Insecure IP Storage Networks. Presenter: Himanshu Dwivedi Regional Technical Director @stake, Inc.



Similar documents
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01

NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Exam Questions SY0-401

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC

Security Considerations White Paper for Cisco Smart Storage 1

Oracle ZFS Storage Appliance Security Guide

NAS 109 Using NAS with Linux

1. LAB SNIFFING LAB ID: 10

Data ONTAP : Best Practices for Secure Configuration

Storage Security. Presenter: Himanshu Dwivedi. BlackHat 2003

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Internal Penetration Test

How To Set Up Egnyte For Netapp Sync For Netapp

SGI NAS. CIFS User Guide Release 3.1.x

CTS2134 Introduction to Networking. Module Network Security

Get Success in Passing Your Certification Exam at first attempt!

ONEFS MULTIPROTOCOL SECURITY UNTANGLED

Clustered Data ONTAP 8.2

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Implementing SSH Strategies for Optimizing the Secure Shell. Himanshu Dwivedi

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

Caché Integration with a Network Appliance Filer

Security. TestOut Modules

How To Manage File Access On Data Ontap On A Pc Or Mac Or Mac (For A Mac) On A Network (For Mac) With A Network Or Ipad (For An Ipad) On An Ipa (For Pc Or

SSL VPN A look at UCD through the tunnel

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

TELE 301 Network Management. Lecture 16: Remote Terminal Services

NAS 224 Remote Access Manual Configuration

Swiss Cyber Storm II Case: NFS Hacking

PineApp Archive-Secure Quick Installation Guide:

Quality of Service (bandwidth limitation): Default is 2 megabits per second.

Security IIS Service Lesson 6

How to Backup XenServer VM with VirtualIQ

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Setting Up Scan to SMB on TaskALFA series MFP s.

How To Use Directcontrol With Netapp Filers And Directcontrol Together

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

Instructions for Adding a MacOS 10.4.x Client to ASURITE

Tactical Exploitation the other way to pen-test. hdm / valsmith

SSH and FTP on Ubuntu WNYLUG Neal Chapman 09/09/2009

Using Network Attached Storage with Linux. by Andy Pepperdine

IIS, FTP Server and Windows

EMC VNXe Series. Security Configuration Guide. Version REV 04

Solution of Exercise Sheet 5

visionapp Remote Desktop 2010 (vrd 2010)

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Quick Start - NetApp File Archiver

DiamondStream Data Security Policy Summary

Policy. London School of Economics & Political Science. Encrypted Authentication IMT. Jethro Perkins. Information Security Manager. Version 1.

The Mac OS X Server Essentials v10.5 Exam Skills Assessment Guide

Codes of Connection for Devices Connected to Newcastle University ICT Network

GS1 Trade Sync Connectivity guide

Topics in Network Security

Directory and File Transfer Services. Chapter 7

SCP - Strategic Infrastructure Security

How to setup FTP and Secure FTP for XD Series

Data ONTAP 8.2. Software Setup Guide For 7-Mode. NetApp, Inc. 495 East Java Drive Sunnyvale, CA U.S.

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

WHITE PAPER. Home Directories on Snap Server GuardianOS

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Pre Sales Communications

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

Network Security. Network Packet Analysis

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc.

Network Forensics: Log Analysis

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Parallels Plesk Panel

My FreeScan Vulnerabilities Report

VoIP Security. Title: Something Old (H.323), Something New (IAX), Something Hallow (Security), & Something Blue (VoIP Administrators)

Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4)

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

PRINTER SECURITY AUDIT: THE UNIVERSITY OF VIRGINIA. Kevin Savoy, CPA, CISA, CISSP Brian Daniels, CISA, GCFA

CONFIGURING ACTIVE DIRECTORY IN LIFELINE

Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger.

