Telecom Signaling attacks on 3G and LTE networks
|
|
|
- Georgiana Reed
- 9 years ago
- Views:
Transcription
1 Telecom Signaling attacks on 3G and LTE networks from SS7 to all-ip, all open P1 Security Inc. v1.1
2 Telecom security intro SIP, PBX,... Periphery, customer side. Long gone world of Blue Box. Sometime hear about Roaming frauds. Rarely hear the Core Network horror stories. Steve Jobs and Steve Wozniak in 1975 with a bluebox
3 Telecom frauds and attacks
4 Telecom frauds and attacks
5 Telecom frauds and attacks
6 Structure of operators: SS7 SS7 basis for international interconnection & transit Called Legacy : Why it is not going away? Walled garden approach to security.
7 NGN, IMS, 3G IP friendly. More IETF Diameter Partly SIP-based SCTP appears Encapsulates SS7 over IP SIGTRAN
8 LTE, LTE Advanced More P2P Even more IP SIGTRAN is simplified Simpler protocols (S1) enb handover & communications Deeper integration, less layering & segmentation Addresses performances issues & bottlenecks
9 Current state of security research ME vulnerability research (SMS o Death, OsmocomBB) OpenBTS + crypto cracking (Karsten Nohl,...), Baseband vulns (R.P. Weinman) OpenBSC FemtoCell hacking (THC, P1 Security, SEC- T,...) Nothing really new in IP domain? WRONG: Many things come from Telecom and IP merger & legacy obscurity. SMS injection (TSTF,...) External APIs to HLR: location, IMSI. (Tobias Engel,...) Scanning and Attacking SS7 CN, SIGTRAN, IMS vulnerabilities, LTE scanning,... (Philippe Langlois, P1 Security, Enno Rey)
10 Attacking Telecom Networks Newbie question How do you get access? Steps 1.Footprint 2.Scan 3.Exploit 4.Detect & Protect No recipe as in IP world, each telecom environment is quite different (legacy sandwich)
11 1. Footprint (demo) Demo
12 2. Scan: PS entry points PS Domain is huge now Many common mistakes: IP overlaps, APN misconfiguration, firewall issues, IPv6 control M2M specifics.
13 GTP entry points GTP, GTP-C, GTP-U, v1 or v2 UDP or SCTP based Many APNs (from to 5000), many configurations, many networks with their corresponding GGSN. packet slips in M2M or public APNs GTP tunnel manipulation means traffic insertion at various point of the network (Core or Internet)
14 Scan Femto Cells entry points Femto Cell security is improving Better boot harden IPsec tunnels EAP-SIM protected But many compromise vectors still. Exposes directly signaling network (HNBAP), HLR/HSS (Diameter,...), infrastructure network (routing, NTP,...) to the user.
15 Scan the Core Network Some Core Network start of migration since 2008 to IPv6 SCTP based (RFC4960, Stream Control Transmission Protocol) Still SS7 encapsulated Implementations make scanning easy...
16 SCTP scan Pioneered in SCTPscan, ported into nmap. Attacker INIT Servers ABORT Port 101 Both don t work anymore (SCTP protocol evolved). Now in SCTPscan NG INIT INIT-ACK Fast, positive, TCP-like Port 102
17 CN Scan problems SCTP changed a lot, public tools don t work anymore. (Difficulty) IPv6 starts to be deployed, scan is completely possible but regular consultants don t know how to. (Size) CN Protocols are very complex (ASN.1 madness, Difficulty) cannot be tested by hand Signaling protocols address ranges makes then hard to assess by hand (Size) Size + Difficulty increase requires automation
18 Scan & Address spaces SSN Scanning GTT Scanning DPC Scanning
19 Scan IP vs. Telecom Signaling TCP/IP SS7 IPsec endpoint scan, MPLS label scan, VLAN tag scan SCTP endpoint scan Arp or Ping scan MTP3 or M3UA scanning Ping scan using TCP SYN SCCP DPC scanning TCP SYN or UDP port/service scanning SCCP SSN (SubSystem Number) scanning Service-specific attacks and abuses (e.g. attacks over HTTP, SMB, RPC,...) Application (*AP) traffic injection (e.g. MAP, INAP, CAP, OMAP...)
