SlideShare a Scribd company logo
Network Vulnerability Assessments Lessons Learned Chris Goggans [email_address]
What are Vulnerability Assessments? Internal and external attacks Validation of existing security mechanisms Detailed analysis of all networked devices and services Audits for policy compliance and deficiencies in existing policies Prioritized recommendations for improving security posture
Vulnerability Assessments: WHY? Only realistic way to determine vulnerabilities Get a baseline of vulnerability state Prioritize remedial actions Correct serious problems quickly Assure that policies address real vulnerabilities Industry best practice
Vulnerability Assessments: H OW ? External Assessment  Internet Modems Wireless Partner Connectivity In-briefing Internal Assessment Out-briefing Report preparation and delivery Executive briefing
Government Contractor Unpassworded TELNET access into print server SNMP Read/Write community string exposed in printer configuration menu Community string also used on devices such as routers, switches, etc. “ Level 7” hashes in Cisco config files exposed the password “mbhafnitsoscar” This password also used by Domain Administrator on Windows PDC Windows Domain also tied to NetWare eDirectory, sharing account names and passwords In total, compromise of nearly 15,000 accounts and 99.99% of all systems and network   devices…all from one insecure printer
Government Contractor Lessons Learned: Even the most insignificant network device can provide information that uncovers a major attack path  Always examine everything connected to your networks! Always utilize the greatest password protection possible MD5 vs Level7  In situations where accounts and passwords are shared across platforms, a single compromise of the weakest platform can lead to massive compromise Rainbow Tables & NTLMv1
Civilian Government Agency Development WWW server running with default cold fusion scripts that allow remote viewing of web source Attack Path 1 ODBC setup in web page source code exposed z/OS RACF account and password used for DB2 queries Account found to have “system programmer” access on IBM Mainframe Attack Path 2 MS-SQL “sa” account and password in web source SQL “XP_CMDSHELL” stored procedure gave remote “SYSTEM” access to Windows OS Local SAM file exposed Domain Administrator account SAM file on PDC had roughly 50,000 accounts Certain users used same password on Windows as they did on very large High Performance Computing cluster
Civilian Government Agency Lessons Learned: Passwords embedded in web applications are never a good thing Web Application Vulnerability Assessments have become as important as Network Vulnerability Assessments Database security is also critical and often left unchecked
Another Government Agency  Large network of Solaris and Windows systems All machines and applications patched Many important UNIX services are TCP-wrapped NFS, NIS, etc. Customer had recently deployed new KVM switches in their racks In addition to 3 rd  party software, KVM Switch also had HTTPS based management interface with a default “Admin” account with no password HTTPS-based access also provided JAVA-based remote console program Open consoles found on Windows system (as Administrator) and Solaris system (as root) NIS passwd-byname tables and Windows SAM and locally cached account hashes pulled All systems compromised
Another Government Agency Lessons Learned: Every host on a network must undergo some level of security hardening before being allowed to connect to the production network Every console should be forced to either screen-lock or auto-logout when not in use
Managed Service Provider Customer had limited Internet exposure, primarily HTTP traffic allowed to “Hosting” LAN  (primarily only TCP 80 & 443) Web server compromised with Apache “Chunked-code vulnerability” Server had 3 interfaces (2 for normal access, 3 rd  interface leading to NOC management-LAN for “out of band” SNMP) System on NOC network compromised with common Windows vulnerability NOC network had visibility into entire corporate network, as well as other hosted customers
Managed Service Provider Lessons Learned: It only takes one vulnerable service to give attackers a strong foothold into your network Management networks or VLANs are often excellent points to bridge between networks without direct connectivity Systems hosted by 3 rd  parties are often compromised by attacks originating from less secure customers at the same hosting facility
Telecommunications Large US telephone company Dial-ups found with unpassworded pcAnywhere pcAnywhere system used primarily for access into security camera monitoring of unmanned facilities Full access to internal network, including switching systems, billing, etc.
Telecommunications Lessons Learned: Modems can still be a major external threat! Critical systems should be firewalled against general network access
Emergency Response Organization responsible for state-wide emergency medical services Internet connectivity shared with major university Organization tied to other state-run networks through dedicated lines Firewall rules allowed certain hosts on University network & State Government networks into EMS network using insecure protocols (MS-SQL, SMB) Common exploits led to massive compromise
