The Mechanisms and Effects of the Code Red Worm
|
|
|
- Cory Merritt
- 9 years ago
- Views:
Transcription
1 Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The Mechanisms and Effects of the Code Red Worm This paper addresses the vulnerability that was present in Microsoft Internet Information Services (IIS) web server software and the worm, Code Red, which exploited this vulnerability. It describes the mechanisms of three different versions of Code Red, as well as the patches and methods for stopping the worm. Finally, it discusses the effects of the worm, both financially and technically, as well as in how it has impacted the security of systems in general. Copyright SANS Institute Author Retains Full Rights AD
2 The Mechanisms and Effects of the Code Red Worm GSEC Practical Assignment Version 1.2f Renee C. Schauer Introduction It is common for viruses, hacker attacks and system vulnerabilities to make the evening news on an almost weekly basis. Web sites such as SANS and CERT are updated daily with new viruses, worms and security holes. It has become a difficult task for system administrators to keep up with the task of securing their systems. Not only must they know about the constantly changing vulnerabilities that are present in software and hardware, Key fingerprint but they = must AF19 also FA27 continue 2F94 998D to monitor FDB5 DE3D for attacks, F8B5 06E4 patch A169 for 4E46 new viruses and control access of internal users. Exploits can come in many forms. Viruses such as I Love You and Melissa can affect individual computers and web traffic through launching attachments with malicious code. Denial of Service attacks send traffic to flood servers and bring them down. But a worm is an exploit that is often times more effective than other methods because it invades servers overwhelming the memory capacity and then shuts down before the worm is passed automatically to another machine. It is also effective because it does not rely on infected files spreading through the cooperation of a user opening an attachment or launching a program. Recently an exploit was identified and named Code Red. This worm caused billions of dollars in damages and introduced to the technology community the dangers of not reacting quickly to public warnings of vulnerabilities. This paper addresses the vulnerability that was present in Microsoft Internet Information Services (IIS) web server software and the worm, Code Red, which exploited this vulnerability. It describes the mechanisms of three different versions of Code Red, as well as the patches and methods for stopping the worm. Finally, it discusses the effects of the worm, both financially and technically, as well as in how it has impacted the security of systems in general. Discovery of the Vulnerability The beginning of the Code Red crisis began with the discovery of a vulnerability. Riley Hassell, an employee at eeye Digital Security was running CHAM auditing code against eeye s Microsoft IIS web server to check for unknown software vulnerabilities. He identified that there was a buffer overflow vulnerability due to a section of code that performs input parameters which contained an unchecked buffer in the ISAPI extension. Hassell Key fingerprint realized that = AF19 this FA27 could 2F94 enable 998D an FDB5 attacker DE3D to perform F8B5 06E4 a buffer A169 overrun 4E46 attack and take complete control of the server and run foreign code.
3 On June 18, 2001, eeye Digital Security released an advisory notifying users that a remote buffer overflow vulnerability existed in Microsoft IIS web server software. The advisory indicated that Microsoft web servers Windows NT 4.0 IIS 4.0, Microsoft Windows 2000 IIS 5.0 and Microsoft Windows XP beta IIS 6.0 were all susceptible to the Index Server ISAPI vulnerability which could be used to take control of a server by specially formatting a web page request. According to the CAIDA Analysis of Code Red, the vulnerability resides in the code that allows a web server to interact with the Microsoft Indexing Service functionality. With a default installation of the Indexing Service ISAPI filter, the.ida ISAPI filter performs improper bounds checking of user inputs. This makes the filter predisposed to buffer overflow attacks. If an attacker is aware of the vulnerability, they can gain full system level access remotely Key fingerprint to the web = AF19 server. FA27 This 2F94 full 998D system FDB5 access DE3D allows F8B5 06E4 the outsider A169 4E46 to perform any action including executing programs, manipulating web server databases and changing files and web pages. In the eeye advisory the following comment was made, Some people might wonder why this advisory does