VEA-bility Analysis of Network Diversification

Size: px
Start display at page:

Download "VEA-bility Analysis of Network Diversification"

Transcription

1 VEA-bility Analysis of Network Diversification Melanie Tupper Supervised by Nur Zincir-Heywood Faculty of Computer Science, Dalhousie University August 31, 2007 Abstract: In nature, genetic diversity increases a species' ability to survive when faced with biological, environmental, or predatory threats. In this work, we investigate whether computer networks may benefit from diversification in much the same way. To this end, we compare different network configurations to explore the ability of a computer network to defend itself against threats. In order to compare configurations, we also present a novel security metric, VEA-bility, which measures the desirability of a specific network configuration. Our metric is a numeric value that is computed by considering network vulnerabilities, network topology, intruder connectivity, and an attack graph of the network. The higher the value, the greater the ability of the network to defend against attacks.

2 Acknowledgements I would like to thank The Computer Research Association s Committee on the Status of Women in Computing Research (CRA-W) and The Natural Sciences and Engineering Research Council of Canada (NSERC) for supporting this research. I would like to thank my mentor, Dr Nur Zincir-Heywood for her inspiration and guidance that made this project an enjoyable and rewarding experience. I would like to thank the entire Tech Support team at Dalhousie University for their cooperation and assistance for the duration of this project they made this project possible. I would also like to thank my husband, Stewart Hardie, for his encouragement, love, and support. 1

3 Contents Section 1 - Introduction Motivation Overview... 8 Section 2 Related Work Diversity Security Metrics Section 3 Attack Graphs Section 4 - Methodology Data Collection Feature Selection Virtual Network Modeling and Simulation VEA-bility analysis Section 5 - Results Nessus Scans Results Selected Features Virtual Network Diversification Section 6 Network Example Section 7 Conclusions and Future Work References Appendix A: Sample Attack Graphs Appendix B: Sample XML File Appendix C: Network Configurations Appendix D: Sample Nessus Scan Result Appendix E: Configuration Data

4 List of Figures Figure 2.1 Monoculture Computer Networks...10 Figure 2.2 Diversified Computer Networks...10 Figure 2.3 Diversified Network Example...11 Figure 3.1 Sample Attack Graph...12 Figure 4.1 Base and Diversified Base Configurations...16 Figure 4.2 Initial and Diversified Firewalled Configurations...20 Figure 4.3 Initial and Diversified DMZ Configurations...20 Figure 4.4 Screenshot of Temporal Generation Interface...23 Figure 5.1 A Scan Result Sample...26 Figure 5.2 Average VEA-bility for Diversified Network Configurations...33 Figure 5.3 VEA-bility Distribution...34 Figure 6.1 Network Configuration Figure 6.2 Network Configuration Figure 6.3 Network Configuration Figure 6.4 Network Configuration Figure 6.5 Network Configuration Figure 6.6 Network Configuration Figure 6.7 Network Configuration

5 List of Tables Table 4.1 Virtual Network Configurations...22 Table 5.1 Nessus Scan Results by Operating System...26 Table 5.2 Virtual Network Vulnerabilities...27 Table 5.3 Average V N Dimensin s...29 Table 5.4 Average E N Dimensin s...30 Table 5.5 Average A N Dimensin s...31 Table 5.6 Average VEA-bility s

6 Section 1 Introduction 1.1 Motivation A primary objective for a computer network administrator is to maintain a stable, secure environment for network users. This objective includes ensuring that malicious computer users, known as attackers or intruders, are kept from compromising the network. An intruder exploits vulnerabilities in the software running on hosts within the network to gain access to network resources. The effects of such an exploit can range from low-level information access on one host to remote root access on multiple hosts, often including critical servers. Preventing intruder exploits includes detecting and patching, if possible, any known software vulnerabilities. Software vulnerabilities, most often the result of careless programming, are weaknesses in software that attackers can use to gain or escalate network privileges. A network service running software that is vulnerable is considered to be a vulnerable service. A common vulnerability, known as a buffer overflow or overrun, is the failure to check the size of a data buffer. Other vulnerabilities include format string vulnerabilities and logic errors. An exploit, or attack, is a way for the attacker to take advantage of vulnerabilities and can take the form of a piece of software, sequence of commands, or a block of data. If successful, the intruder will have gained privileges equal to that of the vulnerable program, allowing the intruder to access information or escalate privileges on the target host. Buffer overflow vulnerabilities can be exploited by an attacker by sending input that is too large for the intended buffer. This results in the extra data being overwritten to unauthorized memory locations, allowing the intruder to execute arbitrary code. Another common attack, the denial-ofservice (DoS) attack, occurs when an intruder sends more requests than the system can handle, thus rendering the service unable to process any valid requests. Although a DoS attack does not generally permit intruder access to the target host, this attack may serve as a distraction for a more serious attack on another host within the network. 5

7 There are several online software vulnerability databases, including the Common Vulnerabilities and Exposures (CVE) list [1]. This list is an initiative to standardize vulnerability references and gives vulnerabilities a name in the form CVE-YYYY-XXXX, where YYYY is the year in which the vulnerability was first reported. The CVE list, which is searchable by the CVE name, also provides the status of the vulnerability, a description, and a list of references. Network hardening refers to the various methods that can be employed to secure a system, which includes patching software vulnerabilities. Other ways in which a network can be made more secure is through the addition of firewalls, Demilitarized zones (DMZs), intrusion detection systems (IDSs), or intrusion prevention systems (IPSs). Firewalls and DMZs protect a network by restricting the connectivity of hosts both inside and outside a network. An IDS monitors network traffic and can be configured to alert the administrator to suspicious activity. An IPS not only monitors network activity, but can also react in real time to block or prevent malicious activity. A firewall, which can be either a hardware or software device, restricts the connectivity of hosts outside a network to hosts inside a network, or vice versa, and aims to filter unwanted behavior to or from the network. A DMZ, also known as a perimeter network, is an area between an internal and external network. A DMZ configuration allows hosts on both the internal and external networks to connect to hosts in the DMZ. However, hosts inside the DMZ are generally restricted from connecting to hosts on the internal network. A DMZ configuration serves to protect the internal network from attack should an intruder be able to gain elevated privileges on a host inside the DMZ. Web servers are commonly placed in the DMZ to allow external users to request information while protecting hosts inside the network. An IDS or IPS is a software application that monitors malicious traffic between hosts, including worms and viruses, which would go undetected by a firewall. The presence of this type of unwanted traffic will alert the system administrator to suspicious activity. Even with the best security practices, it is inevitable that systems become vulnerable. A common practice for detecting vulnerabilities on a network employs a vulnerability scanner: a software program that can be used to pinpoint weaknesses in a network. A vulnerability scanner generally 6

8 searches for active IP addresses, then attempts to connect to open ports and determine the operating system and applications running on the host. If a vulnerable service is found, most scanners will identify the related CVE number and assign a risk factor to the vulnerability. A popular, open-source vulnerability scanner, which is available for numerous operating systems, is the Nessus Vulnerability Scanner [2]. Once vulnerabilities have been identified, the administrator can attempt to fix the hole by finding the corresponding vulnerability in one of the online databases, then downloading and applying a software patch, if one is available. While these tools are useful for increasing security, they can only be used on existing physical networks. Since new software vulnerabilities are being discovered at an alarming rate of approximately 18 vulnerabilities per day [3], exploit prevention has become an attractive research area. Network diversification is an emerging trend that is suggested to increase the security of a computer network [4]. In much the same way as biodiversity increases a species likelihood of survival and portfolio diversity increases an investor s chances of receiving a return on investment, network diversification aims to eliminate monoculture configurations by introducing additional hosts, operating systems, and applications into the network. However, to the authors knowledge, there has been no previous research investigating this hypothesis. Thus, the purpose of this research project is to explore the effects of network diversity on network security. Our approach involves 3 phases: (i) A data collection phase; (ii) An experimental phase; and (iii) An evaluation phase. In the data collection phase, we use a vulnerability scanner to gather host information from the test bed. An important aspect of this research is the ability to model realistic network topologies with known vulnerabilities. For this reason, we use a set of hosts on the Faculty of Computer Science network at Dalhousie University as our test bed. In the experimental phase, we use the data collected to model diversified networks from initial configurations, including known vulnerabilities. To this end, we use a software package to generate an attack graph, which is a tree based data structure describing all known courses of actions that an attacker can take to compromise the network. 7

9 In the final phase, evaluation, we propose a novel quantitative metric, VEA-bility, which can be used to compare different network configurations. The underlying idea behind our VEA-bility metric is that the security of a network is influenced by many factors, including the severity of existing vulnerabilities, distribution of services, connectivity of hosts, and possible attack paths. These factors are modeled into three network dimensions: vulnerability, exploitability, and attackability. The VEA-bility score, a numeric value in the range [0,10], is a function of these three dimensions. Based on our findings, we conclude that the diversification theory, when properly applied, can be employed to increase the security of a network. These conclusions are important to network administrators as they strive to provide secure, yet functional, network configurations. 1.2 Overview The following section, Section 2, provides an overview of network diversification and security metrics. Section 3 gives a detailed description of attack graphs. Section 4 reviews each phase of our research and Section 5 summarizes our results. Section 6 provides an example of our VEAbility metric applied to a diversified network. Section 7 presents our conclusions and suggests further directions for this research. 8

10 Section 2 Related Work 2.1 Diversity While network diversification is only an emerging strategy, the benefits of diverse populations have been extensively researched in many disciplines, including biology and economics. Biodiversity, the variation of life, has three levels: genetic diversity, species diversity, and ecosystem diversity [5]. While all three are essential to survival, we use the genetic level to demonstrate how diversity can impact the survival of a species or population. Genetic diversity refers to the differences in the raw material of a species; DNA and RNA are two forms of this raw material. It is this raw material that makes it possible for a species to evolve and adapt, thus surviving biological, environmental, or predatory threats. A decline in the number of individuals in a population lowers the genetic variability, which is common in endangered species. One such species that is vulnerable to extinction due to the lack of genetic variation is the cheetah. The few cheetah populations that do remain are being forced to compete for resources in limited and diminishing habitats. The cheetah s limited genetic diversity may affect their ability to adapt to these environmental changes, further limiting their chances of survival. Diversification in finance involves choosing different investments to comprise a portfolio. Two general categories of financial diversification are horizontal and vertical. Horizontal diversification refers to diversity among the same type of investment, stocks, for example. Vertical diversification refers to investing in different types of investments such as stocks, bonds and mutual funds. The main benefit of portfolio diversification is reduced risk. This strategy relies on historical evidence that it is unlikely that different investments will simultaneously move in the same direction, thus reducing the risk. 9

11 Figure 2.1 depicts a monoculture computer network consisting of hosts running the same operating system and offering like services. A firewall is used solely to illustrate the idea of an internal network. An example of a monoculture network would be a computer lab where the operating system and services on each machine are similar, if not identical. If an attacker were able to compromise one host, it is likely that the attacker would be able to compromise every host on the network. Unfortunately, the monoculture configuration approach is common in many organizations due to limited resources, including time, money, and network administration personnel. Figure 2.1 Monoculture Computer Network On the other hand, Figure 2.2 demonstrates how a network can be diversified by dispersing the network services among hosts running different operating systems. Industry professionals propose that monoculture networks can benefit from diversity strategies in much the same way as species benefit from genetic diversity and investors benefit from diverse portfolios [4,6,7]. As the saying goes, Don t put all your eggs in one basket! Figure 2.2 Diversified Computer Network 10

12 Jajodia et al. [8] attempt to demonstrate that network diversity is not always beneficial to a network. Although we do not disagree with their conclusion, that is, we agree that it is possible to obtain a less secure network through diversification, we believe that in order to make such a claim, a thorough investigation is needed providing examples to show whether the result they obtained is typical or exceptional. Their example case, shown in Figure 2.3, compares two firewalled configurations, which we refer to as configuration 1 and configuration 2. The internal network in configuration 1 consists of a vulnerable mail server running on a Linux host, an ftp directory running on a Linux host, and a Database Management System (DBMS) running on a FreeBSD host. Configuration 2 includes an additional vulnerable mail server running on a Windows 2000 host. Figure 2.3 Diversified Network Example Jajodia et al. [8] state that a network configuration that has less attack paths is considered to be more secure. They argue that since configuration 2 has twice as many attack paths as configuration 1, configuration 2 is less secure which shows that diversification may be detrimental to a network. However, the main purpose of their work is the proposition of a security metric that does not consider the number of attack paths. While we agree that the number of attack paths to the target host should be considered, we believe this exemplifies the need to include a myriad of factors when determining the level of security offered by a network configuration. 11

