Understanding SNMP Vulnerabilities By Latha Sudharshan Vasudha Yaramala.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
NS-H /11041 SNMP. NS-H /11042 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 © 2013 Cisco Systems, Inc. All rights reserved. Cisco confidential.Cisco Networking Academy, U.S./Canada Equipping Today’s Instructors for Tomorrow’s.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Introduction to SNMP AfNOG 11, Kigali/Rwanda.
ENS 1 SNMP M Clements. ENS 2 Simple Network Management Protocol Manages elements in networks – E.g. routers, switches, IP phones, printers etc. Uses manager.
1 Network Management Computer Networks. 2 OSI Network Management Model Performance Management e.g. utilization Fault Management e.g. SNMP traps Configuration.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
SNMP: Simple Network Management Protocol
SNMP (Simple Network Management Protocol)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Title: HP OpenView Network Node Manager SPI for SNMPv3 Session #: 326 Speakers: Jeff Scheaffer, HP OpenView NSM David Reid, SNMP Research.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems and emergencies in the network (router.
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Network Management Presentation HP Openview Christopher Scott December 10, 2004.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
APRICOT 2015 Security Day Cooperation between Security Teams and Network Operators: Actionable Intelligence on ShellShock Arnold S. Yoon Information Security.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Securing Wired Local Area Networks(LANs)
Operating system Security By Murtaza K. Madraswala.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Henric Johnson1 Chapter 12 Network Management Security Henric Johnson Blekinge Institute of Technology, Sweden
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
CCNA 4 Module 6 Introduction to network Administration.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Network Management Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
HP Overview. HP Overview is a family of integrated network and system management solution for managing the complete IT enterprises, including networks,
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
“ Vulnerabilities in SNMP Implementations ” CSCI Web Security Instructor: Dr. Andrew Yang Presented By: Harini Varatharajan.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
Network Management Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Defense-in-Depth using Network Virtualization and Network Admission.
Security in Cloud Computing Zac Douglass Chris Kahn.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Network Management Security in distributed and remote network management protocols.
Simple Network Management Protocol
Instructor Materials Chapter 5: Network Security and Monitoring
SNMPv1 Network Management: Communication and Functional Models
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Working at a Small-to-Medium Business or ISP – Chapter 8
SNMP M Clements ENS.
SNMP M Clements ENS.
Network Management Computer Networks.
Router Audit Tool and Benchmark
Chapter 5: Network Security and Monitoring
SNMP M Clements ENS.
Chapter 8: Monitoring the Network
مهندسی فناوری اطلاعات ارائه دهنده دکتر سيد امين حسيني
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

Understanding SNMP Vulnerabilities By Latha Sudharshan Vasudha Yaramala

Introduction What is a Network Management Protocol? SNMP most widely used Oulu University Secure Programming Group (OUSPG) Goal : describe SNMP vulnerabilities, its impact and solutions

SNMP Overview A standard protocol to manage networks and systems An SNMP-managed network consists of three key components: managed devices, agents, and network-management systems (Managers). Where does SNMP pitch in?

SNMP Vulnerabilities How is SNMP vulnerable? SNMP vulnerabilities Multiple vulnerabilities in SNMPv1 request handling Multiple vulnerabilities in SNMPv1 trap handling

Impact  Specific impact may vary from product to product  Unexpected input to agents and managers will lead to unexpected results  Vulnerabilities in the decoding and subsequent processing of SNMP messages by both managers and agents may result in:  denial-of-service conditions  buffer overflows  allow an attacker to gain unauthorized, privileged access to the affected device  viruses and worms

Solution Apply patch from vendor Disable the SNMP service Ingress filtering Filter SNMP traffic from non-authorized internal hosts Change default community strings Segregate SNMP traffic onto a separate management network Egress filtering Share tools and techniques

Conclusion SNMP – widely used but not perfect Emerging SNMP versions 2 and 3 Ignorance is *not* bliss when it comes to network security