Top Messaging Vulnerabilities Part 1 Technical Issues



Similar documents
Singlefin. protection services. Compliance. Security Solutions for @ By Kevin Beaver

CMPT 471 Networking II

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Firewalls (IPTABLES)

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

On-Site Computer Solutions values these technologies as part of an overall security plan:

Mailwall Remote Features Tour Datasheet

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Information Security Basic Concepts

Firewall Design Principles Firewall Characteristics Types of Firewalls

Secure Frequently Asked Questions

Firewalls CSCI 454/554

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

How To Protect Your Network From Attack From Outside From Inside And Outside

Building A Secure Microsoft Exchange Continuity Appliance

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewalls, Tunnels, and Network Intrusion Detection

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

SIP Security Controllers. Product Overview

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

How To Protect Your Network From Attack

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Chapter 9 Firewalls and Intrusion Prevention Systems

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

Medical Device Security Health Group Digital Output

Firewalls. Steven M. Bellovin Matsuzaki maz Yoshinobu

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Introduction of Intrusion Detection Systems

Proxies. Chapter 4. Network & Security Gildas Avoine

Introduction to Computer Security Benoit Donnet Academic Year

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Understanding and evaluating risk to information assets in your software projects

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Web Application Security

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

Networking for Caribbean Development

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Chapter 1 The Principles of Auditing 1

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Why The Security You Bought Yesterday, Won t Save You Today

Network Security Administrator

Presented by Evan Sylvester, CISSP

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Host/Platform Security. Module 11

Cyber Exploits: Improving Defenses Against Penetration Attempts

Inspection of Encrypted HTTPS Traffic

Security Technology: Firewalls and VPNs

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Windows Remote Access

Intro to Firewalls. Summary

How are we keeping Hackers away from our UCD networks and computer systems?

CIT 480: Securing Computer Systems. Firewalls

A D M I N I S T R A T O R V 1. 0

Computer Security: Principles and Practice

πωχ Notes on Domino Black Hat Las Vegas 2003 Aldora Louw PricewaterhouseCoopers

CYBERTRON NETWORK SOLUTIONS

Thick Client Application Security

DMZ Gateways: Secret Weapons for Data Security

FTA Computer Security Workshop. Secure

Using Remote Desktop Clients

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

The monsters under the bed are real World Tour

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Computer Security DD2395

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

What is Web Security? Motivation

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Serial Deployment Quick Start Guide

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

74% 96 Action Items. Compliance

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Maruleng Local Municipality

CSCE 465 Computer & Network Security

Web Engineering Web Application Security Issues

Information Security Policy

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

How To Secure An Rsa Authentication Agent

Securing Web Applications...at the Network Layer

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

V1.4. Spambrella Continuity SaaS. August 2

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Transcription:

Top Messaging Vulnerabilities Part 1 Technical Issues By Kevin Beaver, CISSP Founder and principal consultant - Principle Logic, LLC 4430 Wade Green Rd., Suite 180 Kennesaw, GA 30144 kbeaver@principlelogic.com www.principlelogic.com

About Your Presenter Kevin Beaver Information security advisor, author, and trainer 16+ years experience in IT and specializes in information security assessments and incident response Author of the new book Hacking For Dummies Author of the free ebook The Definitive Guide to Email Management and Security (Realtimepublishers.com) Co-author of the new book The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach Publications) Regular columnist and information security advisor for SearchExchange.com, SearchSecurity.com, SearchNetworking.com, and SearchWindowsSecurity.com Bachelor s in Computer Engineering Technology from Southern Poly & Master s in Management of Technology from Georgia Tech Holds CISSP, MCSE, MCNE, and IT Project+ certifications

What You ll Learn Today Common technical security vulnerabilities I see all the time in email and instant messaging systems Practical (simple and often free) countermeasures you can implement now

Common Mistakes Take security of messaging systems for granted Haven t realized the level of confidential information that flows through these systems Believe that malware protection and encryption are all that s needed Ignore or just can t keep up with all the new vulnerabilities and patches Have tough policies with no enforcement