13 2.2 Security Metrics Comparing the desirability of different network configurations requires a security metric. In general, a metric is a quantifiable measurement that allows for comparison. A security metric can be either qualitative or quantitative, and measures the degree of security controls, policies and procedures. For a security administrator, a security metric allows for comparison of different network configurations. When reviewing related work, our primary interest lies with quantitative security metrics that generate a numeric score. Jajodia et al. [8] present such a metric based on the strength of the weakest adversary that can compromise the network. The algorithm they present starts with a goal state and works in reverse, decomposing the requirements for the previous network state until an initial state is found. This produces the minimum set of initial attributes that an attacker would need to compromise a specified host and can be compared to other configurations. Manadhata et al. [9] use an attack surface metric to compare the attack surfaces of two ftp servers. Although this research does not offer a metric to compare the security of networks, the contributions of this paper inspire us to consider a security metric for a network with multiple dimensions. Their metric computes a discrete score for each of their three proposed dimensions: methods, channels, and data. The metric proposed by Adedin et al. [10] to evaluate network security policies generates one unified score that is a weighted aggregation of different factors. These factors include existing network vulnerabilities, vulnerability history of exposed services, exposure of services, and traffic volumes handled by services. In calculating the Existing Vulnerability Measure (EVM), this metric uses an exponential average to ensure that the resulting score will be at least as high as the highest vulnerability score present in the system. Additional vulnerabilities serve only to increase this score. We also use an aggregated, unified security score as well as exponential averages in our own VEA-bility metric for network security. Another tool we use in calculating the VEA-bility of a network is an attack graph. The next section details how an attack graph is generated, the information it represents, and how we use this information in our VEA-bility metric. 12

14 Section 3 Attack Graphs While identifying single vulnerabilities is useful, the security threat increases exponentially with multiple network vulnerabilities. One way to explore the effects of multiple vulnerabilities on a network is through an attack graph. An attack graph is a pictorial representation of the paths an attacker can take to exploit network vulnerabilities. The paths in the graph, known as attack paths, represent all the ways an intruder can penetrate the network. This can be used by a network administrator to identify how vulnerable the network is and what hardening measures should be taken to thwart attacks. Generation of an attack graph requires an attack model and a wealth of information regarding network topology and existing vulnerabilities. The network is usually modeled as state-machine where the nodes of the resulting attack graph represent a network state and the graph edges represent transitions, including actions taken by the attacker. Traditionally, attack graphs were produced manually by groups known as Red Teams who would generate hand drawn attack graphs on a large white board. Since attack graphs scale exponentially, this requires a substantial commitment of time and resources. Several software packages have been designed to automate the production of attack graphs, many of which are discussed in the following section. The main challenge of automating the generation of attack graphs is the exponential scaling of the graph with additional vulnerabilities. Most automated attack graph generators produce a pruned attack graph; the graph generated contains all the paths to a specific target host as opposed to the whole network. This type of graph can be aggregated for each host to comprise a network attack graph. A pruned attack graph is useful to an administrator wishing to protect a critical server. As the name suggests, a critical server offers essential network services; therefore, the security of a critical server is given a higher priority than other hosts on the network. When the critical server is identified as the target host, the pruned attack graph will identify attack paths to the critical server but not to other hosts on the network. 13

15 Network attack graphs are considered to be valuable tools for evaluating the security of a network. Therefore, much work has been done in the area of automated attack graph generation and analysis. Amman et al. [11] present an algorithm that scales well, and is implemented by Jajodia et al. [12] in their Topological Vulnerability Analysis (TVA) tool. The TVA tool automatically imports results from Nessus scans, but also requires that exploit and goal state information be entered by hand. TVA does not model firewall and router rules into the network model, but rather, relies on data collected from the Nessus scans to determine host connectivity. Since TVA requires Nessus scan info, it can only be used on an actual network and not on virtual networks or network simulations directly. Michael Artz s NetSPA tool [13] also requires information collected form Nessus scans, but must be entered into a database by hand. The NetSPA architecture relies on a software database and an action database to generate the network model. Software database entries can either be populated by hand or directly from an online vulnerability database. Action database entries must be entered manually and are used to model pre-conditions and post-conditions of intruder actions. The toolkit developed by Sheyner et al. [14] requires a user defined XML file describing the network for input. Therefore, this file can describe both virtual networks as well as existing physical networks, allowing analysts to consider alternate configurations before implementation. The input file specifies host information, connectivity among hosts, trust relations, a model of the intruder, intruder actions, and IDS information. This toolkit generates a pruned attack graph to a specified host. Although this toolkit does not produce a full attack graph, individual attack graphs to specific hosst can be combined if required. Our original research goal involved comparing the different automated attack graph generation software packages as described above on a test bed to determine which implementation had the most potential for further development. However, in spite of our efforts, we were only able to obtain a copy of one toolkit, which prompted the current research direction to use this toolkit to study the effects of diversity on security. 14

16 Our research uses a toolkit based on the work of Sheyner et al. This toolkit has been updated and is currently being maintained by David Swasey and is freely available for download [15]. We refer to this updated toolkit as the Sheyner/Swasey toolkit since the original toolkit designed by Sheyner et al. is still available, but not supported. Figure 3.1 is an example of a simple attack graph produced by the Sheyner/Swasey toolkit. The network configuration consists of one attacker and two internal hosts, A and B, each running one vulnerable service. For simplicity, we assume no restrictions on connectivity. Figure 3.1 Sample Attack Graph This is a pruned attack graph representing the attack paths to host A. Transitions from a parent node to a child are the result of a state change, represented as edges, and stored as Boolean values. Node 0 represents the initial state of the network with a simple transition to Node 1, most likely as the result of a network scan. Node 2 represents the attacker gaining access to host B, which is used to gain user access to host A (Node 3). The attacker escalates the privilege to root, resulting in Node 4. Alternatively, the attacker can directly gain user access to host A, Node 5, and escalate the user privilege to root, resulting in Node 6. Examples of other attack graphs can be found in Appendix A. 15

17 Section 4 Methodology 4.1 Data Collection Our goal to produce realistic virtual networks prompted us to seek permission to use the Dalhousie University network as our test bed. To accurately model networks mimicking the test bed, we use the Nessus Vulnerability Scanner to collect network topology information. The Nessus Scanner is an attractive research tool primarily because it allows safe checks. When the scanner is configured to scan a network using this option it will not attempt to exploit vulnerabilities, enabling us to compile vulnerability information without causing harmful Denial of Service (DoS) attacks. We run the scans from a Windows XP platform; however, the Nessus Scanner is also available for Mac OS X, Linux, FreeBSD, and Solaris. The Windows installation automatically installs and configures both server and client software, which may need to be configured separately for other operating systems. The Nessus Scanner gathers information by sending requests to all ports on hosts identified in the scan parameters. We use the scanner s default settings, but limit the number of hosts scanned for each scan to 20. The default range is 40 hosts per scan, as suggested in the Nessus 3.0 Client Guide [16]; however, we limit the number of hosts to 20 to further reduce the risk of overwhelming the system. The scan results are saved in XML format, but can also be viewed and resaved in plain text. In total, we scan 250 hosts, and generate results for 85 of these hosts. Failure to generate a report indicates that the Nessus Scanner was unable to connect to that host, and therefore, unable to extract any host information. The test bed is comprised of hosts located in diverse physical locations on the network, and includes network servers, faculty machines, and student machines. 16

18 4.2 Feature Selection The purpose of the Nessus scans is to model a realistic virtual network, which requires a wealth of host information. From the scan results we extract the following information: IP address Operating System Number of open ports Number of notes Number of warnings Number of holes Port number and corresponding services running on the open port CVE identification numbers and risk factors associated with vulnerabilities The magnitude of information requires that we construct a more compact representation of data from which to choose a set of operating systems to use in our experiments. We reorganize the host information into categories by operating system, further decomposing the operating systems by version or distribution. For each category we record: Number of hosts Number of warnings Number of holes Number of hosts with at least 1 vulnerability in each of the three highest risk categories After choosing three suitable operating systems we refer back to the original table to isolate similar vulnerabilities, also referring extensively to the National Vulnerability Database [17] to compare vulnerability characteristics including CVSS base score, access vector, access complexity, authentication, impact type, and age. We are concerned with these characteristics 17

19 because they express the severity of the vulnerability. By limiting the variation among these characteristics, we assure that our experiments measure the effects of different network configurations as opposed to different vulnerability characteristics. 4.3 Virtual Network Modeling and Simulation Before explaining how we diversify our virtual networks, it is important to understand what we mean by the term diversification. We define the diversification of a network as altering the topology of a network by redistributing services among additional hosts running either the same or another operating system as the original configuration. We model our diverse virtual networks into XML files to produce attack graphs using the Sheyner/Swasey toolkit. We chose this toolkit because of its availability, GUI interface, and ability to model virtual networks. Each XML file describes a network attack model comprised of the following components: Set of hosts connected to the network including operating system, IP address, vulnerabilities, open ports, and corresponding services; Connectivity information describing network topology and host reachability; Trust relations among hosts; Intruder information including connectivity information and level of privilege the intruder has on each of the other hosts; Set of exploits including CVE of exploited vulnerability, name, description, local and global exploit preconditions, and local and global exploit effects; A model of the intrusion detection system. Following the model provided by Sheyner et al. [14], we do not model trust relations among hosts within the network. We use the Sheyner/Swasey toolkit to generate attack graphs for each 18

20 configuration. The toolkit produces a pruned attack graph to a specified target host; therefore, a separate file must be generated for each host inside the network. Relevant data recorded includes number of nodes, number of edges, number of attack paths, and number of ways to traverse the network. A sample XML file can be found in Appendix B. We begin our modeling with the following three topologies: 1. One intruder and one network host running four services on Solaris Apache vulnerability 2. One intruder and one network host running four services on Windows rpc vulnerability 3. One intruder and one network host running four services on Linux ftp vulnerability These three topologies are considered to be the base configurations. We purposefully start with configurations that result in a low VEA-bility score, and then test the effects of diversification by adding additional hosts and operating systems; we refer to these diversified configurations as the diversified base configurations. Figure 4.1 depicts the Linux base configuration and a diversified configuration with 2 hosts running different operating systems. Figure 4.1 Base and Diversified Base Configurations We then add a firewall or DMZ to the base configurations to produce three initial firewalled configurations and three initial DMZ configurations, respectively. These new configurations act as a control and are also diversified by adding hosts and additional operating systems to produce diversified firewalled configurations and diversified DMZ configurations. The DMZ 19

21 configurations are constructed by isolating the host running a web server in the DMZ. This results in 12 fewer configurations since some configurations are duplicated. Figure 4.2 shows an initial firewall configuration and a diversified firewall configuration with 2 operating systems. Figure 7 depicts an initial DMZ configuration and a diversified DMZ configuration with 3 operating systems. Figure 4.2 Initial and Diversified Firewalled Configurations Figure 4.3 Initial and Diversified DMZ Configurations 20

22 In total, we test 303 configurations: 3 base configurations 24 diversified base configuration with 1 operating system 42 diversified base configurations with 2 operating systems 36 diversified base configurations with 3 operating systems 3 initial firewalled configurations 24 diversified firewalled configurations with 1 operating system 42 diversified firewalled configurations with 2 operating systems 36 diversified firewalled configurations with 3 operating systems 3 initial DMZ configurations 12 diversified DMZ configurations with 1 operating system 42 diversified DMZ configurations with 2 operating systems 36 diversified DMZ configurations with 3 operating systems Firewalled and DMZ configurations act initially as a control to show the level of security that can be achieved without diversification. Firewalls and DMZs are tools that administrators often use to increase the security of a network; therefore, we diversify the initial firewalled and DMZ configurations to show how the diversification approach in combination with existing security strategies can further affect security. A detailed verbal description of the test configurations can be found in Appendix C. 21

23 Table 4.1 matches the configurations in each category with the descriptions in Appendix C. Table 4.1 Virtual Network Configurations Configuration group Number of Configurations in group Corresponding Configurations in Appendix C Base configurations 3 1, 10, 19 Diversified base configurations with 1 operating system Diversified base configurations with 2 operating systems Diversified base configurations with 3 operating systems , 11-18, Initial firewalled configurations 3 106, 115, 124 Diversified firewalled configurations with 1 operating system Diversified firewalled configurations with 2 operating systems Diversified firewalled configurations with 3 operating systems , , Initial DMZ configurations 3 211, 216, 221 Diversified DMZ configurations with 1 operating system Diversified DMZ configurations with 2 operating systems Diversified DMZ configurations with 3 operating syatems , ,

