Security researcher at P1 Security. Hacking Telco equipment: The HLR/HSS Laurent Ghigonis P1 Security
|
|
|
- Morgan Harvey
- 10 years ago
- Views:
Transcription
1 Hacking Telco equipment The HLR/HSS Laurent Ghigonis Security researcher at P1 Security
2 What are we talking about? A mobile network operator Core Network Network passive capture showing Global Titles
3 Mobile Operators Conveys the majority of voice communications worldwide Conveys our data Conveys growing M2M traffic Emergency systems notifications uses it => We now rely on it and we have some security expectations
4 Mobile Operators and governance In Europe
5 Mobile Operators and governance In France Lets check the reality
6 The Witness : An HLR/HSS AuC HSM HLR Front End HSS Front End Provisioning DSA Routing DSA Install Server Admin Provisioning Gateway 3 Back Ends Typical HLR/HSS in use in operator Core Network
7 HLR/HSS in Mobile Core Network A mobile network operator Core Network Network passive capture showing Global Titles
8 HLR/HSS in Mobile Core Network
9 HLR/HSS in Mobile Core Network
10 HLR/HSS in Mobile Core Network HLR is used in all 2G Operator Network HSS is used in all 3G/4G Operator Network Stores customer data Subscriber identifier (IMSI) Subscriber encryption keys Subscriber approximate location Subscriber SIM plan options Critical to the operator HLR down == Network down, no calls possible
11 HLR/HSS in Mobile Core Network HLR/HSS receiving subscriber location update from the operator SS7/Diameter signaling links
12 Lets make it talk
13
14 Plan HLR/HSS Robustness assessment Virtualization Virtualization and instrumentation System Analysis Localroot, Framework complexity Network Fuzzing SS7 Protocols Binaries Reverse More vulns
15 HLR/HSS Virtualization No, it s not ATCA / NFV
16 An HLR/HSS is an ecosystem
17 An HLR/HSS is an ecosystem HLR + HSS Front-end HLR Administration server Application/Database routing servers HLR Backend/Database (multiple) HSM (Hardware Security Module) for keys
18 HLR/HSS is never alone
19 Where to start Most exposed from the outside => HLR/HSS Front-end Receives SS7/Diameter traffic Telecom network stacks Receives provisioning requests Connected to the HSM
20 Where to start AuC HSM HLR Front End HSS Front End Provisioning DSA Routing DSA Install Server Admin Provisioning Gateway 3 Back Ends Typical HLR/HSS in use in operator Core Network
21 Virtualization of HLR/HSS Frontend
22 Original Equipment Manufacturer Specs of the real equipment i386 / x64 / Sparc Solaris / CentOS 32 GB of RAM CPU 16 Cores TB hard drive + External SAN
23 Qemu/KVM Faster than VirtualBox More flexible Tweak code to add more network interfaces VDE Switch for networking
24 Qemu/KVM qemu-system-x86_64 \ -machine type=pc,accel=kvm:tcg -pidfile./myhlr.pid \ -m 7.2g -smp 4 -drive file=/dev/mapper/lvm-vm--myhlr,cache=none \ -vnc :2,password,tls,lossy -display curses -rtc base=localtime,driftfix=slew \ -net vde,vlan=1,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=1,macaddr=52:54:00:00:10:01 \ -net vde,vlan=2,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=2,macaddr=52:54:00:00:10:02 \ -net vde,vlan=3,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=3,macaddr=52:54:00:00:10:02 \ -net vde,vlan=4, sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=4,macaddr=52:54:00:00:10:02 \ -net vde,vlan=5,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=5,macaddr=52:54:00:00:10:02 \ -net vde,vlan=6,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=6,macaddr=52:54:00:00:10:02 \ -net vde,vlan=7,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=7,macaddr=52:54:00:00:10:02 \ -net vde,vlan=8,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=8,macaddr=52:54:00:00:10:02 \ -net vde,vlan=9,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=9,macaddr=52:54:00:00:10:02 \ -net vde,vlan=10,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=10,macaddr=52:54:00:00:10:02 \ -net vde,vlan=11,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=11,macaddr=52:54:00:00:10:02 \ -net vde,vlan=12,sock=/home/vm-kvm/myhlr/vde-myhlr.ctl -net nic,vlan=12,macaddr=52:54:00:00:10:02 Physical partition for disk Do not use disk file on host btrfs super slow ext4 is ok Curses output Improvements: serial terminal
