Fast Internet-wide scanning and its security applications
|
|
|
- Annabelle Pope
- 10 years ago
- Views:
Transcription
1 Fast Internet-wide scanning and its security applications J. Alex Halderman University of Michigan
2 Based on joint work ZMap: Fast Internet-Wide Scanning and its Security Applications Zakir Durumeric, Eric Wustrow, and J. Alex Halderman 22nd Usenix Security Symposium (Sec 13), August 2013 Analysis of the HTTPS Certificate Ecosystem Zakir Durumeric, James Kasten, Michael Bailey, and J. Alex Halderman 13th Internet Measurement Conference (IMC 13), October 2013 Elliptic Curve Cryptography in Practice Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, and Eric Wustrow To appear. 18th Intl. Conf. on Financial Cryptography and Data Security (FC 14), March 2014 Illuminating the Security Issues Surrounding Lights-Out Server Management Anthony Bonkoski, Russ Bielawski, and J. Alex Halderman 7th Usenix Workshop on Offensive Technologies (WOOT 13), August 2013 CAge: Taming Certificate Authorities by Inferring Restricted Scopes James Kasten, Eric Wustrow, and J. Alex Halderman 17th Intl. Conf. on Financial Cryptography and Data Security (FC 13), April 2013 Mining Your Ps and Qs: Widespread Weak Keys in Network Devices Nadia Heninger, Zakir Durumeric, Eric Wustrow, and J. Alex Halderman 21st Usenix Security Symposium (Sec 12), August 2012
3 The Internet
4
5 Carna botnet Internet Census 2012
6 Internet-Wide Network Studies Previous research has shown promise of Internet-wide surveys Census and Survey of the Visible Internet (2008) EFF SSL Observatory: A glimpse at the CA ecosystem (2010) Mining Ps and Qs: Widespread weak keys in network devices (2012) Carna botnet Internet Census (2012)
7 Internet-Wide Network Studies Previous research has shown promise of Internet-wide surveys Census and Survey of the Visible Internet (2008) 3 months to complete ICMP census (2200 CPU-hours) EFF SSL Observatory: A glimpse at the CA ecosystem (2010) 3 months on 3 Linux desktop machines (6500 CPU-hours) Mining Ps and Qs: Widespread weak keys in network devices (2012) 25 hours acoss 25 Amazon EC2 Instances (625 CPU-hours) Carna botnet Internet Census (2012) 420,000 usurped hosts
8
9 What if? What if Internet surveys didn t require heroic effort? What if we could scan the HTTPS ecosystem every day? What if we wrote a whole-internet scanner from scratch?
10 an open-source tool that can port scan the entire IPv4 address space from just one machine in under 45 minutes with 98% coverage With Zmap, an Internet-wide TCP SYN scan on port 443 is as easy as: $ zmap p 443 o results.txt 34,132,693 listening hosts (took 44m12s) 97% of gigabit Ethernet linespeed
11 Demo time! I ll do: $ zmap -T4 -p `printf "%d" 0x30c3` You can do: $ tcpdump src port If you re on a public IP address, you should see a SYN from me by the end of the talk. (Look for /16.)
12 masscan bit.ly/14gzzct
13 Talk Roadmap ZMap Scanner 1. Architecture of ZMap 2. Characterizing Performance Applications of High Speed Scanning 1. Globally Observable Weak Keys 2. Uncovering the CA Ecosystem
14 ZMap Architecture Existing Network Scanners Reduce state by scanning in batches - Time lost due to blocking - Results lost due to timeouts Track individual hosts and retransmit - Most hosts will not respond Avoid flooding through timing - Time lost waiting Utilize existing OS network stack - Not optimized for immense number of connections ZMap Eliminate local per-connection state - Fully asynchronous components - No blocking except for network Shotgun Scanning Approach - Always send n probes per host Scan widely dispersed targets - Send as fast as network allows Probe-optimized Network Stack - Bypass inefficiencies by generating Ethernet frames
15 Addressing Probes How do we randomly scan addresses without excessive state? Scan hosts according to random permutation. Iterate over multiplicative group of integers modulo p. 1 5 mod 7 = mod 7 = mod 7 = mod 7 = mod 7 = 2 Negligible State 1. Primitive Root 2. Current Location 3. First Address 2 5 mod 7 = 3
16 Z * 11 Generator: Z * 11 Generator:
17 Validating Responses How do we validate responses without local per-target state? Encode secrets into mutable fields of probe packets that will have recognizable effect on responses Ethernet receiver MAC address sender MAC address length data IP V IHL sender IP address receiver IP address data TCP sender port receiver port sequence number ack. number data
18 Validating Responses How do we validate responses without local per-target state? Encode secrets into mutable fields of probe packets that will have recognizable effect on responses Ethernet receiver MAC address sender MAC address length data IP V IHL sender IP address receiver IP address data TCP sender port receiver port sequence number ack. number data
19 Validating Responses How do we validate responses without local per-target state? Encode secrets into mutable fields of probe packets that will have recognizable effect on responses Ethernet receiver MAC address sender MAC address length data IP V IHL sender IP address receiver IP address data TCP sender port receiver port sequence number ack. number data
20 Packet Transmission and Receipt How do we make processing probes easy and fast? 1. ZMap framework handles the hard work 2. Probe modules fill in packet details, interpret responses 3. Output modules allow follow-up or further processing Configuration, Addressing, and Timing Probe Generation Packet Tx (raw socket) Output Handler Response Interpretation Packet Rx (libpcap)
21 Talk Roadmap ZMap Scanner 1. Architecture of ZMap 2. Characterizing Performance Applications of High Speed Scanning 1. Globally Observable Weak Keys 2. Uncovering the CA Ecosystem
22 Scan Rate How fast is too fast? No meaningful correlation between speed and response rate. Slower scanning does not reveal additional hosts.