not contain the typical eeye humor like most of our other advisories. Basically, the reason is that this is our 4 th remote system level IIS vulnerability and well we ve run out of jokes. They advised users to download a patch made available for the vulnerability from Microsoft and to remove the.ida ISAPI filter from the web server if it did not provide the server with any needed functionality. A Long Night The Code Red worm version 1 began to infect Microsoft IIS web servers on July 12, The next evening, two employees of eeye Digital Security pulled an all-nighter to disassemble and analyze the worm fueling their efforts with the heavily caffeinated Code Red Mountain Dew. Their beverage of choice along with the fact that the worm defaces many web pages with Hacked by Chinese led to the name Code Red. It was determined that the virus spread through port 80 TCP/IP transmissions. A TCP/IP stream was sent to vulnerable web servers, and then a scan was performed to identify additional systems that were vulnerable. There were several versions and variants of Code Red that would surface in the next couple of weeks. The following sections describe the inner workings and effects of each virus. Code Red Version 1 Servers that had not patched the Index Server ISAPI buffer overflow vulnerability were first infected with Code Red version 1 on July 12, The Code Red worm version 1 first Key checked fingerprint the server = AF19 date FA27 to 2F94 see 998D if the FDB5 date was DE3D between F8B5 06E4 the first A169 and 4E46 the nineteenth of the month. If it met this criterion, a static seed was used to generate a list of random IP addresses to probe each machine to attempt to infect as many computers as possible. The use of the static seed in the random number generator resulted in the
4 same list of IP addresses being generated for each infected machine. The worm spread slowly as each infected machine spread the worm to other machines. On the twentieth of the month, Code Red version 1 was programmed to cease attempts to spread the virus to other machines. Instead, the worm was supposed to launch a Denial of Service attack against the White House web site (www1.whitehouse.gov) between the th of the month and then hibernate before beginning the cycle on the first day of the next month. The White House web site avoided the Denial of Service attack by changing its IP address when the threat was identified. However, a design flaw was noted in the Code Red source code. The code checked for a valid connection before sending data to perform the Denial of Service attack, and since the IP address was no longer valid, the connection was never established. Therefore, traffic did not increase Key fingerprint as a result = AF19 of trying FA27 to 2F94 access 998D the FDB5 Whitehouse.gov DE3D F8B5 06E4 web A169 site. 4E46 Although Code Red version 1 defaced some web pages with Hacked by Chinese and consumed some resources on local area networks and infected web servers, it did not cause much damage and had little impact on global resources. This is partially due to the fact that the infected systems ended up reinfecting each other since a static seed created the IP address list. The Code Red version 1 was memory resident meaning that the machine can be disinfected by rebooting it since it did not write to the system s hard disk. Rebooting, however, still left the system open to repeat infection, and with version 1 reinfection was an extreme possibility due to the list of IP addresses occurring in the same order due to the static seed. Code Red Version 2 The second version of Code Red was discovered at 10:00am on July 19 th. This version of the worm varied in that the random number generator used a random seed variant as opposed to the previous static seed. This caused each infected computer to infect a different list of randomly generated IP addresses. While this change seems minor, the effect was that more than 359,000 machines were infected in fourteen hours by Code Red version 2. At the peak of infection, 2000 hosts were infected each minute. This version of the worm also affected additional devices such as DSL modems, printers, switches and routers. HP web servers and other hardware equipped with interfaces to the web could crash if scanned by Code Red. Cisco s web site confirmed that products including DSL routers, IP phones and wireless networking access kits were vulnerable to Denial of Service due to the Code Red virus. These devices were not infected with Code Red, but would crash or reboot when they were sent a copy of the Key worm fingerprint by an infected = AF19 machine. FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Although Code Red version 2 was similar in its inner workings to version 1, it caused much more damage due to the volume of machines infected and probes sent to infect