25 Qemu/KVM Solaris 10 Qemu/KVM ok for x64 Fails for SPARC Stock kernel /kernel /usr/kernel Custom kernel modules For Telecom Signaling [Signalware] Uses grub Failsafe mode
26 Inside the machine ZFS filesystem Solaris 10 Everything is installed via packages Multiple Oracle databases Even on HLR/HSS Front-end only A lot of Middleware framework to start the actual network stacks / applications Telco stacks: based on Ulticom Signalware The OS expects its precious network cards
27 System Analysis
28 The filesystem ZFS = Filesystem + Volume manager ZFS pool (often mirrored) ZFS root pool GB usually enough Prepare free space for system/processes dump ZFS Dump pool Should be more than size of your RAM ZFS SWAP pool Should be more that size of your RAM
29 The filesystem ZFS offers good resilience against data corruption, and is very picky when there is too much corruption You can t recover when filesystem is too much broken You can try $ zdb -e -p /dev/dsk/c0t3d0p0 -F -X -AAA -dd rpool 1 $ zpool import -f -F -X mypool $ zpool import -o readonly=on -o autoreplace=on -o failmode-continue -m -N -f -F -X mypool If it fails Code your own tool by modifying ZOL
30 advdata/ autoinstmnt/ boot/ cust_data/ environment.txt* etc/ export/ false/ home/ installmnt/ kernel/ lib/ mnt/ net/ nsr/ opt/ patchmnt/ platform/ root/ rpool/ rtp_environ.txt sbin/ tftpboot/ ti_var/ tmp/ tspinst/ updatesw/ usr/ var/ vol/ Filesystem / Grub/platform + failsafe Home + Applications data + Telco specific apps Applications data Kernel Telco specific apps Crashdumps from Telco specific apps
31 Some packages installed application SMAWrtp Telecommunication Service Platform (TSP) Base Package application OMNI Signalware System application S6U-4 Signalware System application OMNI-C7X Signalware C7 Extensions application INTPahacu AC Utimaco HSM
32 Low hanging fruits SUID executables SUID Total: 162 (155 binaries, 7 scripts) SUID Root: 142 (137 binaries, 5 scripts) Signalware Boot process becoming root by Design
33 Local roots Of course, we often find multiple local roots Some are really too easy (one command):
34 Example of Telco network stack: NSN TSP / RTP + Ulticom Signalware TSP + RTP framework are found on NSN NT- HLR Found in many European and Worldwide operators Very similar to Apertio OneHLR TSP: Telco Server Platform (Ericsson) / Telco Service Platform (NSN, others, generic name) RTP: Resilient Telco Platform (NSN)
35 Example of Telco network stack: NSN TSP / RTP + Ulticom Signalware SS7 Protocol handling Reminder: SS7 stack
36 Network Fuzzing
37 Fuzzing SS7: M3UA Example: Flooding badly handled Leads to alerts flooding in OSS Leads to loss of previous alerts! P1VID#799
38 Fuzzing SS7: SCCP Example result: 1 specific MSU repeated 2 times causes DoS of all Signaling Interconnections HLR is down during 2 minutes Total Denial of Service of the network Nobody can receive calls in the whole country core 'core.xxx' of 15477: 01 msu_processing () 02 msg_distribution () 03 main () 04 _start () /export/home/xxx If the attack is repeated, the DoS is permanent during the attack P1VID#773 So long for the critical infrastructure
39 Fuzzing SS7: SCCP
40 Fuzzing SS7: MAP Example results: 1 specific MSU causes MAP process crashes 5 MSU/second makes HLR totally unresponsive to any other MAP Query Total Denial of Service of the network Nobody can receive calls in the whole country 1 MSU/second makes HLR totally drop 50% of other MAP Queries Network is highly perturbed 50% of the called in the whole country are failing P1VID#772
41 Fuzzing Diameter Process Crash with 1 specific manually crafted MSU Logs do not even report process crash. Neither the OSS Alerts. Application logs: Services_Esm_Log_Message: vc_priority=log_err, vc_messageinformation=esm: Service could not be processed correctly, vc_additionalinformation=reason: xxxxxxxxx data unavailable, Message Type: S6a-xxxxxxxxx Services_Esm_Log_Message: vc_priority=log_err, vc_messageinformation=esm: Service could not be processed correctly, vc_additionalinformation=reason: xxxxxxxxx data unavailable, Message Type: S6a-xxxxxxxxx UTC Tue Sep 3 01:20: Services_Esm_Log_Message: vc_priority=log_err, vc_messageinformation=esm: Service could not be processed correctly, vc_additionalinformation=reason: xxxxxxxxx data unavailable, Message Type: S6a-xxxxxxxxx Services_Esm_Log_Message: vc_priority=log_err, vc_messageinformation=esm: Service could not be processed correctly, vc_additionalinformation=reason: xxxxxxxxx data unavailable, Message Type: S6a-xxxxxxxxx Behind that, process core dumps are created P1VID#718
