Download - A ttack B ox D esign 7/11/01
![Page 1: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/1.jpg)
Attack Box Design7/11/01
D0Gof
WAR
![Page 2: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/2.jpg)
Blake~Internet Consultant~
Security Audits & WAN / LAN Infrastructure Designs
San Jose (408) 907-5003 / San Francisco (415) 561-9374
![Page 3: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/3.jpg)
1. Introduction2. Attack Box Design:
-CUJ0 OS Selection Hardware Selection OS Layout Baseline Software Load Lock & Load: Extended Toolz Selection - Layout of the Lab -Zombies -Those Evil Web Servers -Fighting Back, ‘Rooting the Attacker’
-P0IS0N -Conceptual: The Death Star Design 3. Overview of Security Audits 4. Closing
![Page 4: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/4.jpg)
Building an Attack Box
From the Ground Up….
‘CUJ0’
![Page 5: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/5.jpg)
OS Selection For Tools
WINDOWS (98 / NT / Win2k)
LINUX
BSD
SOLARIS
Single OS vs Multiboot
![Page 6: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/6.jpg)
Hardware SelectionVia Piece-Meal
(which Manufacturers, Sizing, etc ???)Motherboard, Processor(s)
RAM
Hard Drives
Floppy
NIC Cards
CD Rom / CD Burner
External Modem
Printer
Total Cost =
![Page 7: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/7.jpg)
Hardware Selection: (cont’d)
Laptops
Used Hardware(Where to look for Cheap Stuff)
![Page 8: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/8.jpg)
Multiboot Options
MBRWindows Boot.ini
Lilo bootFreeBSD multiboot
BootMagicSystem Commander
MSTBoot Bootit NGVMWare
![Page 9: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/9.jpg)
OS Load Order
Which one first ???
The Problems with Installations
![Page 10: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/10.jpg)
Partitions
PrimaryExtendedLogicalVirtual
Formatting
Layout on the Hard DrivesSizing & Resizing
![Page 11: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/11.jpg)
BaselineSoftware Loads
Different ConfigurationsPartition Imaging of Different Loads
Drive ImagingStorage
![Page 12: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/12.jpg)
TOOLZSelection
Integration
Testing
Evaluation
Parsing the Code
Making you own Scripts & Toolz
![Page 13: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/13.jpg)
Layout of the Lab for Testing Toolz
Master File Server
Attack, Victim, & Monitoring Boxes
![Page 14: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/14.jpg)
Network Equipment & Configurations Fractional / T1
DSL
Cable Modem
Dial-up
Routers / Switches / Hubs
Firewalls
Sniffers / Network IDS
![Page 15: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/15.jpg)
Other Types of Attack Boxes
(cont’d)
Automated vs ‘Hands-on’
Vulnerability Scanners
![Page 16: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/16.jpg)
Other Types of Attack Boxes
(cont’d)
Zombies
![Page 17: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/17.jpg)
Other Types of Attack Boxes
(cont’d)
Those
Evil Web Servers
![Page 18: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/18.jpg)
FIGHTING BACK
‘Rooting the Attacker’
![Page 19: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/19.jpg)
Other Types of Attack Boxes
(cont’d)
‘P0IS0N’The Honeypot with an Attitude
(A Box That Bites Back)
![Page 20: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/20.jpg)
Other Types of Attack Boxes
(cont’d)
‘The Death Star Design’
![Page 21: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/21.jpg)
PERFORMING SECURITY AUDITS
Discussion
![Page 22: A ttack B ox D esign 7/11/01](https://reader036.vdocuments.net/reader036/viewer/2022081517/56815ba9550346895dc9abe4/html5/thumbnails/22.jpg)
END