How To Protect Your Network From Attack From A Hacker (For A Fee)

Similar documents
13 Ways Through A Firewall

13 Ways Through A Firewall What you don t know will hurt you

Safe Network Integration

An Analysis of the Capabilities Of Cybersecurity Defense

Stronger than Firewalls And Cheaper Too

Strong Security in NERC CIP Version 5: Unidirectional Security Gateways

Industrial Security for Process Automation

New Technologies for Substation Cyber Hardening

Chapter 9 Firewalls and Intrusion Prevention Systems

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Cyber Security Summit Milano, IT

Stronger Than Firewalls: Unidirectional Security Gateways

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Section 12 MUST BE COMPLETED BY: 4/22

Next Gen Firewall and UTM Buyers Guide

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

CYBERTRON NETWORK SOLUTIONS

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

CompTIA Security+ (Exam SY0-410)

Detailed Description about course module wise:

Inspection of Encrypted HTTPS Traffic

Protecting Your Organisation from Targeted Cyber Intrusion

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Chapter 1 The Principles of Auditing 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Network Access Security. Lesson 10

Best Practices for Secure Remote Access. Aventail Technical White Paper

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Unified Threat Management

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Chapter 4 Application, Data and Host Security

Unified Threat Management, Managed Security, and the Cloud Services Model

Remote Access Considered Dangerous. Andrew Ginter, VP Industrial Security Waterfall Security Solutions

Lesson 5: Network perimeter security

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Using a VPN with Niagara Systems. v0.3 6, July 2013

Windows Remote Access

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

What would you like to protect?

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Using a VPN with CentraLine AX Systems

Networking for Caribbean Development

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

CMPT 471 Networking II

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

IINS Implementing Cisco Network Security 3.0 (IINS)

The Key to Secure Online Financial Transactions

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Where every interaction matters.

Linux Network Security

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

IBM Protocol Analysis Module

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Learn Ethical Hacking, Become a Pentester

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

By David G. Holmberg, Ph.D., Member ASHRAE

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Sitefinity Security and Best Practices

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Top tips for improved network security

The Benefits of SSL Content Inspection ABSTRACT

PCI Compliance Updates

A Systems Engineering Approach to Developing Cyber Security Professionals

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

8 Steps for Network Security Protection

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Simple Steps to Securing Your SSL VPN

8 Steps For Network Security Protection

Host/Platform Security. Module 11

Data Center security trends

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Network/Cyber Security

How users bypass your security!

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

What is Web Security? Motivation

Achieving PCI Compliance Using F5 Products

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Understanding Security Testing

BlackRidge Technology Transport Access Control: Overview

Transcription:

Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright 2012 2011 by Waterfall Security Solutions Ltd. 1 2012

Firewalls Firewalls separate networks and sub-networks with different security / connectivity needs Often first investment any site makes when starting down the road to an ICS cyber security program Unified Threat Managers firewalls with stateful inspection, VPNs, in-line anti-virus scanning, intrusion detection, intrusion prevention, anti-spam, web filtering, and much more but are they secure? DMZ in-between network(s) ICS best practice: layers of firewalls, layers of host and network-based defenses Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 2

Setup for Demo Scenarios Industrial firewall / UTM Business network my laptop + hacked host virtual machine Control network ICS server to attack / take over + one other ICS host virtual machine 2x virtual switches one for each network, each connected to firewall Consider only one-hop compromise into DMZ, or into ICS from DMZ Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 3

Compensating Measures Abbrev 2-FACT ENC RULES HIDS NIDS SECUPD UGW Graphic Compensating Measure 2-Factor authentication Encryption Better firewall rules Host intrusion detection / prevention system / SIEM Network intrusion detection / prevention system / SIEM Security updates / patch program Unidirectional security gateway Impact Would have prevented / detected the attack Would prevent / detect some variants of the attack Would not have prevented / detected the attack Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 4

#1 Phishing / Spam / Drive-By-Download Single most common way through (enterprise) firewalls Client on business network pulls malware from internet, or activates malware in email attachment Spear-phishing carefully crafted email to fool even security experts into opening attachment 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 5