24 4.4 VEA-bility analysis Given that the objective of this work is to explore the effects of diversification on network security, a metric is required to compare the different aforementioned network configurations. Thus, a security metric is defined to capture the numerous factors that influence the security of a network. To this end, we propose the VEA-bility metric to be a function of the security scores along three dimensions: vulnerability, exploitability, and attackability. For the sake of simplicity, the vulnerability, exploitability, and attackability scores will be represented in equations as V, E, and A, respectively. Each of the three dimension scores is a numeric value in the range [0,10]. The VEA-bility metric uses data from three sources: network topology, attack graphs, and scores as assigned by the Common Vulnerability Scoring System (CVSS) [18]. VEA-bility uses the following CVSS values: impact score, temporal score, and exploitability score. The impact score measures the impact that a successful exploit will have on the availability, integrity, and accessibility of information resources. The temporal score assigns a value based on the age of the vulnerability, the remediation status of a patch, and the credibility of the patch source. The vulnerability of a network is the degree to which an exploit can impact a system; a measure that is influence by time. Therefore, our vulnerability dimension is a function of the impact and temporal scores. Figure 4.4 shows a screenshot of the online temporal score interface. Our exploitability dimension is a function of the exploitability score, which evaluates the likelihood of exploitation. Temporal Metrics These metrics describe elements about the vulnerability that change over time. If all of these values are left as 'Undefined', the environmental score will be based on the base score. Availability of exploit (Exploitability) Functional exploit exists Type of fix available (RemediationLevel) Official fix Level of verification that vulnerability exists (ReportConfidence) Confirmed Figure 4.4 Screenshot of Temporal Generation Interface 23

25 Since a network is only as secure as its host, we define the three dimensions for a network configuration as a function of the three dimensions for each host on the network. The vulnerability score of a network is the exponential average of the vulnerability scores of each host on the network, or a maximum of 10. This captures the requirement that the vulnerability score of the network is at least as large as the largest host vulnerability score; additional vulnerable hosts serve only to increase this value, which can be a maximum of 10. The exploitability and attackability scores of a network are the summation of the exploitability and attackability scores of each host, respectively. Therefore, the following equations represent the Vulnerability, Exploitability, and Attackability dimension scores for a network: For a network, N, let HV(N) be the set of hosts in N that contain vulnerabilities. A network void of vulnerabilities scores a 0 along each dimension; otherwise, we define the network dimensions: Vhost V N = min(10, ln e ) host HV ( N ) E N = host HV ( N ) E host A N = host HV ( N ) A host We propose that a host with multiple vulnerabilities is less secure than a host with a single vulnerability, which is modeled into the vulnerability and attackability dimensions by taking the exponential average of the values for all vulnerabilities. Again, this allows the value to be at least as large as the highest value, and additional scores serve to increase this value to a maximum value of 10. Let each vulnerability, v, have an impact score, temporal score, and exploitability score as defined by the CVSS [18]. An impact and exploitability sub-scores are automatically generated for each CVE name, the temporal score requires user input. 24

26 We define the severity, S, of a vulnerability to be the average of the impact and temporal scores: S v = (Impact v + Temporal v ) / 2 The host vulnerability score is an exponential average of the severity scores of the vulnerabilities on a host, or 10, whichever is lower. The exploitability is the exponential average of the exploitability score for all host vulnerabilities multiplied by the ratio of network services on the host. Attackability is the ratio of attack paths produced by attack graphs to total number of attack paths, and is multiplied by a factor of 10 to produce a number in the range [0,10], ensuring that all dimensions have the same range. For a host, host, let V(host) be the set of vulnerabilities on a host. We then define the three host dimensions as: V host = min(10, ln e Sv ) v V ( host ) Exploitability v E host = (min(10, ln e )) ( services on host) / ( network services) v V ( host ) A host = (10) (attack paths) / ( network paths) The final equation for network VEA-bility is: VEA-bility N = 10 ((V+E+A) N / 3) According to the NIST Security Metrics Guide for Information Technology Systems [19], a metric must yield quantifiable information, be useful for tracking system performance, measure a repeatable process, and supporting data must be readily obtainable. The metric we propose, VEA-bility, conforms to these standards in that it is quantifiable, that is, it is expressed as a numeric value in the range [0,10]. By using the Nessus scanner and the Sheyner/Swasey toolkit, both freely available online, the methods we employ can be easily duplicated. Also, this metric serves to track the performance of a network configuration by comparing the score to other possible configurations. Thus, a network administrator can use the VEA-bility metric to direct or reallocate resources. 25

27 Section 5 Results 5.1 Nessus Scans Results Scan results can be viewed in HTML, XML or plaintext format. Figure 5.1 is an excerpt from one of the resulting plaintext output files; the complete result can be found in Appendix D. An example is provided to show the structure of the report and type of information provided. All IP address references and other information that could potentially identify this host have been removed. surf (1010/tcp) NOTE Port is open; surf (1010/tcp) NOTE RPC program version 1 'status' is running on this port;; vnc (5900/tcp) NOTE The remote VNC server supports those security types:;+ 30;; netbios-ssn (139/tcp) NOTE An SMB server is running on this port; Figure 5.1. A Scan Result Sample Due to the nature of the information, we are unable to publish our original table of results. However, Table 5.1 presents a summary of the data we obtained to select three suitable operating systems. Table 5.1. Nessus Scan Results by Operating System Operating System Hosts Warnings Holes hosts with 1+ medium CVE hosts with 1+ high CVE hosts with 1+ critical CVE Mac OS X Windows Linux Solaris FreeBSD

28 5.2 Selected Features From Table 5.1, we choose to model our networks using Linux, Solaris, and Windows operating systems. These were chosen because we were able to identify similar vulnerabilities on each operating system on our test bed. Table 5.2 summarizes the identified vulnerabilities. Table 5.2 Virtual Network Vulnerabilities Operating System Vulnerable Service CVE Name Description Linux File Transfer Protocol (ftp) CVE Buffer overflow Solaris Apache (web) CVE Heap-based buffer overflow Windows Remote Procedure Call (rpc) CVE Stack-based buffer overflow All three vulnerabilities have a CVSS base score of 10. They are network exploitable and low complexity. They do not require authentication, but do provide administrator access. Finally, all were first reported in We believe that by keeping the exploits similar, the resulting VEAbility scores will reflect the effects of changes in the network configurations and will not be influenced by different vulnerability factors. In all experiment scenarios, a tested virtual network offers the following services: rpc on port 135, web server on port 80, ftp server on port 21 and a database. Port numbers are assigned to network exposed services as required to model the XML files. The database service is for illustration only and represents any critical service running on the network; it is used to show how a critical service could be exploited without being directly exposed to the network. 27

29 5.3 Virtual Network Diversification Detailed results for each network configuration tested can be found in Appendix E. These results correspond to the configurations in Appendix C. For each configuration, we have recorded the impact score, temporal score, exploitability score, number of attack paths, number of ways to traverse the network, network dimension scores, and the VEA-bility score of the network. As discussed earlier, the vulnerabilities were intentionally chosen to be similar as not to skew the results. As a consequence, the severity, S, of the three vulnerabilities is constant. A temporal score of 8.7 was generated by using the online metric with availability of exploit field set to widespread, the type of fix available field set to Official Fix, and the Level of verification that vulnerability exists field set to Confirmed. The severity score for the three vulnerabilities is: S v = (Impact v + Temporal v ) / 2 = ( ) / 2 = 9.35 We are only dealing with one vulnerability per host; therefore, V host = S v = 9.35 if a vulnerability exists, and 0 otherwise. Our network configurations may have either 0, 1, 2, or three hosts, the respective V N values will be 0, 9.35, 10, and 10. This demonstrates the value of using an exponential average. A network with one vulnerability has a vulnerability dimension value of 9.35 since this is the only vulnerability. However, when there are more vulnerabilities, the risk to the network is greater than 9.35 depending on the severity of the additional vulnerabilities. A simple average of severity scores would yield a 9.35 rating for a configuration with 2 vulnerabilities, which would not accurately represent the increased risk. 28

30 Due to the large dataset, comparing individual results is not practical. Therefore, in Table 5.3, we present the average vulnerability dimension scores for comparison. A higher score indicates a more vulnerable network configuration. Table 5.3 Average V N Dimension s Configuration Average V N Dimension Base configurations 9.35 Initial firewalled configurations 9.35 Initial DMZ configurations 9.35 Diversified base configurations with 1 O/S 9.35 Diversified base configurations with 2 O/S 6.86 Diversified base configurations with 3 O/S 6.40 Diversified firewalled configurations with 1 O/S 9.35 Diversified firewalled configurations with 2 O/S 6.86 Diversified firewalled configurations with 3 O/S 6.40 Diversified DMZ configurations with 1 O/S 9.35 Diversified DMZ configurations with 2 O/S 6.86 Diversified DMZ configurations with 3 O/S 6.40 These results indicate that with diversification by adding different operating systems it is possible to reduce the vulnerability of a network. This occurs since running a vulnerable service on a different operating system removes the vulnerability, provided the software is not vulnerable on the alternate operating system. It should be noted here that, based on our experiments, the addition of firewalls and DMZs seems to affect connectivity only and has no effect on the network vulnerability dimension. 29

31 Limiting vulnerabilities to one per host results in the following calculation: E host = (Exploitability v ) ( services on host) / ( network services) The E N score is then the summation of E host values. Table 5.4 shows the average exploitability dimension scores, E N, for each configuration category. A higher score indicates a more exploitable network configuration. Table 5.4 Average E N Dimension s Configuration Average E N Dimension Base configurations 10 Initial firewalled configurations 10 Initial DMZ configurations 5.8 Diversified base configurations with 1 O/S 5.3 Diversified base configurations with 2 O/S 5.7 Diversified base configurations with 3 O/S 3.8 Diversified firewalled configurations with 1 O/S 5.3 Diversified firewalled configurations with 2 O/S 5.7 Diversified firewalled configurations with 3 O/S 3.8 Diversified DMZ configurations with 1 O/S 3.3 Diversified DMZ configurations with 2 O/S 3.9 Diversified DMZ configurations with 3 O/S 3.1 These results show that exploitability is best controlled by the addition of a DMZ, but can be improved through diversification. Since the exploitability dimension is related to the number of services on hosts with vulnerabilities, it seems to reason that isolating the web server on a host will best affect this dimension. 30

32 Attackability is a function of the ratio of attack paths to total paths through the network. This ratio is multiplied by 10 to generate a number compatible with the other two dimensions. Average attackability, A N, dimension scores for each configuration category are presented in Table 5.5. A higher score indicates a more attackable network configuration. Table 5.5 Average A N Dimension s Configuration Average A N Dimension Base configurations 10 Initial firewalled configurations 6.7 Initial DMZ configurations 1.7 Diversified base configurations with 1 O/S 2.2 Diversified base configurations with 2 O/S 3.9 Diversified base configurations with 3 O/S 1.6 Diversified firewalled configurations with 1 O/S 1.5 Diversified firewalled configurations with 2 O/S 2.6 Diversified firewalled configurations with 3 O/S 1.0 Diversified DMZ configurations with 1 O/S.6 Diversified DMZ configurations with 2 O/S 1.3 Diversified DMZ configurations with 3 O/S 1.1 These figures highlight both the benefits of diversity and a DMZ on the network security as represented in the attack graphs. While many system administrators use attack graphs alone to evaluate the security of a network [14], we propose that they are more useful when aggregated with other network factors. 31

33 For example, consider a vulnerable host on a network that cannot be exploited due to connectivity restrictions. We consider this network less secure than a network with no software vulnerabilities, but more secure than a network with no connectivity restrictions. This is reflected in our VEA-bility metric score. The overall average VEA-bility scores are found below in Table 5.6. A higher score indicates a more secure configuration, which we call more VEA-ble. Table 5.6 Average VEA-bility s Configuration Average VEA-bility Base configurations.2 Initial firewalled configurations.6 Initial DMZ configurations 4.4 Diversified base configurations with 1 O/S 4.4 Diversified base configurations with 2 O/S 4.5 Diversified base configurations with 3 O/S 6.1 Diversified firewalled configurations with 1 O/S 4.6 Diversified firewalled configurations with 2 O/S 5.0 Diversified firewalled configurations with 3 O/S 6.3 Diversified DMZ configurations with 1 O/S 5.6 Diversified DMZ configurations with 2 O/S 5.8 Diversified DMZ configurations with 3 O/S 6.5 Although these scores are averages, it is evident that it is possible to increase the security rating of a network configuration through diversification. Figure 5.1 is a pictorial representation of this data which highlights the benefits of diversification alone or in combination with a firewall or DMZ. 32

34 The significant advantage of network diversity is apparent when comparing the average scores for the diversified base configurations with three operating systems to the diversified DMZ configurations with three operating systems. As indicated, the DMZ adds only.4 to the final VEA-bility score. Average VEA-bility of Diverse Network Configurations No Firewall Firewall DMZ Initial Configurations Same O/S Two O/S Three O/S Figure 5.2 Average VEA-bility for Diversified Network Configurations 33

