Codebox 2: simple configuration changes in Apache and PHP configuration files
|
|
|
- Elmer Burke
- 10 years ago
- Views:
Transcription
1 Do Reverse Proxies provide real security? In the process of building / designing the infrastructure for a new project the following question was asked: shouldn't we use a reverse proxy to secure or protect the web servers? Of course the first question I asked myself is do reverse proxies provide real security? After consulting with some fellow members of ISECOM (a non-profit organization based in Barcelona which among other projects has the OSSTMM), to see if they had already some experience testing environments with a similar setup. This is the answer I got from Pete Herzog, the Managing Director: It's a pretty standard set-up. But if you're using the RP (reverse proxy) for extra *security* then I don't think you'll get it. You (would) need to crunch the numbers to know quantity but you're increasing your Attack Surface with it. So I setup the environment (one with and one without a reverse proxy) and we proceeded to test it. The rest of this article presents what we tested, the results we obtained, how to measure the actual security of the environment with the RAVs (crunch the numbers) and how these can be used to make a fact based comparison of both based on these results. The scope or environment For the scope we decided to exclude the web applications themselves, because they will be different in each scenario. The focus has been set on the architecture and the infrastructure. For these tests the following environment depicted in Figure 1was setup in an IaaS aka Cloud environment. Figure 1: Environment diagram Pablo Endres Page 1
2 We have all servers reachable individually to make both scenarios available simultaneously for testing purposes. Web server 1 aka cacti: is a standard Linux server running Apache 2.22 with PHP, MySQL 5.x to serve the cacti application. Web server 2 aka app2: is a standard Linux server running Apache 2.22, serving a static html site. Reverse Proxy aka RP: is a standard Linux server running Apache 2.22 with mod_proxy_html enabled and configured as a reverse proxy server. The firewall in the environment allows pings (ICMP echo-request / reply), SSH (22/TCP), HTTP (80/TCP) and HTTPS (443/TCP), while all other ports and services are denied. All of the servers are configured to work only with HTTPS and the default configuration has been used for all other configuration items. After the initial rounds of tests we found that the web servers were disclosing too much information in the HTTP-headers, error page footers (see Codebox 1 and the server banner: Apache/ (Amazon) Server at Port 443 Codebox 1: Error page footer The following minor configuration tweaks were made to make it a more reasonable scenario. In /etc/httpd/conf/httpd.conf: ServerSignature Off ServerTokens Prod In the /etc/php.ini: expose_php=off Codebox 2: simple configuration changes in Apache and PHP configuration files Pablo Endres Page 2
3 Tests and analysis From here on, the following names will be used for the different systems: Cacti App2 RP and We used the OSSTMM 3 as the basis for the testing so we could measure the Attack Surface. Even though, measuring the Attack Surface with RAVs (the method outlined in the OSSTMM) seems complicated at first, it is actually pretty straight-forward once you understand the concepts. Full disclosure, myself and all the testers I asked to test this scenario are OPST ( and OPSA ( certified to assure we all knew how to do it right. The OSSTMM 3 uses interactions and not risk as its base for defining security. Some of these interactions are between objects within the security scope so they are defined as Trusts. When the interactions happen between the inside and the outside of the security scope, they are defined as Accesses. Interactions which are purely informational and serve only to expose what is in the security scope are designated as Visibilities. These three things make up a scope's Porosity which is its base Attack Surface. Porosity = Visibility + Access + Trust While measuring the Porosity, we also look for Controls, the types of protection mechanisms used within the scope, and Limitations which are types of vulnerabilities based on cause/effect. These things influence the size of the Attack Surface as well and help us calculate the final RAV a unit which shows the percentage of protection where 100% is a perfect balance between