560 likes | 740 Views
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | ondrej@ sevecek.com | www.sevecek.com |. Current Threats. Motto. Thou shalt never assume The Rogue Warrior's Eight Commandment of SpecWar Richard Marcinko US Navy Seal. Current Threats.
E N D
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | ondrej@sevecek.com | www.sevecek.com | Current Threats
Motto • Thou shalt never assume The Rogue Warrior's Eight Commandment of SpecWar Richard Marcinko US Navy Seal
Current Threats Threats
Attackers • External • don’t know anything about your environment • can try brute force passwords at most • vulnerability scanning • Internal • most severe threat • know their environment • have already at least some level of access • can steal data they are authorized to read
Protection: External Attackers • Firewalls • Antispam/Antimalware • Software Updates • Account Lockout
Current threats • Assuming • Physical security • computers • data • Passwords • cracking, keyloggers • Eavesdropping • wired/wireless networks • Spam/malware • directed attacks • Remote Access • from unsecure computers • Data theft by authorized readers • currently one of the most underestimated problem
Current Threats Assumptions
Vulnerabilities • Examples: • My wife crossing a road • PKI misconfiguration in a bank • Hidden accounts after virus attack • Malicious mail from home vs. from work
Protection: Assumptions • Never assume anything • Be careful • Know your enemy • Don’t do anything you don’t understand
Current Threats Physical Security
Machines • Servers • rack security • Data storage • Client computers • desktops, notebooks • usually caching data • Peripherals • Remote offices
Network • Wireless • AirPCap • Wired • USB Ethernet switch + netbook
Vulnerabilities • Computers easily accessed by a lot of people • employees • maintenance staff • theft from branch offices • Attacks • stealing the whole machine • stealing the data only • Physical access = local administrator
Protection: Physical access • Limit physical access • Place computers/storage into secure locations • +hardware locks, cables • Define security boundaries • data stolen • passwords compromised • Encryption • BitLocker, TrueCrypt
Protection: BitLocker • Provide password on startup • prevents other from becoming an administrator • Use TPM • Trusted Policy Module • stores the password on mother board • checks signatures of BIOS, CMOS, MBR, Boot Sector, loader etc. • Windows 7 Enterprise/Ultimate
Current Threats Passwords
Vulnerabilities • Keyloggers • software • hardware • Cache • Cracking
Local Password Storage • Full-text passwords • IE autocomplete • password “lockers” • fingerprint readers • service/scheduled-tasks accounts • Password hashes • local user accounts • all domain accounts on Domain Controllers • password caches
Password Cracking • Windows MD4 Hashes • local storage • LAN network capture • PPTP VPN • Offline • Rainbow Tables • severe up to 7 characters (minutes)
Protection: Passwords • Use smart cards vs. fingerprints • convenient (3-5 characters PIN) • still secure than passwords • Require strong passwords • Procedures, policies and audit • Never type sensitive passwords on insecure computers • Training
Protection: Password Policies • For the whole domain only • Windows 2003 Domain Function Level and older • For individual groups/users • Granular Password Policies • Windows 2008 Domain Functional Level and newer • Non-complex password example • login: Ondrej • password: #.J@mES-BonD58
Current Threats Eavesdropping
Vulnerabilities • Free network access • No network traffic encryption • People ignore warnings • ARP poisoning
Protection: Eavesdropping • Implement IPSec/SSL encryption • Always encrypt WiFi • not only require authentication • Implement 802.1x for network access • Implement ARP protection • Train people
Protection: 802.1x PC PC PC PC Switch PC Switch Switch PC PC Printer PC
Current Threats Secure Socket Layer
SecureSocketLayer / IPSec Certificate Public key Client WebServer Private key
SecureSocketLayer Certificate Client WebServer Public key Public key Random Private key Random Data
Attacking SSL False Certificate Certificate Public key Public key Client Attacker WebServer Private key Private key
SSL Certificate prices • Verisign – 1999 • 300$ year • Thawte – 2003 • 150$ year • Go Daddy – 2005 • 30$ year • GlobalSign – 2006 • 250$ year • StartCom – 2009 • free
SSL Assurance • Email loopback confirmation • Requires just a valid email address • No assurance about the target identity
EV Certificate prices • Verisign – 1999 • 1500$ year • Thawte – 2003 • 600$ year • Go Daddy – 2005 • 100$ year • GlobalSign – 2006 • 900$ year • StartCom – 2009 • 50$ year
Current Threats Spam/Malware
Vulnerabilities • No real prevention against spam • Spam created anonymously • no traces/auditing • Directed attacks cannot be automatically recognized • Users tend to use same passwords for more services • Stability and performance
Spam Threats • Phishing • Hoax • think something • do something online • do something physically! • Personal reputation after forwarding
Malware Threats • Virus must be first detected after infection! • Backdoors just download the real infection • does antimalware know what exactly it was? • Reinstallation of the whole environment!
Protection: Spam and malware • Train people • Implement antispam/antimalware • Words/Open Relay Lists etc. • SenderID
Current Threats Remote Access
Vulnerabilities • Prone to keylogger attacks • when used with passwords • Can be connected from quite anywhere • insecure home computers, internet cafes • Some protocols not secure • PPTP – passwords hashes offline cracking
Protection: Remote Access • Use RDP when possible • sends only keystrokes and mouse • receives only pictures • Use L2TP or SSTP • IPSec or SSL • encrypts the channel with strong random private keys (2048 bit etc.) • IPSec requires and limits connection to those who have client computer certificate • Implement VPN Quarantine