VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.

Slides:



Advertisements
Similar presentations
Module XVII Novell Hacking
Advertisements

Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Cryptography and Network Security Chapter 20 Intruders
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
IPSec/IKE Protocol Hacking ToorCon 2K2 – San Diego, CA Anton Rager Sr. Security Consultant Avaya Security Consulting.
“Secure” Remote Access Submitted To Mr.: Ahmed Abu Mosameh Preparation By: Mohammed N. Abu Shammala For telecommuters and roaming users.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Security at NCAR David Mitchell February 20th, 2007.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CHAPTER 9 Sniffing.
Cody Brookshear Andy Borman
Chapter 2 Securing Network Server and User Workstations.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Attacking IPsec VPNs Charles D George Jr. Overview Internet Protocol Security (IPSec) is a suite of protocols for authenticating and encrypting packets.
Ethical Hacking: Hacking GMail. Teaching Hacking.
TCOM Information Assurance Management System Hacking.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Password Cracking COEN 252 Computer Forensics. Social Engineering Perps trick Law enforcement, private investigators can ask. Look for clues: Passwords.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Hacking Windows.
COEN 252 Computer Forensics
CSCE 548 Student Presentation By Manasa Suthram
Working at a Small-to-Medium Business or ISP – Chapter 8
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
PPP – Point to Point Protocol
Introduction to SQL Server 2000 Security
Security of a Local Area Network
Nessus Vulnerability Scanning
Advanced Penetration testing
Lesson 16-Windows NT Security Issues
6. Application Software Security
Presentation transcript:

VPN AND SECURITY FLAWS Rajesh Perumal Clemson University

VPN – AN ATTRACTIVE TARGET  Carry Sensitive information  Remote access VPNs exposes entire internal network  Intrusion Detection Systems cannot Monitor VPN Traffic  Increase in security in Internet servers makes VPN a tempting Target.

VPN FLAWS  Insecure storage of Authentication credentials by VPN Clients  Username Enumeration Vulnerabilities  Offline Password Cracking  Man in the Middle Attacks  Lack of Account Lockout  Poor Default Configurations  Poor Guidance and Documentation

Insecure storage of Authentication credentials by VPN Clients  Storing the username unencrypted in a file or the registry  Storing password in scrambled form or obfuscated form  Physical memory dumps can reveal plain text passwords  Caching credentials

Username Enumeration Vulnerabilities  IKE Aggressive Mode with PSK will prompt or give clue the hacker, the login name is incorrect. So the hacker can deduce the correct user names.

Offline Password Cracking  Easy to obtain Hash function.  Responder hash is obtained  Dictionary attack on the password will reveal in feasible amount.

Man in the Middle Attacks  By installing a packet sniffing system between the VPN client and server, we can sniff clear text user names and the password can be cracked by the 1st and 2nd packets of the IKE Aggressive mode exchange.  The sniffing system (SS), acts as a server for the client and as a client for the server. SS can get passwords, user names and ISAKMP message from the client and issue its own ISAKMP message. Similarly the sniffer can send its own ISAKMP message, since the user name and password is known.

Poor Guidance and Documentation  End user is not provided with proper documentation and is not well informed to take proper decisions.  User goes with default settings, default encryption.

CONCLUSION  Remote access VPN systems, 90% have had significant security issues.  Cryptographic Techniques adopted are strong but vulnerabilities are due to poor configuration.  Well accepted security practices are not adopted.  Info leaking about valid usernames is prevented in OS but not in VPN.  Users make Default configuration on the basis of ease of use rather than security. Eg. IKE Aggressive mode with PSK authentication  Users do not know the intensity of bad Configuration options.  Proper testing is needed. Tools like “ike – scan” should help testing the VPN.