Top Banner
IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part 2-v2 November 15, 2016
68

IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Apr 02, 2018

Download

Documents

dangnga
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

IP Network Security Part 2

Wayne M. Pecena, CPBE, CBNE

Texas A&M University

Educational Broadcast Services

Part 2-v2

November 15, 2016

Page 2: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

IP Network Security Part 2

2

Advertised Webinar Scope: Webinar Major Topics:

Overview

As broadcast station IP networks have grown and become an integral part of the broadcast

technical facility, so has the security threats grown such that network security is an ongoing

essential task for the broadcast engineer with IT responsibilities.

This webinar will build on the security foundation principals presented in part 1 by focusing on

verification of a secure network environment by use of network penetration tools. Practical

penetration test examples utilizing public domain tools such as nmap and the zenmap GUI will be

presented.

Page 3: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Today’s Agenda

• Brief Review of IP Network Security Fundamentals - Part 1 Takeaways

• What Makes a Secure Network?

• Verification of Network Security & Introduction to Penetration Testing – Understanding TCP/IP & IP Port

– Introduction to nmap

– Introduction to zenmap GUI

– Penetration Exploration Examples

• Reference Resources

• Conclusion, Takeaways, & Questions

3

Page 4: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Brief Review of IP Network Security Fundamentals - Part 1

Takeaways

4

Page 5: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Cybersecurity

• Cybersecurity is focused upon the protection of computers, networks, programs and data from change, destruction, or unauthorized change.

5

Cybersecurity is the collection of tools, policies, security concepts, security

safeguards, guidelines, risk management approaches, actions, training, best

practices, assurance and technologies that can be used to protect the cyber

environment and organization and user’s assets. Organization and user’s

assets include connected computing devices, personnel, infrastructure,

applications, services, telecommunications systems, and the totality of

transmitted and/or stored information in the cyber environment. Cybersecurity

strives to ensure the attainment and maintenance of the security properties of

the organization and user’s assets against relevant security risks in the cyber

environment.

The general security objectives comprise the following:

Availability

Integrity

Confidentiality International Telecommunications Union ITU-T X.1205

Page 6: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Network Infrastructure Threats • Focus - Protecting the “Network Infrastructure”

• Common Threats: – DHCP Snooping

– ARP Spoofing (IP Spoofing)

– Rogue Routers Advertisements

– Denial of Service Attacks

– Application Layer Attacks

• Implementation Considerations: – Know Your Enemy

– Cost

– Human Factors

– Understand Your Network

– Limit Scope of Access

– Don’t Overlook Physical Security

6

Page 7: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

A Cyber Attack Chain Model

Step Description

Reconnaissance & Probing

Find Target

Harvest information (email, conference listings, public lists, etc.)

Delivery & Attack Place delivery mechanism online

Use social engineering to induce target to access malware or other exploits

Installation & Exploitation

Exploit vulnerabilities on target systems to acquire access

Elevate user privileges and install additional “tools”

Compromise & Expansion

Exfiltration of data

Use compromised systems to exploit additional systems

Courtesy: Chris Homer @ PBS

Page 8: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Goals of Network Security

• Provides Confidentiality – Prevent Disclosure - Maintain Privacy

• Maintains Data Integrity – Prevent Data Alteration

• Provides Availability – Prevent Denial of Use

8

Network

Send Host Receive HostDATA

The CIA Triangle

Page 9: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Security Begins With Policy Common Policy Terminology

• Asset – Any object of value

• Vulnerability – A system weakness to be exploited

• Threat - Possible danger to a system or its information

• Risk – The feasibility that a vulnerability might be exploited

• Exploit - An attack directed at a vulnerability

• Countermeasure - An action or mitigation of a risk

9

Page 10: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Security Policy Lifecycle

10

Planning

Policy

Creation

Management &

Monitoring

Assessment

Policy

Implementation

& Enforcement

Detection

Threat

Analysis

Page 11: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

The OSI Model Open Systems Interconnection (OSI) Model

Defines How Data Traverses From An Application to the Network – Layer by Layer Breaks Networking Processes Into Manageable Parts

11

Networking

Focus

Page 12: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

The “OSI” Model Data Flow Layers Provide the Structured Implementation Approach

12

Transport

Physical

Data Link

Network

4

1

2

3

Manages End-End Connections:

TCP, UDP, & Flow Control

Interfaces to Physical Network, Moves Bits Onto &

Off Network Medium

Provides Network Access Control, Physical

Address (MAC), & Error Detection

Provides Internetwork Routing (path)

Provides Virtual Addressing (IP)

Page 13: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Layer 1 - Physical Access

• Restricted Physical Access to Network Infrastructure

• Controlled Access: – Access Badges

– Cyber-Locks

– Bio-Recognition

• Monitor Access – Access Logs

– Surveillance Cameras

13

Page 14: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Layer 2 – Data-Link Layer Access

• Implement Ethernet Switch Port Security

14

Disable Any

Unused

“Access”

Or

“Untagged”

Ports

Configure

“Trunk”

Or

“Tagged”

Ports

Only

When

Required

Enable Switch Port Security:

Specific MAC address

Limit number of MAC addresses / port

Specify “shutdown” violation response

VLAN

100

VLAN

200 VLAN

300

Segment Network Traffic

Page 15: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Layer 3 and Above ……..

