protecting your website / network onno w. purbo [email protected]

85
Protecting Your Website / Network Onno W. Purbo [email protected]

Upload: jeffry-perkins

Post on 30-Dec-2015

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Protecting Your Website / Network

Onno W. Purbo

[email protected]

Page 2: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

“Information Security isabout technology, policy,

people and common sense”

Page 3: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Excellence References

• http://www.sans.org

• http://www.cert.org

Page 4: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 5: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 6: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Extreme References

• http://www.remote-exploit.org

• http://packetstormsecurity.org

Page 7: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Outline

• Technical Tips

• Security Policies

• Knowing Your Friends & Enemies

Page 8: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

CERT Technical Tips

• URL– http://www.cert.org/tech_tips/

• Covering– Securing System or Networks

– Responding to Incidents

– Web Security Issues

– Mail Abuse

– Understanding Attacks

– Securing Network Systematically

Page 9: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Where It All Started …

• Choosing an Operating System

Page 10: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Choosing an Operating System

• In-House vs. Outside Tech Support– Do you have the HR to do it?

• Freely-Available vs. Commercial Software– Do you have the HR to do it?

• Understand Your Needs– Availability of source code vs. binaries – Availability of technical expertise (internal and external) – Maintenance and/or customer support – Customer requirements and usability – Cost of software, hardware, and technical support staff

Page 11: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Choosing an Operating System

• Regardless of the choice you make, you should first carefully review and understand the needs of your organization or customer base in terms of resources, cost, and security risk, as well as any site-specific constraints; compare the available products and services to your needs; and then determine what product best matches your needs.

Page 12: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Network Security Technology Map

Page 13: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Network Security Technology Map

Page 14: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Internet Security Aspects

• Penetration testing

• Certificate Authority / PKI

• Vulnerability Testing

• Managed Security Services

Page 15: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Penetration Testing

• Active Content Monitoring / Filtering.• Intrusion Detection – Host Based.• Firewall.• Intrusion Detection – Network Based.• Authorization.• Air Gap Technology• Network Authentication.• Security Appliances.• Security Services: Penetration Testing.• Authentication.

Page 16: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Certificate Authority / PKI

• Certificate Authority.

• File & Session Encryption.

• VPN & Cryptographic Communications.

• Secure Web Servers.

• Single Sign On

• Web Application Security.

Page 17: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Vulnerability Testing

• Vulnerability Scanners – Host Based

• Real-Time Security Awareness, Response & Threat Management.

• Vulnerability Scanners – Network Based.

Page 18: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Managed Security Services

• Enterprise Security Policy Implementation.

• Managed Security Services.

• Enterprise Security Administration.

• Security Services: Policy Development.

• Trusted Operating Systems.

• Anti D.D.O.D Tools.

Page 19: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Some Tips

• Securing Networks Systematically — the Security Knowledge in Practice - SKiP Method

• General Advice Pertaining to Intrusion Detection• Minimal Steps in Compromised System• Intruder Detection Checklist• Windows Intruder Detection Checklist• Steps for Recovering from a UNIX or NT System

Compromise

Page 20: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

SKiP Method

Page 21: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

SKiP Method1. Select systems software from a vendor and customize it

according to an organization’s needs.2. Harden and secure the system against known vulnerabilities.3. Prepare the system so that anomalies may be noticed and

analyzed for potential problems.4. Detect those anomalies and any other system changes that

could indicate evidence of an intrusion.5. Respond to intrusions when they occur.6. Improve practices and procedures after updating the system.7. Repeat the SKiP process as long as the organization needs

to protect the system and its information assets.

Page 22: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

SKiP Method

Customizing Vendor Software• eliminate services that are unneeded and

insecurely configured• restrict access to vulnerable files and directories• turn off software “features” that introduce

vulnerabilities• mitigate vulnerabilities that intruders can use to

break into systems

Page 23: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

SKiP Method

Harden and Secure the Network• configure their system to meet organizational

security requirements• retaining only those services and features needed to

address specific business needs• Securing a system against known attacks eliminates

vulnerabilities and other weaknesses commonly used by intruders.