Why highlight messaging systems? Technology is certainly not sexy! Everyone s doing it and have been for a long time Mostly widely used business app It s not just for sending messages any more One of the most commonly exploited systems

Why are messaging systems insecure? Old protocols designed w/o security in mind Convenience and usability far outweigh the demand for security Underlying OS/network issues often forgotten Applications allow too much end user control See 2 nd bullet above

How Messaging Attacks Are Carried Out Most attacks are actually pretty simple Malware taking systems down, deleting data, and even extracting confidential info Exploiting OS and other vulnerabilities to obtain remote control and more Cracking into unencrypted message stores and log files Capturing data in transit and viewing it in clear text

Email bombs Attachment overloads Auto-responder attacks DoS Attacks Some Solutions Throttle connections Limit/filter file attachments Don t allow out of office replies

Banner Grabbing Discloses important version information General lack of banner warning information Even if you do, changing banners isn t foolproof Some Solutions Change defaults Keep systems hardened patched Use an email firewall or proxy Use warning banners Hack-us us-now.com v1.0 Come on in!

Account enumeration via EXPN/VRFY commands Email header disclosures Open relays SMTP Attacks Some Solutions Disable/limit EXPN and VRFY commands Check headers and re-write them if necessary Enforce SMTP authentication Close open relays!

Clear Text Messages Most email goes across the wire/air in clear text Can disclose IP & provide ways to hack other hosts Message stores & log files are even more vulnerable Some Solutions Use switches (not foolproof!) and IDS/IDP Encrypt preferably at the server/perimeter Use a system that encrypts message store Disable/limit logging if you don t use it

Running out of storage space Lack of fault-tolerance Storage Issues Some Solutions Limit storage space just beware! Implement failover systems

Spam? Eats up bandwidth and storage space DoS anyone? Potential for malware attachments Chance of your own systems being blacklisted Diverts security resources from more important issues Some Solutions Use a mix of various filtering methods Filter at the server/perimeter mostly Resort to whitelists or stop using email?

Must allow both inbound and outbound traffic Firewalls offer limited protection Other apps running on hosts can open new holes and create stability issues Web servers for web access Passwords? Some Solutions Harden your hosts Email firewalls help just don t bypass host security Use dedicated servers Passwords?.well Vulnerable Hosts

Instant Messaging Flaws Users can easily share any drive New channel for malware Some vulnerabilities have enabled remote control Serious log file issues especially if a host is compromised or stolen Some Solutions Don t give users control! Use a more robust IM solution Use IM content filtering and firewalls

and Malware (of course) Messaging is the preferred method of travel Virus signatures and engines out of date Services running that aren t needed are often compromised Relying on protection at the desktop only is not good! Some Solutions Centralized malware protection Consider behavioral protection Use multiple layers and engines

Other Cool Countermeasures Implement technical security measures as close to the network perimeter & as far away from users as possible Use PGP or S/MIME for standalone encryption If practical email firewalls work great Consider IM protection as well Don t rely on technical security measures alone!

Don t Think that messaging vulnerabilities are important just because it s not sexy Think that email is less vulnerable than your other systems Assume that if no issues are found when testing that none exist now or will in the future

Tools Test for open relays www.abuse.net/relay.html Email security test www.gfi.com/emailsecuritytest SMTPScan to see what the bad guys can see www.greyhats.org/outils/smtpscan Spam lookup and other email tests www.dnsstuff.com

Resources Vulnerability Databases NIST ICAT Metabase http://icat.nist.gov/icat.cfm Common Vulnerabilities and Exposures www.cve.mitre.org/cve System Hardening NSA Configuration Guides www.nsa.gov/snac Guide on disabling open relays www.mailabuse.org/tsi/ar-fix.html My in-depth testing techniques in Hacking For Dummies

Wrap Up Remember that Technical security issues in messaging systems must remain on your security shortlist Test them as you would web servers, file servers, OSs, & other critical systems Your network is only as secure as your weakest system don t let email be the point of entry Vice versa A pound of prevention is worth a ton of cure Keep It Simple, Somebody!

Thanks for joining me!