ICS/SCADA Security Analysis of a Beckhoff CX5020 PLC
|
|
|
- Emory Morgan
- 10 years ago
- Views:
Transcription
1 ICS/SCADA Security Analysis of a Beckhoff CX5020 PLC Gregor Bonney, Hans Höfken, Benedikt Paffen and Marko Schuba FH Aachen, University of Applied Sciences, Eupenerstr. 70, Aachen, Germany {bonney, hoefken, paffen, schuba}@fh-aachen.de Keywords: Abstract: ICS, SCADA, security, vulnerability, Beckhoff, CX5020, PLC A secure and reliable critical infrastructure is a concern of industry and governments. SCADA systems (Supervisory Control and Data Acquisition) are a subgroup of ICS (Industrial Control Systems) and known to be well interconnected with other networks. It is not uncommon to use public networks as transport route but a rising number of incidents of industrial control systems shows the danger of excessive crosslinking. Beckhoff Automation GmbH is a German automation manufacturer that did not have bad press so far. The Beckhoff CX5020 is a typical PLC (Programmable Logic Controller) that is used in today s SCADA systems. It is cross-linked through Ethernet and running a customized Windows CE 6.0, therefore the CX5020 is a good representative for modern PLCs which have emerged within the last years that use de facto standard operation systems and open standard communication protocols. This paper presents vulnerabilities of Beckhoff s CX5020 PLC and shows ways to achieve rights to control the PLC program and the operation system itself. These vulnerabilities do not need in-depth knowledge of penetration testing, they demonstrate that switching to standard platforms brings hidden features and encapsulating SCADA protocols into TCP/IP might not always be a good idea underlining that securing ICS systems is still a challenging topic. 1 INTRODUCTION Computers in automation technology are used to regulate industrial processes such as chemical production processes or assembly lines in the automobile industry. In the early years, computer control of automation systems was done in a local context only, i.e., with no connection to a corporate network or the Internet (European Network and Information Security Agency 2011b:1). In the past decade, however, the growing availability of the Internet, the globalization, and the growing number of decentralized companies led to ICSs (Industrial Control Systems) that had to be network- and Internet-enabled (European Network and Information Security Agency 2011c:14). From a business perspective this results in automation processes that are easier and thus cheaper to manage. An essential part of ICS are SCADA systems (Supervisory Control and Data Acquisition) which are responsible for centrally collecting process relevant information and based on the analysis of this data send control instructions to the production systems (European Network and Information Security Agency 2011c:6). To this end, the SCADA systems need to be connected to various parts of the ICS, for example, to PLCs (Programmable Logic Controllers), which control the individual actuators or sensors in the machinery. Interconnection between central SCADA machines and PLCs is more and more based on standard networking technology. SCADA-specific protocol data units are, for instance, encapsulated in TCP/IP and transmitted via Ethernet on the link layer (industrial Ethernet) (Knapp 2011:66). The discovery of the virus Stuxnet in 2010 made it obvious to the public, that modern ICS are vulnerable against cyber-attacks (Knapp 2011:38). As any modern computer system, SCADA systems and PLCs have vulnerabilities that can be exploited with off-the-shelf or targeted malware. Internet search engines like Shodan (SHODAN 2014), which collect information about machines connected to the Internet, and fast Internet scanners like Zmap (ZMap 2014), make the discovery of vulnerable machines even simpler (Knapp 2011:117). The effects of cyberattacks on ICS could be devastating: production processes could be manipulated or disrupted. In the worst case, there could be personal or environmental damage or loss.