• The practices performed during this step may change over time to address new attacks and vulnerabilities.

Page 24: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

SKiP Method

Prepare• Network administrators characterize their system

in the Prepare step. An administrator knows what to expect in terms of– changes in files and directories and the operating

system– normal processes, when they run, by whom, and what

resources they consume– network traffic consumed and produced– hardware inventory on the system

Page 25: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

SKiP Method

Detect• Administrators concentrate on detecting

signs of anomalous or unexpected behavior since it may indicate possible intrusions and system compromise.

• Administrators also watch for early warning signs of potential intruder actions such as scanning and network mapping attempts.

Page 26: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

SKiP Method

Respond• analyze the damage caused by the intrusion and

respond by adding new technology or procedures to combat it

• monitor an intruder’s actions in order to discover all access paths and entry points before acting to restrict intruder access.

• eliminate future intruder access• return the system to a known, operational state

while continuing to monitor and analyze

Page 27: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

SKiP Method

Improve the System• hold a post-mortem review meeting to

discuss lessons learned• update policies and procedures• select new tools• collect data about the resources required to

deal with the intrusion and document the damage it caused

Page 28: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

General Advice Pertaining to Intrusion Detection

Page 29: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

General Advice Pertaining to Intrusion Detection

• Proactive auditing and monitoring are essential steps in intrusion detection.

• It is ineffective to audit altered data or compromised systems -- their logs are unreliable.

• Establish a baseline for what you consider normal activity for your environment so you can determine unusual events and respond appropriately

Page 30: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Minimal Steps in Compromised System

Page 31: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Minimal Steps in Compromised System

• Document every step that you perform in detail.

• Perform a sector-by-sector backup of the hard disk drive.

• If your organization intends to take legal action in connection with intrusions, then consult with your legal department before performing any step.

Page 32: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Intruder Detection Checklist

Page 33: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Intruder Detection Checklist

• Examine log files • Look for setuid and setgid Files • Check system binaries • Check for packet sniffers • Examine files run by 'cron' and 'at'. • Check for unauthorized services • Examine /etc/passwd file • Check system and network configuration • Look everywhere for unusual or hidden files • Examine all machines on the local network

Page 34: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Windows Intruder Detection Checklist

Page 35: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Windows Intruder Detection Checklist

Look for Signs For System Compromised • Rootkits • Examine Log Files • Check for Odd User Accounts and Groups • Check All Groups for Unexpected User Membership • Look for Unauthorized User Rights • Check for Unauthorized Applications Starting

Automatically • Check Your System Binaries for Alterations

Page 36: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Windows Intruder Detection Checklist

Look for Signs For System Compromised • Check Your Network Configurations for

Unauthorized Entries • Check for Unauthorized Shares • Check for Any Jobs Scheduled to Run • Check for Unauthorized Processes • Look Throughout the System for Unusual or Hidden

Files • Check for Altered Permissions on Files or Registry

Keys

Page 37: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Windows Intruder Detection Checklist

Look for Signs For System Compromised

• Check for Changes in User or Computer Policies

• Ensure the System has not been Joined to a Different Domain

• Audit for Intrusion Detection

Page 38: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Windows Intruder Detection Checklist

Consider Running Intrusion Detection Systems

• Freeware/shareware Intrusion Detection Systems

• Commercial Intrusion Detection Systems

Page 39: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Windows Intruder Detection Checklist

Review CERT Documents

• Steps for Recovering from a Windows NT Compromise

• Windows NT Configuration Guidelines

• NIST Checklists

Page 40: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Recovering from Compromise

Page 41: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Recovering from Compromise

• Before you get started• Regain control• Analyze the intrusion• Contact the relevant CSIRT for Incident Reporting• Recover from the intrusion• Improve the security of your system and network• Reconnect to the Internet• Update your security policy

Page 42: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Recovering from Compromise