35 The following table shows the distribution of diversified network VEA-bility scores. Although it is possible to decrease security, the tables show the distribution of configurations which resulted in lower and higher VEA-bility scores than the average initial scores of.22,.6, and 4.4. To reduce influencing the results by including firewalled and DMZ configurations, we divide the results into three categories: base, firewalled, and DMZ. VEA-bility Distribution Less VEA-ble More VEA-ble Percentage of Hosts Base Firewalled DMZ Figure 5.3 VEA-bility Distribution 34

36 Section 6 Network Example The following is an example of how a network configuration can be diversified to increase security. We start with a simple configuration of an attacker and one host running four services and explore the effects of adding a firewall, DMZ, additional hosts, and additional operating systems. All of the following configurations can be found in Appendix B; the first is configuration 1. Figure 6.1 Network Configuration 1 Since there is only one host, network dimensions are host dimensions: V N = (10+8.7) / 2 = 9.35 E N = 10 (4/4) = 10 A N = (1/1)10 = 10 VEA-bility = 10- (( )/3) =.22 35

37 On the other hand, configuration 35 results from isolating the database on the Solaris host and dispersing the services onto an additional host running Windows operating system. Figure 6.2 Network Configuration 35 V N = (10+8.7) / 2 = 9.35 E N = 10 (3/4) = 7.5 A N = (1/4)10 = 2.5 VEA-bility = 10- (( )/3) = 3.6 Alternatively, adding a firewall to configuration 1 creates configuration 106: Figure 6.3 Network Configuration 106 V N = (10+8.7) / 2 = 9.35 E N = 10 (4/4) = 10 A N = (1/1)10 = 10 VEA-bility = 10- (( )/3) =.22 36

38 The VEA-bility scores for configurations 1 and 106 are both.22 as a result of the firewall rules restricting connectivity to the rpc service, but not to the web of ftp services. Configuration 140 is the result of isolating the database on the Solaris host and dispersing the remaining services onto an additional host running Windows operating system. Figure 6.4 Network Configuration 140 V N = (10+8.7) / 2 = 9.35 E N = 10 (3/4) = 7.5 A N = (0/4)10 = 0 VEA-bility = 10- (( )/3) = 4.4 There are no attack paths to hosts inside the network because the firewall restricts connectivity to the vulnerable rpc service. However, the fact that rpc service is vulnerable on Windows and 75% of the network services are on this host gives a resulting VEA-bility score of 4.4. This vulnerability could be exploited if the attacker discovers another way to get inside the network. 37

39 We generate configuration 211 from configuration 1 by adding another Solaris host to a DMZ to act as the web server. Figure 6.5 Network Configuration 211 V N = (10+8.7) / 2 = 9.35 E N = 10 (1/5) = 2.5 A N = (1/2)10 = 5.0 VEA-bility = 10- (( )/3) = 4.4 This allows the attacker to gain root access on the DMZ host, but lack vulnerabilities inside the network to prevent the attacker from advancing. The VEA-bility represents the potential for a vulnerable internal attack if the attacker were to discover an alternate vulnerability. Furthermore, by isolating the database on the Solaris host inside the network, and adding a Windows host for the remaining services, we have configuration 233. Figure 6.6 Network Configuration

40 V N = (10+8.7) / 2 = 9.35 E N = 10 (2/4) = 5.0 A N = (0/5)10 = 0 VEA-bility = 10- (( )/3) = 5.2 Again, there are no attack paths inside the network due to connectivity restrictions, however vulnerabilities still exist. This is the reason for the VEA-bility of 5.2 and reiterates our sentiment that the security of the network cannot be determined from attack graphs alone. Finally, by adding yet another host, Linux, we separate the services running on the Windows machine to get the following: configuration 279. Figure 6.7 Network Configuration 279 V N = 0 E N = 0 A N = 0 VEA-bility = 10- (0/3) = 10 This network is completely secure (very VEA-ble) as there are no vulnerabilities to exploit. 39

41 Section 7 Conclusions and Future Work In this work, the objective was to test and evaluate the effects of network diversity on network security. To this end, we gathered network topology information of our test bed using the Nessus Vulnerability Scanner. Using the collected data, we isolated the desired features and modeled diversified network configuration based on these features. Initial configurations were diversified by adding additional hosts and operating systems. We also added firewalls and DMZs as a control. Using these virtual models we generated attack graphs using the toolkit designed by Oleg Sheyner and updated by David Swasey. To compare the security measure of each resulting configuration, we proposed a quantitative security metric, VEA-bility. Our VEA-bility metric assigns a numeric value in the range [0,10] to each network configuration where 0 indicates a poorly configured network and 10 indicates the most secure network configuration possible. Using our VEA-bility metric applied to our diversified configurations, we find that diversification does indeed support the security of a network. Specifically, in our experiments, diversity assists in increasing the average score in each dimension, thus increasing the overall average VEA-bility of network configurations in each category. Therefore, observe that diversifying a computer network can result in a more secure configuration. We show that by diversifying services onto hosts where the resulting configuration is less vulnerable, the result is a more secure network. However, just as investors research and monitor their investments to maximize their profits, a network administrator should research the history of vulnerabilities for software intended for use on a system or network. Once configured, the system should be monitored by referring frequently to online vulnerability databases to patch or replace vulnerable software as required. There are a number of directions for extending this research in the future including improving the metric and using the VEA-bility metric to investigate specific aspects of network security. 40

42 Moreover, improving the network model is another future direction. In this research we did not have access to information provided by an intrusion detection system or intrusion prevention system on the test bed. Obtaining this information and including it in the network model would allow a network administrator to make more confident decisions concerning secure network topologies. Also, continuing from the work of Sheyner et al. [14], we did not model trust relations within the network, but rather modeled the resulting authentications as connectivity relations. Since the Sheyner/Swasey toolkit is designed to recognize host trust relations, representing these relations can provide more accurate representations of a network. One way to improve the VEA-bility metric includes adding more information provided by the CVSS [18]. One such example is the environmental score, which assigns a numeric value based on software implementation and network environment. The environmental score is calculated based on user defined input such as the potential for damage and the target distribution. Our VEA-bility metric could be used to investigate the security of a network to determine which of our three defined dimensions has a greater impact on the overall security. The results of this type of study would better allow network administrators to focus their efforts on events that would have the most impact on the security of their networks. 41

43 References [1] Common Vulnerabilities and Exposures (CVE). [2] Nessus Vulnerability Scanner. [3] National Vulnerability Database Home. [4] Geer, D. E. (2007, April). The Evolution of Security [Electronic Version]. ACM Queue, 5(3). [5] Campbell, N., Reece, J., Taylor, M., & Simon, E. (2006). Biology: Concepts and Connections. 5 th Edition. San Francisco: Benjamin Cummings. [6] Geer, D., Bace,R., Gutmann, P., Metzger, P., Pfleeger, C. P., Quarterman, J.S., and Schneier, B. (2003, Sept 27). CyberInsecurity: The Cost of Monopoly How the Dominance of Microsoft's Products Poses a Risk to Security. [7] Lemos, R. (2004, January). Agriculture epidemics may hold clues to Net viruses. CNET News.com. [8] Jajodia, S., Pamula, J., Ammann, P., & Swarup, V. (2006). A Weakest Adversary Security Metric for Network Configuration Security Analysis. In QoP-2006: Quality of Protection workshop, October [9] Manadhata, P., Wing, J., Flynn, M., & McQueen, M. (2006). Measuring the Attack Surfaces of Two FTP Daemons. In QoP-2006: Quality of Protection workshop, October [10] Abedin, M., Nessa, S., Al-Shaer, E., & Khan, L. (2006). Vulnerability Analysis For Evaluating Quality of Protection Security Policies. In QoP-2006: Quality of Protection workshop, October

44 [11] Ammann, P., Wijesekera, D., & Kaushik, S. (2002). Scalable, Graph-Based Network Vulnerability Analysis. In Proceedings of the 9 th ACM Conference on Computer and Communications Security (CCS 02), November [12] Jajodia, S., Noel, S., & O Berry, B. (2005). Topological Analysis of Network Attack Vulnerability. In Managing Cyber Threats: Issues, Approaches and Challenges, pages V. Kumar, J. Srivastava, and A. Lazarevic (Eds.), Springer-Verlag. [13] Artz, M. (2002). NetSPA, A Network Security Planning Architecture, M.S. Thesis. Cambridge: Massachusetts Institute of Technology, May [14] Sheyner, O. & Wing, J. M. (2004) Tools for Generating and Analyzing Attack Graphs. In Proceedings of Workshop on Formal Methods for Components and Objects, pp [15] Scenario and Attack Graphs. [16] Nessus Client Guide. [17] National Vulnerability Database Search Page. [18] A Complete Guide to the Common Vulnerability Scoring System (CVSS). [19] Security Metrics Guide for Information Technology Systems. 43

45 Appendix A: Sample Attack Graphs Figure A.1 Single Path Attack Graph Figure A.2 Multiple Path Attack Graph Figure A.3 Multiple Path Attack Graph 44

46 Appendix B: Sample XML File <network> <host id="solaris" ip=" " network="inside"> <services> <web port="80" /> <ftp port="21" /> <rpc port="135" /> <database /> </services> <vulnerabilities> <CVE_2004_0492 /> </vulnerabilities> <connectivity> <remote id="solaris"> <web /> <ftp /> <rpc /> </remote> <remote id="intruder"> <web /> <ftp /> <rpc /> </remote> </connectivity> </host> <host id="intruder" ip=" " network="outside"> <connectivity> <remote id="solaris"> <web /> </remote> <remote id="intruder"> <web /> 45

47 <ftp /> <rpc /> </remote> </connectivity> </host> <adversary> <privileges> <privilege host="intruder" level="root" /> <privilege host="solaris" level="none" /> </privileges> <knowledge> <scan value="no" /> </knowledge> </adversary> <attack name="apache_buffer_overflow" description="gives a root shell on the target machine."> <local_preconditions> <privilege host="source" rel="gte" value="user" /> <privilege host="target" rel="lte" value="user" /> </local_preconditions> <global_preconditions> <service name="web" host="target" /> <vulnerability name="cve_2004_0492" host="target" /> <connectivity from="source" service="web" /> </global_preconditions> <local_effects> <privilege host="target" value="root" /> </local_effects> <global_effects> <service host="target" name="web" value="false" /> </global_effects> </attack> </network> 46

48 Appendix C: Network Configurations Base Configurations Intruder can connect to ports 80, 135, and 21. Configuration 1-1 intruder and 1 internal Solaris host running web, ftp, rpc, and database. Configuration 2 1 intruder, 1 internal Solaris host running rpc, and 1 internal Solaris host running web, ftp, and database. Configuration 3 1 intruder, 1 internal Solaris host running ftp, and 1 internal Solaris host running web, rpc, and database. Configuration 4 1 intruder, 1 internal Solaris host running web, and 1 internal Solaris host running rpc, ftp, and database. Configuration 5 1 intruder, 1 internal Solaris host running database, and 1 internal Solaris host running web, rpc, and ftp. Configuration 6 1 intruder, 1 internal Solaris host running database and web, and 1 internal Solaris host running ftp and rpc. Configuration 7 1 intruder, 1 internal Solaris host running database and rpc, and 1 internal Solaris host running ftp and web. Configuration 8 1 intruder, 1 internal Solaris host running database and ftp, and 1 internal Solaris host running rpc and web. Configuration 9 1 intruder, 1 internal Solaris host running database, 1 internal Solaris host running rpc, 1 internal Solaris host running ftp, and 1 internal Solaris host running web. Configuration 10 1 intruder and 1 internal Linux host running web, ftp, rpc, and database. Configuration 11 1 intruder, 1 internal Linux host running rpc, and 1 internal Linux host running web, database, and ftp. Configuration 12 1 intruder, 1 internal Linux host running ftp, and 1 internal Linux host running rpc, web, and database. Configuration 13 1 intruder, 1 internal Linux host running web, and 1 internal Linux host running rpc, ftp, and database. Configuration 14 1 intruder, 1 internal Linux host running database, and 1 internal Linux host running web, rpc, and ftp. Configuration 15 1 intruder, 1 internal Linux host running web and database, and 1 internal Linux host running ftp and rpc. Configuration 16 1 intruder, 1 internal Linux host running rpc and database, and 1 internal Linux host running ftp and web. Configuration 17 1 intruder, 1 internal Linux host running ftp and database, and 1 internal Linux host running web and rpc. Configuration 18 1 intruder, 1 internal Linux host running database, 1 internal Linux host running rpc, 1 internal Linux host running ftp, and 1 internal Linux host running web. Configuration 19 1 intruder and 1 internal Windows host running web, rpc, ftp, and database. Configuration 20 1 intruder, 1 internal Windows host running rpc, and 1 internal Windows host running ftp, web, and database. Configuration 21 1 intruder, 1 internal Windows host running ftp, and 1 internal Windows host running rpc, web, and database. Configuration 22 1 intruder, 1 internal Windows host running web, and 1 internal Windows host running ftp, rpc, and database. Configuration 23 1intruder, 1 internal Windows host running database, and 1 internal Windows host running rpc, ftp, and web. Configuration 24 1 intruder, 1 internal Windows host running web and database, and 1 internal Windows host running ftp and rpc. Configuration 25 1 intruder, 1 internal Windows host running rpc and database, and 1 internal Windows host running ftp and web. Configuration 26 1 intruder, 1 internal Windows host running ftp and database, and 1 internal Windows host running rpc and web. Configuration 27 1 intruder, 1 internal Windows host running database, 1 internal Windows host running rpc, 1 internal Windows host running ftp, and 1 internal Windows host running web. Configuration 28 1 intruder, 1 internal Solaris host running web, rpc, and database, and 1 internal Windows host running ftp. 47

