Top Banner
Assessing Large Networks George G. McBride, CISSP RSA Conference 2004 San Francisco, CA
40

Assessing Large Networks

Jan 14, 2016

Download

Documents

Jesús

Assessing Large Networks. George G. McBride, CISSP R SA Conference 2004 San Francisco, CA. The Goals This Morning:. To share with you some ideas and techniques to efficiently assess large data networks for security vulnerabilities. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Assessing Large Networks

Assessing Large NetworksAssessing Large Networks

George G. McBride, CISSP

RSA Conference 2004 San Francisco, CA

George G. McBride, CISSP

RSA Conference 2004 San Francisco, CA

Page 2: Assessing Large Networks

The Goals This Morning:

To share with you some ideas and techniques to efficiently assess large data networks for security vulnerabilities.

These ideas may help for smaller networks, but are optimized for the larger ones.

These are just guidelines. You will have to do what is comfortable and best for you. There is a going to be a learning curve and will take some time to “get it right”.

Page 3: Assessing Large Networks

Presentation Outline

Introduction

Before You Begin

Interviewing

Scanning

Correlating the results

Getting the results back to the System Administrators

Post-Mortem

Getting ready for the next assessment

Page 4: Assessing Large Networks

Notes:

Be advised that all tools can potentially disrupt network operations. Run all tools at your own risk. Myself, Lucent, and RSA are not liable!

US Export and your country’s import laws may restrict the use of certain tools.

Double check any IP address that you scan to ensure that you are authorized to scan the addresses and that the addresses are accurate.

All IP addresses captured in this report were captured on the author’s home network or are screen shots from the product’s home page.

Page 5: Assessing Large Networks

What is a large network?

More than one subnet?

More than the corporate office?

Too many machines that you can’t scan in one day?

More than one country?

More than one continent

All of the continents?

Does it Matter? Let’s assume that a “large” network is pretty big.

Page 6: Assessing Large Networks

Everything is relative…

Vint Cerf’s presentation to RSA

Gives new meaning to “large”

Page 7: Assessing Large Networks

Getting it right the first time:

Do as much as possible up front before you start to gather and collect data.

Set up questionnaires to ensure you get the required data from the appropriate people.

Scanning templates? What are we scanning for?

Repetitive tasks should be streamlined.

Plans, procedures, tasks, and databases should be reviewed and optimized if necessary.

Spend the time the first time to do things right.

Page 8: Assessing Large Networks

Where Do You Start?

The hardest part of large assessments is agreeing on a valuable and useful scope. Will you assess by:— Business Unit (Widget Design)

— Location or Region (Palo Alto Manufacturing)

— System Administrator (George’s systems)

— Platform or Operating System (all Linux boxes)

— IP Address or Subnet (10.5.4.x)

— Vulnerabilities (Only RPC or blank Administrator passwords)

Every location, every company, and every situation will be significantly different from each other. Be flexible. What works today may not work tomorrow.

Page 9: Assessing Large Networks

Get Ready, Get Set, And Hang On!

Start all long term processes early. War Dialing and Wireless sweeps can take a tremendous amount of time.— Don’t underestimate the contributing factors that can increase the time to

complete some of these tasks.

I like to work directly with each location and be able to distribute the collected data at each location.

For example, if I was reviewing the Tokyo office which may have three different business units, I may do one large effort and then divide the assessment results into three completely separate reports.

However, if all business units are managed by the same officers or the same IT group supports the businesses, one report may be better!

Page 10: Assessing Large Networks

Things to Consider During Scope Layout:

Your assessment may involve the same personnel multiple times if working more than one business unit. Likewise, you may not meet everybody.— Ensure you’ve got all questions ready the first time.

With large networks and small IT shops, it may be difficult to obtain specific IP Addresses.— Scan subnets to find active machines and services and then work

with the customer to determine which machines should be scanned.

Nobody wants to take responsibility for a shared machine.— But you can still scan it with proper notification if your policy

permits it!

Page 11: Assessing Large Networks

The Interview

What about questionnaires?— Electronic vs Paper-based

— Preliminary vs Complete

— Ensure that you are meeting with the proper people

I’d still recommend meeting with the personnel, not only for some face time, but to review responses and answer any new questions that come up from the questionnaire.

Make sure that you take the time to acknowledge and thank those that provide information to you.— Recognition and thanks go a long way!

Page 12: Assessing Large Networks

It’s Good To Meet You!

Meeting with the system administrators can give you MORE information than you want to know.

You know you’re asking the proper questions when the responses set your expectations of the scan results.— I.E., you’ll know the scan results before you start scanning.

I like to have a living list of questions already prepared for each group (DBA, help desk, system administrator, etc.).

Make sure you schedule some time to collate and review the information.

Due to political issues, you may need to interview some non-essential persons!

Page 13: Assessing Large Networks

Interviewing (Cont’d)

If you send off the interview questions to be completed prior to arrival, MAKE SURE you review them prior to meeting with the people.— Don’t ask questions for which you’ve already got answers.

