Network Security Network Attacks and Mitigation 張晃崚 CCIE #13673, CCSI #31340 區域銷售事業處 副處長 麟瑞科技.

Slides:



Advertisements
Similar presentations
Cisco Device Hardening Disabling Unused Cisco Router Network Services and Interfaces.
Advertisements

Mitigating Layer 2 Attacks
DMZ (De-Militarized Zone)
DMZ (De-Militarized Zone)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Switched Networks Routing And Switching 2.0.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Common Layer 2 Attacks and Countermeasures.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Introduction to Switched Networks Routing and Switching.
CCNPv5 Minimizing Service Loss and Data Theft in a Campus Network 1 Minimizing Service Loss and Data Theft in a Switched BCMSN Module 8 – Sec 2.
1 © 2004, Cisco Systems, Inc. All rights reserved IP Telephony Security Cisco Systems.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Protecting Against Spoofing Attacks.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
System and Network Security Practices COEN 351 E-Commerce Security.
Controlling access with packet filters and firewalls.
1 Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Lo'ai Tawalbeh NYIT New York Institute of Technology.
Implementing Secure Converged Wide Area Networks (ISCW)
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L3 1 Implementing Secure Converged Wide Area Networks (ISCW)
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Enterprise Network Security Accessing the WAN Lecture week 4.
COEN 252: Computer Forensics Router Investigation.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Layer 2 Security – No Longer Ignored Security Possibilities at Layer 2 Allan Alton, BSc CISA CISSP NetAnalyst UBC October 18, 2007.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
SECURITY BASELINES -Sangita Prabhu.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
– Chapter 5 – Secure LAN Switching
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Securing Wired Local Area Networks(LANs)
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Securing the Network.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
Network Security Techniques by Bruce Roy Millard Division of Computing Studies Arizona State University
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
Linux Networking and Security
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
CHAPTER 9 Sniffing.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Firewall Security.
Chapter 10 Security. A typical secured network Recognizing Security Threats 1- Application-layer attacks Ex: companyname.com/scripts/..%5c../winnt/system32/cmd.exe?/c+dir+c:\
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Security fundamentals Topic 10 Securing the network perimeter.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Security fundamentals
Instructor Materials Chapter 5: Network Security and Monitoring
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 2: Basic Switching Concepts and Configuration
Chapter 2: Introduction to Switched Networks
Chapter 5: Network Security and Monitoring
Network Security and Monitoring
– Chapter 3 – Device Security (B)
Introduction to Network Security
Presentation transcript:

Network Security Network Attacks and Mitigation 張晃崚 CCIE #13673, CCSI #31340 區域銷售事業處 副處長 麟瑞科技

Types of Network Attacks

Attacks that require less intelligence about the target network: Reconnaissance Access attacks DoS and distributed DoS

Types of Network Attacks (Cont.) Attacks that typically require more intelligence or insider access: Worms, viruses, and Trojan horses Application layer attacks Threats to management protocols

Reconnaissance Attacks and Mitigation

Reconnaissance refers to the overall act of learning information about a target network by using readily available information and applications. Reconnaissance attacks include: –Packet sniffers –Port scans –Ping sweeps –Internet information queries

Packet Sniffers A packet sniffer is a software application that uses a network adapter card in promiscuous mode to capture all network packets. Packet sniffers: –Exploit information passed in plaintext. Protocols that pass information in plaintext are Telnet, FTP, SNMP, POP, and HTTP. –Must be on the same collision domain. –Used legitimately, or can be designed specifically for attack.

Packet Sniffer Mitigation The mitigation techniques and tools include: Authentication Cryptography Antisniffer tools Switched infrastructure

Port Scans and Ping Sweeps Port scans and ping sweeps attempt to identify: All services All hosts and devices The operating systems Vulnerabilities

Port Scan and Ping Sweep Mitigation Port scans and ping sweeps cannot be prevented without compromising network capabilities. However, damage can be mitigated using intrusion prevention systems at network and host levels.

Internet Information Queries Sample IP address query Attackers can use Internet tools such as “WHOIS” as weapons.

Access Attacks and Mitigation

Access Attacks Intruders use access attacks on networks or systems for these reasons: –Retrieve data –Gain access –Escalate their access privileges Access attacks include: –Password attacks –Trust exploitation –Port redirection –Man-in-the-middle attacks –Buffer overflow

Password Attacks Hackers implement password attacks using the following: Brute-force attacks Trojan horse programs IP spoofing Packet sniffers

Password Attack Example L0phtCrack takes the hashes of passwords and generates the plaintext passwords from them. Passwords are compromised using one of two methods: –Dictionary cracking –Brute-force computation

Password Attack Mitigation Password attack mitigation techniques: Do not allow users to use the same password on multiple systems. Disable accounts after a certain number of unsuccessful login attempts. Do not use plaintext passwords. Use “strong” passwords. (Use “mY8!Rthd8y” rather than “mybirthday”)

Trust Exploitation A hacker leverages existing trust relationships. Several trust models exist: –Windows: Domains Active directory –Linux and UNIX: NIS NIS+

Trust Exploitation Attack Mitigation

Port Redirection

Man-in-the-Middle Attacks and Their Mitigation A man-in-the-middle attack requires that the hacker have access to network packets that come across a network. A man-in-the-middle attack is implemented using the following: –Network packet sniffers –Routing and transport protocols Man-in-the-middle attacks can be effectively mitigated only through the use of cryptographic encryption.