security and operations. The OSSTMM also defines 10 types of operational controls and 5 types of Limitations. With a little practice, they become easy to identify while doing a test. Here we include the Controls and Limitations we found while measuring the Porosity. Then in the final RAV if it's above 100% we know we have more security than we need which costs us more to build and maintain and if it's under then we know we have too little. One of the other key points of the RAVs is seeing if we have the right controls in place to handle a variety of threats or if we have too many of just one type of control which might make the infrastructure appear stronger but only against specific threats while simultaneously being weaker against many other types. Pablo Endres Page 3
4 Operational Controls: Class A: Interactive controls Authentication Indemnification Resilience Subjugation Continuity Class B: Process controls Non-Repudiation Confidentiality Privacy Integrity Alarm Limitations: Category OpSec Limitations Visibility Exposure Operations Access Trust Vulnerability Controls Authentication Indemnification Class A Resilience Interactive Subjugation Weakness Continuity Class B Process Non-Repudiation Confidentiality Privacy Integrity Alarm Concern Anomalies Access For this test, we don't count interactions in the web application logic because our scope and focus is the infrastructure and not the application. In this case to measure Access, we used various port scanners to do the job: nmap and Unicornscan. bash# nmap -T4 -p sv cacti Nmap scan report for cacti (176.x.y.218) Host is up (0.030s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 5.3 (protocol 2.0) 80/tcp filtered http 443/tcp open ssl/http Apache httpd Pablo Endres Page 4
5 Codebox 3: output of nmap TCP scan For the UDP scans, two approaches were taken: one using nmap and testing all ports which is really time intensive and one using Unicornscan. This last tool is much more efficient for this type of test. bash# nmap -su -T4 -p cacti bash# unicornscan -mu -vv -Ir 100 cacti:a Codebox 4: tools that can be used for UDP scans The following results were obtained: Cacti App2 RP open ports: 22 /TCP, 443 /TCP ICMP echo replies no closed ports no UDP open ports: 22 /TCP, 443 /TCP ICMP echo replies no closed ports no UDP open ports: 22 /TCP, 443 /TCP ICMP echo replies no closed ports no UDP The systems respond with TCP SYN ACK on open ports, but no TCP RST packets are received outside the scope. But because SYN ACK's are received, the filtered status for other ports can't be explained by server down, unreachable etc. This means that the packets are dropped by a firewall, an ACL in a router or any other packet filter. This firewall/packet filter is counted as 1x the Authentication for all hosts. Since in the RP scenario, it is the only server directly reachable, the Access must be counted separately for each case Access count for RP scenario: 3 RP has 3 accesses: 2x open TCP ports (22 and 443) and 1x ICMP. Access count for direct scenario: 6 Each web server has 3 accesses: 2x open TCP ports (22 and 443) and 1x ICMP. Pablo Endres Page 5
6 Visibility All systems are exposed, so the Visibility is at least one for each of the systems. To detect a reverse proxy server, we connected to the target and retrieved the page /cacti/ or /app2/. When the Max-Forwards request header was set to 1, the responses for Cacti and RP were similar and the responses for App2 and RP were similar. When the Max-Forwards request header was set to 0, the responses were different. Cacti and App2 replied similar as when the Max-Forwards request header was set to 1, but RP replied with a 502 Proxy Error. This test proved the presence of a reverse proxy server. The example here is shown for /cacti/ on RP. (Funny enough, the TTL on arrival is different for the different values of Max-Forwards). This can be done by multiple ways. One approach would be to do it by hand using OPENSSL as shown in Codebox 5 and another would be by using Firefox and TamperData. A screenshot of the error message can be seen in Figure 2 $ openssl s_client -connect 54.u.p.245:443 GET /cacti/ HTTP/1.0 Max-Forwards: 0 HTTP/ Proxy Error $ openssl s_client -connect 54.u.p.245:443 GET /cacti/ HTTP/1.0 Max-Forwards: 1 HTTP/ OK <html><head><title>login to Cacti</title><style type="text/css"> Codebox 5: extracts of manually testing HTTPS requests Pablo Endres Page 6
