Bypassing Network Access Control Systems



Similar documents
Bypassing Network Access Control Systems

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Ofir Arkin Insightix. A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

On the Deficiencies of Active Network Discovery Systems

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

End Point Security & Network Access Control

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Detecting rogue systems

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Securing end devices

Network Virtualization Network Admission Control Deployment Guide

Network Access Security It's Broke, Now What? June 15, 2010

Technical Note. ForeScout CounterACT Endpoint Detection & Inspection Methods

NETWORK ACCESS CONTROL

Technical Note. ForeScout CounterACT: Virtual Firewall

Designing a Windows Server 2008 Network Infrastructure

Microsoft Windows Server System White Paper

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Demystifying the Myth of Passive Network Discovery and Monitoring Systems

Secure Networks for Process Control

InfoExpress Cyber Gatekeeper. How to quote? Günter Neuleitner. März 2009

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Technical Note. ForeScout CounterACT Rogue Device Detection

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

Insightix Discovery & NAC. Lite Edition. Installation Guide. Version 3.0. May United States. International 945 Concord St.

All You Wanted to Know About WiFi Rogue Access Points

Training Course on Network Administration

IP Telephony Management

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Building A Secure Microsoft Exchange Continuity Appliance

CompTIA Network+ (Exam N10-005)

Whitepaper. Securing Visitor Access through Network Access Control Technology

INTRODUCTION TO FIREWALL SECURITY

Efficient and easy-to-use network access control and dynamic vlan management. Date: F r e e N A C. n e t Swisscom

Chapter 9 Firewalls and Intrusion Prevention Systems

CTS2134 Introduction to Networking. Module Network Security

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

STATE OF NEW JERSEY IT CIRCULAR

Network Access Control (NAC) and Network Security Standards

Sygate Secure Enterprise and Alcatel

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

SANS Top 20 Critical Controls for Effective Cyber Defense

» WHITE PAPER X and NAC: Best Practices for Effective Network Access Control.

How To Understand and Configure Your Network for IntraVUE

Total Defense Endpoint Premium r12

Perspective on secure network for control systems in SPring-8

VSI Predict Able. We Focus on Your IT So You Can Focus on Your Business

Section 12 MUST BE COMPLETED BY: 4/22

BLACK BOX. Do you know who s on your network? Network Access Control. Get the facts. Then get the protection you can t live without.

Guideline on Auditing and Log Management

Using Ranch Networks for Internal LAN Security

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI

CDM Hardware Asset Management (HWAM) Capability

Security and Access Control Lists (ACLs)

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Chapter 1 Personal Computer Hardware hours

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Critical Security Controls

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network security strategy to meet new threats and simplify IT security operations

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives

Policy Management: The Avenda Approach To An Essential Network Service

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

ΕΠΛ 674: Εργαστήριο 5 Firewalls

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Solving the Enterprise Information Security Problem Common Approaches

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Designing a security policy to protect your automation solution

Self defending networks?

Chapter 1 The Principles of Auditing 1

Secure IP Address Management Layer 2 Network Access Control Solution

Getting Started with Symantec Endpoint Protection

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Ovation Security Center Data Sheet

VLANs. Application Note

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CISCO IOS NETWORK SECURITY (IINS)

Security Technology: Firewalls and VPNs

ForeScout Technologies Is A Leader Among Network Access Control Vendors

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Transcription:

1 Bypassing Network Access Control Systems Ofir Arkin, CTO Blackhat USA 2006 ofir.arkin@insightix.com http://www.insightix.com

2 What this talk is about? Introduction to NAC The components of a NAC solution How to bypass NAC solutions Software Hardware

3 Ofir Arkin CTO and Co-Founder, Insightix http://www.insightix.com Founder, The Sys-Security Group http://www.sys-security.com Computer Security Researcher Infrastructure Discovery ICMP Usage in Scanning Xprobe2 (The Active OS Fingerprinting Tool) VoIP Security Information Warfare Member VoIPSA (Board member, Chair security research committee)

4 NAC An Introduction

5 NAC - An Introduction Introduction The threat of viruses, worms, information theft and the lack of control of the IT infrastructure lead companies to implement security solutions to control the access to their internal IT networks A new breed of software and hardware solutions from a variety of vendors has emerged recently All are tasked with one goal controlling the access to a network using different methods and solutions