23 Temporal Variation Response rates show significant diurnal variation. TCP Port 443 +/- 3%
24 Coverage Is one probe sufficient? We expect to see a plateau in response rate, regardless of additional probes. Treat as Ground Truth Response Rate 1 Packet: 97.9% 2 Packets: 98.8% 3 Packets: 99.4%
25 Zmap vs. Nmap Averages for scanning 1 million random hosts: Normalized Coverage Duration (mm:ss) Est. Internet Wide Scan Nmap (1 probe) 81.4% 24: days Nmap (2 probes) 97.8% 45: days ZMap (1 probe) 98.7% 00:10 1:09:35 ZMap (2 probes) 100.0% 00:11 2:12:35 ZMap can scan more than 1300 times faster than the most aggressive Nmap default configuration ( insane ) Surprisingly, ZMap also finds more results than Nmap
26 Probe Response Times Why does ZMap find more hosts than Nmap? 250 ms timeout 500 ms timeout Response Times 250 ms: < 85% 500 ms: 98.2% 1000 ms: 99.0% 8000 ms: 99.9% Statelessness leads to both higher performance and increased coverage.
27 Talk Roadmap ZMap Scanner 1. Architecture of ZMap 2. Characterizing Performance Applications of High Speed Scanning 1. Globally Observable Weak Keys 2. Uncovering the CA Ecosystem
28 Enumerating Vulnerable Hosts Discovering UPnP Vulnerabilities En Masse HD Moore disclosed vulnerabilities in several common UPnP frameworks in January Under 6 hours to code and run UPnP discovery scan. Custom probe module, 150 SLOC. We found that 3.34 M of 15.7 M devices were vulnerable. Compromise possible with a single UDP packet!
29 Uncovering Hidden Services Enumerating Unadvertised Tor Bridges Scanning has potential to uncover unadvertised services We perform a Tor handshake with public IPv4 addresses on port 9001 and 443 Identified >86% of live allocated Tor bridges with a single scan (Tor has developed obfsproxy that listens on random ports to counter this type of attack.)
30 Detecting Service Disruptions Areas with >30% decrease in listening hosts, port 443 October 29 31, 2013
31 Globally Observable Phenomenon Uncovering weak cryptographic keys and poor entropy collection We considered the cryptographic keys used by HTTPS and SSH HTTPS SSH Live Hosts 12.8 million 10.2 million Distinct RSA Public Keys 5.6 million 3.8 million Distinct DSA Public Keys million There are many legitimate reason that hosts might share keys
32 Shared Cryptographic Keys Why are a large number of hosts sharing cryptographic keys? We find that 5.6% of TLS hosts and 9.6% of SSH hosts share keys in a vulnerable manner: - Default certificates and keys - Apparent entropy problems What other, more serious, problems could be present if devices aren t properly collecting entropy?
33 Factoring RSA Public Keys What else could go wrong if devices aren t collecting entropy? RSA Public Key: n = p q, p and q are two large random primes Most efficient known method of compromising an RSA key is to factor n back to p and q While n is normally difficult to factor, for N 1 = p q 1 and N 2 = p q 2 we can trivially compute p = GCD(N 1, N 2 )
34 Broken Cryptographic Keys Why are a large number of hosts sharing cryptographic keys? We find 2,134 distinct primes and compute the RSA private keys for 64,081 (0.50%) of TLS hosts Using another approach for DSA, we are able to compute the private keys for 105,728 (1.03%) of SSH hosts What was causing these vulnerable keys?
