OS Hardening Justin Whitehead Francisco Robles. ECE 4112 - Internetwork Security OS Hardening Installing kernel/software patches and configuring a system.

Slides:



Advertisements
Similar presentations
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Advertisements

SubDomain: Parsimonious Server Security Presenter: Alptekin Küpçü.
System Security Scanning and Discovery Chapter 14.
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Stack-Based Buffer Overflows Attacker – Can take over a system remotely across a network. local malicious users – To elevate their privileges and gain.
System Hardening Borrowed from the CLICS group. System Hardening How do we respond to problems? (e.g. operating system deadlock) Detect Detect (Detect.
System and Network Security Practices COEN 351 E-Commerce Security.
Linux Security 資管研究生 劉順德. Outline General Security –Account –Local –Network –Patch Services Security –Sendmail –BIND/DNS –Apache –FTP Recent Linux security.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Hacking Web Server Defiana Arnaldy, M.Si
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Securing Apache and PHP
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
CSCD 303 Essential Computer Security Fall 2010
Honeypot and Intrusion Detection System
Module 14: Configuring Server Security Compliance
Buffer Overflows Lesson 14. Example of poor programming/errors Buffer Overflows result of poor programming practice use of functions such as gets and.
Software Security Testing Vinay Srinivasan cell:
Secure Operating Systems Lesson C: Linux Security Features.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
CIS 193A – Lesson4 Bastille Hardening a System. CIS 193A – Lesson4 Focus Question What Linux utilities, commands, and files are used by Bastille to harden.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Module 8 : Configuration II Jong S. Bok
S E C U R E C O M P U T I N G Not For Public Release 1 Intrusion Tolerant Server Infrastructure Dick O’Brien OASIS PI Meeting July 25, 2001.
TCOM Information Assurance Management System Hacking.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006 Group 9 Greg Sheridan Terry Harvey Group 10 Matthew Bowman Laura Silaghi Michael.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
Асоциация за информационна сигурност Мрежова сигурност 1 изборен курс във ФМИ на СУ понеделник, зала 325, ФМИ, 19:00 четвъртък, зала 200,
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Linux Kernel Security (SELinux vs AppArmor vs Grsecurity)
Developing a Secure Internet Service SE Linux in Production Russell Coker Linux Consultant.
Safety measures in Linux Krzysztof Lichota
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Working at a Small-to-Medium Business or ISP – Chapter 8
Linux Security Presenter: Dolev Farhi |
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Chapter 6 Application Hardening
CompTIA Server+ Certification (Exam SK0-004)
Secure Software Confidentiality Integrity Data Security Authentication
Hacking Unix/Linux.
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Linux Security.
Intrusion Detection system
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

OS Hardening Justin Whitehead Francisco Robles

ECE Internetwork Security OS Hardening Installing kernel/software patches and configuring a system in order to prevent attackers from exploiting and attacking your system.

ECE Internetwork Security Motivations Why?  Add security features not present in default installs –Vendors leave default installs open for more customizability –Kernel & System level patches – work for known and unknown bugs  Bugs/Exploits in software

ECE Internetwork Security How Patches  Apply security patches to Linux kernel  Apply bug patches to software Security tools  Extra system logs and auditing System rules and policies  Restrict user privileges  Disabling unnecessary processes

ECE Internetwork Security The Best in Hardening… GRsecurity  Kernel patch  Features –Non-Executable Stack –Change root (chroot) hardening –/tmp race prevention –Extensive auditing –Additional randomness in the TCP/IP stack –/proc restrictions

ECE Internetwork Security Hardening Utilities Bastille Linux  Automated security program, Security wizard –SUID restrictions –SecureInetd –DoS attack detection and prevention –Automated firewall scripting –User privileges –Education

ECE Internetwork Security Common Issues and Exploits Stack-based attacks /proc /tmp SUID TCP Sequence Numbers

ECE Internetwork Security /proc /proc is a pseudo file system used for the kernel-level modules to send and retrieve information to and from processes Some files changeable, but primarily read- only but still allows users to gather information on specific processes.

ECE Internetwork Security /proc Solutions grsecurity  /proc rights restrictions that don't leak information about process owners  Option to hide kernel processes  /proc filedescriptor/memory protection

ECE Internetwork Security /tmp exploits /tmp directory is used by many programs to create and access files. Do not need permissions to create files Programs using /tmp must be carefully written in order to avoid exploits

ECE Internetwork Security /tmp exploits Race Condition  Replacing a file during the time a program accesses it and opens it. –Allows attacker to manipulate program with their own data, “winning the race”  Performing a race attack on a symlink can allow an attacker to create a file somewhere else on the system –Attackers can also gain root access

ECE Internetwork Security /tmp Solutions GRsecurity  Places restrictions on hardlinks/symlinks Bastille  Each process using /tmp gets its own safe /tmp directory

ECE Internetwork Security SUID Exploits SUID  Set-User ID – allows processes to be executed with the permissions of its owner, not the user running it  Example: passwd SUID programs can be exploited to gain root access  Bad inputs  Buffer overflows

ECE Internetwork Security SUID solutions Bastille  Disables many SUID programs it believes users should not run anyways –mount, umount? –Up to admin

ECE Internetwork Security TCP/IP Stack randomization Initial sequence numbers can be guessed or discovered by attackers  Allows session hijacking  IP spoofing Security patches attempt to add more randomization to initial sequence numbers  grsecurity

ECE Internetwork Security What you will be doing Base RH 8.0 Install  Run a series of exploits and collect TCP traffic data Applying patch to kernel, recompiling kernel Configuring system with Bastille Linux

ECE Internetwork Security Before and After Port scan TCP data capture Running a stack exploit Running /tmp and SUID exploits Comparing User Privileges  SUID programs  Access to gcc  /proc

ECE Internetwork Security Base Install RH 8.0 Telnet, FTP, and other insecure inetd services running No firewall No RH updates Minimum security settings

ECE Internetwork Security GR Security Patch Apply patch to kernel, rebuild kernel  Perform stack exploit  Perform port scan  Record differences in /proc  Perform /tmp exploit  Compare results to base install

ECE Internetwork Security Bastille-Linux Install and run  Configure SecureInetd daemon  Disable problematic daemons and SUID programs  Configure firewall  Enable /tmp security Repeat previous tests