49 Configuration 29 1 intruder, 1 internal Solaris host running database, ftp, and web, and 1 internal Windows host running rpc. Configuration 30 1 intruder, 1 internal Solaris host running database, ftp, and rpc, and 1 internal Windows host running web. Configuration 31 1 intruder, 1 internal Solaris host running web, ftp, and rpc, and 1 internal Windows host running database. Configuration 32 1 intruder, 1 internal Windows host running database, web, and rpc, and 1 internal Solaris host running ftp. Configuration 33 1 intruder, 1 internal Windows host running database, ftp, and web, and 1 internal Solaris host running rpc. Configuration 34 1 intruder, 1 internal Windows host running database, ftp, and rpc, and 1 internal Solaris host running web. Configuration 35 1 intruder, 1 internal Windows host running web, ftp, and rpc, and 1 internal Solaris host running database. Configuration 36 1 intruder, 1 internal Windows host running database and ftp, and 1 internal Solaris host running web and rpc. Configuration 37 1 intruder, 1 internal Windows host running database and web, and 1 internal Solaris host running ftp and rpc. Configuration 38 1 intruder, 1 internal Windows host running database and rpc, and 1 internal Solaris host running ftp and web. Configuration 39 1 intruder, 1 internal Solaris host running database and rpc, and 1 internal Windows host running ftp and web. Configuration 40 1 intruder, 1 internal Solaris host running database and web, and 1 internal Windows host running ftp and rpc. Configuration 41 1 intruder, 1 internal Solaris host running database and ftp, and 1 internal Windows host running web and rpc. Configuration 42 1 intruder, 1 internal Solaris host running database, rpc, and ftp, and 1 internal Linux host running web. Configuration 43 1 intruder, 1 internal Solaris host running database, ftp, and web, and 1 internal Linux host running rpc. Configuration 44 1 intruder, 1 internal Solaris host running database, rpc, and web, and 1interanal Linux host running ftp. Configuration 45 1 intruder, 1 internal Solaris host running ftp, web, and rpc, and 1 internal Linux host running database. Configuration 46 1 intruder, 1 internal Solaris host running ftp, and 1 internal Linux host running database, rpc, and web. Configuration 47 1 intruder, 1 internal Solaris host running rpc, and 1 internal Linux host running ftp, web, and database. Configuration 48 1 intruder, 1 internal Solaris host running web, and 1 internal Linux host running ftp, rpc, and database. Configuration 49 1 intruder, 1 internal Solaris host running database, and 1 internal Linux host running ftp, web, and rpc. Configuration 50 1 intruder, 1 internal Solaris host running database and rpc, and 1 internal Linux host running ftp and web. Configuration 51 1 intruder, 1 internal Solaris host running database and web, and 1 internal Linux host running ftp and rpc. Configuration 52 1 intruder, 1 internal Solaris host running database and ftp, and 1 internal Linux host running web and rpc. Configuration 53 1 intruder, 1 internal Solaris host running rpc and ftp, and 1 internal Linux host running database and web. Configuration 54 1 intruder, 1 internal Solaris host running web and rpc, and 1 internal Linux host running database and ftp. Configuration 55 1 intruder, 1 internal Solaris host running web and ftp, and 1 internal Linux host running rpc and database. Configuration 56 1 intruder, 1 internal Windows host running database, rpc, and web, and 1 internal Linux host running ftp. Configuration 57 1 intruder, 1 internal Windows host running web, ftp, and database, and 1 internal Linux host running rpc. Configuration 58 1 intruder, 1 internal Windows host running database, ftp, and rpc, and 1 internal Linux host running web. Configuration 59 1 intruder, 1 internal Windows host running ftp, rpc, and web, and 1 internal Linux host running database. Configuration 60 1 intruder, 1 internal Windows host running web, and 1 internal Linux host running database, ftp, and rpc. Configuration 61 1 intruder, 1 internal Windows host running rpc, and 1 internal Linux host running database, web, and ftp. 48

50 Configuration 62 1 intruder, 1 internal Windows host running ftp, and 1 internal Linux host running rpc, web, and database. Configuration 63 1 intruder, 1 internal Windows host running database, and 1 internal Linux host running web, ftp, and rpc. Configuration 64 1 intruder, 1 internal Windows host running database and web, and 1 internal Linux host running ftp and rpc. Configuration 65 1 intruder, 1 internal Windows host running database and rpc, and 1 internal Linux host running ftp and web. Configuration 66 1 intruder, 1 internal Windows host running database and ftp, and 1 internal Linux host running web and rpc. Configuration 67 1 intruder, 1 internal Windows host running ftp and rpc, and 1 internal Linux host running database and web. Configuration 68 1 intruder, 1 internal Windows host running ftp and web, and 1 internal Linux host running database and rpc. Configuration 69 1 intruder, 1 internal Windows host running web and rpc, and 1 internal Linux host running database and ftp. Configuration 70 1 intruder, 1 internal Solaris host running web, 1 internal Linux host running ftp, and 1 internal Windows host running database and rpc. Configuration 71 1 intruder, 1 internal Solaris host running web, 1 internal Linux host running database, and 1 internal Windows host running rpc and ftp. Configuration 72 1 intruder, 1 internal Solaris host running web, 1 internal Linux host running rpc, and 1 internal Windows host running database and ftp. Configuration 73 1 intruder, 1 internal Solaris host running ftp, 1 internal Linux host running database, and 1 internal Windows host running web and rpc. Configuration 74 1 intruder, 1 internal Solaris host running ftp, 1 internal Linux host running rpc, and 1 internal Windows host running web and database. Configuration 75 1 intruder, 1 internal Solaris host running ftp, 1 internal Linux host running web, and 1 internal Windows host running database and rpc. Configuration 76 1 intruder, 1 internal Solaris host running rpc, 1 internal Linux host running web, and 1 internal Windows host running database and ftp. Configuration 77 1 intruder, 1 internal Solaris host running rpc, 1 internal Linux host running ftp, and 1internal Windows host running web and database. Configuration 78 1 intruder, 1 internal Solaris host running rpc, 1 internal Linux host running database, and 1 internal Windows host running ftp and web. Configuration 79 1 intruder, 1 internal Solaris host running database, 1 internal Linux host running ftp, and 1internal Windows host running rpc and web. Configuration 80 1 intruder, 1 internal Solaris host running database, 1 intern al Linux host running web, and 1internal Windows host running ftp and rpc. Configuration 81 1 intruder, 1 internal Solaris host running database, 1internal Linux host running rpc, and 1 internal Windows host running web and ftp. Configuration 82 1 intruder, 1 internal Solaris host running web, 1 internal Windows host running ftp, and 1 internal Linux host running database and rpc. Configuration 83 1 intruder, 1 internal Solaris host running web, 1 internal Windows host running rpc, and 1 internal Linux host running database and ftp. Configuration 84 1 intruder, 1 internal Solaris host running web, 1 internal Windows host running database, and 1 internal Linux host running rpc and ftp. Configuration 85 1 intruder, 1 internal Solaris host running ftp, 1 internal Windows host running rpc, and 1 internal Linux host running web and database. Configuration 86 1 intruder, 1 internal Solaris host running ftp, 1 internal Windows host running web, and 1 internal Linux host running database and rpc. 49

51 Configuration 87 1 intruder, 1 internal Solaris host running ftp, 1 internal Windows host running database, and 1 internal Linux host running web and rpc. Configuration 88 1 intruder, 1 internal Linux host running ftp, 1 internal Windows host running web, and 1 internal Solaris host running rpc and database. Configuration 89 1 intruder, 1 internal Linux host running database, 1 internal Windows host running ftp, and 1 internal Solaris host running web and rpc. Configuration 90 1 intruder, 1 internal Linux host running database, 1 internal Windows host running web, and 1internal Solaris host running rpc and ftp. Configuration 91 1 intruder, 1 internal Linux host running database, 1 internal Windows host running rpc, and 1 internal Solaris host running web and ftp. Configuration 92 1 intruder, 1 internal Linux host running rpc, 1 internal Windows host running web, and 1 internal Solaris host running database and ftp. Configuration 93 1 intruder, 1 internal Linux host running rpc, 1 internal Windows host running ftp, and 1 internal Solaris host running database and web. Configuration 94 1 intruder, 1 internal Linux host running rpc, 1 internal Windows host running database, and 1 internal Solaris host running web and ftp. Configuration 95 1 intruder, 1 internal Linux host running web, 1 internal Windows host running ftp, and 1 internal Solaris host running rpc and database. Configuration 96 1 intruder, 1 internal Linux host running web, 1 internal Windows host running database, and 1internal Solaris host running rpc and ftp. Configuration 97 1 intruder, 1 internal Linux host running web, 1 internal Windows host running rpc, and 1 internal Solaris host running ftp and database. Configuration 98 1 intruder, 1 internal Solaris host running database, 1 internal Windows host running ftp, and 1internal Linux host running rpc and web. Configuration 99 1 intruder, 1 internal Solaris host running database, 1 internal Windows host running rpc, and 1 internal Linux host running ftp and web. Configuration intruder, 1 internal Solaris host running database, 1 internal Windows host running web, and 1 internal Linux host running rpc and ftp. Configuration intruder, 1 internal Solaris host running rpc, 1 internal Windows host running web, and 1 internal Linux host running ftp and database. Configuration intruder, 1 internal Solaris host running rpc, 1 internal Windows host running ftp, and 1internal Linux host running web and database. Configuration intruder, 1 internal Solaris host running rpc, 1 internal Windows host running database, and 1 internal Linux host running ftp and web. Configuration intruder, 1 internal Linux host running ftp, 1 internal Windows host running database, and 1 internal Solaris host running web and rpc. Configuration intruder, 1 internal Linux host running ftp, 1 internal Windows host running rpc, and 1 internal Solaris host running database and web. Firewalled Configurations Intruder can connect to ports 80 and 21. Configuration intruder and 1 internal Solaris host running web, ftp, rpc, and database. Firewall between intruder and internal network. Configuration intruder, 1 internal Solaris host running rpc, and 1 internal Solaris host running web, ftp, and database. 50

52 Configuration intruder, 1 internal Solaris host running ftp, and 1 internal Solaris host running web, rpc, and database. Configuration intruder, 1 internal Solaris host running web, and 1 internal Solaris host running rpc, ftp, and database. Configuration intruder, 1 internal Solaris host running database, and 1 internal Solaris host running web, rpc, and ftp. Configuration intruder, 1 internal Solaris host running database and web, and 1 internal Solaris host running ftp and rpc. Configuration intruder, 1 internal Solaris host running database and rpc, and 1 internal Solaris host running ftp and web. Configuration intruder, 1 internal Solaris host running database and ftp, and 1 internal Solaris host running rpc and web. Configuration intruder, 1 internal Solaris host running database, 1 internal Solaris host running rpc, 1 internal Solaris host running ftp, and 1 internal Solaris host running web. Configuration intruder and 1 internal Linux host running web, ftp, rpc, and database. Firewall between intruder and internal network. Configuration intruder, 1 internal Linux host running rpc, and 1 internal Linux host running web, database, and ftp. Firewall between intruder and internal network. Configuration intruder, 1 internal Linux host running ftp, and 1 internal Linux host running rpc, web, and database. Firewall between intruder and internal network. Configuration intruder, 1 internal Linux host running web, and 1 internal Linux host running rpc, ftp, and database. Firewall between intruder and internal network. Configuration intruder, 1 internal Linux host running database, and 1 internal Linux host running web, rpc, and ftp. Firewall between intruder and internal network. Configuration intruder, 1 internal Linux host running web and database, and 1 internal Linux host running ftp and rpc. Configuration intruder, 1 internal Linux host running rpc and database, and 1 internal Linux host running ftp and web. Configuration intruder, 1 internal Linux host running ftp and database, and 1 internal Linux host running web and rpc. Configuration intruder, 1 internal Linux host running database, 1 internal Linux host running rpc, 1 internal Linux host running ftp, and 1 internal Linux host running web. Configuration intruder and 1 internal Windows host running web, rpc, ftp, and database. Firewall between intruder and internal network. Configuration intruder, 1 internal Windows host running rpc, and 1 internal Windows host running ftp, web, and database. Configuration intruder, 1 internal Windows host running ftp, and 1 internal Windows host running rpc, web, and database. Configuration intruder, 1 internal Windows host running web, and 1 internal Windows host running ftp, rpc, and database. Configuration 128 1intruder, 1 internal Windows host running database, and 1 internal Windows host running rpc, ftp, and web. Configuration intruder, 1 internal Windows host running web and database, and 1 internal Windows host running ftp and rpc. 51