• Utilize Network Equipment Security Features – Secure Connectivity “IPSec”

– Threat Control “IPS”

– Identity Trust “AAA”

• Implement Firewalls – Border

– Internal

• Implement “Access Control Lists”

• Utilize Application Security Where Possible

15

Page 16: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

“IPsec” Internet Protocol Security

• IPsec – End-to-End Scheme to Encrypt Communications – IPv4 – Optional Implementation

– IPv6 – Mandatory Implementation (Recommended)

• Layer 3 Implementation

• Modes: – Tunnel Implementation (VPN)

– Host-to-Host Implementation

16

Send Host Receive Host

Encrypted Data

Encrypted Data

Page 17: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Firewall Types

• Determines What IP Traffic Can Enter or Exit a Network Based Upon Pre-Defined Rules

• Stateless Packet Filtering – Single Packet Inspection – Access Control List “ACL” – Ingress or Egress Filtering

– No knowledge of flow

– Filters on IP Header info – Layer 3

• Stateful Packet Filtering – Conversation Inspection – Filters on IP Header info – Layers 3-4

– Records conversations – then determines context:

» New Connections

» An Existing Conversation

» Not involved in any conversation

17

Page 18: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Implementing an Access Control List

18

Egress ACL Filters

Outbound Packets

Ingress ACL Filters

Inbound Packets

Egress ACL Filters

Outbound Packets

Ingress ACL Filters

Inbound Packets

Interface

0/0

Interface

0/1

Permit or Deny:

Source IP Address

Destination IP Address

ICMP

TCP/UDP Source Port

TCP/UDP Destination Port

One ACL per:

Interface

Direction

Protocol

Create

Access Control List

Apply

Access Control List

Page 19: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

What Makes a Secure Network?

19

Page 20: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Attributes of a Secure Network

• Layered Approach (“Defense in Depth” NOTE 1) – Different Security Controls Within Different Groups

• Security Domains – Segmentation of Network Into Areas or Groups

• Privileges – Restrict to “Need – To – Access”

– “Deny by Default”

• Access – Restrict by Firewalls, Proxies, etc.

• Logging – Accountability , Monitoring, & Activity Tracking

20

NOTE 1 – Cisco Security Terminology

Page 21: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Characteristics of a Secure Network

• Network Infrastructure Equipment Current With System Updates

• VLAN(s) Traffic Separation (do not over-trust)

• Access Control Lists (ACL) Implementation

• Un-Used Ports (Protocols/Services) Disabled

• External ICMP Access Blocked

• Minimize Administrative Access Points

• External Administrative Access Blocked

• Multi-Level Network Design Approach Utilized

• Implement Encryption Between Networks

• Traffic Audit Capability Implemented – NTP-log Synchronization

– Permitted Traffic (Layer 3 headers)

– Denied Traffic (Layer 3 headers)

21

Page 22: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Multi-Layer Approach “Defense – In – Depth”

22

Separate Networks into “Layers”

With Different Security Controls: External or Public Network

“DMZ” or Demilitarized Zone or

Perimeter Network

Internal Network(s)

Page 23: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Verification of Network Security & Introduction to Penetration Testing

23

Page 24: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Network Addressing

• Layer 2 PHYSICAL ADDRESS: – MAC Address – 6 Bytes – Hexadecimal Notation - 00:12:3F:8D:4D:A7

– 2-part: Fixed “Burned-in-Address” – OUI + Mfg. Assigned

– Local in Scope

• Layer 3 VIRTUAL ADDRESS – IP Address – 4 Bytes (IPv4) – Doted-Decimal Notation – 165.95.240.185

– 2-part: Virtual Network ID + Host ID

– Globally Unique

24

172.15.1.1 172.15.2.2 DATA Trailer00:12:3F:8D:4D:A7FF:FF:FF:FF:FF:FF

Destination

MAC

Source

MAC

Destination

IP

Source

IP

Encapsulated IP Packet

(Layer 3)

Encapsulated Ethernet

Frame (Layer 2)

