Top Banner
Kevin Cardwell
31

Essential Defense by Kevin Cardwell

Apr 15, 2017

Download

Technology

EC-Council
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Essential Defense by Kevin Cardwell

Kevin Cardwell

Page 2: Essential Defense by Kevin Cardwell

TMI

The good, the bad and the ugly

Smart defense

Page 3: Essential Defense by Kevin Cardwell

3

505 Billion Pages to date

Page 4: Essential Defense by Kevin Cardwell

www.shodanh.io

4

Page 5: Essential Defense by Kevin Cardwell

Local Area Network Protocol Should not be open from the Internet!

Ports

135,137,139,445

5

Page 6: Essential Defense by Kevin Cardwell

6

Page 7: Essential Defense by Kevin Cardwell

We have gotten better at security

The hackers have gotten better at hacking

Patch system is broken

Residual risk

www.zerodayinitiative.com

7

Page 8: Essential Defense by Kevin Cardwell
Page 9: Essential Defense by Kevin Cardwell
Page 10: Essential Defense by Kevin Cardwell
Page 11: Essential Defense by Kevin Cardwell
Page 12: Essential Defense by Kevin Cardwell

12

Page 13: Essential Defense by Kevin Cardwell

The compromise was inevitable! APT, sophisticated attackers etc etc

MYTH!

13

Page 14: Essential Defense by Kevin Cardwell
Page 15: Essential Defense by Kevin Cardwell

Estimated to block 85% of attacks when initially released

Application Whitelisting

Patch Applications

Patch Operating System

Minimize the number of users with privileged rights◦ Disable the local admin account on domain

computers

15

Page 16: Essential Defense by Kevin Cardwell

Security is a process and methodology not a product!

16

Page 17: Essential Defense by Kevin Cardwell

Steps

Page 18: Essential Defense by Kevin Cardwell

Identify critical segments◦ List the ingress and egress requirements

◦ Monitor deviations from the normal

Segment to segment

Research segment by segment vulnerabilities◦ Legacy, commercial and ICS

◦ Prioritize the fixes

◦ Servers no initiation of connection

◦ Windows => core installations for Windows 2008/2012/2016

18

Page 19: Essential Defense by Kevin Cardwell

Track 2-3 vulnerability sites◦ ICS - www.ics-cert.gov

◦ Identify the areas of concern => increase monitoring

19

Page 20: Essential Defense by Kevin Cardwell

Traffic coming into your network Implemented by almost all organizations Security policy determines what is allowed and

configured in the filters No traffic arriving at the perimeter should have an

internal source address◦ Commonly referred to as sanity checking

Sanity checking Bogon filtering RFC 2827 – defeating denial of service attacks RFC 3704 GEO IP blocking

CaseStudy of malware infection => 64% of traffic blocked by bogon filtering

20

Page 21: Essential Defense by Kevin Cardwell

If site is not 24/7◦ Shut off access going out to the Internet

Block the well known malware ports of communication http ssh https Etc

◦ Monitor for attempts All malware will attempt outbound connections If no one is there, should be none

If 24/7◦ Only monitor critical systems

Servers should not initiate connections to the Internet◦ Subscribe to a service

Watch for lookups of known malware nets

21

Page 22: Essential Defense by Kevin Cardwell

Blackhole routing◦ No DNS traffic can be sourced from an address

other than the internal DNS server

no direct client queries to the Internet

◦ No traffic directly to a web server

Has to be sourced from the IP address of the proxy

90% of the malware does direct queries

22

Page 23: Essential Defense by Kevin Cardwell

Enhanced Mitigation Experience Toolkit◦ Microsoft tool

DEP and others => adds obstacles to exploitation

◦ Permanent protection against targeted applications

Adobe etc

All 2015 IE exploits failed

23

Page 24: Essential Defense by Kevin Cardwell

Segmentation and isolation

Bind ports INSIDE of the bastion host

Externalnetwork

Screeningrouter

Bastionhost

DMZ

DMZ App Servers

IDS

Page 25: Essential Defense by Kevin Cardwell

No time

No staff

No budget

Etc

Page 26: Essential Defense by Kevin Cardwell

Internal honeypot and decoys◦ Provides a method of detection of an attack

◦ Allows IT to develop the implementation plan

◦ Low cost

Relatively speaking

$600

Page 27: Essential Defense by Kevin Cardwell

KFSensor◦ Cost

Page 28: Essential Defense by Kevin Cardwell

Back Officer friendly◦ Cost

FREE

Page 29: Essential Defense by Kevin Cardwell

Labrea Tarpit◦ FREE

◦ Linux!!!!!!!

Page 30: Essential Defense by Kevin Cardwell