53 Configuration intruder, 1 internal Windows host running rpc and database, and 1 internal Windows host running ftp and web. Configuration intruder, 1 internal Windows host running ftp and database, and 1 internal Windows host running rpc and web. Configuration intruder, 1 internal Windows host running database, 1 internal Windows host running rpc, 1 internal Windows host running ftp, and 1 internal Windows host running web. Configuration intruder, 1 internal Solaris host running web, rpc, and database, and 1 internal Windows host running ftp. Configuration intruder, 1 internal Solaris host running database, ftp, and web, and 1 internal Windows host running rpc. Configuration intruder, 1 internal Solaris host running database, ftp, and rpc, and 1 internal Windows host running web. Configuration intruder, 1 internal Solaris host running web, ftp, and rpc, and 1 internal Windows host running database. Configuration intruder, 1 internal Windows host running database, web, and rpc, and 1 internal Solaris host running ftp. Configuration intruder, 1 internal Windows host running database, ftp, and web, and 1 internal Solaris host running rpc. Configuration intruder, 1 internal Windows host running database, ftp, and rpc, and 1 internal Solaris host running web. Configuration intruder, 1 internal Windows host running web, ftp, and rpc, and 1 internal Solaris host running database. Configuration intruder, 1 internal Windows host running database and ftp, and 1 internal Solaris host running web and rpc. Configuration intruder, 1 internal Windows host running database and web, and 1 internal Solaris host running ftp and rpc. Configuration intruder, 1 internal Windows host running database and rpc, and 1 internal Solaris host running ftp and web. Configuration intruder, 1 internal Solaris host running database and rpc, and 1 internal Windows host running ftp and web. Configuration intruder, 1 internal Solaris host running database and web, and 1 internal Windows host running ftp and rpc. Configuration intruder, 1 internal Solaris host running database and ftp, and 1 internal Windows host running web and rpc. Configuration intruder, 1 internal Solaris host running database, rpc, and ftp, and 1 internal Linux host running web. Firewall between intruder and internal network. Configuration intruder, 1 internal Solaris host running database, ftp, and web, and 1 internal Linux host running rpc. Firewall between intruder and internal network. Configuration intruder, 1 internal Solaris host running database, rpc, and web, and 1interanal Linux host running ftp. Firewall between intruder and internal network. Configuration intruder, 1 internal Solaris host running ftp, web, and rpc, and 1 internal Linux host running database. Firewall between intruder and internal network. Configuration intruder, 1 internal Solaris host running ftp, and 1 internal Linux host running database, rpc, and web. Firewall between intruder and internal network. 52

54 Configuration intruder, 1 internal Solaris host running rpc, and 1 internal Linux host running ftp, web, and database. Firewall between intruder and internal network. Configuration intruder, 1 internal Solaris host running web, and 1 internal Linux host running ftp, rpc, and database. Firewall between intruder and internal network. Configuration intruder, 1 internal Solaris host running database, and 1 internal Linux host running ftp, web, and rpc. Firewall between intruder and internal network. Configuration intruder, 1 internal Solaris host running database and rpc, and 1 internal Linux host running ftp and web. Configuration intruder, 1 internal Solaris host running database and web, and 1 internal Linux host running ftp and rpc. Configuration intruder, 1 internal Solaris host running database and ftp, and 1 internal Linux host running web and rpc. Configuration intruder, 1 internal Solaris host running rpc and ftp, and 1 internal Linux host running database and web. Configuration intruder, 1 internal Solaris host running web and rpc, and 1 internal Linux host running database and ftp. Configuration intruder, 1 internal Solaris host running web and ftp, and 1 internal Linux host running rpc and database. Configuration intruder, 1 internal Windows host running database, rpc, and web, and 1 internal Linux host running ftp. Configuration intruder, 1 internal Windows host running web, ftp, and database, and 1 internal Linux host running rpc. Configuration intruder, 1 internal Windows host running database, ftp, and rpc, and 1 internal Linux host running web. Configuration intruder, 1 internal Windows host running ftp, rpc, and web, and 1 internal Linux host running database. Configuration intruder, 1 internal Windows host running web, and 1 internal Linux host running database, ftp, and rpc. Configuration intruder, 1 internal Windows host running rpc, and 1 internal Linux host running database, web, and ftp. Configuration intruder, 1 internal Windows host running ftp, and 1 internal Linux host running rpc, web, and database. Configuration intruder, 1 internal Windows host running database, and 1 internal Linux host running web, ftp, and rpc. Configuration intruder, 1 internal Windows host running database and web, and 1 internal Linux host running ftp and rpc. Configuration intruder, 1 internal Windows host running database and rpc, and 1 internal Linux host running ftp and web. Configuration intruder, 1 internal Windows host running database and ftp, and 1 internal Linux host running web and rpc. Configuration intruder, 1 internal Windows host running ftp and rpc, and 1 internal Linux host running database and web. Configuration intruder, 1 internal Windows host running ftp and web, and 1 internal Linux host running database and rpc. 53

55 Configuration intruder, 1 internal Windows host running web and rpc, and 1 internal Linux host running database and ftp. Configuration intruder, 1 internal Solaris host running web, 1 internal Linux host running ftp, and 1 internal Windows host running database and rpc. Configuration intruder, 1 internal Solaris host running web, 1 internal Linux host running database, and 1 internal Windows host running rpc and ftp. Configuration intruder, 1 internal Solaris host running web, 1 internal Linux host running rpc, and 1 internal Windows host running database and ftp. Configuration intruder, 1 internal Solaris host running ftp, 1 internal Linux host running database, and 1 internal Windows host running web and rpc. Configuration intruder, 1 internal Solaris host running ftp, 1 internal Linux host running rpc, and 1 internal Windows host running web and database. Configuration intruder, 1 internal Solaris host running ftp, 1 internal Linux host running web, and 1 internal Windows host running database and rpc. Configuration intruder, 1 internal Solaris host running rpc, 1 internal Linux host running web, and 1 internal Windows host running database and ftp. Configuration intruder, 1 internal Solaris host running rpc, 1 internal Linux host running ftp, and 1internal Windows host running web and database. Configuration intruder, 1 internal Solaris host running rpc, 1 internal Linux host running database, and 1 internal Windows host running ftp and web. Configuration intruder, 1 internal Solaris host running database, 1 internal Linux host running ftp, and 1internal Windows host running rpc and web. Configuration intruder, 1 internal Solaris host running database, 1 intern al Linux host running web, and 1internal Windows host running ftp and rpc. Configuration intruder, 1 internal Solaris host running database, 1internal Linux host running rpc, and 1 internal Windows host running web and ftp. Configuration intruder, 1 internal Solaris host running web, 1 internal Windows host running ftp, and 1 internal Linux host running database and rpc. Configuration intruder, 1 internal Solaris host running web, 1 internal Windows host running rpc, and 1 internal Linux host running database and ftp. Configuration intruder, 1 internal Solaris host running web, 1 internal Windows host running database, and 1 internal Linux host running rpc and ftp. Configuration intruder, 1 internal Solaris host running ftp, 1 internal Windows host running rpc, and 1 internal Linux host running web and database. Configuration intruder, 1 internal Solaris host running ftp, 1 internal Windows host running web, and 1 internal Linux host running database and rpc. Configuration intruder, 1 internal Solaris host running ftp, 1 internal Windows host running database, and 1 internal Linux host running web and rpc. Configuration intruder, 1 internal Linux host running ftp, 1 internal Windows host running web, and 1 internal Solaris host running rpc and database. Configuration intruder, 1 internal Linux host running database, 1 internal Windows host running ftp, and 1 internal Solaris host running web and rpc. Configuration intruder, 1 internal Linux host running database, 1 internal Windows host running web, and 1internal Solaris host running rpc and ftp. 54

56 Configuration intruder, 1 internal Linux host running database, 1 internal Windows host running rpc, and 1 internal Solaris host running web and ftp. Configuration intruder, 1 internal Linux host running rpc, 1 internal Windows host running web, and 1 internal Solaris host running database and ftp. Configuration intruder, 1 internal Linux host running rpc, 1 internal Windows host running ftp, and 1 internal Solaris host running database and web. Configuration intruder, 1 internal Linux host running rpc, 1 internal Windows host running database, and 1 internal Solaris host running web and ftp. Configuration intruder, 1 internal Linux host running web, 1 internal Windows host running ftp, and 1 internal Solaris host running rpc and database. Configuration intruder, 1 internal Linux host running web, 1 internal Windows host running database, and 1internal Solaris host running rpc and ftp. Configuration intruder, 1 internal Linux host running web, 1 internal Windows host running rpc, and 1 internal Solaris host running ftp and database. Configuration intruder, 1 internal Solaris host running database, 1 internal Windows host running ftp, and 1internal Linux host running rpc and web. Configuration intruder, 1 internal Solaris host running database, 1 internal Windows host running rpc, and 1 internal Linux host running ftp and web. Configuration intruder, 1 internal Solaris host running database, 1 internal Windows host running web, and 1 internal Linux host running rpc and ftp. Configuration intruder, 1 internal Solaris host running rpc, 1 internal Windows host running web, and 1 internal Linux host running ftp and database. Configuration intruder, 1 internal Solaris host running rpc, 1 internal Windows host running ftp, and 1internal Linux host running web and database. Configuration intruder, 1 internal Solaris host running rpc, 1 internal Windows host running database, and 1 internal Linux host running ftp and web. Configuration intruder, 1 internal Linux host running ftp, 1 internal Windows host running database, and 1 internal Solaris host running web and rpc. Configuration intruder, 1 internal Linux host running ftp, 1 internal Windows host running rpc, and 1 internal Solaris host running database and web. DMZ Configurations Intruder can only connect to ports 80 on host in DMZ. Configuration intruder, 1 DMZ Solaris host running web, and 1 internal Solaris host running database, ftp, and rpc. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running database and ftp, and 1 internal Solaris host running rpc. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running database and rpc, and 1 internal Solaris host running ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running database, and 1 internal Solaris host running rpc and ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running database, 1 internal Solaris host running ftp, and 1 internal Solaris host running rpc. Configuration intruder, 1 DMZ Linux host running web, and 1 internal Linux host running database, ftp, and rpc. Configuration intruder, 1 DMZ Linux host running web, 1 internal Linux host running database and ftp, and 1 internal Linux host running rpc. 55

57 Configuration intruder, 1 DMZ Linux host running web, 1 internal Linux host running database and rpc, and 1 internal Linux host running ftp. Configuration intruder, 1 DMZ Linux host running web, 1 internal Linux host running database, and 1 internal Linux host running rpc and ftp. Configuration intruder, 1 DMZ Linux host running web, 1 internal Linux host running database, 1 internal Linux host running ftp, and 1 internal Linux host running rpc. Configuration intruder, 1 DMZ Windows host running web, and 1 internal Windows host running database, ftp, and rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running database and ftp, and 1 internal Windows host running rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running database and rpc, and 1 internal Windows host running ftp. Configuration intruder, 1DMZ Windows host running web, 1 internal Windows host running database, and 1 internal Windows host running rpc and ftp. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running database, 1internal Windows host running ftp, and 1 internal Windows host running rpc. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running database and rpc, and 1 internal Windows host running ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running database and ftp, and 1internal Windows host running rpc. Configuration intruder, 1 DMZ Windows host running web, and 1 internal Solaris host running database, ftp, and rpc. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running ftp and rpc, and 1 internal Windows host running database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running database and rpc, and 1 internal Solaris host running ftp. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running database and ftp, and 1 internal Solaris host running rpc. Configuration intruder, 1 DMZ Solaris host running web, and 1 internal Windows host running ftp, rpc, and database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running ftp and rpc, and 1 internal Solaris host running database. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Windows host running database and ftp, and 1internal Solaris host running rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running database, and 1 internal Solaris host running ftp and rpc. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Windows host running database and rpc, and 1 internal Solaris host running ftp. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running database and rpc, and 1 internal Windows host running ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running database, and 1 internal Windows host running ftp and rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running rpc, and 1 internal Solaris host running database and ftp. Configuration intruder, 1 DMZ Linux host running web and 1 internal Solaris host running ftp, rpc, and database. 56

