a demonstration in the need for layered security · 2006-08-25 · a demonstration in the need for...

32
A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance Director / Vice President Director of Security –GIS North America - Presented by:

Upload: others

Post on 02-Jan-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

A Demonstration in the Need for Layered Security

Bryant G. Tow InfraGard National Members AllianceDirector / Vice President

Director of Security –GIS North America -

Presented by:

Page 2: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Today’s AgendaNew Network Entry PointsPenetration Demonstration & Root Kit IntallationWireless Network CompromisePhishing DemonstrationSecurity Strategy and Planning

Page 3: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

New Network Entry Points

Page 4: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Penetration Demonstration

( Disclaimer !)*

Page 5: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Exploiting a Vulnerable Server

1. Profile a target set2. Identify available services3. Find one or more canned exploits for any

observed platform/service combinations4. Try them all, see what sticks5. Penetrate and Radiate

Page 6: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Profiling the Target

Attacker FirewallTarget

TCP 1-65535 SYN

TCP/80 SYN

TCP/22 SYN

TCP/22 RST

TCP/80 SYN+ACK

Page 7: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

AttackerTarget

TCP/443/https

PayloadExploit

TCP/80/http

Page 8: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Mitigation: Penetration & Root KitUnderlying Causes

• Technical - The system was missing a patch

- No visibility as to the state of system patches

• Operational - The systems management team did not detect a machine was

missing a patch

- No internal assessment processes to detect a vulnerable host

• Strategy- Any existing efforts to manage patches or detect vulnerable

systems did not take into account this one particular host –strategies should apply controls effectively across all resources

Page 9: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Phishing

Page 10: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Phishing Statistics

Page 11: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Phishing by Cross-Site Scripting (XSS)1. Find a reputable site with an XSS vulnerability on any of is

pages2. Harvest a large number of live email addresses3. Draft an email 4. Insert an XSS exploit hyperlink into the email for the user

to click on 5. Send it to all of the live email addresses6. Wait

* The XSS attack will make some javascript execute inside the victim’s session with the real server – this could be used to steal cookies, passwords, etc.

* This could also be used with vulnerable SSL pages

Page 12: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

XSS Phishing MechanismVictims

Phisher

CLICK

HERE

Bait

XSS

Vulnerable

Page

ExploitLink

Real Server

Real Site

Exploit Link

Fake Server

Fake

Content

Fake

Site

Page 13: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a
Page 14: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a
Page 15: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Reel them in

Page 16: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a
Page 17: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Mitigation: Phishing with XSSUnderlying Causes

• Technical- Failure to filter inputs for javascript-related characters

• Operational- Development process does not have a security testing phase

• Policy- Security policy does not mandate a customer-oriented security

awareness campaign

- Security review not part of initial project planning

• Strategy- Failure to adopt an appropriate threat model for application

development

Page 18: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

What to do…Be suspicious of any email with urgent requests for personal financial information Don't use the links in an email to get to any web page Avoid filling out forms in email messages that ask for personal financial information Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser Consider installing a Web browser tool bar to help protect you from known phishing fraud websites http://www.earthlink.net/earthlinktoolbarRegularly log into your online accounts Ensure that your browser is up to date and security patches applied

Page 19: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

How to Report Phishing

• forward the email to [email protected]

• forward the email to the Federal Trade Commission at [email protected]

• forward the email to the "abuse" email address at the company that is being spoofed (e.g. "[email protected]")

• when forwarding spoofed messages, always include the entire original email with its original header information intact

• notify the Internet Fraud Complaint Center of the FBI by filing a complaint on their website: www.ifccfbi.gov/

Page 20: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Wireless

Page 21: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Threats

Wired Network CompromiseWireless Network CompromiseWired Network Abuse (Third Party)Theft of Service (WISP)Interception of Traffic (Wireless Sniffing)Hotspot Hijinks

Page 22: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

CountermeasuresWEPClosed Network Access Control (“Disabling Broadcast SSID”)MAC Address FilteringLEAP (Cisco)WPA802.11i

Page 23: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

WEP CrackingMore efficient methods available now

• Collect a few encrypted packets

• Use a tool to “replay” some of those encrypted packets on the WLAN to try and generate responses from other WLAN peers

• Collect many encrypted packets very quickly from response traffic

• Use statistical attacks on the weak IVs to recover the WEP key

Page 24: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Ethernet

EncryptedRequests

EncryptedResponses

client

WLAN

attacker

Page 25: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Ethernet

WLAN

attacker

forged

requestsresponses

Page 26: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Mitigation: WirelessUnderlying Causes:

• Technical- WEP is fundamentally broken

• Operational- No support for more robust authentication (WPA, EAP-TLS)- No monitoring wireless networks for sudden traffic spikes

• Policy- Treating wireless different from any other network service

where shared authentication would be disallowed (e.g. VPN)

• Strategy- Failure to address evolving standard as such – implementation

only took into account technology available with 1st generation deployment

Page 27: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Security Strategy & Planning

Page 28: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a
Page 29: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a
Page 30: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Reactive Security as an Ongoing StrategyExpensiveShort-term resultsSteep learning curveLittle time for validationUnpredictable resourcingReduced operational efficiencyIncreased environmental complexityDistraction from long-term goals & objectives

Page 31: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Layered Defense as an Alternative

Technical Controls

Network Platform Application Identity Visibility

Operational Controls

Management Monitoring Assessment Response

Policy

RegulatoryInfluence

ContractualObligations

CorporatePolicy

Strategy

Short-termGoals

Long-termGoals

Page 32: A Demonstration in the Need for Layered Security · 2006-08-25 · A Demonstration in the Need for Layered Security Bryant G. Tow InfraGard National Members Alliance ... Profile a

Q & A

Questions?

Bryant G. [email protected] Middle TN, President & InfraGard Southeast Regional LeadDirector of Security –GIS North America -