Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
System Security Scanning and Discovery Chapter 14.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
System and Network Security Practices COEN 351 E-Commerce Security.
Vulnerability Analysis Borrowed from the CLICS group.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
Chapter 7 HARDENING SERVERS.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Hands-On Microsoft Windows Server 2003 Administration Chapter 7 Administering Web Resources in Windows Server 2003.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 19: Configuring Windows Firewall
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Network Vulnerability Scanning Xiaozhen Xue Dept. of Computer Science Texas Tech University, USA Akbar Siami Namin Dept. of Computer.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cyber Patriot Training
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Using Windows Firewall and Windows Defender
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Honeypot and Intrusion Detection System
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Module 8 : Configuration II Jong S. Bok
Web Security Group 5 Adam Swett Brian Marco. Why Web Security? Web sites and web applications constantly growing Complex business applications are now.
TCOM Information Assurance Management System Hacking.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 7: Implementing Security Using Group Policy.
NetTech Solutions Protecting the Computer Lesson 10.
1 Active Directory Administration Tasks And Tools Active Directory Administration Tasks Active Directory Administrative Tools Using Microsoft Management.
Security Configuration Wizard Keith D Miller Microsoft European Support Readiness Manager.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Module 8 Implementing Security Using Group Policy.
Windows Server 2003 SP1 Technical Overview John Howard, IT Pro Evangelist, Microsoft UK
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Maintaining and Updating Windows Server 2008 Lesson 8.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Setting-Up and Securing a Server
Chapter 4: Security Baselines
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
Information Security Session October 24, 2005
Operating System Security
Operating System Hardening
Security Templates Lecture 7.
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs. non-credentialed Example: – Microsoft Baseline Security Analyzer

How Vulnerability Scanners Work Similar to virus scanning software: – Contain a database of vulnerability signatures that the tool searches for on a target system – Cannot find vulnerabilities not in the database New vulnerabilities are discovered often Vulnerability database must be updated regularly

Typical Vulnerabilities Checked Network vulnerabilities Host-based (OS) vulnerabilities – Misconfigured file permissions – Open services – Missing patches – Vulnerabilities in commonly exploited applications (e.g. Web, DNS, and mail servers)

Vulnerability Scanners - Benefits Very good at checking for hundreds (or thousands) of potential problems quickly – Automated – Regularly May catch mistakes/oversights by the system or network administrator Defense in depth

Vulnerability Scanners - Drawbacks Report “potential” vulnerabilities Only as good as the vulnerability database Can cause complacency Cannot match the skill of a talented attacker Can cause self-inflicted wounds

Credentialed Vulnerability Scanners A Windows security template is a file (.inf) that lists recommended configuration parameters for various system settings: – Account policies – Local policies – Event log – Restricted groups – System services – Registry – File system

Security Templates (cont) There are several default security templates defined by Microsoft: – Default security – from a default installation of the OS – Compatible – modifies permissions on files and registry to loosen security settings for user accounts (designed to increase application compatibility) – Secure – increases security by modifying password, lockout, and audit settings – Highly secure – does everything the secure template does plus more There are templates defined by others, and an administrator can customize his/her own templates

Security Configuration and Analysis Utility Can be used to: – Save current system settings to a template – Compare the current system settings against a preconfigured template – Apply the settings in a preconfigured template to the system

Security Configuration and Analysis Utility (cont) Running: – Run Microsoft Management Console (MMC) – Add Security Configuration and Analysis Snap-in – Open a (new) database – Analyze/Configure computer now Demo

Security Configuration Wizard An attack surface reduction tool For Windows 2003 Server SP1 and later Determines the minimum functionality for server’s role or roles Disables functionality that is not required Run off of a file (.xml) that lists recommended configuration parameters for various system settings

Security Configuration Wizard (cont) Disables functionality that is not required – Disables unneeded services – Blocks unused ports – Allows further address or security restrictions for ports that are left open – Prohibits unnecessary IIS web extensions, if applicable – Reduces protocol exposure to server message block (SMB), LanMan, and Lightweight Directory Access Protocol (LDAP) – Defines a high signal-to-noise audit policy

Security Configuration Wizard (cont) Running – From Control Panel -> Add/Remove New Programs – Add/Remove Windows Components – Security Configuration Wizard – Run from Administrative Tools Analyze system settings Configure system settings Demo

Windows Malicious Software Removal Tool Checks for specific malicious software – Trojans – Spyware – Worms – Viruses – Bots Helps remove any infection found Updated monthly (via automatic updates)

Popular Security Tools “the network security community's favorite tools” We will talk about/demo many of these during this class The list: –

Attackers use Vulnerability Scanners Too From network scanning an attacker has learned: – List of addresses of live hosts – Network topology – OS on live hosts – Open ports on live hosts – Service name and program version on open ports

Uncredentialed Vulnerability Scanning After network scanning, an attacker probably has enough information to begin searching for vulnerabilities that will enable attacks –Manually –Automatically Vulnerability scanner Credentialed vs. non-credentialed Used along with other reconnaissance information to prepare for and plan attacks

Manually Researching Vulnerabilities Many sources for vulnerability information: –Web sites: General: – – Vendor: – – Questionable –Books E.g. Hacking Exposed –Other

Automated Vulnerability Scanners Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs. non-credentialed Used along with other reconnaissance information to prepare for and plan attacks

How Vulnerability Scanners Work Vulnerability Database Scanning Engine Knowledge Base GUI Results Target 2 Target 1 Target 3 Target 4

Typical Vulnerabilities Checked Common configuration errors –Examples: weak/no passwords Default configuration weaknesses –Examples: default accounts and passwords Well-known system/application vulnerabilities –Examples: Missing OS patches An old, vulnerable version of a web server

Nessus Free, open-source vulnerability scanner URL: Two major components: –Server Vulnerability database Scanning engine –(Web) Client Configure a scan View results of a scan

Nessus Plug-ins Vulnerability checks are modularized: –Each vulnerability is checked by a small program called a plug-in –More than 20,000 plug-ins form the Nessus vulnerability database (updated regularly) –Customizable – user can write new plug-ins In C In Nessus Attack-Scripting Language (NASL)

Vulnerabilities Checked by Nessus Some major plug-in groups: –Windows –Backdoors –CGI abuses –Firewalls –FTP –Remote file access –RPC –SMTP –DOS

Running a Nessus Scan Make sure the server is running and has the latest vulnerability database Start the client Connect to the server Select which plug-ins to use Select target systems to scan Execute the scan View the results

Nessus Results Vulnerabilities ranked as high, medium, or low risk Need to be checked (and interpreted) Can be used to search for/create exploits along with previous information collected: –OS type –List of open ports –List of services and versions –List of vulnerabilities

Nikto – a Web Vulnerability Scanner URL: Vulnerability scanner for web servers –Similar to Nessus - runs off plug-ins Tests for: –Web server version –Known dangerous files/CGI scripts –Version-specific problems

Summary Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Used by defenders to automatically check for many known problems Used by attackers to prepare for and plan attacks