6 NAC - An Introduction Introduction Network Access Control (NAC) is a set of technologies and defined processes, which its aim is to control access to the network A common criterion for NAC does not exist and therefore the definition of what does a NAC solution should contain varies from one vendor to another Cisco Network Admission Control Microsoft NAP Trusted Computing Group (TCG) Trusted Network Connect (TNC) Other

7 NAC Capabilities

8 NAC Capabilities The Basic Capabilities The most essential capabilities any NAC solution must have are the ability to detect a new element connecting to the network, and the ability to verify whether or not it complies with a defined security policy If the element does not comply with the defined security policy, the NAC solution must restrict the element s access to the network

9 NAC Capabilities NAC Functions The following is a list of functions that may, or may not, be included with a vendor s NAC offering: Element detection (must) The ability to detect new elements as they are introduced to the network Authentication The ability to authenticate each user accessing the network no matter where they are authenticating from and/or which device they are using

10 NAC Capabilities NAC Functions End point security assessment The ability to assess whether a newly introduced network element complies with the security policy. These checks may include the ability to gather knowledge regarding an element s operating system, the presence of an anti virus software, the list of installed patches, etc. Remediation The process of quarantine an element not complying with the defined security policy until the issues causing it to be non-compliant are fixed. When quarantined the element is able to access a defined set of remediation servers allowing the user fixing the non-compliant issues Enforcement (must) If the element does not comply with the defined security policy, the NAC solution must restrict the element s access to the network.

11 NAC Capabilities NAC Functions Authorization The ability to verify access by users to network resources complies with an authorization scheme defined in an existing authorization system (such as Active Directory, RADIUS servers, etc.) allowing enforcing identitybased policies Post-Admission Protection Is the process of continuously monitoring users, elements and their sessions for suspicious activity (i.e. worms, viruses, malware, etc.). If detected the action taken by a NAC system may vary from isolating the offending system to dropping the session. Post admission protection functions similar to Intrusion Prevention Systems (IPS), and may be used as a means

12 Element Detection

13 A List of Methods Element Detection Software DHCP Proxy DHCP Extensions Broadcast Listeners Switch Integration 802.1x Hardware In-Line devices Out-of-Band devices

14 Element Detection DHCP Proxy Source: Sygate / Symantec

15 Element Detection DHCP Proxy Source: Sygate / Symantec

16 Element Detection DHCP Proxy Strengths Most organizations use DHCP Easy to deploy

17 Element Detection DHCP Proxy Weaknesses Must use agent software Agent software is usually restricted to Windows-based operating systems Detection at L3 hence enforcement at L3 Elements can infect and/or penetrate other elements on their subnet, and cannot be stopped No actual knowledge regarding the enterprise network No knowledge of what is on the network No knowledge on actual network topology lead existence of other, uncovered venues to access the network Exceptions needs to be manually inputted (if at all) Not a complete solution (does not detect everything) Cannot be extended to include remote users

18 Element Detection DHCP Proxy Bypass Assigning a static IP Address Elements can infect and/or penetrate other elements on their subnet, and cannot be stopped NAT (Not able to detect masquerading elements behind an allowed elements) Mimicking exceptions

19 Element Detection DHCP Extensions Source: Microsoft

20 Element Detection DHCP Extensions Strengths Does not need to replace the existing DHCP supporting infrastructure Weaknesses Client-based software must support DHCP extensions (or use specialized client software)

21 Element Detection Broadcast Listeners

22 Element Detection Broadcast Listeners Weaknesses Must be deployed on each and every subnet A lot of moving parts Knowledge regarding the enterprise network must be obtained prior to deployment (i.e. which are the different subnets, where are the locations to be deployed, etc.) Exceptions are hard to configure (i.e. the only information available is a MAC address and an IP address) No knowledge on actual network topology lead existence of other, uncovered venues to access the network Cannot be extended to include remote users

23 Element Detection Broadcast Listeners Bypass Static ARP entries NAT Mimicking exceptions

24 Element Detection Switch Integration

25 Element Detection Switch Integration Weaknesses Must have prior knowledge regarding the entire list of switches it needs to integrate with (receive information from) Depends on the ability to query a switch using SNMP Depends on a switch to provide with information regarding a new element operating on the network (SNMP trap) Provides poor information regarding elements operating on the network (their MAC address and their IP address) Cannot be extended to include remote users

26 Element Detection Switch Integration Bypass Find and connect to an unmanaged switch Connect two switches through a hub Connect elements through a switch or a hub NAT Mimicking allowed elements ( No Port Security ) The same MAC address of an existing element and a different IP address The same MAC address and IP address of an existing element