42 Does redundancy saves you? No! Same N front-ends == same crashes Messages just needs to be sent N times
43 Binaries reverse
44 Often, too much help Binaries not stripped Debug symbols / function names / available No anti-debug mechanism Libraries headers on production machines Great help in understanding the internals Large documentation about internals on production machines Great help in understanding the internals Updated binaries and previous binaries both on production machines Binary diff to track issues fixed
45 Signalware Kernel modules Example: Parsing of SCCP header
46 Signalware Kernel modules Kernel modules signaling parsing is robust IPC to communicate with userland binaries Complexity leads to other type of errors Logic errors Race conditions Slow handling of some types of MSUs
47 Signalware userland binaries Parsing less robust (less tested) Example logic error due to IPC / Framework complexity: Null pointer dereference Can be triggered from the International SS7 network
48 So verdict?
49 Misconceptions! So verdict? No crashes on a Critical Core Network Element FAIL Robustness against network attacks FAIL Redundancy!= Robust, attack kills Front-end one by one Modern Depends, but from what we see there is much room for improvement
50 Mobile Operators and governance Reality on Threats analysis: Maybe Reality of Telco equipment security: Very bad Public information: Very bad Telco private sector information: Didn t see impact
51 Consequences Mobile Network crashes for unknown publicly available reason Spying on phone calls / customer activities from a single point (Core Network) is relatively easy Fraud
52 Recommendations Secure SDLC (Secure Software Development Life Cycle) Design Implementation Testing Especially for vendors custom stacks/services TCAP/MAP parsing bugs leading to overflows, Vendors security audits (HLR isolated) System audit Network audit Testbed audits (HLR in environment) System audit Network audit Before deploying to production
53 Recommendations: securing the OS Use Solaris Zones to split services: P1VID#764 Use Solaris Audit mechanism: P1VID#765 Authenticate the hardware To prevent emulation Use the latest OS protections against exploitation Solaris 11 has ASLR Use custom Linux kernel Use a firewall by default on the machine itself
54 Make it faster! Recommendations: OSS People should be able to use it to react when under attack E.g. commander Need access to all low-level network traffic for forensics
55 Recommendations: For the operators Push the vendors to fix the bugs Some of the attacks we discovered can be filtered Operators do not have to wait for bugs to be fixed Filter at perimeter boundaries (typically STP / Router) Depends on STP / Router models and security features Sometime filtering options are charged by vendor It is possible to filter also at the SCCP provider level
56 To be continued Telecom Network Elements security is low We tested multiple Network Element types/models, from different vendors Vendors, Governments and security researchers have work to do Vulnerability disclosure in security critical infrastructure is scarce Dangerous? Not if there is collaboration
57 Other aspects of Telecom Security We talked here about equipment security It s a work in progress, and only HLR/HSS Mainly Network Equipment Vendor responsibility Also consider Other Network Elements security GRX / IPX / SCCP Providers security Deployment security (passwords policies, filtering ), Operator responsability Telecom Network Fraud (SS7 spoofing, Call/SMS Spoofing, ), Operator responsability
58 References Governance literature on critical infrastructure: European level 2007: France &datetexte=&categorielien=id
59 That s it, please react. Thank you [email protected]
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
Remotely crashing HLR MSC STP
Remotely crashing HLR MSC STP MME Why it took telecom industry 20 years to recognize the problems with SS7 Philippe Langlois, P1 Security Intro Philippe Langlois Founder of Qualys, Worldnet, TSTF, WaveSecurity,