20 SIGTRAN Audit Strategies SCTP portscan For each M3UA, M2PA, SUA peering (internal, national, intl..) DPC scan For each DPC SSN scan For each SS7 application or SSN (HLR,...) Application tests MAP tests INAP tests CAP tests... 20
21 National and International SPCs SANC and ISPCs SANC assigned by ITU SPCs Confidential - (C) P1 Security
22 Scan to network maps Multiple formats for Point Code representation (3-8-3, NIPC, 5-4-5, Hex, Decimal) One Point Code can represent many different addresses. Helps target good part of the network (SMSC, Testbed, HLR cluster or BSCs?)
23 LTE scanning strategies Mix between SIGTRAN scan and IP scan Target protocols: S1, X2 Inter- enodeb communications (X2) Communication between enodebs and Core Network Tools: SCTP connect scan, SCTPscan NG or PTA
24 3. Exploit Standard vulnerabilities: Known vulnerabilities are present, but scarce: proprietary tools, network elements,... Misconfiguration is present often: once working, people don t touch (fix) the network. Simple architecture problems: HLR without SSL on OAM, logs exposed, vulnerable VLAN setup And unstandard / Telecom specific vulnerabilities:
25 ASN.1 paradise or hell ITU is ASN.1 addicted Plenty of TLV, tons of complex protocols Encodings: Old protocols: BER, DER Newer: PER, Aligned, Unaligned Encoding bombs, Decompression bombs e.g. LTE S1 protocol between ehnb and SGW, MME
26 SCTP Fuzz Target Protocol Specification is huge RFC 5062, RFC 5061, RFC 5043, RFC 4960, RFC 4895, RFC 4820, RFC 4460, RFC 3873, RFC 3758, RFC 3554, RFC 3436, RFC 3309, RFC 3286, RFC 3257, RFC 2960 Good target for vulnerabilities CVE CVSS Severity: 7.1 (HIGH), CVE CVSS Severity: 7.8 (HIGH), CVSS Severity: 7.8 (HIGH), CVE CVSS Severity: 10.0 (HIGH), CVE CVSS Severity: 7.8 (HIGH), CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE CVE (33 vulnerabilities)
27 Scapy and SCTP send(ip(dst=" ")/sctp(sport=2600,dport=2500)/ SCTPChunkInit(type=1)) send(ip(dst=" ")/sctp(sport=2600,dport=2500)/ SCTPChunkInit(type=1)/SCTPChunkParamCookiePreservative()/ SCTPChunkParamFwdTSN()/SCTPChunkParamIPv4Addr()) send(ip(dst=" ")/sctp(sport=2600,dport=2500)/ SCTPChunkInit(type=1)/SCTPChunkParamAdaptationLayer()/ SCTPChunkParamCookiePreservative()/SCTPChunkParamFwdTSN ()/SCTPChunkParamIPv4Addr()/ SCTPChunkParamUnrocognizedParam()/ SCTPChunkParamECNCapable()/SCTPChunkParamHearbeatInfo()/ SCTPChunkParamHostname()/SCTPChunkParamStateCookie()) It can get ugly... and i m not even fuzzing here.
28 SIGTRAN Stack de-synchronization: more exposure & attacks IP/SCTP/M3UA std by IETF MTP3/SCCP/TCAP std by ITU Finite State Machine in M3UA can be tricked into believing you re a peer. Once you re signaling peer you can...
29 SS7 ISUP Call Initiation Flow IAM attack: Capacity DoS ` Attack Quiz!
30 SS7 ISUP Call Release Flow REL attack: Selective DoS Attack Quiz!
31 User targeted DoS
32 Sending hostile MSU (MAP) Sent from any network (in the world) to any target mobile phone HLR Lookup may be used to prepare attack (IMSI gathered through SRI_for_SM) IMSI scanning / querying needed! Phone is registered on network, can make call, cannot receive calls or SMS.
33 Attack success
34 Fuzzing, research and DoS Fuzzing only in testbed environment Because it s easy to DoS equipments Telecom developer obviously don t think like hackers MGW: hardcoded Backdoor found in OAM terminal enodeb: protocol flaw leads to DoS HLR/HSS: DB/Directory protocol leads to DoS + Diameter flaw Equipments are rarely tested before integration/production
35 Complete audit process M3UA peer scan (External SPCs) SCCP peer scan (Ext. SPCs) SCCP SubSystem scan (Ext. SSN) STP Filter tests Application tests (MAP, INAP,...) Sending vs. Spoofing SIGTRAN Peering tests (M3UA) M3UA peer scan (Internal SPCs) SCCP peer scan (Int SPCs) SCCP SubSystem scan (Int SSN) Filter & Routing tests Application tests (MAP, INAP,...) Sending vs. Spoofing Result analysis & Reporting Interconnect testing Application discovery Perimeter protection testing Higher protocols: Application Part protocols Online status & Progress display Final Report
36 4. Detect & Protect IP IDS don't detect these problems Previous Lack of IDS for telecom networks Fraud Management Systems target only CDR: bills, statistical analysis DShield.org don t log SCTP attempts netstat -anp doesn t list SCTP associations hard to track! We re building tools to help.