#2 Social Engineering Steal a Password VPN password on sticky note on monitor, or under keyboard Call up administrator, weave a convincing tale of woe, and ask for the password Ask the administrator to give you a VPN account Shoulder-surf while administrator enters firewall password Guess Install a keystroke logger 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 6

#3 Compromise Domain Controller Create Account More generally abuse trust of external system Create account / change password of exposed ICS server, or firewall itself Other external trust abuse compromise external HMI, ERP, DCS vendor with remote access, WSUS server, DNS server, etc. 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 7

#4 Attack Exposed Servers Every exposed port is vulnerable: SQL injection buffer overflow default passwords hard-coded password denial of service / SYN-flood 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 8

#5 Attack ICS Clients via Compromised Servers Best practice: originate all cross-firewall TCP connections on ICS / trusted side Once established, all TCP connections are bi-directional attacks can flow back to clients: compromised web servers compromised files on file servers buffer overflows 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 9

#6 Session Hijacking / Man-in-the-Middle Requires access to communications stream between authorized endpoints eg: ARPSpoof (LAN), fake Wi-Fi access point, hacked DNS server Insert new commands into existing communications session Sniff / fake session ID / cookie and re-use 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 10

#7 Piggy-Back on VPN You may trust the person you have granted remote access, but should you trust their computer? Broad VPN access rules I trust this user to connect to any machine, on any port makes it easy for worms and viruses to jump Split-tunneling allows interactive remote control 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 11

#8 Firewall Vulnerabilities Firewalls are software. All large software artifacts have bugs, and some of those bugs are security vulnerabilities and zero-days Vendor back-doors / hard-coded passwords Supply chain issues do you trust the manufacturer? The manufacturer s suppliers? Occasional design vulnerabilities 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 12

#9 Errors and Omissions Modern firewalls require 6-8 weeks full-time training to cover all features and all configurations The smallest errors expose protected servers to attack Over time, poorly-managed firewalls increasingly resemble routers Well-meaning corporate IT personnel often control firewall configurations and can reach through to fix ICS hosts 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 13

#10 Forge an IP Address Most firewall rules are expressed in terms of IP addresses Any administrator can change the IP address on a laptop or workstation Works only if attacker is on same LAN segment as true IP address or WAN routers route response traffic to a different LAN May need ARPSpoof to block machine with real IP 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 14

#11 Bypass Network Security Perimeter Complex network architectures path from business network to ICS network through only routers exists, but is not obvious Rogue wireless access points Rogue cables well meaning technicians eliminate single point of failure in firewall ICS network extends outside of physical security perimeter Dial-up port 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 15

#12 Physical Access to Firewall If you can touch it, you can compromise it Reset to factory defaults Log in to local serial port, change settings with CLI Re-arrange wiring 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 16

#13 Sneakernet Removable media, especially USB sticks, carried past physical / cyber security perimeter Entire laptops, workstations and servers carried past physical / cyber security perimeter 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 17

Demo Warning: the issues demonstrated in the following slides apply to all firewalls, not just the firewall vendors and models illustrated. It is a mistake to interpret the following slides as a criticism of specific firewalls or specific firewall vendors. Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 18

Firewall Vulnerability Cross-Site Request Forgery Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 19

Firewall Vulnerability Cross-Site Request Forgery Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 20

Firewall Vulnerability Cross-Site Request Forgery Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 21

Firewall Vulnerability Cross-Site Request Forgery Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 22

Firewall Vulnerability Cross-Site Request Forgery Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 23

Firewall Vulnerability Cross-Site Request Forgery Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 24

Firewall Vulnerability Cross-Site Request Forgery Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 25

Firewall Vulnerability Cross-Site Request Forgery Uses web browser credentials for logged-in sites Blind technique script cannot read from foreign web page Can however, push changed data to web server, as if user had pressed send Lesson: Cross-site scripting vulnerabilities are rampant in web applications of all kinds, including ICS applications. CSRF has been public knowledge for over a decade Mitigation: Modify web application to use hidden fields to echo random data back to web site on pages that change application state. Browsers prevent each site s scripts from seeing data coming from another site, so foreign scripts cannot echo random data back to protected website Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 26

