Lab 1: Security Audit



Similar documents
Using a VPN with Niagara Systems. v0.3 6, July 2013

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Using a VPN with CentraLine AX Systems

Locking down a Hitachi ID Suite server

Smart Telephone System

Chapter 8 Router and Network Management

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Comtrend 1 Port Router Installation Guide CT-5072T

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

Security Best Practice

Windows Remote Access

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

FileCloud Security FAQ

Remote Desktop How-To. How to log into your computer remotely using Windows XP, etc.

Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

GoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster

Perimeter Firewalls. Brandon Napier Rick Archibald Pete Jamison HAL PC & HLUG 09/22/2007. brought to you by: in association with

How To Protect Decd Information From Harm

Securing Windows Remote Desktop with CopSSH

Daylite Server Admin Guide (Dec 09, 2011)

Securing Windows Remote Desktop with CopSSH

EZblue BusinessServer The All - In - One Server For Your Home And Business

Network Security Guidelines. e-governance

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

System Security Policy Management: Advanced Audit Tasks

Connecting to Another PC with Remote Assistance

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Comtrend 4 Port Router Installation Guide CT-5361T

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

For assistance with your computer, software or router we have supplied the following information: Tech Support , press 1

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Information Security

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

EZblue BusinessServer The All - In - One Server For Your Home And Business

By David G. Holmberg, Ph.D., Member ASHRAE

White Paper. BD Assurity Linc Software Security. Overview

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Consensus Policy Resource Community. Lab Security Policy

Cisco Virtual Office Express

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Log Management for the University of California: Issues and Recommendations

Remote Unix Lab Environment (RULE)

A Decision Maker s Guide to Securing an IT Infrastructure

Novell Open Workgroup Suite

Hardening Guide. Installation Guide

Network Setup Guide. 1 Glossary. 2 Operation. 1.1 Static IP. 1.2 Point-to-Point Protocol over Ethernet (PPPoE)

Quick Installation Guide For Mac users

SecurityMetrics Vision whitepaper

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

your Gateway Windows network installationguide b wireless series Router model WBR-100 Configuring Installing

Best Practices For Department Server and Enterprise System Checklist

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

LevelOne. User Manual. FBR-1430 VPN Broadband Router, 1W 4L V1.0

Advanced Diploma In Hardware, Networking & Server Configuration

IT Networking and Security

Instructions for use the VPN at the Warsaw School of Economics

Setting up VNC, SAMBA and SSH on Ubuntu Linux PCs Getting More Benefit out of Your Local Area Network

GoToMyPC and. pcanywhere. expertcity.com. Remote-Access Technologies: A Comparison of

Stable and Secure Network Infrastructure Benchmarks

Information Technology Security Procedures

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Quick Installation Guide

CMPT 471 Networking II

Quick Installation Guide-For MAC users

Quality of Service (bandwidth limitation): Default is 2 megabits per second.

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

Amahi Instruction Manual

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

The Self-Hack Audit Stephen James Payoff

Codes of Connection for Devices Connected to Newcastle University ICT Network

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Network & Information Security Policy

Hacking Database for Owning your Data

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

The Real State of WiFi Security in the Connected Home August 25, 2015

Tips for Banking Online Safely

Topics in Network Security

Section 12 MUST BE COMPLETED BY: 4/22

RemotelyAnywhere. Security Considerations

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

SyncLockStatus Evaluator s Guide

Recommended IP Telephony Architecture

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Countering and reducing ICT security risks 1. Physical and environmental risks

Transcription:

Lab 1: Security Audit Mark Gius October 10, 2014 1 System Description The system is a low-powered Atom PC, small form factor (it is less than 12 on each side, and about 3 tall), with a 320GB hard drive and 2GB of ram. The system is located in my bedroom in a house in San Luis Obispo, on top of another computer. It is plugged into a surge protector, but not a UPS. The surge protector is shared with several other computers. The system has no input devices plugged into it (keyboard, mouse, webcam, etc). The system is connected to the internet via a switch in my bedroom that is shared with several other desktops. The bedroom switch connects to a shared house switch via a cable that runs along the floor of the hallway leading to my bedroom. The shared workgroup switch has connects to a Linksys router running DD-WRT (linux), connected to a DSL modem (local ATT affiliate ISP). 2 Threat Analysis Threat Power Loss Availability The system is completely unavailable in the event of a power loss Integrity Power loss is well known to cause data corruption Random power outage (or malicious conduct) could cause power loss to the system 1

