introduction to vulnerability assessment labs
play

Introduction to Vulnerability Assessment Labs Ge Zhang - PowerPoint PPT Presentation

Introduction to Vulnerability Assessment Labs Ge Zhang ge.zhang@kau.se Dvg-C03 Karlstad University Schedule 3 Attacking methods Password cracking ARP spoofing & sniffing Port Scanning 1 Defense methods


  1. Introduction to Vulnerability Assessment Labs Ge Zhang ge.zhang@kau.se Dvg-C03 Karlstad University

  2. Schedule • 3 Attacking methods – Password cracking – ARP spoofing & sniffing – Port Scanning • 1 Defense methods – Firewall configuration • 2 Vulnerability assessment tool – Nessus – Bastille Karlstad University

  3. Environment • 3 VM images ( c:\vmware\valab-ht11 ) Hub Hub Switch Hub Hub Host machine VM Karlstad University

  4. Password Cracking • Authentication: – Something you know – Something you have – Something you are • Password need to be transferred • Password need to be stored Karlstad University

  5. Brute Force • Attempts all possible combinations of letters and numbers • Possible Solution – Limit amount of unsuccessful logins – Change password often – The length should be at least 8 characters Karlstad University

  6. Dictionary • Type of Brute Force • Only tries possibilities that are likely to succeed • List are derived from dictionary • Possible Solutions – Mix and match numbers, letters, upper and lower case – Avoid passwords based on dictionary words, letter or number sequences, usernames, or biographical information Karlstad University

  7. John the ripper • Traditionally the account information is stored in the /etc/passwd file • The /etc/passwd file is world-readable • Shadow password system stores passwords in the file /etc/shadow which is not world-readable • Have a look on – /usr/share/doc/john-1.7.0.2/EXAMPLES • Then create your own account and password, run “john” again to see the result • useradd [your account] • passwd [your account] Karlstad University

  8. Sniffing Hub shared Token Ring • Hub : a hub simply receives incoming packets and broadcasts these packets out to all devices on the network • Adapt promiscuous mode : an adapter can receive all frames on the network, not just frames are addressed to that adapter Karlstad University

  9. Wireshark Show capture options Select network interface Filters for display Filters for Capture Karlstad University

  10. Wireshark Stop capturing Captured datagrams Datagrams analysis Datagrams in Hex Karlstad University

  11. Hub v.s. switch • Hub: Layer 1 (physical) Hub • Switch: Layer 2 shared (data-link) Token Ring Switch Dedicated Karlstad University

  12. ARP (Address Resolution Protocol) • MAC address (layer 2) – Global unique – Unchangeable • IP address (layer 3) – Network unique IP address IP address – Changeable ARP RARP MAC address MAC address Karlstad University

  13. ARP spoofing (cache poisoning) on switch Who has the IP address 192.163.0.4? Tell 192.163.0.4->DD I am 192.163.0.4, with mac address DD 192.163.0.1 with mac: AA 192.163.0.1 (AA) 192.163.0.1 (AA) 192.163.0.2 (BB) 192.163.0.2 (BB) 192.163.0.3 (CC) 192.163.0.3 (CC) 192.163.0.4 (DD) 192.163.0.4 (DD) 192.163.0.4->CC I am 192.163.0.4, with mac address CC 192.163.0.1 (AA) 192.163.0.1 (AA) I am 192.163.0.1, with mac address CC 192.163.0.1->CC 192.163.0.2 (BB) 192.163.0.2 (BB) 192.163.0.3 (CC) 192.163.0.3 (CC) 192.163.0.4 (DD) 192.163.0.4 (DD) Karlstad University

  14. Preparation • ipconfig /all • Let me know the last number of your ip address and mac address • ping [IP address] –t Door Door ping ping ping ping ping ping ping ping ping ping ping ping ping ping ping Ping Window Karlstad University

  15. Cain Select interface Scan MAC addresses Scanned results ARP spoofing configuration Karlstad University

  16. Cain Add to list for spoofing Spoof the arp cache for these two hosts to intercept the conversation between them Karlstad University

  17. Cain Start ARP Spoofing Karlstad University

  18. Port Scanning • Attackers wish to discover services they can break into. • Whether the service existing? • sending a packet to each port, once at a time. – Based on the type of response, an attacker knows if the port is used. – The used ports can be probed further for weakness. • Well-known: tcp 21, tcp 22, tcp 23, tcp 80 … Karlstad University

  19. Nmap • -sT (scanning by TCP connections) • -sS (SYN scanning) • -sU (UDP scanning) • -sV (Version detection) • -O (OS fingerprinting) • -T[0-5] (time interval) • -f (fragmenting) Karlstad University

  20. Nmap Karlstad University

  21. Nmap • Zenmap: graphical interface Karlstad University

  22. Firewall • A set of related programs that protects the resources of a private network or a host from external environment. • A mechanism for filtering network packets based on information contained within the IP header. Karlstad University

  23. IPtables 3 default chains • input Used to control packets entering the interface. (The packets will be ended in this machine) • output Used to control packets leaving the interface. (The packets are originated from this machine) • forward Used to control packets being masqueraded, or sent to remote hosts. Karlstad University

  24. IPtables • iptables command [match] [target] • Command: -A, -I, -D, -F, -L • Match: -p [protocol], -s [source IP], -d [destination IP], -i [interface], --sport [source port], --dport [destination port] • Target: -j [ACCEPT/DROP/LOG…] • Example: – iptables –I INPUT –p ICMP –j DROP – iptables –I INPUT –p ICMP –icmp-type 0 –j ACCEPT • Our task: restrict all inbound traffic, except SSH requests on port 22. However, any outgoing requests should not be affected. Karlstad University

  25. Nessus • Remote vulnerability scanner • Nessus will – Perform over 900 security checks – Accept new plugins to expand new checks – List security concerns and recommend actions to correct them Karlstad University

  26. Nessus • Client/server architecture – Server: perform checking – Client: Front-end • Can test unlimited amount of hosts in each scan www FTP Nessus Server Nessusd Nessus Client Mail VoIP Karlstad University

  27. Nessus Karlstad University

  28. Nessus Karlstad University

  29. Bastille • Operating System Hardening – Remove unnecessary processes – Setting file permissions – Patching and updating – Setting networking access controls • Generate your own hardening policy • Can be run manually to provide advice and information Karlstad University

  30. Bastille • Assessment mode: bastille -a Karlstad University

  31. Bastille • Configuration mode: bastille -x Karlstad University

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend