Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Similar documents
Security Awareness For Website Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Network Security Audit. Vulnerability Assessment (VA)

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

FORBIDDEN - Ethical Hacking Workshop Duration

Build Your Own Security Lab

On-Site Computer Solutions values these technologies as part of an overall security plan:

Ethical Hacking Course Layout

Closing Wireless Loopholes for PCI Compliance and Security

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

CYBERTRON NETWORK SOLUTIONS

Loophole+ with Ethical Hacking and Penetration Testing

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Where every interaction matters.

Passing PCI Compliance How to Address the Application Security Mandates

Understanding Security Testing

Presented by Evan Sylvester, CISSP

Professional Penetration Testing Techniques and Vulnerability Assessment ...

SecurityMetrics Vision whitepaper

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Attack and Penetration Testing 101

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Common Cyber Threats. Common cyber threats include:

Course Title: Penetration Testing: Network & Perimeter Testing

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Wireless Auditing on a Budget

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Topics in Network Security

The Nexpose Expert System

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

SANS Top 20 Critical Controls for Effective Cyber Defense

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Concierge SIEM Reporting Overview

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Penetration Testing //Vulnerability Assessment //Remedy

March

Top 10 Database. Misconfigurations.

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

4. Getting started: Performing an audit

Mobile security and your EMR. Presented by: Shawn Tester & Allen Cornwall

Ed Ferrara, MSIA, CISSP Fox School of Business

A Decision Maker s Guide to Securing an IT Infrastructure

Presented By: Bryan Miller CCIE, CISSP

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

CRYPTUS DIPLOMA IN IT SECURITY

PCI Wireless Compliance with AirTight WIPS

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) mail.biz

IBM Managed Security Services Vulnerability Scanning:

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

NCS490 Penetration Testing. Ronny L. Bull, MS Lecturer Computer Science Department. Spring 2014

Network and Security Controls

Healthcare Security Vulnerabilities. Adam Goslin Chief Operations Officer High Bit Security

Information Security Services

IT HEALTHCHECK TOP TIPS WHITEPAPER

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Columbia University Web Security Standards and Practices. Objective and Scope

Cyber R &D Research Roundtable

Secure Web Applications. The front line defense

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Penetration Testing. Presented by

Web Application Penetration Testing

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM


WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Kerem Kocaer 2010/04/14

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Penetration Testing Report Client: Business Solutions June 15 th 2015

Sitefinity Security and Best Practices

GFI White Paper PCI-DSS compliance and GFI Software products

Web Security School Final Exam

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Malicious Network Traffic Analysis

Best Practices For Department Server and Enterprise System Checklist

The Trivial Cisco IP Phones Compromise

Network Security: Introduction

Top 20 Critical Security Controls

Penetration Testing Service. By Comsec Information Security Consulting

Department of Homeland Security

Assessing Network Security

How to complete the Secure Internet Site Declaration (SISD) form

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Web Plus Security Features and Recommendations

Database Security Guide

WHITEPAPER. Nessus Exploit Integration

05.0 Application Development

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Description: Course Details:

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

10 Application and Network Security and security testing. IT Governance CEN 667

Security Implications Associated with Mass Notification Systems

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

(WAPT) Web Application Penetration Testing

Transcription:

Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions

Purpose and Scope To present a best practice approach to securing your servers To present real life examples of vulnerability assessment successes To present hacker techniques but not specific tools 2

Legal Disclaimer Don t try this at home Get written permission before trying any of these techniques The main difference between a security admin and a hacker is permission 3

Physical Security Locks keep honest people honest 4

SANS Top Threats 2008 1. Website attacks: exploiting browser holes 2. Botnets 3. Cyber espionage 4. Mobile phone threats 5. Insider attacks 70% of hacks are from in house 6. Malicious spyware 7. Web application security exploits 8. Social engineering through phishing 5

Layered Security Sample Attack Vectors Internal person Spear phishing Social engineering Botnets SQL injection 6

Security In-Depth 7

Return on Investment 2006 Illinois breach notification law Average cost to notify per identity compromised? $14-90 Black market value of your identity? $2-18 What is the return on investment for proactive security? 8

Testing Methodology Start Discovery (passive) Penetration Testing Vulnerability Assessment Enumeration (active) Vulnerability Assessment 9

Discovery Internet registrar search (http://whois.net) General company research (Google, etc.) Dumpster diving Archive.org Newsgroups Techs posting questions Job postings Specific software used 10

Discovery Google hacking Password site:yoursite.com Filetype:doc site:yoursite.com classified Robots.txt site:yoursite.com Intitle:index.of parent directory site:yoursite.com 11

Enumeration Ping sweeps / port scanning Banner grabbing (telnet ip port) Fingerprinting MSN virtual hosts search (ip:address) Directory Structure Default directories: /admin /secure /adm Backup files: /.bak /backup /back /log /archive Include files: /include /inc /js /global /local 12

Enumeration Common files Ws_ftp.log Install.txt ToDo HTML source code Password, select, insert, #include, #exec, connect, // Comments 13

Enumeration Hidden fields Query strings User ID (/login?userid=558253) Session ID (/menu.asp?sid=69jt7b9329kuy) Database queries (/dbsumit.php?stitle=ms&iphone=5551212) 14

Corrective Actions Investigate and disconnect unauthorized hosts Disable or remove unnecessary or vulnerable services 15

Vulnerability Assessment Proactive Validate policy compliance ID vulnerabilities Fast and easy Video (MS06-040 proof of concept) 16

Vulnerability Assessment Weaknesses False positives Requires high expertise in networking and OS security 17

Corrective Actions Upgrade or patch vulnerable devices Improve setup procedures and security baseline steps Assign a staff member to monitor alerts and mailing lists Modify the organization's security policies Implement and monitor Intrusion Detection Example (DoD calls) 18

Passwords Password Cracking Identify weak or default passwords Verify the use of complex passwords Brute force attack estimator Video (Lock your PC) Characters (complex) Estimated time to crack 7.009 hours 8 2.34 hours 14 9 hours 15 209 days 19

Passwords A strong password is: 8 or more characters Uppercase and lowercase Alpha-numeric Odd character(s) Non-dictionary Non-pronounceable 15 or more characters for admin passwords (recommended) 20

Passwords Prevention Set minimum length and complexity through group policies Disable LM hashing Don t store passwords in plain text Password Safe (recommended) Educate the users Change defaults Example (Router and password) 21

Penetration Testing Example (Cisco Exploit) Demo (Sample audit report) 22

Post Testing Actions Remediate vulnerabilities Update policies Security awareness Legal notice Patch, patch, patch Change passwords 23

Legal Notice 24

Wireless Security 802.11b has serious flaws in its current implementation of WEP AP s often set to default configuration 300-600 feet range (more with an antenna) WPA 2 or above for encryption WEP 128 bit encryption can be cracked in 1 to 6 minutes 25

Wireless Security Don t use hotel or coffee shop wireless for anything requiring authentication or confidentiality (treat them like a postcard) Don t jump on free_internet Avoid theft of service 26

War Driving 27

Corrective Actions Create and communicate a wireless policy Search for (and remove) rogue AP s and misconfigured wireless LANs 28

Conclusion Security is a journey, not a destination. Keep informed Newsgroups Constant research Books, etc. 29

Resources www.securiteam.com US-CERT bulletins www.us-cert.gov/cas/bulletins/ National Vulnerability Database http://nvd.nist.gov/ 30

Security Awareness Material www.illinois.gov/bccs/services/catalog/security/ assessments/pages/awareness.aspx 31