35 Most compromised keys are generated by headless or embedded network devices Identified devices from > 40 manufacturers
36 Linux /dev/urandom Why are embedded systems generating broken keys? Nearly everything uses /dev/urandom Time of boot Keyboard /Mouse Disk Access Timing Input Pool Only happens if Input Pool contains more than 192 bits Time of boot Non-blocking Pool /dev/urandom Problem 1: Embedded devices may lack all these sources Problem 2: /dev/urandom can take a long time to warm up
37 Typical Ubuntu Server Boot Why are embedded systems generating broken keys? Entropy first mixed into /dev/urandom Boot-Time Entropy Hole OpenSSH seeds from /dev/urandom /dev/urandom may be predictable for a period after boot.
38 Moving Forward What do we do about fixing the Linux kernel and affected devices? Patches have been committed to the Linux 3.x Kernel - Use interrupts until other entropy is available - Mix in unique information such as MAC address Manufacturers have been notified. DHS, ICS-CERT, NSA, JPCERT, and other agencies are working with affected companies and helping manufacturers correct vulnerabilities. Online Key Check Service available at
39 Talk Roadmap ZMap Scanner 1. Architecture of ZMap 2. Characterizing Performance Applications of High Speed Scanning 1. Globally Observable Weak Keys 2. Exposing the CA Ecosystem
40 Certificate Authority Ecosystem HTTPS is dependent on a supporting PKI composed of certificate authorities that vouch for websites identities. Every certificate authority can sign for any website. There is no central repository of certificate authorities. We don t know who we trust until we see CAs in the wild
41 Certificate Chains A Brief Review of Certificates Trust everything signed by this root certificate I authorize and trust this certificate; here is my signature I authorize and trust this certificate; here is my signature Mozilla Firefox Browser Subject: C=US/ /OU=Equifax Secure Certificate Authority Issuer: C=US/ /OU=Equifax Secure Certificate Authority Public Key: Signature: 39:10:83:2e:09:ef:ac:50:04:0a:fb:9a:38:c9:d1 Subject: C=US/ /CN=Google Internet Authority Issuer: C=US/ /OU=Equifax Secure Certificate Authority Public Key: Signature: be:b1:82:19:b9:7c:5d:28:04:e9:1e:5d:39:cd Subject: C=US/ /O=Google Inc/CN=*.google.com Issuer: C=US/ /CN=Google Internet Authority Public Key: Signature: bf:dd:e8:46:b5:a8:5d:28:04:38:4f:ea:5d:49:ca
42 Certificate Chains A Brief Review of Certificates Trust everything signed by this root certificate I authorize and trust this certificate; here is my signature I authorize and trust this certificate; here is my signature Mozilla Firefox Browser Subject: C=US/ /OU=Equifax Secure Certificate Authority Issuer: C=US/ /OU=Equifax Secure Certificate Authority Public Key: Signature: 39:10:83:2e:09:ef:ac:50:04:0a:fb:9a:38:c9:d1 Subject: C=US/ /CN=Google Internet Authority Issuer: C=US/ /OU=Equifax Secure Certificate Authority Public Key: Signature: be:b1:82:19:b9:7c:5d:28:04:e9:1e:5d:39:cd Subject: C=US/ /O=Google Inc/CN=*.google.com Issuer: C=US/ /CN=Google Internet Authority Public Key: Signature: bf:dd:e8:46:b5:a8:5d:28:04:38:4f:ea:5d:49:ca
43 Uncovering the HTTPS Ecosystem How do we regularly collect certificates from Internet? We completed 110 scans of the HTTPS ecosystem over the last year 1. Identify certificate authorities 2. Uncover worrisome practices ZMap libevent2 OpenSSL Custom Processing We collected 42 million unique certificates of which 6.9 million were browser trusted from 109 million unique hosts
44 Identifying Certificate Authorities Who do we trust to correctly sign certificates? Identified 1,800 CA certificates belonging to 683 organizations - Including religious institutions, libraries, non-profits, financial institutions, governments, and hospitals - More than 80% of organizations controlling a CA certificate aren t commercial certificate authorities More than half of the certificates were provided by the German National Research and Education Network (DFN) All major browser roots are selling intermediates to third-party organizations without any constraints
45 Distribution of Trust Who actually signs the certificates we use on a daily basis? 90% of Trusted Certificates - signed by 5 organizations - descendants of 4 roots - signed by 40 intermediates Symantec, GoDaddy, and Comodo control 75% of the market through acquisitions 26% of trusted sites are signed by a single intermediate certificate!
