Healthcare Information Security Governance and Public Safety II



Similar documents
Professional Penetration Testing Techniques and Vulnerability Assessment ...

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

McAfee Certified Assessment Specialist Network

DenyAll Detect. Technical documentation 07/27/2015

Build Your Own Security Lab

Penetration Testing 2014


Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

CYBERTRON NETWORK SOLUTIONS

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Certified Ethical Hacker (CEH)

Vulnerability Assessment and Penetration Testing

CEH Version8 Course Outline

CIS 4204 Ethical Hacking Fall, 2014

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Certified Ethical Hacker Exam Version Comparison. Version Comparison

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

SONDRA SCHNEIDER JOHN NUNES

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

[CEH]: Ethical Hacking and Countermeasures

EC Council Certified Ethical Hacker V8

Securing Cisco Network Devices (SND)

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Kerem Kocaer 2010/04/14

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

locuz.com Professional Services Security Audit Services

Learn Ethical Hacking, Become a Pentester

Windows Remote Access

IBM Internet Scanner software

Vinny Hoxha Vinny Hoxha 12/08/2009

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

gathering Dave van Stein 9 april 2009

Cyber Threats, Trends, and Security Configurations. June 2, Shevaun Culmer-Reid, Program Manager

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

BMC Client Management - SCAP Implementation Statement. Version 12.0

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Penetration Testing Report Client: Business Solutions June 15 th 2015

VMware: Advanced Security

4. Getting started: Performing an audit

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Footprinting and Reconnaissance Tools

Audience. Pre-Requisites

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Assessing Network Security

Check list เตร ยมความพร อมด าน Cyber Security ให หน วยงาน 6 th October 2015 Avirut Liangsiri 1. Effective:

Payment Card Industry (PCI) Data Security Standard

Federal Desktop Core Configuration (FDCC)

Getting Started with Capacity Planner

Network Attacks and Defenses

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

FSP-201: Ethical Hacking & IT Security

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Running a Default Vulnerability Scan SAINTcorporation.com

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Integrigy Corporate Overview

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

INFORMATION SECURITY TRAINING CATALOG (2015)

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Attacks and Defense. Phase 1: Reconnaissance

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Rapid Vulnerability Assessment Report

FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs

Penetration Testing. Presented by

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Web App Security Audit Services

Shipping Products Chart. Contents

Introduction to Network Security Lab 2 - NMap

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Network Security Audit. Vulnerability Assessment (VA)

Certified Penetration Testing Engineer

Real-Time Database Protection and. Overview IBM Corporation

How To Manage A System Vulnerability Management Program

The Nexpose Expert System

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

EC Council Security Analyst (ECSA)

Transcription:

Healthcare Information Security Governance and Public Safety II Technical Track Seminar Agenda 8/26/2009 1

Vulnerability Assessment, Vulnerability Management and Penetration Testing PART 1 9:00 10:30

Anatomy of A Hack How hacker attack your system? Reconnaissance Scanning Gaining Access Privilege Escalation and Maintaining Access Covering tracks

Reconnaissance หา URL ของ เป าหมาย ม WEB Site อ นอ ก ใน Intranet หร อไม หาเอกสารท อาจม ข อม ลส าค ญ หาข อม ลบ คคล ข อม ลส าค ญจาก แหล งอ นๆ Search Engine Sub Domains pdf, doc, xls, ppt Directory Services Social Networking Web Site ร บสม ครงาน ข อม ลบร ษ ทจดทะเบ ยน

หา URL ของเป าหมาย

ม WEB Site อ นอ กใน Intranet หร อไม mail.acisonline.net mx.acisonline.net Ns.acisonline.net ftp.acisonline.net webmail. acisonline.net web.acisonline.net gateway.acisonline.net secure.acisonline.net intranet. acisonline.net extranet.acisonline.net smtp.acisonline.net pop.acisonline.net

หาเอกสารท อาจม ข อม ลสาค ญ filetype:doc site:acisonline.net filetype:pdf site:acisonline.net

หาข อม ลบ คคล

ข อม ลสาค ญจากแหล งอ นๆ

ข อม ลสาค ญจากแหล งอ นๆ (ต อ) http://www. archive.org

ข อม ลสาค ญจากแหล งอ นๆ (ต อ) http://www. archive.org

ข อม ลสาค ญจากแหล งอ นๆ (ต อ) http://www. Netcraft.com

Footprinting Tools BiLE Suite Web Data Extractor Tool SpiderFoot 3D Traceroute Path Analyzer Pro Maltego Power E-mail Collector Tool Kartoo Search Engine

Scanning ARP Scan PING Sweep TCP Scan Stealth Scanning Full TCP Scan Service Fingerprint OS Fingerprint UDP Scan

