration  Network Map  HSV Scans  Vulnerability Mapping/Exploitation

Internal Penetration Testing Service Identification Identify Ports  TCP  UDP Fscan - Foundstone

Internal Penetration Testing Service Identification Don’t forget source port scans! Fscan –i Fscan –

Internal Penetration Testing  Footprint  Host Identification  Service Identification  Service Enumeration  Host Enumeration  Network Map  HSV Scans  Vulnerability Mapping/Exploitation

Internal Penetration Testing Service Enumeration Identify what is running on listening ports  TCP  UDP Fscan - Foundstone

Internal Penetration Testing  Footprint  Host Identification  Service Identification  Service Enumeration  Host Enumeration  Network Map  HSV Scans  Vulnerability Mapping/Exploitation

Internal Penetration Testing Host Enumeration: use all the previous information to make accurate guess at OS and version

Internal Penetration Testing  Footprint  Host Identification  Service Identification  Service Enumeration  Host Enumeration  Network Map  HSV Scans  Vulnerability Mapping/Exploitation

Internal Penetration Testing Network Maps should be created to identify hosts, services and access paths.

Internal Penetration Testing  Footprint  Host Identification  Service Identification  Service Enumeration  Host Enumeration  Network Map  HSV Scans  Vulnerability Mapping/Exploitation

Internal Penetration Testing High Severity Vulnerability (HSV) Scans should be performed to identify systems with high severity vulnerability.

Internal Penetration Testing High Severity Vulnerability Scans NetBIOS weak passwords SQL weak passwords Web Vulnerabilities

Internal Penetration Testing High Severity Vulnerability Scans NetBIOS weak passwords

Internal Penetration Testing High Severity Vulnerability Scans NetBIOS weak passwords

Internal Penetration Testing High Severity Vulnerability Scans SQL weak passwords

Internal Penetration Testing High Severity Vulnerability Scans SQL weak passwords

Internal Penetration Testing High Severity Vulnerability Scans Web vulnerabilities

Internal Penetration Testing  Footprint  Host Identification  Service Identification  Service Enumeration  Host Enumeration  Network Map  HSV Scans  Vulnerability Mapping/Exploitation

Internal Penetration Testing Vulnerability Mapping/Exploitation Source port attacks

If you use IPSec don’t forget to use the NoDefaultExempt key HKLM\SYSTEM\CCS\Services\IPSEC\NoDefaultExec DWORD = 1

Internal Penetration Testing Vulnerability Mapping/Exploitation.printer unicode

Internal Penetration Testing Vulnerability Mapping/Exploitation

Internal Penetration Testing Vulnerability Mapping/Exploitation

Internal Penetration Testing Vulnerability Mapping/Exploitation

Demo

Internal Penetration Testing  Two scenarios  CYA and documentation  Defining scope and goals  Tools of the Trade  Presentation of findings

Presentation of Findings  HSVs should be reported ASAP  Report should be clear and concise  Include screenshots  Use action items for remediation

Presentation of Findings  Do not confuse symptoms for systemic causes  Think about systemic causes  Categorize findings  TACTICAL  STRATEGIC

Strengthening Microsoft Networks  strong domain architectures  rigid user management  hardened applications  principle of least privilege

Strengthening Microsoft Networks  security baselines for systems  defense in depth  network segmentation  3rd party audit

Summary  What was the point again?  Where can we get these slides?  Do you have a web site?  Is there time for Q&A?

Question and Answer

How to Fix A Broken Window Erik Pace Birkholz, CISSP, Principal Consultant, Foundstone ©1999, 2000 Laurie Brosius