5 new hosts. The effects on additional hardware also increased the downtime and effects of the worm. Similar to Code Red version 1, version 2 could be removed from the machine by rebooting. However, reinfection was occurring so quickly that many machines were reinfected as the patch for the.ida vulnerability was applied. Code Red II On August 4, 2001 the Code Red II worm began to exploit the Microsoft IIS web server buffer overflow vulnerability. This virus, while completely different than the original Code Key Red, fingerprint was named = AF19 after FA27 Code 2F94 Red 998D because FDB5 DE3D the source F8B5 06E4 code A169 contained 4E46 the string CodeRedII. Unlike the original Code Reds, this worm did not deface the web page or launch Denial of Service attacks. However, the mechanism of this exploit was much more concerning and consequential than the original two. The attack mechanism began with the worm checking a new host to the to see if the system had been previously infected. It also looked to check whether Chinese was the language of the system. If so, it spread for 48 hours using 600 threads. If the system was not set with Chinese as the language, it created 300 threads and spread for 24 hours. The virus then rebooted the system and cleared the worm portion from memory. However, most systems were immediately reinfected or the reboot would occur over and over. The rebooting action was the action that caused the worm to spread to the next infected machine identified. The worm was also created with a mechanism to load a Trojan and toggle file system protection to publish C: and D: drives as web pages. The Trojan was saved to c:\explorer.exe and d:\explorer.exe and was run when Explorer.exe was called. The Trojan wrote values to the registry to open a security hole in the system to allow a remote attacker access via a web browser to the C: and D: drives. The backdoor installed could be used to launch future attacks or to execute any code. The Code Red II virus is not memory resident, and therefore cannot be removed by rebooting the machine. In order to fix a system infected with Code Red II, the system had to be patched to prevent reinfection and then the worm removed. Preventing the Virus from Infecting The only way to prevent an infection of a Microsoft IIS web server was to patch the system with a download available from Microsoft at the following URL: Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Representatives from Microsoft and United States security agencies held a press conference instructing users to download the patch available from Microsoft and
6 indicated it as a civic duty to download this patch. CNN and other news outlets following the spread of Code Red urged users to patch their systems. As of August 1, one million users had downloaded the patch that would prevent infection by all versions of the Code Red worm. The effects of the exploit were reduced by the publicity the worm received. However, the patch had been announced five weeks prior to Code Red s emergence, and many security administrators waited until a threat was imminent to patch these systems. Some administrators even delayed patching their systems when Code Red version 1 became quiet and did not attempt to apply patches until version 2 began spreading ten days later. Symantec Security Response recommended downloading the Microsoft patches as opposed to trying to detect the infection by searching for specific files written by the worm Key or fingerprint defaced web = AF19 pages. FA27 Since 2F94 998D the virus FDB5 runs DE3D only F8B5 in memory 06E4 A169 and 4E46 does not write information to the hard drive the virus could not be reliably detected. Applying the patch from Microsoft and restarting the computer was the only foolproof way to remove Code Red and prevent reinfection. Some programs have also been developed to help eliminate the Code Red worm. CodeGreen is a program that waits for the worm to infect a system, and then launches a counter-attack to remove the worm and install a patch automatically. Crclean is another program used to destroy Code Red when it attempts to infect a system. Effects of the Virus The main effects of the Code Red viruses were performance degradation and system instability. The worldwide cost of the Code Red was $2.6 billion in July and August, which included cleaning and inspecting servers for $1.1 billion dollars and productivity losses of $1.5 billion dollars. The Code Red worm s costs were widespread and devastating to many companies. It was estimated that over one million of the 5.9 million Microsoft IIS web servers were infected by Code Red. Many companies experienced internal disasters when 25 or more system infections simultaneously occurred or large segments of the network were disabled when hardware devices were scanned. The average outage for these large companies was 36 hours. The cost of computer viruses in general has risen drastically over the past two years. According to the Computer Economics of Carlsbad, CA the cost of virus attacks on information systems in 2001 reached $10.7 billion so far this year as compared to $17.1 billion for 2000 and $12.1 billion in Who Did This? Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 There is no clear evidence as to where the Code Red worm originated, however there are some theories. Keith Rhodes, the chief technologist for the General Accounting Office released in a congressional report that the Code Red virus is believed to have
7 started at Foshan University in Guangdong, China. Some feel China is a prime suspect due to the worm being launched shortly after the mid-air collision of an American military spy plane and a Chinese fighter jet. School officials had reported a dramatic increase in web traffic around the time of Code Red s origination. However, university computer department personnel indicated that the school was on vacation at the time and the lab was being refurbished. Other intrusion detection logs compiled by Dshield.org indicated that the virus hit the United States and other countries before moving to Foshan University. Ken Eichman, senior security engineer for CAS, stressed that the hacker could have infected the server from a remote location so it is difficult to say it came from the university. Others blamed the Chinese due to the messages Hacked by Chinese. Welcome to Key fingerprint = AF19 Johannes FA27 2F94 Ullrich, 998D FDB5 operator DE3D of the F8B5 Dshield.org 06E4 A169 service 4E46 indicated that tracking down patient zero or the first machine infected with Code Red I is difficult, because the worm does not leave any files behind on infected systems. He also theorized that an attendee of DefCon, the annual hacker convention held in Las Vegas on July 13, could have launched the virus. At a recent hacker convention in the Netherlands, it was speculated that the creator could have been present at the activities. Participants were heard to say that they hoped police got to the hacker before system administrators did! Lessons Learned from Code Red According to surveys conducted since Code Red s emergence, the publicity and effects of this and other recent large viruses have caused an increase in management-level attention to security issues. A Global Information Security Survey conducted by PricewaterhouseCoopers indicated that 41% of CEOs, company presidents and managing directors are now involved in creating security policy and 52% of top executives are involved in security budgeting decisions. These figures show more than a 10% increase from the previous year. Unfortunately, even increased monitoring and increased awareness about exploits does not solve the problems of keeping up with security vulnerabilities. System administrators are required to monitor security sites, vendor sites and intrusion detection logs on a daily basis to keep up with constantly changing security issues. If the current trend of three new security vulnerabilities announced everyday continues, it will become even more difficult, if not impossible, for security managers to manage the problem. The good news about the Code Red worm is the publicity it gave to securing web servers. David Moore, a senior researcher with CAIDA indicated, Code Red got a lot of publicity. Key fingerprint It got a = lot AF19 of people FA27 2F94 recognizing 998D FDB5 that DE3D patching F8B5 servers 06E4 A169 is a problem. 4E46 A Netcraft survey indicated that many security administrators started patching servers for the first time when Code Red became an issue. By scanning a few hundred systems each month for ten security lapses, Netcraft found that eight of the vulnerabilities
8 decreased drastically by the end of August as security administrators started to take web server patching more seriously. Hopefully, the Code Red outcomes will be a warning to companies to dedicate adequate resources to security administration and increase awareness of the need to patch security holes and continue monitoring for the next exploit. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