Simplified Representation

Page 25: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

The 2-Part IPv4 Address

25

192

32 bit IP Address

1100000010101000110010011111110

168 100 254

11000000 10101000 1100100 11111110

Subnet

Mask

Determines

Network

Address

Host

Address

Octet 1 Octet 2 Octet 3 Octet 4

4 Bytes

Every IP Address Must Have a Subnet Mask

Page 26: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

IP Address Subnet Mask Expression

26

Page 27: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

TCP 3-Way Handshake

27

Host 1 Host 2

SYN

SYN + ACK

ACK

Host 1 Sends

Synchronize Message

to Host 2

Host 2 Responds With

Acknowledgement

Plus Sends It’s Own

Synchronization

Message to Host 1Host 1 Completes the

3-Way Handshake By

Sending

Acknowledgement to

Host 2

Host 1 Initiates

Connection to Host 2

Page 28: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

TCP/UDP Port Numbers Port Number Range: 1 – 65,535

0 - 1023 are Reserved ports / 1024 - 49151 are Registered ports / 49152 – 65535 are Dynamic (private) ports An IP Address + Port Number = A “Socket”

• RESERVED PORT Examples

“System Port Numbers” • Port 20 / 21 – FTP “File Transfer Protocol”

• Port 23 – TELNET

• Port 53 – DNS “Domain Name Service”

• Port 80 – HTTP

• Port 110 – POP3 “Post Office Protocol”

• Port 123 – NTP “Network Time Protocol”

• Port 161 – SNMP “Simple Network Management Protocol” (UDP)

• Port 443 - HTTPS

• REGISTERED PORT Examples

“User Port Numbers” • Port 1720 – H.323 Video Call Setup

• Port 1812 – RADIUS Authentication

• Port 2000 – CISCO “Skinny”

• Port 3074 – “X-Box” Live

• Port 4664 – Google Desktop

• Port 5004 – RTP “Real Time Transport Protocol”

• Port 5060 – SIP “Session Initiation Protocol

• Port 5631 – PC Anywhere

• Port 8080 – Alternate HTTP

28

http://www.iana.org/assignments/port-numbers

Page 29: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Getting Started

• Obtain & Install “nmap”: https://nmap.org/ – Linux (BEST-Ubuntu, Fedora, Centos, BSD, Kali)

– Windows (> WIN7 but limitations)

• Obtain & Install “zenmap”: https://nmap.org/zenmap/

29

Page 30: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Disclaimer “Network Scanning”

• Be Aware of Network Scanning Ethics & Legalities

• Guidelines to Follow: – Insure You Have Permission to Scan

– Limit Target & Scope of Your Scan

– Understand Your ISP AUP

– Use Caution with Options

– Have a Reason to Scan Network

• Be Aware: – Aggressive Scanning Can Crash a Host - Use Caution!

30

Further Information:

https://nmap.org/book/legal-issues.html

Page 31: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

“Network Mapper” or nmap

• Determine Active Network Hosts

• Determine Host OpSys

• Determine Open Ports / Services Active

• Diagram Network Architecture

31

Network Mapper is a open

source network scanning

utility used to determine

information about

network hosts.

Used For:

Host Discovery

Security Profile Auditing

Network “Hacking”

Page 32: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Simple nmap Scan nmap <ip address>

32

Page 33: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

nmap Scanning Discovery

• Scope of Scan

– Single / Multiple Host

– Range of Hosts

– Subnet

• Port Scan – open/closed/filtered

• Protocol Scan

– ARP

– TCP SYN & ACK

– ICMP

33

-T4 = Intense Aggregate Timing Scan

-A = Use Features: OS Detect, Ver Detect

-v = Verbose Output

Page 34: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

nmap Profiles Create Your Custom Profile

34

Page 35: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

nmap Examples

• Scan Single Host

• Scan Multiple Hosts

• Scan Range of IP Addresses

• Scan a Subnet

• Perform an Aggressive Scan

• Discovery Attempt: No Ping

• Discovery Attempt: Ping Only

• Discovery Attempt: Host OS

• Fast Port Scan

• Scan Specific Port

35

Sampling of > 125 nmap commands

Page 36: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Scan Single Host

36

Page 37: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Scan Multiple Hosts

37

Page 38: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Scan Range of IP Addresses

38

Page 39: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Scan a Subnet

39

NOTE

CIDR Notation

Page 40: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Perform an Aggressive Scan

40

Page 41: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Discovery Attempt: No Ping

41

Page 42: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Discovery Attempt: Ping Only

42

Page 43: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Discovery Attempt: Ping Only Topology Map

43

Page 44: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Another Discovery Attempt: Ping Only Topology Map Scope: Class C Network

44

Page 45: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Discovery Attempt: Host OS