46 Ignoring Foundational Principles What are authorities doing that puts the ecosystem at risk? We classically teach concepts such as defense in depth and the principle of least privilege We have methods of constraining what CAs can sign for, yet all but 7 of the 1,800 CA certs we found can sign for anything Lack of constraints allowed a rogue CA certificate in 2012, but in another case prevented 1,400 invalid certificates Almost 5% of certificates include local domains, e.g. localhost, mail, exchange
47 Cryptographic Reality What are authorities doing that puts the ecosystem at risk? 90% of certificates use a 2048 or 4096-bit RSA key 50% of certificates are rooted in a 1024-bit key More than 70% of these roots will expire after 2016
48 Growth in HTTPS Adoption What has changed in the last year of scanning? June 2012 May % HTTPS servers. 23% Use on Alexa Top-1M sites. 11% Browser-trusted certificates.
49 Scans.IO Data Repository How do we share all this scan data?
50 ZMap Public Release ZMap is an actively developed open source project Downloaded it now from Scanning the Internet really is as simple as: $ zmap p 443 o results.txt Let s check on our demo...
51 Ethics of Active Scanning Considerations Impossible to request permission from all owners No IP-level equivalent to robots exclusion standard Administrators may believe that they are under attacka Reducing Scan Impact Scan in random order to avoid overwhelming networks Signal benign nature over HTTP and w/ DNS hostnames Honor all requests to be excluded from future scans Bottom Line: Be a Good Neighbor
52 User Responses Over 200 Internet-wide scans over 1.5 years (>1 trillion probes) Responses from 145 users Blacklisted 91 entities (3.7 M total addresses) 15 hostile responses 2 cases of retaliatory traffic Entity Type Responses Small Business 41 Home User 38 Corporation 17 Academic Institution 22 Government 15 ISP 2 Unknown 10 Total 145
53
54 Future Work 10gigE Network Surveys TLS Server Name Indication Scanning Exclusion Standards IPv6 Scanning Methdology? Use scanning to do great research!
55 Conclusion Living in a unique period IPv4 can be quickly, exhaustively scanned IPv6 has not yet been widely deployed Low barriers to entry for Internet-wide surveys Now possible to scan the entire IPv4 address space from one host in under 45 minutes with 98% coverage Explored applications of high-speed scanning My goal is to enable all of you to do more research
56 masscan bit.ly/14gzzct Scan Data Repository
ZMap. Fast Internet-Wide Scanning and its Security Applications. Zakir Durumeric Eric Wustrow J. Alex Halderman. University of Michigan
ZMap Fast Internet-Wide Scanning and its Security Applications Zakir Durumeric Eric Wustrow J. Alex Halderman University of Michigan Internet-Wide Network Studies Previous research has shown promise of
Analysis of the HTTPS Certificate Ecosystem
Analysis of the HTTPS Certificate Ecosystem, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan HTTPS and TLS How does HTTPS and the CA ecosystem fit into our daily lives? Nearly all
ZMap: Fast Internet-wide Scanning and Its Security Applications
ZMap: Fast Internet-wide Scanning and Its Security Applications Zakir Durumeric, Eric Wustrow, and J. Alex Halderman, University of Michigan This paper is included in the Proceedings of the 22nd USENIX
Internet-wide Scanning Taxonomy and Framework
Proceedings of the 13th Australasian Information Security Conference (AISC 2015), Sydney, Internet-wide Scanning Taxonomy and Framework David Myers 1 Ernest Foo 2 Kenneth Radke 3 1 Email: [email protected]
RSA Keys with Common Factors
RSA Keys with Common Factors Joppe W. Bos Cryptography group extreme Computing Group, Microsoft Research 1 / 19 Outline 2 / 19 Public-Key Cryptography 3 / 19 Cryptanalysis of Public-Key Cryptography Popular
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Factory Application Certificates and Keys Products: SB700EX, SB70LC
Factory Application Certificates and Keys Products: SB700EX, SB70LC 1 Contents 1 Overview... 3 2 Certificates and Keys... 3 2.1 What is in a Certificate?... 4 3 SSL Certificates and Keys... 6 3.1 NetBurner
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson
How the Great Firewall discovers hidden circumvention servers Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson Much already known about GFW Numerous research papers and blog
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005
Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract Writing a custom firewall is a complex task, and is something that requires a significant amount of
Public Key Infrastructures
Public Key Infrastructures Ralph Holz Network Architectures and Services Technische Universität München November 2014 Ralph Holz: Public Key Infrastructures 1 Part 2: Recent results or: the sorry state
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
The Case of the RSA FUCK-A-DUCK certificate. Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman. N=pq