Emergency Response Lessons Learned: All inbound partner connections should be examined as part of a vulnerability assessment Firewall rules should likewise be examined to uncover any potential weak points for permitted communications Your network is ultimately only as secure as the weakest host connected to you
Law Enforcement Compromised Windows Workstation through un-patched IIS Web server – obtained local SAM file with domain accounts Compromised Windows PDC by escalating privileges with access gained from previous machine Compromised Investigator’s workstation with Domain Admin rights Workstation had VNC remote control software – password retrieved from Windows registry Logged in using remote control GUI Icon on desktop for MILES/NCIC Just a keystroke capture program away from access to the FBI
Law Enforcement Lessons Learned: Users should not be allowed to install random applications on their workstations Especially those that facilitate remote control! Applications that utilize proprietary authentication are usually easily broken Any system with multiple Network Connections can be used as a gateway to bridge secure networks to insecure networks The same holds true for VPNs, PPP connections, Wireless LAN access, etc. Even one of the most “secure” systems in the US can be compromised if accessed in an insecure fashion
Uncovering Attacks During Assessment Many assessments will reveal existing evidence of prior attack activity Some attacks may be more serious than others Most attack information found on Internet-based hosts are from random hacker groups running scripts Attacks found on internal machines are usually much more serious
Real Incident – Local Government Internet assessment found that IIS server was vulnerable to attack Several strange files found in the “SCRIPTS” directory Files were backdoor CMD shells and host scanning scripts Web log analysis showed that the host had been compromised by at least two separate groups:  one in USA, one in Korea Host was patched and files were removed
Real Incident – Service Provider Customer had servers hosted at Tier-1 internet provider Poor password on MSSQL server led to compromise of machine Customer noticed that the server was losing disk space Hidden directories had over 30GB of movies and music Netstat output showed that server was connecting to IRC server Ethernet Sniffing revealed IRC channel and channel key being used IRC Channel was being used by German software pirates We joined the channel and surprised the pirate group.  They apologized and told us we could keep copies of the movies.
Real Incident - Telephone Company Systems Administrator making threats about taking down Telephone switches Multiple root-shell files found on critical UNIX servers throughout the enterprise Backdoor access to switching systems found through X.29 PADs Administrator’s contract was terminated
Real Incident – Web Services Systems administrator fired for sexual harassment Windows machines began experiencing problems False accounts discovered on Internet accessible machine Trojan Horse discovered on internal workstations Real motive was intellectual property theft, and administrator was arrested
Real Incident - Banking Vulnerability assessment conducted against bank network Trojan Horse discovered on workstation Workstation used primarily as database for all customer credit-card data No data available to identify how Trojan Horse was delivered All credit cards on server had to be re-issued
Common Assessment Problems Customer Perception Misconfigured Hosts Bad Programming
Problem – Customer Perception Customer knew that we had gained access to all UNIX systems Administrator complained that TACACS server no longer worked, and thought our assessment caused the issue Review of TACACS config file showed that it had been recently modified by the Administrator We discovered that the Administrator had put in an additional # in file that caused the problem Administrator was very embarrassed
Problem – Misconfigured Hosts Solaris file system became full and caused kernel panic Problem occurred when the server was port scanned, starting somewhere above 30000 /var/log/messages file showed that “Inetd” process was failing and writing hundreds of errors per minute to file, causing the disk usage Analysis of /etc/inetd.conf file showed that a process (kcms_server) was allowed to spawn by inetd on port 32774 Examination of files showed that the kcms_server program (and many other unused programs) had been erased by system integrator during original install Addition of a single # in inetd before the program name corrected the problem
Problem – Bad Programming Port scans of a host indicated multiple unknown applications running on database server When connecting to these services with netcat or telnet to obtain banner and protocol information, the service crashed Analysis of the source code indicated that application programmers did not put in any error handling routines for TCP connections Programmers were able to fix the issue very quickly
Final Thoughts Insecure Web Applications have become one of the biggest targets for attackers. Modems   (authorized and unauthorized) are still not receiving the attention they deserve as potential threats. Patch & Configuration management are consistently neglected, or only applied to Core OS (not applications). The concepts of Internal and External access have begun to blur: Partner connections Inbound “Phishing” emails and Web Pages downloading malicious code that open up outbound “shell” access Poor passwords  are the number one mechanism to gain host-level access.