— Questionnaires make follow-ups and more in depth questions significantly easier to follow

— Questionnaires help identify vulnerabilities where you might not normally look.

Let your questions be your guide, not a verbatim reading.

I like to schedule interviews on a one to one basis, for about one hour.

Page 14: Assessing Large Networks

Understanding the Network

If the client doesn’t have network diagrams, generate your own.— It’s an awesome deliverable

A picture is worth a thousand words

Don’t get too caught up in the generation of the network diagrams

A great time-saver to understand the network topology

Page 15: Assessing Large Networks

Network Mapping: The Big Picture

The previous page illustrated a Cheops-NG map, available at: http://cheops-ng.sourceforge.net/ is a great and free tool.

LuMeta, at http://www.lumeta.com offers some great mapping services as well as helping you find your perimeter.

HP’s OpenView and other network management tools may be useful to understand the architecture and topology.

Page 16: Assessing Large Networks

Scanning

Before you start scanning, plan on how you will mine the data that you will collect with the scanners.

Getting the data out of the scanner continues to be the “hardest” part, but is a one-time effort.— Database Format

— Spreadsheet

Research and understand the reporting or database structure of your scanning tools to understand how the data will be collected.

Sometimes a simple “Microsoft Excel import” works wonders.

Page 17: Assessing Large Networks

Only Scan For Data You Will Use

It sounds obvious, but don’t scan for data that will be discarded.

Watch DOS attacks.

Nessus, Newt, ISS, eEye, and all scanners allow you to select and de-select vulnerability checks as required.

Review every option.

Page 18: Assessing Large Networks

Only Scan For Data You Will Use

Just for comparison, a Nessus screen.

Note the DOS option!

All scanners have the potential to have undocumented DOS tests!

Page 19: Assessing Large Networks

Data-Output

ISS’ Internet Scanner has several different output options, some of which may be easy to import into a database.

A-Ha! The data is stored locally on the operators PC in a Microsoft Data Engine database format.

Page 20: Assessing Large Networks

Nessus Output

Adobe PDF, Microsoft .DOC, and .TXT file format outputs.

Page 21: Assessing Large Networks

Nessus Output: .NBE Format

Nessus .NBE file format makes it easy to convert into a database format.

Page 22: Assessing Large Networks

Got your baseline?

If you are only interested in checking for changes since the last scan, try the delta or “differential” scan.

This will highlight changes since the last scan including new systems.

Is there ever a time you aren’t really concerned with the “old stuff”?— Only if the old stuff is noise

Page 23: Assessing Large Networks

Extra Sensitive Systems?

Are you or your client concerned with generating traffic which may “negatively impact service” (take the network down)?

Consider exploring the use of Tenable Security’s Nevo tool which is a passive scanner.— Generates no traffic

— Fills the gap between active scans since it immediately detects any new systems once they generate traffic that pass through one of its sensors

By definition, it generates no traffic. If a vulnerable system does not generate enough traffic, all vulnerabilities may not be identified.

Page 24: Assessing Large Networks

Nevo: Passive Vulnerability Detection

Screen shot of Nevo detecting traffic as it runs.

You can see DHCP server identified, WWW server (And version) and SSH running.

Sometimes it gets specific service versions, sometimes it doesn’t.

Leaves some more ambiguity than a passive scan which could conduct additional probes.

Page 25: Assessing Large Networks

Nevo: Passive Vulnerability Detection

Nevo Output = Nessus Input

Based on identified systems and services as well as their version numbers; vulnerabilities can be identified.

Again, if the system wasn’t accessed or didn’t generate any traffic, Nevo won’t find it.

Page 26: Assessing Large Networks

What Systems Should Be Scanned?

What’s on a typical network:— User’s desktops and workstations

— Servers such as file, print, WWW, database, and major applications

— Network equipment such as routers, firewalls, wireless access points, network management equipment

Workstation Risks (Windows, UNIX, Linux, Mac, etc.)— A lot of local data (mail, personal files, local working documents)

— Possibly exploit trust to access other machines

— Often managed by users who can change anything on the system

— A LOT of workstations to scan and A LOT of risks

Page 27: Assessing Large Networks

What Systems Should Be Scanned?

Servers:— Lots of user’s data

— Sensitive data including source code libraries, print queues, restricted web documents

— Malicious users could change, add, delete, and data on the server

— In general, managed by IT Organization, should follow some security standards

— Fewer servers than workstations, but generally more sensitive

Network Nodes:— Continue to find default passwords installed

— Can be used to sniff traffic

— Can be used to disable network segments

Page 28: Assessing Large Networks

Divide and Conquer

Avoid getting lost in the sea of numbers. A scan of a hundred machines properly analyzed is probably better than a scan of several thousand machines.

Reduce the number of machines to scan:— Multi-phased approach where only servers or critical / sensitive

machines

— Perhaps a scan of a cross-section of systems by:

• Operating system

• Administrator

• Purpose – Function

• Configuration

Page 29: Assessing Large Networks

Saturating Your Network And Hosts

Won’t happen with a passive assessment

Hosts that are close to network and processor overload can be pushed to the “edge” and impact performance.