7 Figure 2: Proxy error Because you can interact with the RP, the RP is visible. Because you can interact with the web server via RP, the web server is visible. By running a sniffer (tcpdump) alongside the ports cans it was possible to identify different TTL values in the IP headers from the responses from /app2/ and /cacti/. Based on our analysis, one explanation for this would be that there are different distances from server to client, which means there have to be different kernels. Another explanation is there are different paths from server to client, which is unlikely if both sites are serviced by the same host. This is why I chose the former to be most likely. As a conclusion the Visibility of RP is now a total of 3 (2 web servers and a reverse proxy server). Visibility count for RP scenario: 3 RP and two web servers are visible. Visibility count for direct scenario: 2 It is possible to interact with two different web servers or at least two different IPs. A reverse proxy provides the operational controls of Privacy by hiding the actual server you are connecting to and Subjugation, which is what, makes a control mandatory, meaning the user has no choices regarding the use of that control. Sometimes it provides Authentication as well although Authentication has not proven here, so it won't be counted. HTTPS All servers speak HTTPS. Each server provides following operational controls: 1x Confidentiality, 1x Integrity and 1x Subjugation. The ciphers accepted by the HTTPS server can be checked by testing each of them manually with OPENSSL. A shortcut would be to use SSLYZE, a python script that does precisely that, as can be seen in Codebox 6 The server supports 56 bit ciphers. Such ciphers are considered weak and it is counted as a Concern on Confidentiality, a Limitation which increases the Attack Surface slightly. No other limitations were found in this implementation of the HTTPS protocol. Pablo Endres Page 7
8 bash$ python sslyze.py --regular rp:443 * SSLV2 Cipher Suites : Cipher Suite: SSL Handshake: HTTP GET: DES-CBC3-MD5 168bits Preferred 200 OK DES-CBC-MD5 56bits Accepted 200 OK Codebox 6: extracts of the output of SSLYZE Note: HTTPS provides the control of Confidentiality (where the content is protected) and not Privacy (where the process is protected). This means a 3rd party can see when you are using HTTPS, where you are attaching to it and where you are coming from (well, the endpoints at least) but they can't see what you are sending or receiving exactly. SSH All servers speak SSH. Each server provides: 1x Confidentiality, 1x Integrity and 1x Subjugation. SSHv1.x is not supported, so this is not counted as a limitation. The SSH servers are disclosing version information via its banner, as seen in the results of the nmap scans. 22/tcp open ssh OpenSSH 5.3 (protocol 2.0) Codebox 7: extracts of the nmap report This is counted as a Limitation on Visibility and therefore as an Exposure. Note: SSH also provides the control of Confidentiality (where the content is protected) and not Privacy (where the process is protected). Trusts Trusts are as important to an Attack Surface as Access because it allows for indirect interactions especially where deception is used to get the trusting target to accept the unauthorized connection. In this case, the web server connects to the database server (a Trust interaction) by using a login and password, which is counted as 1 x Authentication and 1 x Subjugation. The web server can either trust the proxy and process all requests forwarded by it without further inspection (which is the case and also the standard) or not. An Authentication process (i.e. based on certificates) could also be used. Trust count for RP scenario: 2 1 count for each web server that trusts requests from the proxy. Trust count for direct scenario: 0 Pablo Endres Page 8
9 Non-Repudiation No access was granted to the log files (web server, MySQL server or SSH) and because of that, initially we didn't count them as Non-Repudiation. In case of the RP, it is the RP that connects to the web servers, so there is no control of Non- Repudiation. If there is a proxy-log, you can use that one as Non Repudiation for the web services. But not for SSH. Only the RP accepts SSH connections, so the SSH log only provides the control of Non-Repudiation to RP and not to Cacti or App2. In case of direct access to the server you can count these as Non-Repudiation controls (assuming the log level is extensive enough and you don't need a "court-legal" type of Non-Repudiation). MySQL (the database used by cacti) writes decent log files for this per default, so this can be counted as a Non-Repudiation control. Note: To have true court-legal Non-Repudiation you need to ensure the Integrity of the log files can be verified later. More specifically, if someone (an admin or an attacker) alters the log files, it has to be detectable. But in general, if there is any kind of identifying of connection source and file interaction in logging, it should be counted as Non-Repudiation anyway, even though the legal evidence is weak. Non-repudiation count for RP scenario: 3 1 count for the proxy log + 1 count for the SSH log on the RP + 1 count for the MySQL log. Non-repudiation count for direct scenario: 5 For each web server: 1 count for the Apache log + 1 count for the SSH log. + 1 count for the MySQL log. At this point we found no further controls. It is however left open for us to know which controls have already been applied to specific interactions. Should we later determine that our Attack Surface is too high, we have the option of increasing the number of controls implemented as well as removing vulnerabilities. Limitations Limitations should be counted only if they have been proven. So all the vulnerabilities highlighted by the tests should only be counted if the exploit can been used and the problem is verified. Pablo Endres Page 9
10 RAV counts per scenario This section presents the summary of all counts for each scenario. After accounting for the analysis, we enter the numbers into in the RAV spreadsheet provided by ISECOM ( to help make the final calculations. Here's how the numbers crunched for the 2 scenarios look like: Scenario 1: Reverse Proxy (RP) Visibility: Access: Trust:: Authentication: Subjugation: Non-Repudiation: Confidentiality: Privacy: Integrity: Concern: Exposures: 3 1 reverse proxy and 2 web servers 3 - ICMP, 22 /TCP, 443 /TCP 2 2 x web servers that trust the proxy 3 - firewall, 2 x SSH login, MySQL login. (Cacti web login is not counted because the app is not in scope) 4 - firewall, reverse proxy: HTTPS, SSH, MySQL login 3 - proxy log, SSH log, MySQL log 2 - HTTPS, SSH 1 - reverse proxy 2 - HTTPS + SSH 1-56 bit ciphers in HTTPS 2 - Internal IP can be found in SSL certificate, SSH version in banner Total RAV: 88.3% Scenario 2: Direct access to web servers Visibility: 2 2 x web servers Access: 6 2 x (ICMP, 22 /TCP, 443 /TCP) Trust: 0 Authentication: Subjugation: Non-Repudiation: Confidentiality: Integrity: Concern: Exposures: 4 - firewall, 2 x SSH login, 1x MySQL auth. (Cacti web login is not counted because the app is not in scope) 6 - firewall, 2 x (HTTPS, SSH), 1 x MySQL auth 4 2 x (apache log, SSH log), 1 MySQL log 4 2 x (HTTPS + SSH) 2 2 x (HTTPS + SSH) 2 2x 56 bit ciphers in HTTPS 4 2 x (Internal IP can be found in SSL certificate, SSH version in banner) Total RAV: 87.07% Pablo Endres Page 10
11 Conclusion This is the result of the security measurements for both scenarios: using a RP (reverse proxy) and then without it while the web servers have limitations: RP: Total RAV 88.3% Direct: Total RAV 87.07% This shows that the RP has a smaller Attack Surface in this scenario. Don't get fooled by the small difference of 1.23%. Think of a building with 1% of its doors or windows open. Or how even in a risk assessment of potential vulnerable exposure, this 1% on the grand scale of thousands or millions of connections day after day will add up quickly. However, I had no intention of building an infrastructure with limitations already. So we fixed the problems found and recalculated with the limitations removed. This is how it now compares: RP: Total RAV without limitations: 95.92% Direct: Total RAV without limitations: 96.52% What is interesting here is that the balance now tilts the other way, favouring the scenario using direct access to web servers. This means that when considering a scope with a non-optimal configuration of web servers, it can be better protected by using a reverse proxy server. But if they are correctly configured, then the reverse proxy adds to the visibility and expands the Attack Surface. But how does is Scale? As an exercise we calculated the RAVs for bigger scenarios to see if the conclusion also scales, with 100 web servers behind a reverse proxy or directly exposed. Again by taking advantage of the RAVs we can measure the security in both scenarios without actually having to build them. RAV of a RP without limitations protecting 100 servers: 85.29% RAV of 100 web server with limitations: 66.33% RAV of 100 web servers without limitations: 91.44% Adding servers to the scope highlights the conclusion of our research: having a reverse proxy does increase the Attack Surface. At the end, it comes down to a risk decision: If you think your organization can run securely configured, hardened web servers over time (and keep them that way) you are better off without the proxy. If not, you should have a reverse proxy in place as an umbrella to protect all those web servers or devices that are not maintained securely. Pablo Endres Page 11