Shared Network Public OpenSSH Availability Power outages can be mitigated by attaching the server to a UPS. There is not currently a UPS on this system. Integrity Steps can be taken to ensure data integrity, such as journaling filesystems or battery backed disk cache. A journaling filesystem is currently in place (ext3) and past experience has shown that the journal is reasonably effective at preventing integrity errors. Availability A malicious or incompetent roommate can use all available resources, limiting system s access. Confidentiality Data on shared equipment can be snooped. Network on which computer is located is untrusted. Availability Reasonably sane QoS policies on router reduce competition for network resources. Confidentiality All sensitive data is sent and received via encrypted, and possibly authenticated channels (HTTPS, SSL, etc). Availability Compromised accounts could consume system resources or damage services Confidentiality Compromised accounts could grant information to unathorized persons Integrity Compromised accounts could modify system configurations and data A user account with a bad password could become compromised and allow unathorized access to the system 2

Theft General OpenSSH is configured to disallow remote root login. sshblackd script monitors for repeated failed logins (brute force attempts) and adds IPs to a banned iptables chain. All admin accounts have reasonably secure passwords. OpenSSH is listening on a nonstandard port. Confidentiality Sensitive data is not publically readable via file system permissions, so compromised non-admin accounts are prevented from accessing restricted data Integrity Same as above, except read/write Availability A missing computer is an unavailable computer! Confidentiality With physical access to the hardware an attacker would have full access to any data on the system. The system is small and unlocked. Any person who gains access to the home (locked external door) would be able to easily take the system. 3

Public Fileshares Dynamic DNS General The house is generally locked, and roommates are trustworthy. Roommate s guests are also generally trustworthy. Strangers in the home would be confronted by roommates (assuming somebody was home. Availability A lock could be placed on the system to prevent theft. Currently unlocked, and more valuable systems would be higher in the priority list. Confidentiality Whole-disk encryption with required password to unlock would protect data. Currently unused because I don t care and data on disk is not important enough to encrypt. Confidentiality Files that are not supposed to be accessible can be made accessible, either by exploit or accidental publishing of files. Integrity Read-only shares may be written to. Samba exploits could allow access to restricted files, or allow read-only shares to be written to. Confidentiality Integrity Not much I can do here Backups to another system can ensure that a valid version of the file is always available. Availability If DNS service goes down, or if DNS is not updated properly, the system will be unavailable except by IP address. System is connected to the internet via a home DSL connection, with a dynamically assigned IP address. Dynamic DNS service is used to provide a consistent address on the internet for the system. Availability Choose a reliable DynDNS service. Purchase a static IP 4

Compromised Roommates PCs IRC Bot Availability Compromised PCs can consume unreasonable levels of shared resources. Confidentiality Compromised PCs can expose internal -only resources to unathorized persons. Resources which are supposed to be internal can be exposed if another machine on the network is compromised. This bypasses any rules that grant internal machies more access than an external one. General Could hold house-wide security audits. Availability Detect and Take down any compromised machines. Confidentiality Treat internal and external users as the same, assume that anything published for an internal user will be accessed by somebody on the outside. Confidentiality Exploited IRC bot could be used to gain access to system resources. Integrity Exploited IRC bot could change IRC logs or communicate as me IRC software is probably not designed with highsecurity in mind. It is likely that the IRC client can be exploited. Confidentiality Run the IRC bot as an unprivileged user to prevent access. Integrity Keep backups of the logs that the IRC user can t touch. I m not doing this because I really don t care. 3 Conclusions Overall, I would rate the risk level of this system as low. Almost all of the threats evaluated are known, and are mitigated in some fashion. The only publically accessible route into the system is an OpenSSH service. OpenSSH has a long (long) history of being coded by paranoid security fanatics. In addition, OpenSSH is listening on a non-standard port, which mitigates the effects of automated bots. In addition, the machine only really 5

provides one important function, that of a source code repository for myself. Because I recently switched from subversion to git, I now have several such repositories that I sync to, so the importance of this machine has diminished. The data on the system consists primarily of these repositories of program code and a collection of MP3s. These MP3s are backed up to other locations periodically, so their loss is not critical. Although incompetence, maliciousness, or malfeasance on the part of my roommates could cause damage to my systems, they are all generally trustworthy in this regard. Between technical competence, and a cold-war -esque mutually assured self-destruction, we tend to leave each other s machines alone. I take mild precautions (local firewalls, antivirus for windows, read-only network shares) regardless, but I m certain that none of my roommates are sitting in their rooms trying to hack me. They might as well walk into my room and steal the hardware. In short: nothing particularly sensitive or important, the only write-only access is via OpenSSH, which is coded by paranoid security experts, and reasonably trustworthy roommates. 6