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Charles Firth Managing Macs in a Windows World

Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter

Configure NFS Staging for ACS 5.x Backup on Windows and Linux

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

File Services. File Services at a Glance

EMC VNX Series. Using FTP, TFTP, and SFTP on VNX. Release 7.0 P/N REV A01

How to Join QNAP NAS to Microsoft Active Directory (AD)

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Dionseq Uatummy Odolorem Vel Layered Security Approach

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory

Transcription:

Insecure IP Storage Networks Presenter: Himanshu Dwivedi Regional Technical Director @stake, Inc. BlackHat 2004

Agenda Insecure Network Attached Storage (NAS) Introduction NAS Protocols NAS Attacks Conclusion

Introduction Network Attached Storage (NAS) Remote network storage supporting a local file system. File systems are accessed over IP networks via NFS, CIFS, FTP, or o HTTP CIFS Client c:\net use D: \\nas\software /u: C:\ <local files on local machine > D:\ <remote files of NAS device> Exports/Shares on NAS device: CIFS Shares: C$ software NFS Client mount nas:/vol/vol2/marketing /mktg /etc <local files on local machine> /mktg <remote files on NAS device> NAS Device NFS Exports: vol/vol1/hr vol/vol2/marketing

Introduction Default NAS Appliances Default installations of most systems are usually weak in term of security..nas storage appliances are no different Nothing new here NAS storage appliances that support NFS and CIFS *also* support their weaknesses Assumptions of Storage Devices NAS storage appliances don t fix the problems with NFS or CIFS, but rather inherit them

NAS Protocols NFS Platform: Client/Server architecture for *nix systems Purpose: Remote file sharing over IP networks Weakness: Authentication, Authorization, Encryption CIFS Platform: Client/Server architecture for Windows systems Purpose: Remote file sharing over IP networks Weakness: Authentication, Authorization, Encryption

NAS Attacks NAS: NFS and CIFS Scanning Enumeration Anonymous Access Subvert Permissions Sniffing

NAS Scanning: NFS and CIFS NAS: Scanning Scan the NAS Device NFS and CIFS (SMB) ports are open

NAS Scanning: NFS and CIFS NAS: Scanning Information Gained: Listening Ports Data Services (NFS, CIFS, FTP, HTTP) Management Services (Telnet, SSH, HTTPS)

NAS Enumeration: NFS and CIFS NAS: Enumeration Enumerate the NFS Mounts and CIFS Shares CIFS: c:\winfo <ipaddress> -n NFS: #showmount# e e <ipaddress< ipaddress> Enumerate NAS usernames CIFS: c:\enum U U <ipaddress< ipaddress>

NAS Enumeration: NFS and CIFS NAS: NAS: Enumeration Information Gained: NAS Exports (e.g. /dev/dsk/server2fs3) NAS Access (e.g. All Machines) NAS Shares (C$, ETC$) NAS usernames (e.g. administrator, root, etc)

NAS Anonymous Access: NFS NAS: Anonymous Access Connect to a NFS export with anonymous privileges NFS: mount o o anon IP:volume drive:

NAS Anonymous Access: CIFS NAS: Anonymous Access Connect to a CIFS share with anonymous privileges CIFS: c:\net use * \\<ipaddress>\share share /user:

NAS Anonymous Access: NFS NAS: Anonymous Access Mount the admin NFS export (vol0) NFS: mount o o anon IP:volume drive:

NAS Anonymous Access NAS: NAS: Anonymous Access Access Gained: Anonymous access to NFS Exports Data Volumes Management Volumes Anonymous access to CIFS shares Data Volumes

NAS Demo NAS Demo Scanning Scan a NAS Storage Device Enumeration Enumerate Accounts, Shares, and Mounts Anonymous Information Gain anonymous access inside shares and mounts

NAS Subvert Permissions NAS: Subvert Permissions Subvert CIFS or NFS file permissions with NFS weaknesses Data: Subvert permissions to access data files and folders