12 Contributors Pablo Endres Cor Rosielle, Lab 106 Pete Herzog, ISECOM Lars Heidelberg, admeritia GmbH About the author Pablo Endres is an Experienced Security Consultant, Linux / UNIX system administrator and a technological solution architect. His main interests are information security, networking, telephony, *NIX and technological research. He holds a degree in computer engineering, ISC2 CISSP, Comptia Security+, ISECOM s OPSA + OPST Certifications, and a black belt in Shuri-Ryu karate-do; and has worked in a variety of industries: wireless phone providers, VoIP solution providers, contact centers, university labs, and founded a IT consulting company. Pablo enjoys reverse engineering, research, self learning, an intellectual challenge, and collaboration. Published: Pablo Endres Page 12
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Firewall implementation and testing
Firewall implementation and testing Patrik Ragnarsson, Niclas Gustafsson E-mail: [email protected], [email protected] Supervisor: David Byers, [email protected] Project Report for Information
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Lab Objectives & Turn In
Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT
Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Firewalls. Chien-Chung Shen [email protected]
Firewalls Chien-Chung Shen [email protected] The Need for Firewalls Internet connectivity is essential however it creates a threat vs. host-based security services (e.g., intrusion detection), not cost-effective
Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005
Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract Writing a custom firewall is a complex task, and is something that requires a significant amount of
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Nmap: Scanning the Internet
Nmap: Scanning the Internet by Fyodor Black Hat Briefings USA August 6, 2008; 10AM Defcon 16 August 8, 2008; 4PM Abstract The Nmap Security Scanner was built to efficiently scan large networks, but Nmap's
Firewalls. Network Security. Firewalls Defined. Firewalls
Network Security Firewalls Firewalls Types of Firewalls Screening router firewalls Computer-based firewalls Firewall appliances Host firewalls (firewalls on clients and servers) Inspection Methods Firewall
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Security Considerations White Paper for Cisco Smart Storage 1
Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
The Vision of the OSSTMM
The Vision of the OSSTMM A species that thrives on innovation means that the rules are made to be broken. For every guideline that reigns in action and behavior, new research and new technology disrupts
NETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
Payment Card Industry (PCI) Executive Report 08/04/2014
Payment Card Industry (PCI) Executive Report 08/04/2014 ASV Scan Report Attestation of Scan Compliance Scan Customer Information Approved Scanning Vendor Information Company: A.B. Yazamut Company: Qualys
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Payment Card Industry (PCI) Executive Report. Pukka Software
Payment Card Industry (PCI) Executive Report For Pukka Software Primary Contact: Brian Ghidinelli none Los Gatos, California United States of America 415.462.5603 Payment Card Industry (PCI) Executive
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
Internet Banking System Web Application Penetration Test Report
Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Network and Services Discovery
A quick theorical introduction to network scanning January 8, 2016 Disclaimer/Intro Disclaimer/Intro Network scanning is not exact science When an information system is able to interact over the network
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
The current version installed on your server is 2.6.32-431.5.1.el6.x86_64 and it's the latest available.