58 Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running ftp and database, and 1 internal Linux host running rpc. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running database and rpc, and 1 internal Linux host running ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running ftp and rpc, and 1internal Linux host running database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running ftp, and 1 internal Linux host running database and rpc. Configuration intruder 1 DMZ Linux host running web, 1 internal Solaris host running rpc, and 1 internal Linux host running ftp and database. Configuration intruder, 1 DMZ Solaris host running web, and 1 internal Linux host running ftp, rpc, and database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running database, and 1 internal Linux host running ftp and rpc. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running database and rpc, and 1 internal Linux host running ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running database, and 1internal Linux host running ftp and rpc. Configuration intruder, 1 DMZ Linux host running web, 1 internal Linux host running rpc, and 1 internal Solaris host running database and ftp. Configuration 251 I intruder, 1 DMZ Linux host running web, 1 internal Linux host running database, and 1 internal Solaris host running rpc and ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running rpc, and 1 internal Linux host running ftp and database. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Solaris host running ftp, and 1 internal Linux host running database and rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running database and rpc, and 1internal Linux host running ftp. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running ftp and database, and 1 internal Linux host running rpc. Configuration intruder, 1 DMZ Linux host running web, and 1 internal Windows host running ftp, rpc, and database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running ftp and rpc, and 1 internal Linux host running database. Configuration intruder, 1 DMZ Windows host running web, and 1 internal Linux host running ftp, rpc, and database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Windows host running rpc, and 1 internal Linux host running database and ftp. Configuration intruder, 1 DMZ Linux host running web, 1 internal Windows host running ftp, and 1 internal Linux host running rpc and database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Windows host running database, and 1 internal Linux host running ftp and rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running database, and 1 internal Linux host running ftp and rpc. Configuration intruder, 1 DMZ Linux host running web, 1 internal Linux host running ftp, and1 internal Windows host running database and rpc. 57

59 Configuration intruder, 1 DMZ Linux host running web, 1 internal Linux host running rpc, and 1 internal Windows host running database and ftp. Configuration intruder, 1 DMZ Linux host running web, 1 internal Linux host running database, and 1 internal Windows host running ftp and rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running ftp, and 1 internal Linux host running rpc and database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Windows host running rpc, and 1 internal Linux host running ftp and database. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Linux host running ftp, and 1 internal Windows host running rpc and database. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Linux host running database, and 1 internal Windows host running rpc and ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Linux host running rpc, and 1 internal Windows host running ftp and database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running ftp, 1 internal Linux host running database, and 1 internal Windows host running rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running ftp, 1 internal Linux host running rpc, and 1 internal Windows host running database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running ftp, and 1 internal Windows host running rpc and database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running rpc, and 1 internal Windows host running ftp and database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running rpc, and 1 internal Windows host running ftp and database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running rpc, 1 internal Linux host running ftp, and 1 internal Windows host running database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running rpc, 1 internal Linux host running database, and 1 internal Windows host running ftp. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running database, 1 internal Linux host running ftp, and 1 internal Windows host running rpc. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running database, and 1 internal Windows host running ftp and rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running database, 1 internal Linux host running rpc, and 1 internal Windows host running ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Windows host running ftp, and 1 internal Linux host running rpc and database. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Windows host running rpc, and 1 internal Linux host running ftp and database. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Windows host running database, and 1 internal Linux host running rpc and ftp. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running ftp, 1 internal Windows host running rpc, and 1 internal Linux host running database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running ftp, and 1 internal Linux host running rpc and database. 58

60 Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running ftp, 1 internal Windows host running database, and 1 internal Linux host running rpc. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running database, 1 internal Windows host running ftp, and 1 internal Linux host running rpc. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running database, 1 internal Windows host running rpc, and 1 internal Linux host running ftp. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running database, and 1 internal Linux host running ftp and database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Solaris host running rpc, and 1 internal Linux host running ftp and database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running rpc, 1 internal Windows host running ftp, and 1 internal Linux host running database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Solaris host running rpc, 1 internal Windows host running database, and 1 internal Linux host running ftp. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Linux host running ftp, 1 internal Windows host running database, and 1 internal Solaris host running rpc. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Linux host running ftp, 1 internal Windows host running rpc, and 1 internal Solaris host running database. Configuration intruder, 1 DMZ Windows host running web, 1 internal Linux host running ftp, and 1 internal Solaris host running rpc and database. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Linux host running database, 1 internal Windows host running ftp, and 1 internal Solaris host running rpc. Configuration intruder, 1 DMZ Windows host running web, 1 internal Linux host running database, and 1 internal Solaris host running ftp and rpc. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Linux host running database, 1 internal Windows host running rpc, and 1 internal Solaris host running ftp. Configuration intruder, 1 DMZ Windows host running web, 1 internal Linux host running rpc, and 1 internal Solaris host running ftp and database. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Linux host running rpc, 1 internal Windows host running ftp, and 1 internal Solaris host running database. Configuration intruder, 1 DMZ Solaris host running web, 1 internal Linux host running rpc, 1 internal Windows host running database, and 1internal Solaris host running ftp. Configuration intruder, 1 DMZ Linux host running web, 1 internal Windows host running ftp, and 1 internal Solaris host running rpc and database. Configuration intruder, 1 DMZ Linux host running web, 1 internal Windows host running database, and 1 internal Solaris host running ftp and rpc. Configuration intruder, 1 DMZ Linux host running web, 1 internal Windows host running rpc, and 1 internal Solaris host running ftp and database. 59

61 Appendix D: Sample Nessus Scan Result IP addresses and any other information that could potentially identify this host have been removed. dec_dlm (625/tcp) NOTE Port is open; afpovertcp (548/tcp) NOTE Port is open; afpovertcp (548/tcp) NOTE Synopsis :;;File sharing service is available.;;description :;;The remote host is running an AppleShare IP file service.;by sending DSIGetStatus request, it was;possible to disclose information about the remote host.;;risk Factor :;;None / CVSS Base : 0 ;(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N);;Plugin output :;;This host is running an AppleShare File Services over IP.; Machine type: Macintosh; surf (1010/tcp) NOTE Port is open; surf (1010/tcp) NOTE RPC program version 1 'status' is running on this port;; vnc (5900/tcp) NOTE Port is open; vnc (5900/tcp) NOTE The remote VNC server supports those security types:;+ 30;; netbios-ssn (139/tcp) NOTE Port is open; netbios-ssn (139/tcp) NOTE An SMB server is running on this port; sunrpc (111/tcp) NOTE Port is open; sunrpc (111/tcp) NOTE The RPC portmapper is running on this port.;;an attacker may use it to enumerate your list;of RPC services. We recommend you filter traffic;going to this port.;;risk Factor : Low;CVE : CVE , CVE , CVE , CVE ;BID : 205, 205; sunrpc (111/tcp) NOTE RPC program version 2 'portmapper' (portmap sunrpc rpcbind) is running on this port;; nfs (2049/tcp) NOTE Port is open; nfs (2049/tcp) NOTE RPC program version 2 'nfs' (nfsprog) is running on this port;rpc program version 3 'nfs' (nfsprog) is running on this port;; ssh (22/tcp) NOTE Port is open; ssh (22/tcp) NOTE An ssh server is running on this port; 60

62 ssh (22/tcp) NOTE Remote SSH version : SSH-2.0-OpenSSH_3.8.1p1;;Remote SSH supported authentication ssh (22/tcp) NOTE The remote SSH daemon supports the following versions of the;ssh protocol :;;. 1.99;. 2.0;;;SSHv2 svrloc (427/tcp) NOTE Port is open; svrloc (427/tcp) NOTE Synopsis :;;The remote server supports the Service Location Protocol. ;;Description :;;The remote server understands Service Location Protocol (SLP), a;protocol that allows network applications to discover the existence,;location, and configuration of various services in an enterprise;network environment. A server that understands SLP can either be a;service agent (SA), which knows the location of various services, or a;directory agent (DA), which acts as a central repository for service;location information. ;;See Also :;; incoming traffic to this port if desired. ;;Risk Factor :;;None;;Plugin output :;;An SLP Service Agent is listening on this port.; microsoft-ds (445/tcp) NOTE Port is open; microsoft-ds (445/tcp) NOTE A CIFS server is running on this port; microsoft-ds (445/tcp) NOTE Synopsis :;;It is possible to obtain information about the remote operating;system.;;description :;;It is possible to get the remote operating system name and;version (Windows and/or Samba) by sending an authentication;request.;;risk Factor :;;None;;Plugin output :;;The remote Operating System is : Unix;The remote native lan manager is : Samba ; microsoft-ds (445/tcp) NOTE Synopsis :;;An SMB server is running on the remote host.;;description :;;The remote host is running a SAMBA server, a CIFS/SMB;server for Unix.;;See Also :;; Factor :;;None; microsoft-ds (445/tcp) HOLE Synopsis :;;It is possible to execute code on the remote host through samba.;;description :;;The version of the Samba server installed on the remote host is affected;by multiple heap overflow vulnerabilities, which can be exploited remotely;to execute code with the privileges of the samba daemon.;;see Also :;; to Samba version or later. ;;Risk Factor :;;Critical / CVSS Base : 10.0;(AV:R/AC:L/Au:NR/C:C/I:C/A:C/B:N);CVE : CVE ;BID : 23973, 24195, 24196, 24197, 24198;Other references : OSVDB:34732; microsoft-ds (445/tcp) NOTE Synopsis :;;It is possible to logon on the remote host.;;description :;;The remote host is running one of the Microsoft Windows operating;system. It was possible to logon 61

63 using one of the following;account :;;- NULL session;- Guest account;- Given Credentials;;See Also :;; articles/q246/2/61.asp;;risk Factor :;;none;;plugin output :;;- NULL sessions are enabled on the remote host;;cve : CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE ;BID : 494, 990, 11199, 494, 990, 11199; microsoft-ds (445/tcp) NOTE Synopsis :;;It is possible to obtain network information.;;description :;;It was possible to obtain the browse list of the remote;windows system by send a request to the LANMAN pipe.;the browse list is the list of the nearest Windows systems;of the remote host. ;;Risk Factor :;;None microsoft-ds (445/tcp) NOTE Synopsis :;;It is possible to retrieve password policy using the supplied credentials.;;description :;;Using the supplied credentials it was possible to extract the password;policy.;password policy must be conform to the Informationnal System Policy.;;Risk Factor :;;None / CVSS Base : 0 ;(AV:L/AC:H/Au:R/C:N/A:N/I:N/B:N);;Plugin output :;;The following password policy is defined on the remote host:;maximum password age (d): 0;Password must meet complexity requirements: Enabled;Minimum password age (d): 0;Forced logoff time (s): Not set;locked account time (s): 1800;Time between failed logon (s): 1800;Number of invalid logon before locked out (s): 0;; microsoft-ds (445/tcp) INFO Synopsis :;;It is possible to enumerate remote network shares.;;description :;;By connecting to the remote host using a NULL (or guest) session;nessus was able to enumerates the network share names.;;risk Factor :;;None;;Plugin output :;; microsoft-ds (445/tcp) NOTE Synopsis :;;It is possible to obtain remote host SID.;;Description :;;By emulating the call to LsaQueryInformationPolicy() it was;possible to obtain the host SID (Security Identifier).;;The host SID can then be used to get the list of local users.;;risk Factor : ;;None;;Plugin output ;CVE : CVE ;BID : 959; asip-webadmin (311/tcp) NOTE Port is open; asip-webadmin (311/tcp) NOTE A SSLv2 server answered on this port;; asip-webadmin (311/tcp) NOTE A web server is running on this port through SSL; asip-webadmin (311/tcp) NOTE Synopsis :;;The remote service supports the use of weak SSL ciphers.;;description :;;The remote host supports the use of SSL ciphers that;offer either weak encryption or no encryption at all.;;see Also :;; the affected application if possible to avoid use of ;weak ciphers.;;risk Factor : ;;Low / CVSS Base 62