A. Before you get started• Consult your security policy • If you do not have a security policy • Consult with management • Consult with your legal counsel • Contact law enforcement agencies • Notify others within your organization • Document all of the steps you take in recovering

Page 43: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Recovering from Compromise

B. Regain control

• Disconnect compromised system(s) from the network

• Copy an image of the compromised system(s)

Page 44: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Recovering from Compromise

C. Analyze the intrusion• Look for modifications made to system software and

configuration files • Look for modifications to data • Look for tools and data left behind by the intruder • Review log files • Look for signs of a network sniffer • Check other systems on your network • Check for systems involved or affected at remote sites

Page 45: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Recovering from Compromise

D. Contact the relevant CSIRT and other sites involved

• Incident Reporting

• Contact the CERT Coordination Center

• Obtain contact information for other sites involved

Page 46: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Recovering from Compromise

E. Recover from the intrusion• Install a clean version of your operating system • Disable unnecessary services • Install all vendor security patches • Consult CERT advisories, external security

bulletins and vendor-initiated bulletins • Caution use of data from backups • Change passwords

Page 47: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Recovering from Compromise

F. Improve the security of your system and network

• Review security using the UNIX or NT configuration guidelines document

• Install security tools

• Enable maximal logging

• Configure firewalls to defend networks

Page 48: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Recovering from Compromise

G. Reconnect to the Internet

H. Update your security policy• Document lessons learned from being

compromised • Calculate the cost of this incident • Incorporate necessary changes (if any) in

your security policy

Page 49: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Security Policies

Page 50: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Security Policies

• URL– http://www.sans.org/resources/policies/

– http://www.sans.org/resources/policies/Policy_Primer.pdf

• Template For– Wireless Communication Policy

– Server Security Policy

– Anti-Virus Process

– Extranet Policy

Page 51: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 52: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

A Security Policy Framework

• Policies define appropriate behavior. • Policies set the stage in terms of what tools and

procedures are needed.• Policies communicate a consensus.• Policies provide a foundation for HR action in

response to inappropriate behavior.• Policies may help prosecute cases.

• Ref: Michele D. Guel, The SANS Policy Primer.

Page 53: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Policy Outline• Purpose• Scope• Guidelines• Policy

– Ownership Responsibilities– Scenarios & Business Impact– Prohibited Use– Network Control– Scanning period– Monitoring

• Enforcement • Definitions

Page 54: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Knowing Friends & Enemies

Page 55: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Type of Communities

• IT Policy & Politics– [email protected]

• IT Network Administrators– [email protected][email protected]

• Programmer (Formal & White Collar)– [email protected]

• Hacker & Virus– [email protected][email protected]

Page 56: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

IT Policy & Politics

Name members

genetika 2205

telematika 1750

mastel-anggota 337

Page 57: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

IT Network Administrators

Name members

asosiasi-warnet 6241

Ilmukomputer-networking 5636

It-center 4889

indowli 4766

Page 58: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Programmer

Name members

Ilmukomputer-programming 5226

Indoprog-vb 5215

delphindo 2844

jug-indonesia 1783

csharp-indo 699

Page 59: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Hacker & Virus

Name members

jasakom-perjuangan 12278

newbie-hacker 5636

majalahneotek 5633

vaksin 3388

yogyafree 2251

indocrack 1175

bandunghack 1046

Page 60: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

IT Politics & Policy

• telematika

Page 61: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 62: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 63: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 64: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 65: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Programmer

• Csharp-indo

• Jug-indonesia

• Dephindo

• Indoprog-vb

• Ilmukomputer-programming

Page 66: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Delphindo

Page 67: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 68: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 69: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 70: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 71: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Hacker Communities

• Bandunghack

• Indocrack

• yogyafree

• Jasakom-perjuangan

Page 72: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

bandunghack

Page 73: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 74: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 75: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 76: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 77: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 78: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id

Jasakom-perjuangan

Page 79: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 80: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 81: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 82: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 83: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 84: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id
Page 85: Protecting Your Website / Network Onno W. Purbo onno@indo.net.id