IP : nnn.nnn.nnn.n 173.255.141.4 Hostname : example.domain.com webserver.theewfinc.org OS : CentOS release 6.6 (Final) The following is a report on the security and performance of your server. It includes
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie
An Introduction to Nmap with a Focus on Information Gathering Ionuț Ambrosie January 12, 2015 During the information gathering phase of a penetration test, tools such as Nmap can be helpful in allowing
1.0 Introduction. 2.0 Data Gathering
Nessus Scanning 1.0 Introduction Nessus is a vulnerability scanner, a program that looks for security bugs in software. There is a freely available open source version which runs on Unix. Tenable Security
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
ensuring security the way how we do it
ensuring security the way how we do it HUSTEF, 2015.11.18 Attila Tóth 1 Nokia Solutions and Networks 2014 Disclaimer The ideas, processes, tools are presented from a practitioner s point of view working
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
CIT 480: Securing Computer Systems. Firewalls
CIT 480: Securing Computer Systems Firewalls Topics 1. What is a firewall? 2. Types of Firewalls 1. Packet filters (stateless) 2. Stateful firewalls 3. Proxy servers 4. Application layer firewalls 3. Configuring
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall
Figure 5-1: Border s Chapter 5 Revised March 2004 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Border 1. (Not Trusted) Attacker 1 1. Corporate Network (Trusted) 2 Figure
Configure a Microsoft Windows Workstation Internal IP Stateful Firewall
70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow
Sample Report. Security Test Plan. Prepared by Security Innovation
Sample Report Security Test Plan Prepared by Security Innovation Table of Contents 1.0 Executive Summary... 3 2.0 Introduction... 3 3.0 Strategy... 4 4.0 Deliverables... 4 5.0 Test Cases... 5 Automation...
How to protect your home/office network?
How to protect your home/office network? Using IPTables and Building a Firewall - Background, Motivation and Concepts Adir Abraham [email protected] Do you think that you are alone, connected from
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
Linux Routers and Community Networks
Summer Course at Mekelle Institute of Technology. July, 2015. Linux Routers and Community Networks Llorenç Cerdà-Alabern http://personals.ac.upc.edu/llorenc [email protected] Universitat Politènica de
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
CIT 480: Securing Computer Systems. Firewalls
CIT 480: Securing Computer Systems Firewalls Topics 1. What is a firewall? 2. Types of Firewalls 1. Packet filters (stateless) 2. Stateful firewalls 3. Proxy servers 4. Application layer firewalls 3. Configuring
Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer
Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Lab 3: Recon and Firewalls
Lab 3: Recon and Firewalls IP, UDP, TCP and ICMP Before we can create firewall rules, we have to know the basics of network protocols. Here's a quick review... IP ICMP UDP TCP The underlying packet delivery
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Application Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security ICMP, TCP, DNS, Scanning Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Agenda A couple of examples of network protocols that
Network Security CS 192
Network Security CS 192 Firewall Rules Department of Computer Science George Washington University Jonathan Stanton 1 Client Web Auth paper Today s topics Firewall Rules Jonathan Stanton 2 Required: Additional
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Railo Installation on CentOS Linux 6 Best Practices
Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to
Penetration Testing SIP Services
Penetration Testing SIP Services Using Metasploit Framework Writer Version : 0.2 : Fatih Özavcı (fatih.ozavci at viproy.com) Introduction Viproy VoIP Penetration Testing Kit Sayfa 2 Table of Contents 1
040020305-Penetration Testing 2014
Comprehensive Questions/Practical Based :- 040020305-Penetration Testing 2014 1. Demonstrate the installation of BackTrack using Live DVD. Also list all the steps. 2. Demonstrate the installation of BackTrack
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Installing and Configuring Nessus by Nitesh Dhanjani
Unless you've been living under a rock for the past few years, it is quite evident that software vulnerabilities are being found and announced quicker than ever before. Every time a security advisory goes
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Payment Card Industry (PCI) Executive Report 10/27/2015
Payment Card Industry (PCI) Executive Report 10/27/2015 ASV Scan Report Attestation of Scan Compliance Scan Customer Information Approved Scanning Vendor Information Company: Rural Computer Consultants
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