Most scanners err on the side of caution with the number of parallel system scans and service scans. But that is user changeable!

The only time that I consistently see any type of true problem introduced during a network scan is when the scan is across some low-speed WAN connection.— Consider distributed scanning!

Page 30: Assessing Large Networks

Network Overload

Page 31: Assessing Large Networks

Watch Your Network Boundaries

It’s not just your network anymore!— You’ve got connections to customer networks

— And connections to vendor networks

— And connection to business partners

— And joint ventures

— And dial-up users and remote administration / maintenance

If you are assessing ISP provide equipment, ensure that you have the required approval and notify their administration

Watch all local laws, procedures, regulations, etc. What you can do where you start your scan may not be the same laws where you scan terminates.

Page 32: Assessing Large Networks

Speaking of Bad Things

Check and then double-check that you DO NOT HAVE denial of service checks turned on.

If you are doing a large scan, it may be wise to do a subnet or two first. If the machines are vulnerable to some particular test, it’s better to find it out now.

And always, make sure that you notify the system and network administrators when and what you are scanning.— Give everybody your pager or mobile number

Unfortunately, if you do enough scans, “stuff will happen”.

Page 33: Assessing Large Networks

Looking for the needle in the haystack

When you can’t scan every machine for every vulnerability, consider scanning for the top ten threats.

Check out the SANS Top 20 resources at (http://www.sans.org/top20/)

This document is updated somewhat regularly and lists the top 10 UNIX/Linux vulnerabilities and the top 10 Microsoft Windows vulnerabilities

Another SANS Site, http://www.incidents.org, has a real-time “Top 10” list

Page 34: Assessing Large Networks

Top 10 Methodologies…Why Scan?

Several Lucent and Bell Labs researchers performed a study in late 1999 to identify and understand the trends of network and host security vulnerabilities on the Lucent network.

That study is available at: http://www.lucent.com/minds/techjournal/common/arc_issues.html.

The study shows that the “top nine vulnerabilities account for 89 percent of all high risk vulnerabilities”.

The study also indicates that the high and medium risk vulnerabilities account for at 80 percent of all of the vulnerabilities.

When you don’t have time to scan or perhaps prior to your next “enterprise” scan, consider pushing out the fixes for the top ten or twenty vulnerabilities to the systems on your network.

Page 35: Assessing Large Networks

Tackling the False Positive Problems

Given:— 100 Hosts

— 10 Vulnerabilities Per Host

— 95% Confidence Level

1000 Vulnerabilities means that fifty may be suspect. But which fifty and how do you find them?

What about the vulnerabilities that you didn’t detect?

Check all of the results? Don’t check at all?

Random spot check? Run the tool again? Run a different tool?

Page 36: Assessing Large Networks

Verification of Data

Each false positive or undetected vulnerability counts against you in the “credibility” category!

I recommend a sanity check approach which requires a manual review of vulnerability findings with interview responses and configuration information.

Some vulnerabilities are prone to false positives— These should all be checked prior to report distribution

Review the results to make sure that the vulnerabilities match the machine— You can’t have a BIND vulnerability on an HP Printer.

Watch items in the reports that say “may be vulnerable if a file is present”. It should be up to you to clarify those findings.

Page 37: Assessing Large Networks

Data Presentation

In a report where you’ve scanned a large number of systems transcending multiple locations, business units, or support staff, you should consider multiple reports, specific to each recipient.

Summarize the findings into higher levels to present trends and summaries.

In general, only the system administrators need to get a detailed report of vulnerabilities by IP address (with the required fix information).

Include the good things that you found.

The report should be distributed in a draft format immediately after completion.

Page 38: Assessing Large Networks

Getting Ready for the Next One!

Consider a post-mortem:— At least after your first few assessments with all team members

that were involved.

— Even if things went “well”, I suspect that there was room for improvement or positive criticism.

— If you are comfortable, talk to the key contacts at the customer site and solicit their feedback.

Review the processes and steps that took the most time or those that are the most labor intensive. Can anything be done with these?

Continually keep your tools up to date and complete.

Page 39: Assessing Large Networks

Before the next assessment…

Subscribe to (and read!) relevant mailing lists on Security Focus!

NT Bugtraq is an excellent resource

INCIDENTS.ORG and SANS.ORG are equally valuable

FRESHMEAT.NET, ISECOM.ORG, INSECURE.ORG, NESSUS.ORG, and even SNORT.ORG and their mailing lists are excellent resources!— Most have archives to search past messages and lists

Establish a stand-alone network to install and test new tools. As always, your customers network is not a test network.

Page 40: Assessing Large Networks

Questions?

Contact me at [email protected] with any questions that you may have or any thoughts or comments on this talk.

Lucent TechnologiesBell Labs Innovations

Lucent Technologies Inc.Room 2N-611G101 Crawfords Corner RoadHolmdel, NJ 07733Phone: +1.732.949.3408E-mail: [email protected]

George McBrideSenior Manager

IT Risk Management