What is VNC. VNC Solutions and Related. What VNC Solutions are available. Defining some terms



Similar documents
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Windows Remote Access

CS5008: Internet Computing

RemotelyAnywhere. Security Considerations

Potential Targets - Field Devices

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Guideline on Firewall

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

GoToMyPC Corporate Advanced Firewall Support Features

Medical Device Security Health Group Digital Output

VNC User Guide. Version 5.3. December 2015

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Who is Watching You? Video Conferencing Security

Where every interaction matters.

Abstract. Introduction. Section I. What is Denial of Service Attack?

LogMeIn Security an In-Depth Look

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Solution of Exercise Sheet 5

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition

Secure web transactions system

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Firewalls, Tunnels, and Network Intrusion Detection

Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly

The Trivial Cisco IP Phones Compromise

VNC User Guide. Version 5.0. June 2012

Criteria for web application security check. Version

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Security Considerations for DirectAccess Deployments. Whitepaper

RemotelyAnywhere. Security Overview

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

Using a VPN with Niagara Systems. v0.3 6, July 2013

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Chapter 8 Security Pt 2

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Cisco Advanced Services for Network Security

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Firewall Environments. Name

Secure remote access to your applications and data. Secure Application Access

Lecture 23: Firewalls

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

SSL VPN Technical Primer

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

Compliance and Security Challenges with Remote Administration

A HELPING HAND TO PROTECT YOUR REPUTATION

CTS2134 Introduction to Networking. Module Network Security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

CS Final Exam

A Model Design of Network Security for Private and Public Data Transmission

Network Incident Report

Firewalls: An Effective Solution for Internet Security E. Eugene Schultz Payoff

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Basics of Internet Security

CMPT 471 Networking II

CHAPTER 1 INTRODUCTION

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

How To Protect A Web Application From Attack From A Trusted Environment

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

The next generation of knowledge and expertise Wireless Security Basics

The Desktop Sharing Handbook. Brad Hards

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Overview. Firewall Security. Perimeter Security Devices. Routers

SHORT MESSAGE SERVICE SECURITY

TRACING VNC AND RDP PROTOCOL ARTEFACTS ON WINDOWS MOBILE AND WINDOWS SMARTPHONE FOR FORENSIC PURPOSE

Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management

White Paper: Managing Security on Mobile Phones

Best Practices for Secure Remote Access. Aventail Technical White Paper

Security Awareness. Wireless Network Security

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Network Access Security. Lesson 10

DDoS Overview and Incident Response Guide. July 2014

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Client Server Registration Protocol

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Remote Access Security

Chapter 9 Firewalls and Intrusion Prevention Systems

Eleventh Hour Security+

Network Security Policy

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & CBAC. philip.heimer@hh.se

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Transcription:

What is VNC VNC Solutions and Related Security Concerns VNC is basically a remote desktop protocol. VNC stands for Virtual Network Computing. VNC is cross platform making it an ideal solution for IT environments which use multiple computing platforms. Matthew Cannizzaro Defining some terms VNC is a graphical desktop sharing system used to remotely control another computer. RFB Protocol -is a simple protocol for remote access to graphical user interfaces. It is applicable to all windowing systems and applications including Windows and Macintosh. Framebuffer -is a video output device that drives a video display from a memory buffer containing a complete frame of data. The information in the buffer typically consists of color values for every pixel on the screen. What VNC Solutions are available Many, too many to list them all Some of the more popular Remote Desktop/VNC Solutions are: RealVNC TightVNC UltraVNC GotoMyPc LogMeIn

Basic Idea LogMeIn Security White Papers Attack mitigation Authentication and authorization of users to the target resource Authentication of the target resource to users Data confidentiality Authentication and authorization of users within the target resource LogMeIn Security Authentication Authentication of the Target Resource to Users Accomplished by verifying the SSL certificate Authentication of Users to the Gateway Simple username/password combination Optional list of one-time passwords maybe generated Optional one-time use passwords maybe sent to a designated wireless device (cell phone). Authentication of the Gateway to the Host Accomplished by verifying the SSL certificate Authentication of the Host to the Gateway Verified by a unique identifier sent over SSL secured channels from the host only after the gateway has been authenticated. LogMeIn Security Data Encryption Client sends a list of preferred encryption protocols to the server. The server will normally select from the list the strongest algorithm. This process allows both the client and server to reject encryption algorithms that have been compromised even if only one side (usually the server) is fully updated. Data is encrypted using SSL/TLS (RC4 and 3DES, etc.) and includes AES in some more advances (paid services) versions. RC4 uses 128 bit keys, 3DES uses 168 bit keys. AES can use either 128 or 256 bit keys.

