Dial-up, PBX, Voicemail, and VPN Hacking Lesson 13.

Slides:



Advertisements
Similar presentations
E-books and E-journals Off-campus This presentation will show you how to log in and access Oxford Brookes Library e-books and e-journals when youre off.
Advertisements

E-books and E-journals Off-campus This presentation will show you how to log in and access Oxford Brookes Library e-books and e-journals when youre off.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Guide to Network Defense and Countermeasures Second Edition
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Technical Methodology (bottom-up) Lesson 8. 6-step Process Step 1: Site Survey Step 2: Develop a test plan Step 3: Build the toolkit Step 4: Conduct the.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Substitute FAQs SubFinder Overview. FAQs Do I have to have touch-tone service to use SubFinder? No, but you do need a telephone that can be switched from.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
System Security Scanning and Discovery Chapter 14.
Prepared by: Nahed Al-Salah
Hands-On Ethical Hacking and Network Defense
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Remote Access Network Management Kelly Given Allison Traina.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
SM3121 Software Technology Mark Green School of Creative Media.
File sharing. Connect the two win 7 systems with LAN card Open the network.
NORTEL NETWORKS CONFIDENTIAL CallPilot 150 Modem Access Jan 03, 2005 Version 1.5.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Introduction Our Topic: Mobile Security Why is mobile security important?
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Staying Safe Online Keep your Information Secure.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Thoughts on Firewalls: Topologies, Application Impact, Network Management, Tech Support and more Deke Kassabian, April 2007.
CPT 123 Internet Skills Class Notes Internet Security Session A.
IS Network and Telecommunications Risks Chapter Six.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
Information Security What is Information Security?
Hacking Windows and Windows Security Lesson 10. Windows 9X/Me/NT There are still some folks out there using Windows 95 and 98, ME, 2000, and NT. Remote.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer security By Isabelle Cooper.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Private Branch eXchange (PBX)
FORESEC Academy FORESEC Academy Security Essentials (III)
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CPT 123 Internet Skills Class Notes Internet Security Session B.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Network Devices and Firewalls Lesson 14. It applies to our class…
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Understanding Security Policies Lesson 3. Objectives.
Dial-up, VPN and Network Devices hacking. Dial-up hacking Phone number footprinting: phone directories (on-line and CD-ROM) Wardialing (scanning): automatically.
8 – Protecting Data and Security
The new dialup procedure requires the use of the EVPN client software to establish an active connection to the Lockheed Martin network. After January 31st,
Chapter 7. Identifying Assets and Activities to Be Protected
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Lesson 16-Windows NT Security Issues
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Windows Vista Inside Out
Presentation transcript:

Dial-up, PBX, Voic , and VPN Hacking Lesson 13

Dial-up connections Interestingly, earlier versions of text didn’t have as robust a section on dial-ups, PBX’s, etc… It may be somewhat surprising, but many organizations still have analog dial-up connections into their systems May be authorized or not! Nice thing is that if you find one, you will probably be able to circumvent most of the organization’s security systems (e.g. firewalls, IDS…) Techniques have been around for a long time, war-dialers or demon dialers.

An interesting quote… “Dial-up access through a terminal server ensures that we will not be locked out of the network if the organization discovers it is under attack and decides to shut off all Internet access. Dial-up lines are almost always overlooked by security administrators or are managed by a separate group with minimal communication between the two groups.” “As all seasoned network professionals know, there’s always at least one employee who decides to set up his or her own remote access to a desktop machine using Symantec Corp.’s pcAnywhere or a similar product without a password.” Mark Abene “phiber optik”

Preparing to War-dial Need to know what numbers to try Phone number footprinting Check phone book, or a business card to get an idea Need a tool to do the war-dialing Public domain ToneLoc: the granddaddy, updated versions still available THC-Scan: Probably the most popular public version Commercial (may also include penetration attempts) PhoneSweep: powerful but costs TeleSweep: even better, but no longer supported Legal Issues In some locations it is illegal to dial large quantities of numbers in sequence Some locations specifically ban war-dialing Need to ensure you have explicit permission to dial an organization’s phone numbers and DON’T make a mistake!

War-dialing (cont.) Looking for numbers where a computer with a modem answers May also find PBX, Voic system, SCADA or control system. War-dialers will often provide the capability to not only record possible numbers but may also record header information. Some other details you may need to fully characterize the possible connection: Timeout or maximum number of tries? What times are connections allowed? What type of challenge/response is used (does there seem to be an extra level such as a smart card)? What type of character data is used for ID and password

War dialing domains Low Hanging Fruit Common/default userid/password combo in use. With a little background info may be able to determine these. Single Authentication, unlimited attempts Only requires single authentication item (e.g. password but no userid) Brute-forcing possible here since you won’t be disconnected. Single Authentication, limited attempts After threshold reached connection disconnected Will need to repeatedly dial back Dual Authentication, Unlimited attempts Requires more than one piece of info (e.g. ID & Password) Brute-force still possible, just now for two items Dual Authentication, limited attempts Now need two items, and will have to dial back if you can’t come up with both in just a few attempts.

War dialing – some final notes Though high-speed access more ubiquitous, war dialing is still valuable as people still connect modems. Countermeasures: Policy War dial your own numbers. Only will find modems attached when you attempt the war dialing. Not effective if person using modem when you call Doesn’t solve problem, only may let you know you have one. Enforce policy, punish violators when you find them Telephone firewall

PBX Hacking Still common to have dial-up access to PBX for maintenance/management purposes. Textbook included several examples of the type of login screens one might see if a PBX connection is discovered. Like other systems, a number of default password/userid combinations exist which may not have been cleared from the system. Why worry about PBXs? Because they can be exploited, or at the very least, disrupted. Best countermeasure is to not leave this active dial- up port open. Only set it up when it is needed.

Voic Hacking Why play with voic ? Use forgotten ones for your own communication Listen in on other people for corporate espionage purposes Harassment Gives me something to do at nights What is needed for an attempt? Number to dial for voic Box number (often just the extension) Voic box password (generally 4-6 digits) Just like text passwords, people pick easy to remember numbers/patterns for voic Same thing applies for “gated communities”

VPN Hacking With VPNs we are encapsulating the original packet within a new packet and encrypting the original. This hides both the data and information about the origin and destination. Number of different packages that allow you to set up a VPN. Text discusses a few potential problems but… chances are pretty good that we will not be “hacking” a VPN, too time consuming. This is not to say that somebody using a VPN is secure, if you can get in using another method, you can they utilize the VPN yourself in accessing other systems in the corporate domain. Since you will now be coming from inside a trusted domain the level of authentication may not be as high as somebody coming in from outside of the domain.

Summary What is the importance and significance of this material? Dial up still a possible avenue to access corporate networks. PBXs also may be vulnerable and are an asset that should be protected. How does this topic fit into the subject of “Security Risk Analysis”? Need to include dial-up to complete assessment of security perimeter. Also should look at PBXs, though this is often overlooked.