2 This paper describes the results of an initial security analysis of a Beckhoff CX5020, a commonly used PLC in SCADA/ICS systems. The goal of the investigation is to find out, if a modern PLC, which is based on a well-known platform like Windows CE, has exploitable vulnerabilities in the platform or the PLC part of the system. The description of our investigation will start in chapter 2 with a brief description of ICS, SCADA, the protocols used and the specifics of a Beckhoff CX5020. Chapter 3 and 4 explain our analysis approach and results which lead to a set of possible attacks described in chapter 5. Chapter 6 gives a set of recommendations to the manufacturer and to users of the Beckhoff CX5020, which protect against the described attacks. 2 ICS/SCADA SECURITY 2.1 SCADA Systems and Protocols A typical SCADA system consists of different parts. The low-level control algorithm is running on a PLC or RTU (Remote Terminal Unit). These devices are connected to sensors and actuators. They retrieve sensor data, evaluate the local system state and control actuators based on the data evaluation result. Multiple SCADA systems operate as MES (Manufacturing Execution System) and several MESs are controlled by ERP (Enterprise Resource Planning). The layering of the different systems is depicted in the automation pyramid in Figure 1. Figure 1: Automation pyramid An HMI (Human Machine Interface) is used to present the current system state and allows to manually edit parameters. An HMI s control directive is not limited to one PLC or RTU, it is more likely to control multiple devices via a single HMI. Therefore the PLC or RTU and HMI have to be interconnected. A local setup is called remote site. The MTU (Master Terminal Unit) is a central place where the system state of multiple remote sites is supervised and controlled from (Krutz 2006:7). To achieve supervisory control and data acquisition an EWS (Engineering Workstation) is running at the MTU. It is a normal computer with specific SCADA software installed that allows remote diagnostics, sending control instructions and reprogramming. A so-called historian saves retrieved telemetry data of remote sites into a central database for future evaluation (Trend Micro Incorporated:5). SCADA makes use of networks protocols to transport PLC administration and programming commands. The protocols are also used for communication between PLCs. The connection to corporate networks and/or the Internet for instance, for remote maintenance is frequently realized through standard programs such as HTTP, Telnet, or FTP. Connectivity on the link layer usually takes place via Ethernet. 2.2 General SCADA Security Issues Many SCADA systems nowadays are based on or encapsulate higher layer protocols in unencrypted and unauthenticated protocols like Telnet. Integrated HMIs, which simplify control, usually operate over HTTP and have no encryption for login credentials. Many of the special programs and protocols used for programming of PLCs and controlling the infrastructure of ICSs are unsecure as well. At the time of their development security was not part of the requirements. Therefore, they turn out to be a security risk (European Network and Information Security Agency 2011a:27). It is this kind of vulnerabilities, which allows viruses like Stuxnet to be successful. Stuxnet was not only able to exploit operating systems in the control centre, it was also able to continue the attack on downstream PLCs, which had no protection against the attack. Vulnerabilities in the protocols helped to obtain further rights and infected machines, using for instance hardcoded passwords of the PLCs or the credentials of the database server. As a reaction to these new threats the automation industry has started to develop better and more secure components. Still, security by design, as it is applied in software engineering by the traditional software industry, is still a new area for ICS manufacturers and mistakes are made. And even if new and more secure components are made available for retrofit or replacement of insecure parts of an ICS, many
3 companies avoid modernization as any change to the systems means interruption of production, extensive testing, i.e., cost. 3 SECURITY ANALYSIS SETUP In order to find out, if modern PLCs are secure by design, an example for such a modern PLC was analysed. The Beckhoff CX5020 is an embedded PC running Windows CE 6.0 plus a Beckhoff proprietary software that makes it operate as a PLC. The built-in hardware uses an Intel Atom CPU with 1 GB of RAM and a flashcard serving as persistent memory. An integrated UPS provides emergency power for around two seconds and allows a secure shutdown of the device in case of power failure. In order to retrieve and analyse the traffic coming and going to a remote site, a simplified test environment was set up. The test environment consists of an EWS and a CX5020 PLC. A third node, a PC, is used as port scanner and is later on connected to the mirror port of the interconnecting switch in order to capture the traffic. Due to the use of Windows CE 6.0 on the CX5020 the analysis consisted of two phases. The first phase was a normal service and vulnerability discovery using scanning tools. After a full list of open services was received, additional information to each service was searched for inside the windows registry and the local file system. The second phase analysed the traffic between EWS and CX5020 while simulating SCADA use-cases like adding a new remote site to the system or controlling the PLC. 4 SECURITY ANALYSIS RESULTS An nmap port scan of the CX5020 PLC discovered 16 open ports (cf. Table 1) which include well-known services like Telnet on port 23, a webserver