64 : 2 ;(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N);;Plugin output :;;Here is a list of the SSL ciphers supported by the remote server :;; Export Ciphers; SSLv2; EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export ; EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export ; TLSv1; EXP1024-DES-CBC-SHA Kx=RSA(1024) Au=RSA Enc=DES(56) Mac=SHA1 export ; EXP1024-RC2-CBC-MD5 Kx=RSA(1024) Au=RSA Enc=RC2(56) Mac=MD5 export ; EXP1024-RC4-MD5 Kx=RSA(1024) Au=RSA Enc=RC4(56) Mac=MD5 export ; EXP1024-RC4-SHA Kx=RSA(1024) Au=RSA Enc=RC4(56) Mac=SHA1 export ;; Low Strength Ciphers (excluding export, < 128-bit key); SSLv2; DES-CBC-MD5 Kx=RSA Au=RSA Enc=DES(56) Mac=MD5 ; RC4-64-MD5 Kx=RSA Au=RSA Enc=RC4(64) Mac=MD5 ; SSLv3; DES-CBC- SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1 ; TLSv1; DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1 ;; Medium Strength Ciphers (128-bit key); SSLv2; RC2-CBC-MD5 Kx=RSA Au=RSA Enc=RC2(128) Mac=MD5 ; RC4- MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 ; SSLv3; RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 ; RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 ; TLSv1; RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 ; RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 ;; High Strength Ciphers (> 128-bit key); SSLv2; DES-CBC3-MD5 Kx=RSA Au=RSA Enc=3DES(168) Mac=MD5 ; SSLv3; DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1 ; TLSv1; DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1 ; AES128-SHA Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1 ; AES256-SHA Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 ;;The fields above are :;; {OpenSSL ciphername}; Kx={key exchange}; Au={authentication}; Enc={symmetric encryption method}; Mac={message authentication code}; {export flag};; asip-webadmin (311/tcp) INFO The SSL certificate of the remote service expired asip-webadmin (311/tcp) NOTE Synopsis :;;The remote service encrypts traffic using a protocol with known;weaknesses. ;;Description :;;The remote service accepts connections encrypted using SSL 2.0, which;reportedly suffers from several cryptographic flaws and has been;deprecated for several years. An attacker may be able to exploit these;issues to conduct man-in-the-middle attacks or decrypt communications;between the affected service and clients. ;;See Also :;; ;;Consult the application's documentation to disable SSL 2.0 and use SSL;3.0 or TLS 1.0 instead.;;risk Factor : ;;Low / CVSS Base : 2 ;(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N); tftp (69/udp) NOTE Synopsis :;;A TFTPD server is listening on the remote port.;;description :;;The remote host is running a TFTPD (Trivial File Transfer Protocol).;TFTPD is often used by routers and 63

65 diskless hosts to retrieve their;configuration. It is also used by worms to propagage.;;solution: ;;If you do not use this service, you should disable it.;;risk Factor :;;None;CVE : CVE , CVE ; general/tcp NOTE Synopsis :;;The remote service implements TCP timestamps.;;description :;;The remote host implements TCP timestamps, as defined by RFC1323.;A side effect of this feature is that the uptime of the remote ;host can be sometimes be computed.;;see Also :;; Factor : ;;None; general/tcp NOTE Synopsis :;;The physical network is set up in a potentially insecure way.;;description :;;The remote host is on a different logical network. However, it is;on the same physical subnet.;;an attacker connecting from the same network as your Nessus;scanner is on could reconfigure his system to force it;to belong to the subnet of the remote host.;;this makes any filtering between the two subnets useless.;;solution: ;;Use VLANs to separate different logical networks.;;risk Factor : ;;Low;Plugin output :; general/tcp NOTE The remote host is running Mac OS X ; general/tcp NOTE Information about this scan : ;;Nessus version : 3.0.5;Plugin feed version : ;Type of plugin feed : Registered (7 days delay);scanner IP :;Port scanner(s) : synscan ;Port range : default;thorough tests : no;experimental tests : no;paranoia level : 1;Report Verbosity : 1;Safe checks : yes;max hosts : 20;Max checks : 4;Scan Start Date : 2007/6/28 14:21;Scan duration : 448 sec;; unknown (7938/tcp) NOTE Synopsis :;;A backup software is running on this port.;;description :;;The remote host is running EMC Legato Networker backup software or one;of these derivates :;; - Sun StorEdge Enterprise Backup Software; - Sun Solstice Backup Software;;;Solution:;;If this service is not needed, disable it or filter incoming traffic;to this port.;;risk Factor : ;;None; unknown (7938/tcp) HOLE Synopsis :;;Arbitrary code can be executed on the remote host.;;description :;;The remote host is running one of the following product :;; - Legato Networker; - Sun StorEdge Enterprise Backup Software; - Sun Solstice Backup Software;;The remote version of this software is vulnerable to denial of service,;unauthorized access and remote command execution vulnerabilities.;;solution:;; 7x.htm; Factor :;;Critical / CVSS Base : 10 ;(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N);CVE : CVE , CVE , CVE , CVE , CVE , CVE ;BID : 14582, 14582; 64

66 unknown (1007/tcp) NOTE RPC program version 1 'mountd' (mount showmount) is running on this port;rpc program version 3 'mountd' (mount showmount) is running on this port;; unknown (1009/tcp) NOTE RPC program version 0 'nlockmgr' is running on this port;rpc program version 1 'nlockmgr' is running on this port;rpc program version 3 'nlockmgr' is running on this port;rpc program version 4 'nlockmgr' is running on this port;; unknown (7937/tcp) NOTE RPC program version 1 'nsrexec' (nsrexecd NetWorker client execution service) is running on this port;; sunrpc (111/udp) NOTE RPC program version 2 'portmapper' (portmap sunrpc rpcbind) is running on this port;; ftps-data (989/udp) NOTE RPC program version 1 'mountd' (mount showmount) is running on this port;rpc program version 3 'mountd' (mount showmount) is running on this port;; ufsd (1008/udp) NOTE RPC program version 0 'nlockmgr' is running on this port;rpc program version 1 'nlockmgr' is running on this port;rpc program version 3 'nlockmgr' is running on this port;rpc program version 4 'nlockmgr' is running on this port;; unknown (1019/udp) NOTE RPC program version 1 'status' is running on this port;; nfs (2049/udp) NOTE RPC program version 2 'nfs' (nfsprog) is running on this port;rpc program version 3 'nfs' (nfsprog) is running on this port;; ntp (123/udp) NOTE It is possible to determine a lot of information about the remote host ;by querying the NTP (Network Time Protocol) variables - these include ;OS descriptor, and time settings.;;it was possible to gather the following information from the remote NTP: processor='power Macintosh', system='darwin8.6.0', leap=3, stratum=16,;precision=-18, rootdelay=0.000, peer=0,;refid= , reftime=0x , poll=4, state=0, offset=0.000, frequency=0.000,;jitter=0.004, stability=0.000;;;;quickfix: Set NTP to restrict default access to ignore all info packets:; restrict default ignore;;risk Factor : Low; 65

67 Appendix E: Configuration Data Table E.1. Network Configuration Results Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility BASE CONFIGURATIONS

68 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

69 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

70 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

71 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility FIREWALLED CONFIGURATIONS

72 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

73 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

74 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

75 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility DMZ CONFIGURATIONS

76 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

77 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

78 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

79 Configuration hosts Vulnerable Hosts Operating Systems attack paths Network paths V Dimension E Dimension A Dimension VEAbility

VEA-bility Security Metric: A Network Security Analysis Tool

VEA-bility Security Metric: A Network Security Analysis Tool VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose

More information

Attack Graph Techniques

Attack Graph Techniques Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

NETWORK PENETRATION TESTING

NETWORK PENETRATION TESTING Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

A Review on Zero Day Attack Safety Using Different Scenarios

A Review on Zero Day Attack Safety Using Different Scenarios Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system

More information

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Black Box Penetration Testing For GPEN.KM V1.0 Month dd #$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;! Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:

More information

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20

More information

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Security Analysis Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced

More information

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta. Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Vulnerability Assessment Report Format Data Model

Vulnerability Assessment Report Format Data Model I3E'2005 Vulnerability Assessment Report Format Data Model Dr.D.Polemi G.Valvis Issues Attack paradigm Vulnerability exploit life cycle Vulnerability assessment process Challenges in vulnerability assessment

More information

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the

More information

Running head: USING NESSUS AND NMAP TOOLS 1

Running head: USING NESSUS AND NMAP TOOLS 1 Running head: USING NESSUS AND NMAP TOOLS 1 Nessus and Nmap Overview - Scanning Networks Research Paper On Nessus and Nmap Mike Pergande Ethical Hacking North Iowa Area Community College Running head:

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

An Introduction to Network Vulnerability Testing

An Introduction to Network Vulnerability Testing CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning

More information

Metrics Suite for Enterprise-Level Attack Graph Analysis

Metrics Suite for Enterprise-Level Attack Graph Analysis Metrics Suite for Enterprise-Level Attack Graph Analysis Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Sushil Jajodia (PI), Steven Noel (co-pi) Metrics Suite for Enterprise-Level

More information

IBM Managed Security Services Vulnerability Scanning:

IBM Managed Security Services Vulnerability Scanning: IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2

More information

ICTN 4040. Enterprise Database Security Issues and Solutions

ICTN 4040. Enterprise Database Security Issues and Solutions Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Course Title: Penetration Testing: Network & Perimeter Testing

Course Title: Penetration Testing: Network & Perimeter Testing Course Title: Penetration Testing: Network & Perimeter Testing Page 1 of 7 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

Running a Default Vulnerability Scan SAINTcorporation.com

Running a Default Vulnerability Scan SAINTcorporation.com SAINT Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Install SAINT Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s

More information

Guideline on Vulnerability and Patch Management

Guideline on Vulnerability and Patch Management CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved

More information

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates

More information

THE ROLE OF IDS & ADS IN NETWORK SECURITY

THE ROLE OF IDS & ADS IN NETWORK SECURITY THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

Understanding Security Testing

Understanding Security Testing Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many

More information

How To Protect Your Network From Attack From Outside From Inside And Outside

How To Protect Your Network From Attack From Outside From Inside And Outside IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

AN OVERVIEW OF VULNERABILITY SCANNERS

AN OVERVIEW OF VULNERABILITY SCANNERS AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole

More information

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION copyright 2003 securitymetrics Security Vulnerabilities of Computers & Servers Security Risks Change Daily New

More information

6. Exercise: Writing Security Advisories

6. Exercise: Writing Security Advisories CERT Exercises Toolset 49 49 6. Exercise: Writing Security Advisories Main Objective Targeted Audience Total Duration Time Schedule Frequency The objective of the exercise is to provide a practical overview

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat. 1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers

More information

USM IT Security Council Guide for Security Event Logging. Version 1.1

USM IT Security Council Guide for Security Event Logging. Version 1.1 USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE: PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration

More information

WHITE PAPER. An Introduction to Network- Vulnerability Testing

WHITE PAPER. An Introduction to Network- Vulnerability Testing An Introduction to Network- Vulnerability Testing C ONTENTS + Introduction 3 + Penetration-Testing Overview 3 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and

More information

Overview. Firewall Security. Perimeter Security Devices. Routers

Overview. Firewall Security. Perimeter Security Devices. Routers Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security

More information

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor

More information

DoS: Attack and Defense

DoS: Attack and Defense DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

TIME TO LIVE ON THE NETWORK

TIME TO LIVE ON THE NETWORK TIME TO LIVE ON THE NETWORK Executive Summary This experiment tests to see how well commonly used computer platforms withstand Internet attacks in the wild. The experiment quantifies the amount of time

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2 Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning

More information

FIREWALL POLICY November 2006 TNS POL - 008

FIREWALL POLICY November 2006 TNS POL - 008 FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and

More information

Running a Default Vulnerability Scan

Running a Default Vulnerability Scan Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s integrated vulnerability

More information

Taxonomic Modeling of Security Threats in Software Defined Networking

Taxonomic Modeling of Security Threats in Software Defined Networking Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.

More information

locuz.com Professional Services Security Audit Services

locuz.com Professional Services Security Audit Services locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.

More information

SCP - Strategic Infrastructure Security

SCP - Strategic Infrastructure Security SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives

Information Security and Continuity Management Information Sharing Portal. Category: Risk Management Initiatives Information Security and Continuity Management Information Sharing Portal Category: Risk Management Initiatives Contact: Chip Moore, CISO State of North Carolina Office of Information Technology Services

More information

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed

More information

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference... NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.

Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning. Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Network

More information

NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs

NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs Anoop Singhal Ximming Ou NIST Interagency Report 7788 Security Risk Analysis of Enterprise Networks

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Cyber Essentials. Test Specification

Cyber Essentials. Test Specification Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8

More information

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network. Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Building Secure Networks for the Industrial World

Building Secure Networks for the Industrial World Building Secure Networks for the Industrial World Anders Felling Vice President, International Sales Westermo Group Managing Director Westermo Data Communication AB 1 Westermo What do we do? Robust data

More information

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965

More information

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

IntruPro TM IPS. Inline Intrusion Prevention. White Paper IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert

More information

DMZ Gateways: Secret Weapons for Data Security

DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

PCI Security Scan Procedures. Version 1.0 December 2004

PCI Security Scan Procedures. Version 1.0 December 2004 PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting

More information

For more information email [email protected] or call 703.749.7723

For more information email sales@patchadvisor.com or call 703.749.7723 Vulnerability Assessment Methodology Today s networks are typically comprised of a variety of components from many vendors. This adds to the difficulties faced by the system administration staff, as they

More information