More Related Content

PDF
Ch 9: Embedded Operating Systems: The Hidden Threat
PPTX
Gestiona el riesgo de las grandes amenazas
PPTX
Web application security part 01
PPTX
Dealing with legacy code
PPTX
Internet infrastructure UNIT 5
PDF
The Hacker's Guide to the Passwordless Galaxy - Webinar 23.6.21 by Asaf Hecht
PPTX
Network defenses
PDF
Windows Service Hardening
Ch 9: Embedded Operating Systems: The Hidden Threat
Gestiona el riesgo de las grandes amenazas
Web application security part 01
Dealing with legacy code
Internet infrastructure UNIT 5
The Hacker's Guide to the Passwordless Galaxy - Webinar 23.6.21 by Asaf Hecht
Network defenses
Windows Service Hardening

What's hot (20)

PPTX
Havex Deep Dive (English)
PPTX
Security and ethics
PDF
Ch 8: Desktop and Server OS Vulnerabilites
PPT
Ch08 Microsoft Operating System Vulnerabilities
PPT
Lecture 2
PDF
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
PDF
CNIT 123: 8: Desktop and Server OS Vulnerabilites
PDF
PPT_Compiled
PPTX
Latest presentation
PDF
Network concepts and wi fi
PDF
Ceh v5 module 01 introduction to ethical hacking
PDF
Backtracking king05
PDF
Program security chapter 3
PDF
Module 17 (novell hacking)
PPTX
Attack on computer
PPTX
Security concepts
PDF
Fortinet_FortiDDoS_Introduction
PDF
Defcon 22-tim-mcguffin-one-man-shop
PPT
Event - Internet Thailand - Total Security Perimeters
PPTX
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Havex Deep Dive (English)
Security and ethics
Ch 8: Desktop and Server OS Vulnerabilites
Ch08 Microsoft Operating System Vulnerabilities
Lecture 2
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
CNIT 123: 8: Desktop and Server OS Vulnerabilites
PPT_Compiled
Latest presentation
Network concepts and wi fi
Ceh v5 module 01 introduction to ethical hacking
Backtracking king05
Program security chapter 3
Module 17 (novell hacking)
Attack on computer
Security concepts
Fortinet_FortiDDoS_Introduction
Defcon 22-tim-mcguffin-one-man-shop
Event - Internet Thailand - Total Security Perimeters
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg

Viewers also liked (16)

PPT
13. romanticisme
PDF
LPI_101
PPTX
Grandmother's house
PPTX
Mantra hack3rs browser (abhi-m)
PPTX
How To Get Through High School
PPTX
Murid dan alam belajar
PDF
Mindshare 04 mar2011
PDF
Stephenie Meyer Twikight 02 New Moon
PPS
Önlüğün vedası
PDF
บันทึกเอกสารเวิร์ดเป็นเว็บเพจ
DOC
ASLAN BURCU
PPT
S Ma Rt Presentation 2 2009
PPT
Ybcwebbstjrnan1013
PPT
19b r casas la carrega
PDF
Ufmg 2007-1ª - Conteúdo vinculado ao blog http://fisicanoenem.blogspot.c...
PDF
Enem 2010, Linguagens e Matemática - Conteúdo vinculado ao blog http://f...
13. romanticisme
LPI_101
Grandmother's house
Mantra hack3rs browser (abhi-m)
How To Get Through High School
Murid dan alam belajar
Mindshare 04 mar2011
Stephenie Meyer Twikight 02 New Moon
Önlüğün vedası
บันทึกเอกสารเวิร์ดเป็นเว็บเพจ
ASLAN BURCU
S Ma Rt Presentation 2 2009
Ybcwebbstjrnan1013
19b r casas la carrega
Ufmg 2007-1ª - Conteúdo vinculado ao blog http://fisicanoenem.blogspot.c...
Enem 2010, Linguagens e Matemática - Conteúdo vinculado ao blog http://f...