37 Tales of Telecom Honeypots Fraud and attacks in telecom is mostly stealth But the impact is massive (100k to 3 million Euro per incident is typical) Telecom engineers mindset is not as open for proactive security as in IP crowds Prefer not to do anything and suffer from attacks If nothing is there to detect attacks, there are no attacks Lack of threat intelligence in the telecom domain
38 SS7 Honeypot Deployment (standalone) Attacker Attacker who tries to conduct fraud on the target system SS7 Provider SS7 Provider who manages SS7 links (like ISP) P1 Telecom Honeypot SS7 Honeypot with SS7 link and address (pointcode or SPC) Confidential - (C) P1 Security
39 SS7 Honeypot Deployment (integrated) Attacker P1 Telecom Honeypot Attacker who tries to conduct fraud on the operator s system Other operator s equipment Existing Operator SS7 Honeypot within operator SS7 network Confidential - (C) P1 Security
40 Architecture A T T A C K E R S SS7 or SIGTRAN interconnection Front HP Front HP Front HP VPN Real time Monitoring Master Honey Pot Attack record DB Forensic P1 Telecom Auditor Real time audit of the attacker Interconnection is like a VPN, always two-way If attackers does requests (interco), we can request too We conduct scan with P1 Telecom Auditor through interco. Confidential - (C) P1 Security
41 Detection results Realtime detection of scans (IDS) SIGTRAN scans SS7 scans Detection of telecom specifics SIM Boxes (subscription fraud), traffic steering and anti-steering packets/techniques Illegal traffic routing (mostly SMS, never seen before by operator, lost in traffic )
42 Honeypot results Threat intelligence! Nice attacker fingerprints: Single node attackers (stack on one system) Whole carrier infrastructure attacking (insider? relay? approved?) Helps the blacklisting of IDs, Phone numbers,... And identification of the fraudsters
43 Conclusions End of walled garden era, more exposed: High Exposure in term of IP-reachability (starting in 3G/IMS) and reachability of the IP-equipment (specifically in LTE networks) Network complexity (planes/layers) and protocol diversity make it very hard to get right from the beginning. Few dare to audit / test their telecom environment. Tools and services are now mature and efficient. First need to visualize the problem: discovery, awareness.
44 Credits Everybody from Telecom Security Task Force Fyodor Yarochkin Emmanuel Gadaix Raoul Chiesa Daniel Mende, Rene Graf, Enno Rey Everyone at P1 Security and P1 Labs
45 Thank you! Questions? Ask:
46
47 Backup slides P1 Security
48 HLR Lookups Confidential - (C) P1 Security
49 SS7 basic architecture P1 Security Inc,
50 Basic SS7 network elements Service Switching Points (SSP) are the telephone switches that are interconnected to each other by SS7 links. The SSPs perform call processing on calls that originate, tandem, or terminate at that site. Signal Transfer Points (STP) are routers that relay messages between network switches and databases. Their main function is to route SS7 messages to the correct outgoing signaling link, based on information contained in the SS7 message address fields. Service Control Points (SCP) contains centralized network databases for providing enhanced services. Examples of services include toll- free numbers and prepaid subscriptions. P1 Security Inc,
51 Under the hood: SS7 stack Confidential - (C) P1 Security
52 Problem Mobile Network Operators and other Telecom Operators use Fraud Management System that are reactive only, only see fraud when it has stolen money from the operator, have no way to tell if their network weaknesses are, must wait for fraud, network downtime, crashes, spam, intrusions to happen in order to see how it happened. Governments, safety agencies and telecom regulators have no way to assess the security, resiliency and vulnerability of their Telecom Critical Infrastructure
53 P1 Security Solution PTA gives vision on Telecom signaling networks (SS7, SIGTRAN, LTE sig), a security perimeter previously without technical audit. Telecom and Mobile Operator can scan and monitor their signaling perimeter as they do for their Internet and IP perimeter, detecting vulnerabilities before hackers, fraudsters and intruders do. Delivers metric for management, reports and fixes for experts. Right now, all the following problems go undetected (next pages) and could be detected with PTA:
54 P1 Solution Portfolio Awareness Security Planning Monitoring & Detection Intelligence & Response Quality Audit P R O D U C T S P1 Network Discovery P1 Security Recorder P1 Telecom Monitor P1 Telecom Honeypot P1 Telecom Auditor S E R V I C E S Telecom Security Audit Telecom Security Training Basic security Assistance MSP Assistance Forensic Assistance TCERT Auditor Assistance
55 How? P1 Security Telecom Auditor service delivered over the web as SaaS (Software as a Service) or Appliance + Private Cloud Appliances delivered to MSP or Customer (Virtual Machine with PTA Probe software) Available internal experts to help interpret the results if requested. External professional network to help remediate the problems.