27 Element Detection 802.1x Source: Cisco

28 Element Detection 802.1x Source: Cisco

29 Element Detection 802.1x Strengths Can prevent elements to connect to the network even before assigned an IP address Weaknesses Difficult manageability All elements on the network must be configured to use 802.1x Legacy networking elements must be upgraded to support 802.1x Not all of the networking elements can support 802.1x Not all of the elements residing on the network are 802.1x capable (can authenticate) (i.e. legacy equipment, AS-400, printers, etc.) The cost for implementing a solution which is based on 802.1x is high (time, resources, infrastructure upgrade, etc.) No knowledge on actual network topology lead existence of other, uncovered venues to access the network

30 Element Detection 802.1x Bypass Mimicking exceptions (i.e. a printer) NAT

31 Element Detection In-Line Devices

32 Element Detection In-Line Devices Strengths Weaknesses No knowledge on actual network topology lead existence of other, uncovered venues to access the network Deployment must involve a network re-architecture Deployment must be as close as possible to the access layer to be efficient and productive A possible point of failure Deployment is time consuming Extremely Costly Detection at L3 only Infection of other elements on the same subnet and/or switch is possible Some elements may only generate L2 traffic

33 Element Detection In-Line Devices Bypass Mimicking an element NAT Elements can infect and/or penetrate other elements on the same switch/subnet, and cannot be stopped

34 Element Detection Out-of-Band Devices

35 Element Detection Out-of-Band Devices Strengths Fast to implement Less moving parts Real-time Detection at L2 Weaknesses

36 End Point Security Assessment

37 Agent-based Solutions End Point Security Assessment Agent-based Strengths Provides a wealth of information regarding a host (OS, patches, A/V Signatures) Can provide a full featured solution Weaknesses Usually available for Microsoft Windows operating systems only Management can be a nightmare No awareness of the entire network, not everything is covered

38 Agent-less Solutions End Point Security Assessment Agent-less Strength No need to install additional software Deployment might be fast (depends on the tye of solution) Weaknesses Information regarding a certain element might not always be available (i.e. querying the host to receive a certain property of the host may not unveil the requiered information)

39 Risks End Point Security Assessment It all breaks down to what is being checked, and does the information is helpful or not? Patches Security related patches (and other patches) are not enrolled into the enterprise as soon as they are available It may take up to a year to enroll a major update of an operating system (i.e. Microsoft Windows XP SP2) Zero day is not blocked The checks performed may be useless. Zero day viruses, worms, and vulnerabilities do not have remediation Understanding the real risk The risk from an element does not only rely on the version of the A/V signature file it may be running (I.e. information theft, unauthorized access, etc.)

40 Enforcement/Quarantine

41 Enforcement/Quarantine Quarantine Methods Separate Subnet/VLAN Separate, non-routable, network address space Weaknesses Creates a self infecting quarantine area of restricted elements In the case of DHCP, it is easily bypassed by assigning an element a static IP address (and changing routes)

42 Enforcement/Quarantine Quarantine Methods Switch Integration Shutting down a switch port Shutting down a switch port without knowing the topology of the network and without relating to who is connected to that particular switch Creates situations in which legitimate elements may be disconnected from the network Must have a prior knowledge on who are all of the switches which are available on the network Must have SNMP R/W access to all of the switches Unmanaged switches are a big issue ACLs ACLs provides enforcement at L3 only. Not all routers are capable of using them. Creates an extra load on a router

43 Enforcement/Quarantine Quarantine Methods ARP Poisoning Strengths Effective method Performed at L2 Does not rely on switch integration Weaknesses Must be deployed and/or connected to each subnet

44 Other Problematic Issues

45 Other Problematic Issues Authentication as the only supervision means No supervision on an element s action on the network once it is cleared to operate Authorization is not part of NAC Enforcement at L2 Vs. at L3 Managed Vs. Unmanaged Elements No knowledge regarding the big picture

46 Example

47 Microsoft NAP

48 Microsoft NAP Components Source: Microsoft Source: Microsoft

49 Microsoft NAP Components Interaction Source: Microsoft

50 Microsoft NAP Strengths Weaknesses

51 The Required

52 Questions?

53 Resources Microsoft NAP http://www.microsoft.com/technet/itsolutions/network/nap/default.mspx Cisco NAC http://www.cisco.com/en/us/netsol/ns466/networking_solutions_packa ge.html TCG https://www.trustedcomputinggroup.org/home

54 Thank You