Similar to Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008 (20)

PPT
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
PDF
CNIT 121: Computer Forensics Ch 1
PDF
Invited Talk - Cyber Security and Open Source
DOC
Discovery of Compromised Machines
PPT
The Top 10/20 Internet Security Vulnerabilities – A Primer
PPTX
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
PPT
Microsoft Operating System Vulnerabilities
PPT
Microsoft OS Vulnerabilities
PDF
Information Security Risk Management
PDF
CNIT 152: 1 Real-World Incidents
PDF
5 howtomitigate
PPTX
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
PDF
8. cyber51-case-studies
PDF
CNIT 123 Ch 8: OS Vulnerabilities
PDF
CNIT 123 8: Desktop and Server OS Vulnerabilities
PPTX
Vulnerability Management
PPT
Firewalls (Distributed computing)
PDF
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
PPT
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
PPTX
2013 PMA Business Security Insights
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
CNIT 121: Computer Forensics Ch 1
Invited Talk - Cyber Security and Open Source
Discovery of Compromised Machines
The Top 10/20 Internet Security Vulnerabilities – A Primer
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Microsoft Operating System Vulnerabilities
Microsoft OS Vulnerabilities
Information Security Risk Management
CNIT 152: 1 Real-World Incidents
5 howtomitigate
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
8. cyber51-case-studies
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Vulnerability Management
Firewalls (Distributed computing)
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
2013 PMA Business Security Insights

More from ClubHack (20)

PDF
India legal 31 october 2014
PPTX
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
PPT
Cyber Insurance
PPTX
Summarising Snowden and Snowden as internal threat
PPTX
Fatcat Automatic Web SQL Injector by Sandeep Kamble
PDF
The Difference Between the Reality and Feeling of Security by Thomas Kurian
PDF
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
PPTX
Smart Grid Security by Falgun Rathod
PPTX
Legal Nuances to the Cloud by Ritambhara Agrawal
PPT
Infrastructure Security by Sivamurthy Hiremath
PDF
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
PPTX
Hacking and Securing iOS Applications by Satish Bomisstty
PPTX
Critical Infrastructure Security by Subodh Belgi
PPTX
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
PDF
XSS Shell by Vandan Joshi
PDF
Clubhack Magazine Issue February 2012
PDF
ClubHack Magazine issue 26 March 2012
PDF
ClubHack Magazine issue April 2012
PDF
ClubHack Magazine Issue May 2012
PDF
ClubHack Magazine – December 2011
India legal 31 october 2014
Cyberlaw by Mr. Pavan Duggal at ClubHack Infosec KeyNote @ Bangalore
Cyber Insurance
Summarising Snowden and Snowden as internal threat
Fatcat Automatic Web SQL Injector by Sandeep Kamble
The Difference Between the Reality and Feeling of Security by Thomas Kurian
Stand Close to Me & You're pwned! Owning Smart Phones using NFC by Aditya Gup...
Smart Grid Security by Falgun Rathod
Legal Nuances to the Cloud by Ritambhara Agrawal
Infrastructure Security by Sivamurthy Hiremath
Hybrid Analyzer for Web Application Security (HAWAS) by Lavakumar Kuppan
Hacking and Securing iOS Applications by Satish Bomisstty
Critical Infrastructure Security by Subodh Belgi
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
XSS Shell by Vandan Joshi
Clubhack Magazine Issue February 2012
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue April 2012
ClubHack Magazine Issue May 2012
ClubHack Magazine – December 2011

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Getting Started with Data Integration: FME Form 101
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Mushroom cultivation and it's methods.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
project resource management chapter-09.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
1. Introduction to Computer Programming.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
MIND Revenue Release Quarter 2 2025 Press Release
cloud_computing_Infrastucture_as_cloud_p
Programs and apps: productivity, graphics, security and other tools
Assigned Numbers - 2025 - Bluetooth® Document
A comparative study of natural language inference in Swahili using monolingua...
Getting Started with Data Integration: FME Form 101
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Zenith AI: Advanced Artificial Intelligence
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Enhancing emotion recognition model for a student engagement use case through...
Heart disease approach using modified random forest and particle swarm optimi...
Mushroom cultivation and it's methods.pdf
A Presentation on Touch Screen Technology
A comparative analysis of optical character recognition models for extracting...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
project resource management chapter-09.pdf
Chapter 5: Probability Theory and Statistics
1. Introduction to Computer Programming.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Web App vs Mobile App What Should You Build First.pdf

Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008

  • 1. Network Vulnerability Assessments Lessons Learned Chris Goggans [email_address]
  • 2. What are Vulnerability Assessments? Internal and external attacks Validation of existing security mechanisms Detailed analysis of all networked devices and services Audits for policy compliance and deficiencies in existing policies Prioritized recommendations for improving security posture
  • 3. Vulnerability Assessments: WHY? Only realistic way to determine vulnerabilities Get a baseline of vulnerability state Prioritize remedial actions Correct serious problems quickly Assure that policies address real vulnerabilities Industry best practice
  • 4. Vulnerability Assessments: H OW ? External Assessment Internet Modems Wireless Partner Connectivity In-briefing Internal Assessment Out-briefing Report preparation and delivery Executive briefing
  • 5. Government Contractor Unpassworded TELNET access into print server SNMP Read/Write community string exposed in printer configuration menu Community string also used on devices such as routers, switches, etc. “ Level 7” hashes in Cisco config files exposed the password “mbhafnitsoscar” This password also used by Domain Administrator on Windows PDC Windows Domain also tied to NetWare eDirectory, sharing account names and passwords In total, compromise of nearly 15,000 accounts and 99.99% of all systems and network devices…all from one insecure printer
  • 6. Government Contractor Lessons Learned: Even the most insignificant network device can provide information that uncovers a major attack path Always examine everything connected to your networks! Always utilize the greatest password protection possible MD5 vs Level7 In situations where accounts and passwords are shared across platforms, a single compromise of the weakest platform can lead to massive compromise Rainbow Tables & NTLMv1
  • 7. Civilian Government Agency Development WWW server running with default cold fusion scripts that allow remote viewing of web source Attack Path 1 ODBC setup in web page source code exposed z/OS RACF account and password used for DB2 queries Account found to have “system programmer” access on IBM Mainframe Attack Path 2 MS-SQL “sa” account and password in web source SQL “XP_CMDSHELL” stored procedure gave remote “SYSTEM” access to Windows OS Local SAM file exposed Domain Administrator account SAM file on PDC had roughly 50,000 accounts Certain users used same password on Windows as they did on very large High Performance Computing cluster
  • 8. Civilian Government Agency Lessons Learned: Passwords embedded in web applications are never a good thing Web Application Vulnerability Assessments have become as important as Network Vulnerability Assessments Database security is also critical and often left unchecked
  • 9. Another Government Agency Large network of Solaris and Windows systems All machines and applications patched Many important UNIX services are TCP-wrapped NFS, NIS, etc. Customer had recently deployed new KVM switches in their racks In addition to 3 rd party software, KVM Switch also had HTTPS based management interface with a default “Admin” account with no password HTTPS-based access also provided JAVA-based remote console program Open consoles found on Windows system (as Administrator) and Solaris system (as root) NIS passwd-byname tables and Windows SAM and locally cached account hashes pulled All systems compromised
  • 10. Another Government Agency Lessons Learned: Every host on a network must undergo some level of security hardening before being allowed to connect to the production network Every console should be forced to either screen-lock or auto-logout when not in use
  • 11. Managed Service Provider Customer had limited Internet exposure, primarily HTTP traffic allowed to “Hosting” LAN (primarily only TCP 80 & 443) Web server compromised with Apache “Chunked-code vulnerability” Server had 3 interfaces (2 for normal access, 3 rd interface leading to NOC management-LAN for “out of band” SNMP) System on NOC network compromised with common Windows vulnerability NOC network had visibility into entire corporate network, as well as other hosted customers
  • 12. Managed Service Provider Lessons Learned: It only takes one vulnerable service to give attackers a strong foothold into your network Management networks or VLANs are often excellent points to bridge between networks without direct connectivity Systems hosted by 3 rd parties are often compromised by attacks originating from less secure customers at the same hosting facility
  • 13. Telecommunications Large US telephone company Dial-ups found with unpassworded pcAnywhere pcAnywhere system used primarily for access into security camera monitoring of unmanned facilities Full access to internal network, including switching systems, billing, etc.
  • 14. Telecommunications Lessons Learned: Modems can still be a major external threat! Critical systems should be firewalled against general network access
  • 15. Emergency Response Organization responsible for state-wide emergency medical services Internet connectivity shared with major university Organization tied to other state-run networks through dedicated lines Firewall rules allowed certain hosts on University network & State Government networks into EMS network using insecure protocols (MS-SQL, SMB) Common exploits led to massive compromise