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM
A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM 1 V.A.Injamuri Govt. College of Engineering,Aurangabad, India 1 [email protected] Abstract This paper is focused on practical securing Linux
Evaluation of Security for a H.323-based VoIP Emulated Architecture
Evaluation of Security for a H.323-based VoIP Emulated Architecture Eng. MARIUS HERCULEA, Professor VIRGIL DOBROTA Ph.D. Abstract Evaluation tests were conducted on H.323 Cisco Gatekeeper, Gateways and
Oracle Security Auditing
Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,
Oracle Security Auditing
RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
syslog-ng Product Line
www.balabit.com syslog-ng Product Line syslog-ng Description www.balabit.com IT environments constantly generate important data in log messages syslog-ng Collects Filters Classifies Normalizes Stores Transfers
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Peach Fuzzer Platform
Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested
TELE 301 Lecture 7: Linux/Unix file
Overview Last Lecture Scripting This Lecture Linux/Unix file system Next Lecture System installation Sources Installation and Getting Started Guide Linux System Administrators Guide Chapter 6 in Principles
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
IoT IT Security and Secure Development Life Cycle
IoT IT Security and Secure Development Life Cycle Security BSides Ljubljana, 2015 By Christopher Scheuring, ERNW Germany #2 /whoami Christopher Scheuring Security Analyst @ ERNW Since 2010 IT Security
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
Best Practices in Hardening Apache Services under Linux
Best Practices in Hardening Apache Services under Linux Anthony Kent Web servers are attacked more frequently than anything else on the internet. Without the proper security measures it is just a matter
Network Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
System Management. Leif Nixon. a security perspective 1/37
1/37 System Management a security perspective Leif Nixon 2/37 System updates Should we ever update the system? Some common update strategies: 1. If it works, don t touch it! 2. We pick and choose the most
Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview
Hervey Allen Network Startup Resource Center PacNOG 6: Nadi, Fiji Security Overview Security: A Massive Topic Security Viewpoints - Server - Client - Network Securing each overlaps the other Server Client
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Compromise-as-a-Service
ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg 3/31/14 Compromise-as-a-Service Our PleAZURE Felix Wilhelm & Matthias Luft {fwilhelm, mluft}@ernw.de ERNW GmbH Carl-Bosch-Str. 4 D-69115 Heidelberg Agenda
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Virtual Hosting & Virtual Machines
& Virtual Machines Coleman Kane [email protected] September 2, 2014 Cyber Defense Overview / Machines 1 / 17 Similar to the network partitioning schemes described previously, there exist a menu of options
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 16 AKIPS Pty Ltd July 5, 2016 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of this
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 15. AKIPS Pty Ltd
AKIPS Network Monitor Installation, Configuration & Upgrade Guide Version 15 AKIPS Pty Ltd November 12, 2015 1 Copyright Copyright 2015 AKIPS Holdings Pty Ltd. All rights reserved worldwide. No part of
Getting Started Guide
Getting Started Guide Sophos Firewall Software Appliance Document Date: November 2015 November 2015 Page 1 of 14 Contents Preface...3 Minimum Hardware Requirement...3 Recommended Hardware Requirement...3
Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
An Oracle Technical White Paper January 2014. How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper January 2014 How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing
The Hacker Strategy. Dave Aitel [email protected]. Security Research
1 The Hacker Strategy Dave Aitel [email protected] Security Research Who am I? CTO, Immunity Inc. History: NSA->@stake -> Immunity Responsible for new product development Vulnerability Sharing Club