Errors and Omissions Can You See The Error? Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 27

Errors and Omissions Address Range Too Broad Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 28

Errors and Omissions Can You See the Error? Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 29

Errors and Omissions Rule for DHCP Address Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 30

Errors and Omissions andrews-machine address was really for an entire subnet See this only when you go to the screen which defines andrewsmachine address Correcting this problem is not sufficient the address was in the DHCP range See this only when you go to the DHCP server definition screen Andrew s machine needs to be given a static IP address Lesson: Full-featured firewalls are complex. Reviewing configurations to ensure they are safe is not straightforward. Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 31

Firewall Design Vulnerability Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 32

Firewall Design Vulnerability Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 33

Firewall Design Vulnerability Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 34

Firewall Design Vulnerability Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 35

Firewall Design Vulnerability Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 36

Firewall Design Vulnerability Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 37

Firewall Design Vulnerability Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 38

Firewall Design Vulnerability Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 39

Firewall Design Vulnerability Browsers enforce can t touch other site s web pages rule when scripts and web pages come from different sites Within a site, scripts can touch web pages at will this is how complex web applications work Hiding many web sites behind a single proxy address is very convenient web browser is your SSL client Web browsers cannot enforce can t touch other site s web pages rules when scripts and web pages all appear to originate at the same site Lesson: Clientless/browser SSL clients are designed to hide many sites behind one address. Unless browser designs or clientless SSL designs change, hosts behind such proxy-site web servers will always be vulnerable to each other s scripted attacks. Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 40

Hacking ICS Servers Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 41

Hacking ICS Servers Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 42

Hacking ICS Servers Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 43

Hacking ICS Servers 100,000 Vulnerabilities A major vendor recently reported counting over 50,000 bufferoverflow-capable C library calls in one 2,000,000 LOC product All such calls are currently being replaced Do the math: Assume 2% of all overflow-capable calls are vulnerabilities 10 major vendors world-wide, in at least 5 verticals Assume at least 3 2MLOC products unique to each vertical Assume at least 75% of these products still written in C/C++ The math: 2% x 50,000 calls x 10 vendors x 5 verticals x 3 products x 75% = at least 100,000 vulnerabilities waiting to be found Lesson: Attacking firewall-exposed ICS servers with zero-day exploits will be straightforward for the forseeable future Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 44

Keeping Score Graphic Score Impact 2 Would have prevented / detected the attack 1 Would prevent / detect some variants of the attack 0 Would not have prevented / detected the attack Score Abbrev Compensating Measure 7 2-FACT 2-Factor authentication 7 ENC Encryption 11 RULES Better firewall rules 8 HIDS Host intrusion detection / prevention system / SIEM 9 NIDS Network intrusion detection / prevention system / SIEM 9 SECUPD Security updates / patch program 20 UGW Unidirectional security gateway Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 45

Waterfall Security Solutions Headquarters in Israel, sales and operations office in the USA Hundreds of sites deployed in all critical infrastructure sectors Frost & Sullivan: Entrepreneurial Company of the Year Award for ICS network security Pike Research: Waterfall is key player in the cyber security market Gartner: IT and OT security architects should consider Waterfall for their operations networks Strategic partnership agreements / cooperation with: OSIsoft, GE, Siemens, and many other major industrial vendors Market leader for server replication in industrial environments Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 46

Stronger Than Firewalls Firewalls are porous Given the elephants in the room, perimeter protection will always be disproportionately important: 100,000 vulnerabilities Plain-text device communications Dissonance between ECC and IT s constant change patch programs Long life-cycles for physical equipment Analyst advice: All ICS security professionals should become familiar with Unidirectional Security Gateways as an alternative to firewalls 2-FACT ENC RULES HIDS NIDS SECUPD UGW Proprietary Information Copyright 2012 by Waterfall Security Solutions Ltd. 47