  • 16. Emergency Response Lessons Learned: All inbound partner connections should be examined as part of a vulnerability assessment Firewall rules should likewise be examined to uncover any potential weak points for permitted communications Your network is ultimately only as secure as the weakest host connected to you
  • 17. Law Enforcement Compromised Windows Workstation through un-patched IIS Web server – obtained local SAM file with domain accounts Compromised Windows PDC by escalating privileges with access gained from previous machine Compromised Investigator’s workstation with Domain Admin rights Workstation had VNC remote control software – password retrieved from Windows registry Logged in using remote control GUI Icon on desktop for MILES/NCIC Just a keystroke capture program away from access to the FBI
  • 18. Law Enforcement Lessons Learned: Users should not be allowed to install random applications on their workstations Especially those that facilitate remote control! Applications that utilize proprietary authentication are usually easily broken Any system with multiple Network Connections can be used as a gateway to bridge secure networks to insecure networks The same holds true for VPNs, PPP connections, Wireless LAN access, etc. Even one of the most “secure” systems in the US can be compromised if accessed in an insecure fashion
  • 19. Uncovering Attacks During Assessment Many assessments will reveal existing evidence of prior attack activity Some attacks may be more serious than others Most attack information found on Internet-based hosts are from random hacker groups running scripts Attacks found on internal machines are usually much more serious
  • 20. Real Incident – Local Government Internet assessment found that IIS server was vulnerable to attack Several strange files found in the “SCRIPTS” directory Files were backdoor CMD shells and host scanning scripts Web log analysis showed that the host had been compromised by at least two separate groups: one in USA, one in Korea Host was patched and files were removed
  • 21. Real Incident – Service Provider Customer had servers hosted at Tier-1 internet provider Poor password on MSSQL server led to compromise of machine Customer noticed that the server was losing disk space Hidden directories had over 30GB of movies and music Netstat output showed that server was connecting to IRC server Ethernet Sniffing revealed IRC channel and channel key being used IRC Channel was being used by German software pirates We joined the channel and surprised the pirate group. They apologized and told us we could keep copies of the movies.
  • 22. Real Incident - Telephone Company Systems Administrator making threats about taking down Telephone switches Multiple root-shell files found on critical UNIX servers throughout the enterprise Backdoor access to switching systems found through X.29 PADs Administrator’s contract was terminated
  • 23. Real Incident – Web Services Systems administrator fired for sexual harassment Windows machines began experiencing problems False accounts discovered on Internet accessible machine Trojan Horse discovered on internal workstations Real motive was intellectual property theft, and administrator was arrested
  • 24. Real Incident - Banking Vulnerability assessment conducted against bank network Trojan Horse discovered on workstation Workstation used primarily as database for all customer credit-card data No data available to identify how Trojan Horse was delivered All credit cards on server had to be re-issued
  • 25. Common Assessment Problems Customer Perception Misconfigured Hosts Bad Programming
  • 26. Problem – Customer Perception Customer knew that we had gained access to all UNIX systems Administrator complained that TACACS server no longer worked, and thought our assessment caused the issue Review of TACACS config file showed that it had been recently modified by the Administrator We discovered that the Administrator had put in an additional # in file that caused the problem Administrator was very embarrassed
  • 27. Problem – Misconfigured Hosts Solaris file system became full and caused kernel panic Problem occurred when the server was port scanned, starting somewhere above 30000 /var/log/messages file showed that “Inetd” process was failing and writing hundreds of errors per minute to file, causing the disk usage Analysis of /etc/inetd.conf file showed that a process (kcms_server) was allowed to spawn by inetd on port 32774 Examination of files showed that the kcms_server program (and many other unused programs) had been erased by system integrator during original install Addition of a single # in inetd before the program name corrected the problem
  • 28. Problem – Bad Programming Port scans of a host indicated multiple unknown applications running on database server When connecting to these services with netcat or telnet to obtain banner and protocol information, the service crashed Analysis of the source code indicated that application programmers did not put in any error handling routines for TCP connections Programmers were able to fix the issue very quickly
  • 29. Final Thoughts Insecure Web Applications have become one of the biggest targets for attackers. Modems (authorized and unauthorized) are still not receiving the attention they deserve as potential threats. Patch & Configuration management are consistently neglected, or only applied to Core OS (not applications). The concepts of Internal and External access have begun to blur: Partner connections Inbound “Phishing” emails and Web Pages downloading malicious code that open up outbound “shell” access Poor passwords are the number one mechanism to gain host-level access.