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
mguard Device Manager Release Notes Version 1.6.1
mguard Device Manager Release Notes Version 1.6.1 Innominate Security Technologies AG Rudower Chaussee 13 12489 Berlin Germany Phone: +49 30 921028 0 Fax: +49 30 921028 020 [email protected] http://www.innominate.com/
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink [email protected]
VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink [email protected] Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions
Hardening MySQL. Maciej Dobrzański maciek at psce.com @MushuPL http://www.psce.com/
Hardening MySQL Maciej Dobrzański maciek at psce.com @MushuPL http://www.psce.com/ In this presentation Database security Security features in MySQL The ugly truth Improving security DATABASE SECURITY
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
How I DOS ed My Bank. (DTMF Input Processing Easy DOS Attacks via Phone Lines)
How I DOS ed My Bank (DTMF Input Processing Easy DOS Attacks via Phone Lines) 60 Min, Genres: Action, Comedy, Sci- Fi, Thriller, Family Our paper would be on DTMF input processing algorithms [DSP], that
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Proposal for Virtual Private Server Provisioning
Interpole Solutions 1050, Sadguru Darshan, New Prabhadevi Road, Mumbai - 400 025 Tel: 91-22-24364111, 24364112 Email : [email protected] Website: www.interpole.net Proposal for Virtual Private Server
Just as the ecommerce companies have
Protecting IMS Networks From Attack Krishna Kurapati Krishna Kurapati is the founder and CTO of Sipera Systems (www.sipera.com), a company that specializes in security for VOIP, mobile and multimedia communications.
Amahi Instruction Manual
History of Amahi Chapter 1 Installing fedora 12 and Amahi Home Digital Assistant (HDA) Chapter 2 Your DHCP/DNS options Chapter 3 Network Troubleshooting Chapter 4 Getting Started Appendix: Advanced Hard
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Villains and Voice Over IP
Villains and Voice Over IP Heather Bonin ECE 578 March 7, 2004 Table of Contents Introduction... 3 How VOIP Works... 3 Ma Bell and her Babies... 3 VoIP: The New Baby on the Block... 3 Security Issues...
ZXUN USPP. Configuration Management Description. Universal Subscriber Profile Platform. Version: V4.14.10
ZXUN USPP Universal Subscriber Profile Platform Configuration Management Description Version: V4.14.10 ZTE CORPORATION No. 55, Hi-tech Road South, ShenZhen, P.R.China Postcode: 518057 Tel: +86-755-26771900
Security Best Practice
Security Best Practice Presented by Muhibbul Muktadir Tanim [email protected] 1 Hardening Practice for Server Unix / Linux Windows Storage Cyber Awareness & take away Management Checklist 2 Hardening Server
OpenWIPS-ng A modular and Open source WIPS. Thomas d Otreppe, Author of Aircrack-ng
OpenWIPS-ng A modular and Open source WIPS Thomas d Otreppe, Author of Aircrack-ng 1 Agenda What is OpenWIPS-ng? Origin Architecture Internal design Release plan Demo ~# whoami Author of Aircrack-ng and
Basic Installation of the Cisco Collection Manager
CHAPTER 3 Basic Installation of the Cisco Collection Manager Introduction This chapter gives the information required for a basic installation of the Cisco Collection Manager and the bundled Sybase database.
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
INTRODUCTION TO CLOUD MANAGEMENT
CONFIGURING AND MANAGING A PRIVATE CLOUD WITH ORACLE ENTERPRISE MANAGER 12C Kai Yu, Dell Inc. INTRODUCTION TO CLOUD MANAGEMENT Oracle cloud supports several types of resource service models: Infrastructure
Panorama High Availability
Panorama High Availability Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
Applications Manager Best Practices document
Applications Manager Best Practices document This document will list the AdventNet ManageEngine Applications Manager best practices 1. Hardware and Software requirements 2. Configuring Applications Manager
Vulnerability Scan. January 6, 2015
Vulnerability Scan January 6, 2015 Results of Vulnerability Security Scan The results of your Ethos Info Vulnerability Security Scan are detailed below. The scan ran from Sat Dec 27 07:07:00 2014 UTC until
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