listening on port 80, 5120 and 5357 plus unknown services on port 987, and Some of these ports might be accessible from the Internet. Assuming that a remote site is protected via firewall but needs remote maintenance, it is likely that the respective SCADA and maintenance ports are open in the firewall access control lists. In the case of a CX5020 PLC, such common open ports would include port and as advised by the manufacturer Beckhoff on their customer service portal (Beckhoff Information System), and perhaps ports 23, 80 and 987 for Windows CE remote management. Table 1: Port scanning result Port Protocol State Service 23 TCP Open telnet 80 TCP Open http 139 TCP Open netbios-ssn? 443 TCP Open tcpwrapped 445 TCP Open netbios-ssn 987 TCP Open unknown 5120 TCP Open http 5357 TCP Open http 8080 TCP Open http-proxy TCP Open tcpwrapped 123 UDP Open ntp? 137 UDP Open netbios-ns 138 UDP open/filtered netbios-dgm 161 UDP Open snmp 1900 UDP open/filtered upnp UDP open/filtered unknown Taking into account all open ports from Table 1, a vulnerability scan using OpenVAS was executed but did not reveal any vulnerability except for a public community name in the SNMP service that was classified medium. Looking more closely at particular ports, the following was discovered. 4.1 Telnet Telnet is enabled by default. When connecting to the port a greeting containing Welcome to Windows CE 6.0 Telnet service on CX-ABCD is presented while CX-ABCD is the hostname of the device. If the default passwords has not been changed it is possible to log on with username webguest and password 1. Because Windows CE 6.0 is a single user system, all logged in accounts get full administration privileges and are able to create new accounts by using a script called CxAddUser. The newly created accounts are able to use Telnet, FTP, SMB, and VPN. 4.2 Webserver The webserver s index page presents a template file containing the hint Welcome to BECKHOFF CE device. Beckhoff informs about one special URL for accessing a configuration interface: <ip>:5120/config (Beckhoff Information System). A registry inspection discovered that the webserver supports virtual directories and exports different hard disk paths, as depicted in Table 2. The most interesting virtual directory is /remoteadmin which presents Microsoft s Windows
4 CE remote management tool. This virtual directory is not documented in Beckhoff s manual and is not configured. Therefore, on first visit, it allows choosing a password with at least three characters length. Once set, these credentials give users full control on network, time, file, and print server settings. Table 2: Virtual directories found in the Beckhoff CX5020 s registry. Virtual directory Path on Hard Disk / \Hard Disk\www /MsmqAdmin \windows\msmqadminext.dll /remoteadmin \windows\ REMOTEADMIN.dll /remoteadminimages \windows\www\remoteadmin\ images /upnp \windows\upnp /UpnpDevice \Hard Disk\www /upnpisapi \windows\upnpsvc.dll /UpnpWebsite \Hard Disk\UPnP\Website 4.3 CeRDisp CeRDisp is short for CE Remote Display and describes a remote desktop service for Windows CE devices. The service listens on TCP port 987. A client software named CeRHost for Windows desktop variants can be downloaded online. The connection requires a password that has to be set in the CX5020 s control panel. The connection setup is transmitted in plaintext and can be attacked using ARP-Spoofing. After a successful authentication the user has full control over the PLC. 4.4 VPN (PPTP) A PPTP connection is the only way to encrypt traffic to the device. All other services use plain text transfer. If port 1723 is reachable, the default user webguest can connect with password 1. After creation of new users through Telnet, those new users can authenticate themselves and use the PPTP service, too. The default PPTP authentication mechanism is unsecure as it uses MS-CHAP v2 that can be easily cracked (Marlinspike 2013). 4.5 SCADA Service Within a SCADA system the ADS (Automation Device Specification) protocol controls the CX5020 PLC systems. EWS operators use the Beckhoff TwinCAT System Manager software to search for PLCs. Such a discovery of PLCs is initiated by special UDP packets which are broadcasted or sent to a specific IP address on port UDP. ADS devices reply to these packets by sending 325 bytes of data encoding details of the operating system, hostname, ADS and PLC runtime version to the requesting host. Figure 2 shows the packet content of a respective reply. The first four bytes are the ADS packet header. Bytes 000C to 0011 represent the NetId, bytes 001C to 0025 the PLC s hostname f.q e 97...> ' a d 31...CX E b b Figure 2: Information sent from the PLC to the EWS as reply to a search request. Every ADS device has a unique ADS NetId. The TwinCAT System Manager uses this NetId and an optional password to establish an ADS route. If no device password has been set in the PLC s control panel any string will be accepted. Subsequently, only the host with the IP address sent within the route creation request is able to retrieve status information from the PLC. Figure 3 shows a requests for the creation of an ADS route between source IP with hostname WIN7VM-PC and the CX5020 PLC. The first 37 bytes are similar to Figure 2 but contain the EWS details. This packet includes the username Administrator, a password and the IP address the PLC will establish an ADS route to f.q a ff 02 0f ' c 00 0a e 37...WIN d 2d VM-PC a ff 02 0f d 00 0e d 69...Admi e f nistrato r d e e 31 2e Figure 3: Packet send to the PLC from an EWS when trying to create the ADS route with password If a wrong password has been used, a non-zero error code is returned in the bytes at address 001C and 001D as shown in Figure 4.