NAS Subvert Permissions: NFS NAS: UID/GID (Data) Subvert CIFS file permissions with NFS weaknesses Example A large hospital uses multiple NAS filers for storage Medical records for patients are stored on the NAS filer By default, the filer supports both CIFS (Windows) and NFS (Unix) The IT department has placed file permissions on all patient folders, restricting access to authorized users only User named himanshu himanshu should have full access User named hdwivedi hdwivedi should have no access

NAS Subvert Permissions : NFS Internal Medicine Patient Information Pharmacology Genetic Research FILER IT Support hdwivedi himanshu

NAS Subvert Permissions : NFS The IT department grants access to the Patient Information folder to the himanshu himanshu account

NAS Subvert Permissions : NFS A second user, named hdwivedi hdwivedi, attempts to access the Patient Information folder under the CIFS

NAS Subvert Permissions : NFS Since the filer supports both NFS and CIFS, any user can access the filers using NFS also

NAS Subvert Permissions: NFS The second user (hdwivedi( hdwivedi) ) attempts to access Patient Information under NFS and gets denied again

NAS Subvert Permissions : NFS By typing ls al, notice the Patient Information folder is restricted to the owner of that folder, who is the user himanshu, with a Unix UID of 6161 and GID of 30

NAS Subvert Permissions : NFS User hdwivedi hdwivedi SUs (switch user) to root on their local machine, changing their UID to 0 and GID to 0 (god rights) and still get denied to the folder

NAS Subvert Permissions : NFS User hdwivedi hdwivedi edits their local /etc/passwd file and changes their UID to 6161 and GID to 30

NAS Subvert Permissions : NFS User hdwivedi hdwivedi now attempts to access the folder called Patient Information and is now granted access!

NAS Subvert Permissions : NFS NAS Demo Subvert Permission Subvert CIFS permissions with NFS weaknesses Demo 1: Setting CIFS permissions Demo 2: Subvert CIFS permissions via NFS

NAS Sniffing NAS: NAS: Sniffing CIFS NTLM (downgrade attack) Kerberos Tickets Management RSH, Telnet NFS Clear-text mounting

NAS Sniffing: CIFS NAS: Sniffing Downgrade to NTLMv1

NAS Sniffing: CIFS NAS: Sniffing Kerberos Tickets

NAS Sniffing: NFS NAS: Sniffing Clear-text of RSH

NAS Sniffing: NFS NAS: Sniffing Clear-text NFS

Conclusion Security should not overlook NAS Devices Supporting CIFS and NFS also means support their security issues Secure storage devices Disable Clear-text management Telnet, RSH, HTTP Disable anonymous enumeration Disable share enumeration under CIFS Use aliases for NFS exports clients in /etc/hosts Require strong authentication by CIFS and NFS clients Enable in-line and/or at rest encryption Many NAS devices support IPSec 3 rd party encryption devices can encrypt data at rest

Questions Himanshu Dwivedi hdwivedi@stake.com Security Books Authored by presenter: Storage Security Handbook (http://www.neoscale.com/english/downloads/storage_security_handbook/ssh_toc.html) Implementing SSH (Wiley Publishing) The Complete Storage Reference, Chapter 25 (McGraw-Hill) Storage Security Whitepaper co-authored by presenter: www.@stake.com/research/reports/index.html Special Thanks: Andy, Joel, Kusum, Sudhanshu,, and Neeraja

References Nmap Written by Fyodor (www.insecure.org/nmap( www.insecure.org/nmap) Winfo Written by Arne Vindstrom (www.ntsecurity.nu) Enum LC5 Written by Jordan Ritter (www.bindview.com/razor/utilities( www.bindview.com/razor/utilities) Produced by @stake R&D (www.@stake.com( www.@stake.com) Kerbsniff/Kerbcrack Written by Arne Vindstrom (www.ntsecurity.nu) Ethereal Produced by Ethereal (www.ethereal.com( www.ethereal.com)