LogMeIn Security Intrusion Detection IP Address Filter Requests are first checked against a list of trusted or untrusted IP addresses. Connections may be denied at this level Denial of Service Filter If too many unauthenticated requests are sent within a predetermined span of time the filter will reject those connection attempts Authentication Filter If a user attempts and fails authentication excessively the filter will reject the connection. LogMeIn Security - Authentication Authentication and Authorization of Users to the Host Mandatory Windows Authentication Step Authentication and Authorization of Users within the Host LogMeIn uses the Windows access token obtained during user authentication to fool the OS to believe the user is sitting in front of the PC. Because LogMeIn uses the user s access token it must adhere to the Windows security model. This means that LogMeIn remotely supplies the same access or restrictions to the computer s resources, files, and network resources as if the user had logged on in person. LogMeIn Security -Communication LogMeInuses UDP as the foundation for its communication, though no real communication is done via the UDP layer as it is widely regarded as unsecure. LogMeIn builds it s own TCP-like transport layer on top of the UDP pathways it uses to secure the data. This allows for a TCP-like data stream further protected by an SSL layer to traverse firewalls with no additional configuration for the service required. Security Vulnerabilities Severity: MODERATE Description: LogMeIn'RACtrl.dll' ActiveX control is a remote access utility. LogMeIn'RACtrl.dll' ActiveX control is prone to multiple denial-of-service vulnerabilities. These issues affect the 'fgcolor', 'bgcolor', and 'fmcolor' attributes of the control identified by CLSID: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} Specifically, these issues arise from a NULL-pointer dereference when the application handles values supplied through the affected attributes. A remote attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious HTML page. A successful attack allows the attacker to crash the application, denying further service to legitimate users. Affected Products: LogMeIn RACtrl.dll http://www.juniper.net/security/auto/vulnerabilities/vuln30923.html

Sun, 12 Mar 2006, IT Specialist Amy Babinchak posts to [ISAserver.org Discussion List] for help. In an incident deemed IT department gone wild, the former IT employees installed rootkits, remote access software, and hidden wireless routers on a majority of the company s computing and networking resources. The former IT employees used LogMeInfor remote access to the computer systems. Amy needed to block the former employee s access to the company s resources as fast a possible. Uninstalling the software from each and every computer was the ultimate goal, but would take time. And there was no 100% way to guarantee that she would uninstall it from every computer. As Amy explored her options she found one damning concept. In her own words, So what about blocking this "gets through any firewall app"? Several options were explored, including blocking the logmein.com domain, or isolating the domain in its own DNS zone with no DNS records for it. The participants on the discussion list including Amy fall short of actually reporting what the final solution was. Several times Amy asks about a nuke and pave Several times Amy asks about a nuke and pave solution. Indicating that her employer has given or is considering this as their final solution.

The perfect storm of untrustworthy employees with a high level of access and a little know-how coupled with the use of an apparently unblockable service allowed for a completely compromised IT environment. The former employees now had access to pretty much any system within the company, protected by a firewall or not. The subsequent infra-structure repair cost the company a substantial sum of money, which could have ranged into the hundreds of thousands of dollars or more. Worse yet if they ended up having to Nuke and Pave their entire data center, as that sort of operation cannot be carried out while remaining transparent to their clients. Resources and Related Material LogMeIn Security white paper https://secure.logmein.com/documentation/security/wp_lmi_security.pdf Juniper.net security report regarding LogMeIn http://www.juniper.net/security/auto/vulnerabilities/vuln30923.html Wikipedia http://en.wikipedia.org/wiki/vnc Freelists.org http://www.freelists.org/post/isalist/ot-blocking-logmein-with- Checkpoint,12