Scanning NMAP Scanner

Enumeration Banner Grapping Service Fingerprint NetBIOS Enumeration User Lists Group Lists Share Folders/Printer Sharing RPC Enumeration SNMP Scan

Enumeration NMAP Scanner

Enumeration Service Fingerprint

Gaining Access Exploit Buffer Overflow Password Eavesdropping Password Attack Dictionary Attack Brute-Force Attack

Gaining Access Exploit

Vulnerability Assessment (VA)

Vulnerability Management (VM)

Penetration Testing Black-Box Penetration Testing White-Box Penetration Testing

Penetration Testing

Penetration Testing

Microsoft Windows Platform Assessing and Hardening PART 2 10:45 12:00

System Configuration Review Testers using manual review techniques use security configuration guides or checklists to verify that system settings are configured to minimize security risks NIST maintains a repository of security configuration checklists for IT products at http://checklists.nist.gov

NIST SP800-70: Security Configuration Checklists Program for IT Products The name of the organization and authors that produce the checklist Center for Internet Security (CIS) Citadel Security Software Defense Information Systems Agency (DISA) National Security Agency (NSA) NIST, Computer Security Division ThreatGuard HP, Kyocera Mita America INC, LJK Software, Microsoft Corporation

Microsoft Windows Security Guidelines and Checklists Microsoft Security Guidance http://technet.microsoft.com/en-us/library/cc184906.aspx Security Guide Documents Security Template National Security Agency (NSA) As Microsoft Security Guidance Center for Internet Security (CIS) CIS Benchmark Documents (Modified from Microsoft Security Guidance) Scoring Tools Defense Information System Agency (DISA)

Microsoft Windows Security Guidelines and Checklists Defense Information Security Agency (DISA) Windows 2000 Security Checklist Windows 2003 Security Checklist Windows Vista Security Checklist Windows XP Security Checklist Windows 2008 Security Checklist Evaluate Script Windows Gold Disk (scan only) Implementation Guides Windows 2000/XP/2003/Vista/ Windows 2008

Security Template [Event Audit] AuditSystemEvents = 1 [System Access] LSAAnonymousNameLookup = 0 [System Log] MaximumLogSize = 16384 [Privilege Rights] SeInteractiveLogonRight = *S-1-5-32-544 [File Security] "%systemroot%\system32\tlntsvr.exe",1,"d :PAR(A;OIIO;FA;;;BA)(A;OIIO;FA;;;SY)" [Registry Values] MACHINE\System\CurrentControlSet\Service s\tcpip\parameters\enabledeadgwdetect=4, 0 You can use Security Configuration and Analysis tool to: Assessment Analysis Configuration

Using Security Configuration and Analysis Tool DEMO

Linux / Unix Assessing and Hardening PART 3 13:15 14:30

Unix/Linux Security Guidelines and Checklists Center for Internet Security (CIS) CIS Benchmark Documents Scoring Tools Mac OS X AIX FreeBSD Red Hat Linux Solaris 10 SUSE Linux Solaris 10 11/06 and 8/07 Slackware Linux Solaris 2.5.1-9.0 Debian Linux HP-UX Novell OES:NetWare

Unix/Linux Security Guidelines and Checklists National Security Agency (NSA) Security Configuration Guide Apple Mac OS X v10.3.x "Panther Apple Mac OS X v10.4.x "Tiger" RedHat Enterprise Linux 5 Guides Update Nov 19, 2007 Sun Solaris 8 Guides Sun Solaris 9 Guides Defense Information Security Agency (DISA) MAC OS X 10.4 STIG Memo Update July 25, 2007 UNIX STIG V5R1 Update April 4, 2006

Bastille-Unix Security Guide Recommended >>> 100%

Bastille-Linux DEMO

Wireless LAN Assessing and Monitoring PART 4 15:00 16:30

Vulnerabilities of IEEE 802.11 Open system authentication vulnerabilities MAC Address spoofing SSID can easy to discovered Shared key authentication vulnerabilities WEP Weak IVs Packet Injection WPA (Personal) Brute-force attack External authentication vulnerabilities RADIUS Shared Key Brute-force attack Rouge AP

Wireless LAN Attacks DEMO

Wireless LAN Security Guidelines and Checklists Center for Internet Security (CIS) Assessing the security of a wireless environment Wireless Network Benchmark Defense Information Security Agency (DISA) Wireless Security Checklist Wireless Security Technical Implementation Guide National Security Agency (NSA) Recommended 802.11 Wireless Local Area Network Architecture Guidelines for the Development and Evaluation of IEEE 802.11 Intrusion Detection Systems (IDS)

Wireless Intrusion Prevention System

Example: Air Defense

Example: WiFi Manager

Rouge AP Detect

Spectrum Analysis

Site Survey

Faraday Cages

Faraday Cages (cont)

Questions and Answers