5 f.q e 97...e ' Figure 4: CX5020 s responded with error code due to a wrong password. Because of the simple and unencrypted packet structure the communication packets can be reverse engineered easily. On top, attackers who are able to create an ADS route could use some of the tools published on the manufacturer s internet platform to manipulate or interrupt the CX5020 PLC and the related SCADA system. 5 POSSIBLE ATTACKS Two attacks are possible when a CX5020 PLC is reachable over a network connection. The first attack method uses the webserver s virtual directory /remoteadmin. After the attacker has set an initial password, the REMOTEADMIN.dll creates a new account ADMIN on the device. As all accounts are able to use Telnet, the attacker is now able to create a new account for VPN and therefore gains access into the SCADA network. The fact that the PLC answers very fast and does not block a requester after too many wrong password attempts leads to the second possible attack method: a brute force or dictionary attack on UDP port Because an established connection allows for unlimited probing and evaluating of passwords, it is not necessary to create a new connection every time. It is even possible to use multiple connections in parallel, which improves the amount of passwords that can be tested per second. A benchmark test written in Python achieved up to ~8000 tested passwords per second using 8 parallel connections. The brute forced password can then be used with CeRHost to view and control the PLC s desktop. Table 3 shows the performance of the developed Python script. Table 3: Parallel brute force benchmark Passwords Threads Duration [s] Passwords per second 200, , , , , , RECOMMENDATION The following advice is given to the manufacturer and users of the Beckhoff CX5020 to improve the system s security: 1. Remove the registry key for the /remoteadmin virtual directory and disable Telnet by default. 2. Implement a limitation for specific ADS packets per second to reduce the risk of password attacks. This can either be done on the device itself but could also be done by an intrusion detection and prevention system on the upstream path. 3. Deliver the CX5020 with strong default passwords that cannot be guessed. Users should check if their passwords are reasonably secure. 4. Use only secure protocols, e.g., a PPTP with a secure authentication mechanism. 7 CONCLUSION ICS and SCADA systems have a central role in the automation of modern production facilities. The growing interconnection of ICS components among each other and to corporate or public networks like the Internet, leads to new security threats. Devices that are reachable via network can easily become the target of attackers. It is therefore crucial to take such new threats into account and to make sure that vulnerabilities in ICS systems are protected with suitable controls. In this paper we have demonstrated that modern PLCs, like the Beckhoff CX5020, still lack the secure design and security testing that is commonplace for normal computer systems today. In particular a secure default configuration and protection against password attacks should be considered. Unsecure protocols like Telnet, HTTP, or PPTP with MS-CHAP v2 should be replaced with secure versions. For new components, security should be part of the design and here the automation industry should quickly learn from the experience and competence of the computer world. REFERENCES Beckhoff Information System, Scenario: ADS connection through a firewall, viewed 5 November 2014, from =./content/1033/tcremoteaccess/html/tcremoteac cess_firewall.html&id=. Beckhoff Information System, TcWebAccess: Web based diagnostic and configuration interface,
6 viewed 5 November 2014, from /content/1033/sw_os/html/cx1000_tcwebacce ss.htm&id=. European Network and Information Security Agency, 2011a, Protecting industrial control systems: Annex V, Heraklion, from European Network and Information Security Agency, 2011b, Protecting industrial control systems, Heraklion, from European Network and Information Security Agency, 2011c, Protecting industrial control systems: Annex I, Heraklion, from Knapp, E., 2011, Industrial network security: Securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems, Elsevier/Syngress, Amsterdam. Krutz, R.L., 2006, Securing SCADA systems, Wiley Pub, Indianapolis, IN, from n?docid= Marlinspike, M., 2013, Divide and Conquer: Cracking MS-CHAPv2 with a 100% success rate, viewed 5 November 2014, from cracking-ms-chap-v2/. SHODAN, 2014, Computer Search Engine, viewed 4 November 2014, from Trend Micro Incorporated, The SCADA That Didn't Cry Wolf: Who's Really Attacking Your ICS Equipment? (Part 2), viewed 4 November 2014, from ZMap, 2014, The Internet Scanner, viewed 4 November 2014, from
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices
The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices Kyle Wilhoit Sr. Threat Researcher Trend Micro 1 Glossary HMI: Human Machine Interface IED: Intelligent Electronic Device SCADA:
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Xerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
ICS, SCADA, and Non-Traditional Incident Response. Kyle Wilhoit Threat Researcher, Trend Micro
ICS, SCADA, and Non-Traditional Incident Response Kyle Wilhoit Threat Researcher, Trend Micro 1 $whoami Threat Researcher, FTR, Trend Micro Threat Researcher at Trend Micro- research and blogger on criminal
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!
Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
DNA. White Paper. DNA White paper Version: 1.08 Release Date: 1 st July, 2015 Expiry Date: 31 st December, 2015. Ian Silvester DNA Manager.
DNA White Paper Prepared by Ian Silvester DNA Manager Danwood Group Service Noble House Whisby Road Lincoln LN6 3DG Email: [email protected] Website: www.danwood.com\dna BI portal: https:\\biportal.danwood.com
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DR V2.0 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Technical Information
Technical Information Recorders, Data Loggers, and Control Products Security Standard Contents 1. Introduction... 1-1 Why Security Is Essential... 1-1 Applicable Products... 1-2 Trademarks... 1-2 2. Assets
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
MFPConnect Monitoring. Monitoring with IPCheck Server Monitor. Integration Manual Version 2.05.00 Edition 1
MFPConnect Monitoring Monitoring with IPCheck Server Monitor Integration Manual Version 2.05.00 Edition 1 TABLE OF CONTENTS 1. INTRODUCTION...3 2. REQUIREMENTS...4 3. RESTRICTIONS...5 4. INSTALLATION...6
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER
Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several
Device Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Security Type of attacks Firewalls Protocols Packet filter
Overview Security Type of attacks Firewalls Protocols Packet filter Computer Net Lab/Praktikum Datenverarbeitung 2 1 Security Security means, protect information (during and after processing) against impairment
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks
CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro [email protected]
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Vendor System Vulnerability Testing Test Plan
INEEL/EXT-05-02613 Vendor System Vulnerability Testing Test Plan James R. Davidson January 2005 Idaho National Engineering and Environmental Laboratory Bechtel BWXT Idaho, LLC INEEL/EXT-05-02613 Vendor
Print Audit Facilities Manager Technical Overview
Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security 560.2. Sans Mentor: Daryl Fallin
Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing SANS Security 560.2 Sans Mentor: Daryl Fallin http://www.sans.org/info/55868 Copyright 2010, All Rights Reserved Version 4Q10
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
How To Create An Ics Network With A Network Of Nodes
A Connection Pattern-based Approach to Detect Network Traffic Anomalies in Critical Infrastructures Béla Genge 1, Dorin Adrian Rusu 2, Piroska Haller 1 1 Petru Maior University of Tîrgu Mureş, Romania
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
Medical Device Security Health Group Digital Output
Medical Device Security Health Group Digital Output Security Assessment Report for the Kodak Color Medical Imager 1000 (CMI-1000) Software Version 1.1 Part Number 1G0434 Revision 2.0 June 21, 2005 CMI-1000
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
VoipSwitch Security Audit
VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
SNI Vulnerability Assessment Report
SI Vulnerability Assessment Report Generated sample report Automated Infrastructure Discovery and Analysis Scan period 2009-04-07 10:31-2009-04-07 11:27 umber of scanned hosts 12 umber of hosts requiring
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Overview. Packet filter
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview Security Type of attacks Firewalls Protocols Packet filter Security Security means, protect information (during
Logical & Physical Security
Building a Secure Ethernet Environment By Frank Prendergast Manager, Network Certification Services Schneider Electric s Automation Business North Andover, MA The trend toward using Ethernet as the sole
NetBrain Security Guidance
NetBrain Security Guidance 1. User Authentication and Authorization 1.1. NetBrain Components NetBrain Enterprise Server includes five components: Customer License Server (CLS), Workspace Server (WSS),
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