56 PTA Deployment International SS7 Perimeter Network Indicator=1 National SS7 Perimeter Network Indicator=0 Internal SS7 Perimeter Network Indicator=2 Scan Scan Scan PTA Appliance #1 PTA Appliance #2 PTA Appliance #3 Audit Task Audit Task Audit Task P1 Security Manager
57 PTA Audits PTA Audits simulate human analysis of a SS7 signaling network. It is composed of a set of signaling tests each representing one category of attack scenario or one specific attack or fraud attempt. The Test Knowledge Base is constantly updated with new attack scenarios. The behavior, strategy and analysis of the Audit results is driven by a Machine Learning engine using SVM methods to mimic the intelligence of a human expert.
58 PTA Audit process M3UA peer scan (External SPCs) SCCP peer scan (Ext. SPCs) SCCP SubSystem scan (Ext. SSN) STP Filter tests Application tests (MAP, INAP,...) Sending vs. Spoofing SIGTRAN Peering tests (M3UA) M3UA peer scan (Internal SPCs) SCCP peer scan (Int SPCs) SCCP SubSystem scan (Int SSN) Filter & Routing tests Application tests (MAP, INAP,...) Sending vs. Spoofing Result analysis & Reporting Interconnect testing Application discovery Perimeter protection testing Higher protocols: Application Part protocols Online status & Progress display Final Report
59 P1 Products Architecture P1 Telecom Security Manager Audit PTA Network Discovery PTD Monitoring PTM Risk Engine PRE Radio PTR Use case SS7 Security Audit SS7 Active discovery SS7 Security Monitoring telecom risk rating Radio perimeter security audit Target Telecom & Mobile operator Telecom service provider Telecom & Mobile operator SS7 mbank/ mcommerce Mobile operators
60 Web Access: Easy & Standardized
61 Management Dashboard Graphical trends and reports Access control from the web Alerts Multilevel Security (database encryption, SSL)
62 Report Management
63 Technical Needs an appliance or virtual appliance in the signaling domain Requires a Signaling Point Code per perimeter Multiple level of audits depending on the tested perimeter (testbed only, external, national, peer, internal network, BSS) Non-intrusive (safe mode) Zero impact on infrastructure
64 Network Map in Reports
65 Report Generated with graphs, detailed analysis and raw data from the probe. Direct expert contact for assistance and expertise. Reference to knowledge base of past and current attacks on telecom networks. KB Constantly updated.
66 PTA Report
67 Who? Established management team Avg of 15 year of industry background, both Security and Telecom. Successful Entrepreneurs (Qualys, INTRINsec, TSTF) Start-up launched in January 2009 Already established references in Europe and Asia Financial backing from private investors
68 Questions Any question, ask
Telecom Signaling attacks on 3G and LTE networks
Telecom Signaling attacks on 3G and LTE networks from SS7 to all-ip, all open [email protected] P1 Security Inc. v1.1 Telecom security intro! SIP, PBX,...! Periphery, customer side.! Long gone
Philippe Langlois, P1 Security Inc. [email protected]
Telecommunications Infrastructure Security Getting in the SS7 kingdom: hard technology and disturbingly easy hacks to get entry points in the walled garden. Philippe Langlois, P1 Security Inc. [email protected]
Immersed Network Discovery and Attacks. Philippe Langlois Telecom Security Task Force [email protected] http://www.tstf.