9 References: All Versions of Microsoft IIS Remote Buffer Overflow. June 18, Chien, Eric. CodeRed Worm. Symantec Security Response. August 27, Code Red Virus Likely Originated in China. Business Recorder. September 2, Fruitman, Paul. Code Red Worm Sluggish to Hit. Computing Canada: ProQuest Information and Learning, August 10, Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Hulme, George. Management Takes Notice High-Profile Web Attacks and Viruses are Convincing Upper Management At Many Companies to Take Security Seriously. Information Week. CMP Media LLA. September 3, 2001, p. 28. Lemos, Robert. Internet Security Helped by Code Red. Special to CNET News.com. September 7, Lemos, Rob. Virulent Worm Calls Into Doubt Our Ability to Protect the Net. Special to CNET News.com. July 27, Lemos, Rob. Web Worm Targets White House. Special to CNET News.com. July 19, Leyden, John. Code Red s Cisco Side Effect. August 13, McWilliams, Brian. Code Red: Born In the USA? Newsbytes. August 31, Saita, Anne. Code Red s Costs and Hunt for Creator Mount. Information Security Magazine. Security Wire Digest, Vol. 3, No. 68. September 6, Technology Netviews Systems Are Crumbling Under Weight of Apathy. Network News, VNU Business Publications Ltd., September 5, 2001, p. 26. W32/CodeRed.a.worm. McAfee AVERT. July 30, Wilson, Key fingerprint Pat and Brian = AF19 Kantor. FA27 CAIDA 2F94 998D Analysis FDB5 DE3D of Code-Red. F8B5 06E4 August A169 4E46 25,
10 Last Updated: August 21st, 2016 Upcoming SANS Training Click Here for a full list of all Upcoming SANS Events by Location SANS Bangalore 2016 Bangalore, IN Aug 22, Sep 03, 2016 Live Event SANS Chicago 2016 Chicago, ILUS Aug 22, Aug 27, 2016 Live Event SANS Virginia Beach 2016 Virginia Beach, VAUS Aug 22, Sep 02, 2016 Live Event SANS Adelaide 2016 Adelaide, AU Sep 05, Sep 10, 2016 Live Event SANS Brussels Autumn 2016 Brussels, BE Sep 05, Sep 10, 2016 Live Event SANS Northern Virginia - Crystal City 2016 Crystal City, VAUS Sep 06, Sep 11, 2016 Live Event SANS Network Security 2016 Las Vegas, NVUS Sep 10, Sep 19, 2016 Live Event SANS ICS London 2016 London, GB Sep 19, Sep 25, 2016 Live Event SANS London Autumn London, GB Sep 19, Sep 24, 2016 Live Event MGT517 - Managing Security Ops San Diego, CAUS Sep 26, Sep 30, 2016 Live Event Security Leadership Summit Dallas, TXUS Sep 27, Oct 04, 2016 Live Event SANS Seattle 2016 Seattle, WAUS Oct 03, Oct 08, 2016 Live Event SANS Oslo 2016 Oslo, NO Oct 03, Oct 08, 2016 Live Event SANS DFIR Prague 2016 Prague, CZ Oct 03, Oct 15, 2016 Live Event SANS Baltimore 2016 Baltimore, MDUS Oct 10, Oct 15, 2016 Live Event SANS Tokyo Autumn 2016 Tokyo, JP Oct 17, Oct 29, 2016 Live Event SANS Tysons Corner 2016 Tysons Corner, VAUS Oct 22, Oct 29, 2016 Live Event SANS San Diego 2016 San Diego, CAUS Oct 23, Oct 28, 2016 Live Event SANS FOR508 Hamburg in German Hamburg, DE Oct 24, Oct 29, 2016 Live Event SANS Munich Autumn 2016 Munich, DE Oct 24, Oct 29, 2016 Live Event SOS SANS October Singapore 2016 Singapore, SG Oct 24, Nov 06, 2016 Live Event Pen Test HackFest Summit & Training Crystal City, VAUS Nov 02, Nov 09, 2016 Live Event SANS Sydney 2016 Sydney, AU Nov 03, Nov 19, 2016 Live Event SANS Gulf Region 2016 Dubai, AE Nov 05, Nov 17, 2016 Live Event SANS Miami 2016 Miami, FLUS Nov 07, Nov 12, 2016 Live Event European Security Awareness Summit London, GB Nov 09, Nov 11, 2016 Live Event SANS London 2016 London, GB Nov 12, Nov 21, 2016 Live Event Healthcare CyberSecurity Summit & Training Houston, TXUS Nov 14, Nov 21, 2016 Live Event SANS Alaska 2016 OnlineAKUS Aug 22, Aug 27, 2016 Live Event SANS OnDemand Books & MP3s OnlyUS Anytime Self Paced
Interested in learning more about security? What is Code Red Worm? Copyright SANS Institute Author Retains Full Rights
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. What
Interested in learning more about security? The OSI Model: An Overview. Copyright SANS Institute Author Retains Full Rights
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The
How To Secure Your Small To Medium Size Microsoft Based Network: A Generic Case Study
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. How
Easy Steps to Cisco Extended Access List
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Easy
Introduction to Business Continuity Planning
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Introduction
Security Awareness Training and Privacy
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Introduction to the Microsoft Windows XP Firewall
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Introduction
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and
Viruses, Worms, and Trojan Horses
Viruses, Worms, and Trojan Horses Be a Power Reader Make Personal Connections As you read this article, think to yourself, How can I apply this knowledge? How will what I m learning be useful to me? You
Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast?