The Case of the RSA FUCK-A-DUCK certificate Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman N=pq SSL certificates We scanned the Internet SSL certificates We scanned the Internet (It was
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
Passive Vulnerability Detection
Page 1 of 5 Passive Vulnerability Detection "Techniques to passively find network security vulnerabilities" Ron Gula [email protected] September 9, 1999 Copyright 1999 Network Security Wizards
Debugging With Netalyzr
Debugging With Netalyzr Christian Kreibich (ICSI), Nicholas Weaver (ICSI), Boris Nechaev (HIIT/TKK), and Vern Paxson (ICSI & UC Berkeley) 1 What Is Netalyzr?! Netalyzr is a comprehensive network measurement
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Installing and Configuring Websense Content Gateway
Installing and Configuring Websense Content Gateway Websense Support Webinar - September 2009 web security data security email security Support Webinars 2009 Websense, Inc. All rights reserved. Webinar
How To Protect Your Computer From Being Hacked By A Hacker (For A Fee)
Illuminating the Security Issues with Lights-Out Server Management Anthony J. Bonkoski J. Alex Halderman University of Michigan What is IPMI? Need to manage a massive cluster of servers? OS installs, monitoring,
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst Görtz Institute for IT-Security, Ruhr-University Bochum,
You Won t Be Needing These Any More: On Removing Unused Certificates From Trust Stores
You Won t Be Needing These Any More: On Removing Unused Certificates From Trust Stores Henning Perl 1, Sascha Fahl 1, and Matthew Smith 2 1 Leibniz University Hannover, Germany, {perl, fahl}@dcsec.uni-hannover.de
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Low-Level TLS Hacking
Low-Level TLS Hacking Presented by Richard J. Moore E: [email protected] Presentation Outline An introduction to SSL/TLS Using pytls to create and decode TLS messages Fingerprinting TLS servers Fingerprinting
Discover the Latest Innovations with Website Security Solutions Lee-Lin Thye
Discover the Latest Innovations with Website Security Solutions Lee-Lin Thye Senior Product Marketing Manager Trust Services Vision USA 2013 1 Evolving Challenges and Standards Presentation Identifier
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie
An Introduction to Nmap with a Focus on Information Gathering Ionuț Ambrosie January 12, 2015 During the information gathering phase of a penetration test, tools such as Nmap can be helpful in allowing
Apache Security with SSL Using Ubuntu
Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background
1 Scope of Assessment
CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned
A Very Incomplete Diagram of Network Attacks
A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Configuring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Network and Services Discovery
A quick theorical introduction to network scanning January 8, 2016 Disclaimer/Intro Disclaimer/Intro Network scanning is not exact science When an information system is able to interact over the network
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Virtual Private Networks
Virtual Private Networks Jonathan Reed [email protected] MIT IS&T VPN Release Team Overview Basic Networking Terms General Concepts How the VPN works Why it s useful What to watch out for Q&A Networking 101
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Network Security In Linux: Scanning and Hacking
Network Security In Linux: Scanning and Hacking Review Lex A lexical analyzer that tokenizes an input text. Yacc A parser that parses and acts based on defined grammar rules involving tokens. How to compile
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Apache Security with SSL Using Linux
Apache Security with SSL Using Linux These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background
A perspective to incident response or another set of recommendations for malware authors
A perspective to incident response or another set of recommendations for malware authors Alexandre Dulaunoy - TLP:WHITE [email protected] June 7, 2013 CIRCL, national CERT of Luxembourg CIRCL
Network Security CS 192
Network Security CS 192 Network Scanning (Idlescan) Department of Computer Science George Washington University Jonathan Stanton 1 Today s topics Discussion of new DNS flaws Network Scanning (Idlescan)
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Print Audit Facilities Manager Technical Overview
Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Using SYN Flood Protection in SonicOS Enhanced
SonicOS Using SYN Flood Protection in SonicOS Enhanced Introduction This TechNote will describe SYN Flood protection can be activated on SonicWALL security appliance to protect internal networks. It will
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
1.0 Introduction. 2.0 Data Gathering
Nessus Scanning 1.0 Introduction Nessus is a vulnerability scanner, a program that looks for security bugs in software. There is a freely available open source version which runs on Unix. Tenable Security
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