Immersed Network Discovery and Attacks Specifics of Telecom Core Network (CN) insider attacks Philippe Langlois Telecom Security Task Force [email protected] http://www.tstf.net 1 Speaker Introduction
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
Nokia Siemens Networks his 700 Integrated signaling application solutions
Nokia Siemens Networks his 700 Integrated signaling application solutions Today s and the next generation networks use the Signaling System No. 7 (SS7) to exchange information within and between the networks.
Remotely crashing HLR MSC STP
Remotely crashing HLR MSC STP MME Why it took telecom industry 20 years to recognize the problems with SS7 Philippe Langlois, P1 Security Intro Philippe Langlois Founder of Qualys, Worldnet, TSTF, WaveSecurity,
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Introduction. Channel Associated Signaling (CAS) Common Channel Signaling (CCS) Still widely deployed today Considered as old technology
VoIP and SS7 Introduction Channel Associated Signaling (CAS) Still widely deployed today Considered as old technology Common Channel Signaling (CCS) Separation of signaling and call paths Signaling System
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS
Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
SS7: Locate. Track. Manipulate.
You have a remote-controlled tracking device in your pocket Tobias Engel @2b_as 2 Signalling System #7 Protocol suite used by most telecommunications network operators throughout the world
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks
IPsonar provides visibility into every IP asset, host, node, and connection on the network, performing an active probe and mapping everything that's on the network, resulting in a comprehensive view of
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Chapter 10 VoIP for the Non-All-IP Mobile Networks
Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256
XPROBE-NG. What s new with upcoming version of the tool. Fyodor Yarochkin Armorize Technologies
XPROBE-NG What s new with upcoming version of the tool Fyodor Yarochkin Armorize Technologies Abstract Attacks trends analysis and network modern discovery requirements lazy scanning, application level
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin
XPROBE Building Efficient Network Discovery Tools Fyodor Yarochkin Outline Introduction Some motivating stories: real-life attacks Efficient network mapping with Lazy Scan mode Layer 7 extensions Scripting
10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
Mobile Application Part protocol implementation in OPNET
Mobile Application Part protocol implementation in OPNET Vladimir Vukadinovic and Ljiljana Trajkovic School of Engineering Science Simon Fraser University Vancouver, BC, Canada E-mail: {vladimir, ljilja}@cs.sfu.ca
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
Steps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
Guideline on Firewall
CMSGu2014-02 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Firewall National Computer Board Mauritius Version 1.0 June
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
LTE Attach and Default Bearer Setup Messaging
LTE Attach and Default Bearer Setup Messaging 2012 Inc. All Rights Reserved LTE Attach Message Sequence Chart enodeb MME SGW HSS Initial UE Message Update Location Update Location Answer Create Session
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks
CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro [email protected]
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,
Fortinet 1Fortinet Firewall technologies from Fortinet offer integrated, high-performance protection against today s wide range of threats targeting applications, data and users. Fortinet s firewall technology
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
UNDERSTANDING CORE TELECOM SECURITY
SOLUTION BRIEF -TELECOM UNDERSTANDING CORE TELECOM SECURITY If you think you re not affected, consider that a 2013 Congressional survey of more than 150 utility companies revealed more than a dozen utilities
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Citrix NetScaler 10.5 Essentials for ACE Migration CNS208; 5 Days, Instructor-led
Citrix NetScaler 10.5 Essentials for ACE Migration CNS208; 5 Days, Instructor-led Course Description The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by
Affording the Upgrade to Higher Speed & Density
Affording the Upgrade to Higher Speed & Density Ethernet Summit February 22, 2012 Agenda VSS Overview Technology Q&A 2 Corporate Overview World Leader in Network Intelligence Optimization Deployed in 80%
Chapter 2 Introduction
Chapter 2 Introduction This chapter describes the features of the NETGEAR 54 Mbps Wireless ADSL Modem Router Model DG834G. The Wireless ADSL Modem Router is a combination of a built-in ADSL modem, ADSL
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
10 Configuring Packet Filtering and Routing Rules
Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring
SCTPscan - Finding entry points to SS7 Networks & Telecommunication Backbones
SCTPscan - Finding entry points to SS7 Networks & Telecommunication Backbones Philippe Langlois Telecom Security Task Force [email protected] 1 Agenda History of telecommunications security Review
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/[email protected] TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
F5 Silverline DDoS Protection Onboarding: Technical Note
F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Threat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy
29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
Information Security. Training
Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