45

Page 46: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Fast Port Scan

46

nmap scans top 1,000 ports by default

“Fast Port Scan” scans top 100 ports

Page 47: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Scan Specific Port

47

Page 48: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

NSE - nmap Scripts

• Nmap Scripting Engine (NSE)

• Automates nmap Tasks

• Activating NSE: -sC option

• Script Library: https://nmap.org/nsedoc/

• Create Your Own: LUA Script Framework

48

Page 49: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Other nmap Suite Utilities:

• Ndiff – Compare scans and denote differences

• Nping – Enhanced ping utility “ping on Steroids” – Specify ping count, delay, rate, & delay

– Specify TCP or UDP

– Specify a payload

– Specify a port

– ARP ping

• Ncat – Server or Client TCP/IP simulation utility – Test a webserver

– Test a SMTP server

– File Transfer

– Create Ad Hoc Chat Server & Webserver

49

Page 50: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

nmap Practice Target scanme.nmap.org

50

Page 51: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Reference Resources

51

Page 53: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

zmap https://zmap.io

53

Page 54: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

KALI Linux Debian Based – Special Distribution for Network Forensics & Penetration Testing

• Incorporates Family of Security Tools

• https://www.kali.org

• Install Options: Dedicated / Dual-Boot - Win or MAC

54

Page 55: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

55

http://cs.lewisu.edu/~klumpra/camssem2015/nmapcheatsheet1.pdf

Page 57: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Reference Texts:

57

Page 58: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Recent Industry DDoS Attack

58

Page 59: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Distributed Denial of Service “DDoS” Attack • A DDoS attack seeks to disrupt the availability of a network or an individual network host by

flooding the target with a high volume of illegitimate requests.

• Executed from multiple compromised hosts devices targeted at a specific host or network. Often thousands of compromised hosts involved.

• DDoS Symptoms:

– Slow Network Performance

– Host Unavailability (IE website, server)

• DDoS Attack Techniques:

– ICMP Flood

– Nuke (fragmented packets)

– Reflected (spoofing)

– SYN Flood

• DDoS Malware Tools:

– MyDoom (classic DDoS malware)

– Mirai

59

Page 60: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

October 21 DDoS Attack Target: DYN.com

• Historic Attack Scale – > 1 million attacker hosts – Excess of 665 Gbps of IP traffic generated

• DYN is a Major Domain Name Service (DNS) Provider • Impacted Availability of Numerous Domain(s): Amazon, Comcast, PayPal,

Netflix, Pinterest, PlayStation, Spotify, Reddit, Twitter, Verizon • Executed form Internet of Thing (IoT) Devices:

– Primary MFG: Hangzhou Xiongmai Technology

60

Page 61: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Active Digital Attacks: http://www.digitalattackmap.com

61

Page 62: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Conclusion, Takeaways, & Questions

62

Page 63: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

The Challenge

SECURITY USEABILITY

63

Page 64: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Risks to the Broadcast Station

• Dead Air

• Impact to Resources

• Loss of Revenue

• Embarrassment

• Potential Liability

• Breach of Data

Courtesy: Chris Homer @ PBS

Page 65: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Takeaway Points • Understand Security Threats

• Segment Your Network – Performance

– Security

• Lock All Doors – Don’t Overlook Physical Security

– Limit Privileged Users

– Implement “Switch-Port” Security

– Don’t Overlook the “Back Doors”

• Use Firewalls to Limit Ingress & Egress

• Monitor/Log Network Activity – Know the “Norm”

• Scan Your Network on a Regular Basis (PM) – Create nmap “Profile”

65

Page 66: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Best Practices to Consider • Recognize Physical Security

• Change Default Logins

• Utilize Strong Passwords

• Disable Services Not Required

• Adopt a Layered Design Approach

• Segregate Network(s)

• Separate Networks via VLANS

• Implement Switch Port Security

• Utilize Packet Filtering in Routers & Firewalls

• Do Not Overlook Egress Traffic

• Deny All Traffic – Then Permit Only Required

• Keep Up With Equipment “Patches”

• Utilize Access Logging on Key Network Devices

• Utilize Session Timeout Features

• Encrypt Any Critical Data

• Restrict Remote Access Source

• Understand & Know Your Network Baseline

• Actively Monitor and Look for Abnormalities

• Limit “Need-to-Access”

• Disable External “ICMP” Access

• Don’t Use VLAN 1

66

Page 67: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

67

Page 68: IP Network Security Part 2 - Society of Broadcast Engineers€¦ · IP Network Security Part 2 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services Part

Thank You for Attending!

Wayne M. Pecena Texas A&M University [email protected] 979.845.5662

68

? Questions ?