First Worm Ever Morris Worm Robert Morris, a PhD student at Cornell, was interested in network security He created the first worm with a goal to have a program live on the Internet in November 9 Worm was
Security Applications of Bootable Linux CD-ROMs
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
Using Windows Update for Windows XP
Using Windows Update for Windows XP Introduction This document provides instructions on updating Windows XP with the necessary patches. It is very important to update your operating system software in
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
The GSM Standard (An overview of its security)
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
Endpoint Security Management
Endpoint Security Management LANDESK SOLUTION BRIEF Protect against security threats, malicious attacks and configuration vulnerabilities through strong endpoint security control and maintenance. Protect
PATCH MANAGEMENT POLICY PATCH MANAGEMENT POLICY. Page 1 of 5
Page 1 of 5 TABLE OF CONTENTS 1. OVERVIEW... 3 2. DEFINITIONS... 3 3. PURPOSE... 3 4. SCOPE... 3 5. POLICY... 4 6. WORKSTATIONS... 4 7. SERVERS... 4 8. ROLES AND RESPONSIBILITIES... 4 9. MONITORING AND
INFORMATION SECURITY
GAO For Release on Delivery Expected at 10 a.m., PDT Wednesday August 29, 2001 United States General Accounting Office Testimony Before the Subcommittee on Government Efficiency, Financial Management,
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
On the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS
5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS 1 Introduction As small and mid-sized companies rely more heavily on their computer networks to
Using Windows Update for Windows Me
Using Windows Update for Windows Me Contents Introduction... 1 Before You Begin... 2 Downloading and Installing the Windows Update Components... 2 Maintaining a Secure Computing Environment... 6 Introduction
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
Symantec AntiVirus for Network Attached Storage Integration Guide
Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
E-BUSINESS THREATS AND SOLUTIONS
E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
TIME TO LIVE ON THE NETWORK
TIME TO LIVE ON THE NETWORK Executive Summary This experiment tests to see how well commonly used computer platforms withstand Internet attacks in the wild. The experiment quantifies the amount of time
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Interested in learning more about security?
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. :
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Best Practices: Reducing the Risks of Corporate Account Takeovers
Best Practices: Reducing the Risks of Corporate Account Takeovers California Department of Financial Institutions September 2012 INTRODUCTION A state led cooperative effort, including the United States
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Distributed Scan Model for Enterprise-Wide Network Vulnerability Assessment
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Distributed
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
(Self-Study) Identify How to Protect Your Network Against Viruses
SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses
Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology Xiaoqin Song 1
International Conference on Informatization in Education, Management and Business (IEMB 2015) Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients
Hp Compaq t5000 Thin Clients June 2004 Instructions. Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients Table Of Contents Table Of Contents... 1 Executive Summary... 2 Virus Vulnerabilities,
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
netforensics - A Security Information Management Solution
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. netforensics
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
ABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and
Windows 8 Malware Protection Test Report
Windows 8 Malware Protection Test Report A test commissioned by Kaspersky Lab and performed by AV-Test GmbH Date of the report: January 11 th, 2013, last update: January 11 th, 2013 Executive Summary In
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege: Guard the Gaps with Patch Management 1.0
Norton Personal Firewall for Macintosh
Norton Personal Firewall for Macintosh Evaluation Guide Firewall Protection for Client Computers Corporate firewalls, while providing an excellent level of security, are not always enough protection for
PROACTIVE PROTECTION MADE EASY
PROACTIVE PROTECTION AUTHOR: ANDREW NIKISHIN KASPERSKY LAB Heuristic Analyzer Policy-Based Security Intrusion Prevention System (IPS) Protection against Buffer Overruns Behaviour Blockers Different Approaches
Monitoring Microsoft Exchange to Improve Performance and Availability
Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in email traffic, the number and size of attachments, spam, and other factors, organizations
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
Symantec Endpoint Protection Analyzer Report
Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure
Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure Security studies back up this fact: It takes less than 20
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