DoS Attacks and Mitigation

A DoS attack damages or corrupts your computer system or denies you and others access to your networks, systems, or services. Distributed DoS technique performs simultanous attacks from many distributed sources. DoS and Distributed DoS attacks can use IP spoofing.

Distributed DoS Attacks DoS and distributed DoS attacks focus on making a service unavailable for normal use. DoS and distributed DoS attacks have these characteristics: –Generally not targeted at gaining access to your network or the information on your network –Require very little effort to execute –Difficult to eliminate, but their damage can be minimized

Distributed DoS Example

DoS and Distributed DoS Attack Mitigation The threat of DoS attacks can be reduced using: Anti-spoof features on routers and firewalls Anti-DoS features on routers and firewalls Traffic rate limiting at the ISP level

IP Spoofing in DoS and Distributed DoS IP spoofing occurs when a hacker inside or outside a network impersonates the conversations of a trusted computer. IP spoofing can use either a trusted IP address in the network or a trusted external IP address. Uses for IP spoofing include: –Injecting malicious data or commands into an existing data stream –Diverting all network packets to the hacker who can then reply as a trusted user by changing the routing tables IP spoofing may only be one step in a larger attack.

IP Spoofing Attack Mitigation The threat of IP spoofing can be reduced, but not eliminated, using these measures: Access control configuration Encryption RFC 3704 filtering Additional authentication requirement that does not use IP address-based authentication; examples are: –Cryptographic (recommended) –Strong, two-factor, one-time passwords

Management Protocols and Vulnerabilities

Configuration Management Configuration management protocols include SSH, SSL, and Telnet. Telnet issues include: –The data within a Telnet session is sent as plaintext. –The data may include sensitive information.

Configuration Management Recommendations These practices are recommended: Use IPSec, SSH, SSL, or any other encrypted and authenticated transport. ACLs should be configured to allow only management servers to connect to the device. All attempts from other IP addresses should be denied and logged. RFC 3704 filtering at the perimeter router should be used to mitigate the chance of an outside attacker spoofing the addresses of the management hosts.

Management Protocols These management protocols can be compromised: SNMP: The community string information for simple authentication is sent in plaintext. syslog: Data is sent as plaintext between the managed device and the management host. TFTP: Data is sent as plaintext between the requesting host and the TFTP server. NTP: Many NTP servers on the Internet do not require any authentication of peers.

Management Protocol Best Practices Management Protocol Recommendations SNMPConfigure SNMP with only read-only community strings. Set up access control on the device you wish to manage. Use SNMP version 3. SyslogEncrypt syslog traffic within an IPsec tunnel. Implement RFC 3704 filtering. Set up access control on the firewall. TFTPEncrypt TFTP traffic within an IPsec tunnel. NTPImplement your own master clock. Use NTP version 3 or above. Set up access control that specifies which network devices are allowed to synchronize with other network devices.

Determining Vulnerabilities and Threats

The following tools are useful when determining general network vulnerabilities: Blue’s PortScanner Ethereal Microsoft Baseline Security Analyzer Nmap

Blue’s Port Scanner and Ethereal Blue’s PortScanner Ethereal

Microsoft Baseline Security Analyzer

Vulnerable Router Services and Interfaces

Cisco IOS routers can be used as: –Edge devices –Firewalls –Internal routers Default services that create potential vulnerabilities (e.g., BOOTP, CDP, FTP, TFTP, NTP, Finger, SNMP, TCP/UDP minor services, IP source routing, and proxy ARP). Vulnerabilities can be exploited independently of the router placement.

Vulnerable Router Services Disable unnecessary services and interfaces (BOOTP, CDP, FTP, TFTP, NTP, PAD, and TCP/UDP minor services) Disable commonly configured management services (SNMP, HTTP, and DNS) Ensure path integrity (ICMP redirects and IP source routing) Disable probes and scans (finger, ICMP unreachables, and ICMP mask replies) Ensure terminal access security (ident and TCP keepalives) Disable gratuitous and proxy ARP Disable IP directed broadcast

Router Hardening Considerations Attackers can exploit unused router services and interfaces. Administrators do not need to know how to exploit the services, but they should know how to disable them. It is tedious to disable the services individually. An automated method is needed to speed up the hardening process.

Minimizing Service Loss and Data Theft in a Campus Network Understanding Switch Security Issues

Overview of Switch Security

Rogue Access Points Rogue network devices can be: –Wireless hubs –Wireless routers –Access switches –Hubs These devices are typically connected at access level switches.

Switch Attack Categories MAC layer attacks VLAN attacks Spoofing attacks Attacks on switch devices

MAC Flooding Attack

Port Security Port security restricts port access by MAC address.

802.1x Port-Based Authentication Network access through switch requires authentication.

Minimizing Service Loss and Data Theft in a Campus Network Protecting Against Spoof Attacks

DHCP Spoof Attacks Attacker activates DHCP server on VLAN. Attacker replies to valid client DHCP requests. Attacker assigns IP configuration information that establishes rogue device as client default gateway. Attacker establishes “man-in-the-middle” attack.

DHCP Snooping DHCP snooping allows the configuration of ports as trusted or untrusted. Untrusted ports cannot process DHCP replies. Configure DHCP snooping on uplinks to a DHCP server. Do not configure DHCP snooping on client ports.

IP source guard is configured on untrusted L2 interfaces IP Source Guard

ARP Spoofing

DAI associates each interface with a trusted state or an untrusted state. Trusted interfaces bypass all DAI. Untrusted interfaces undergo DAI validation. Dynamic ARP Inspection

Protection from ARP Spoofing Configure to protect against rogue DHCP servers. Configure for dynamic ARP inspection.