160 likes | 276 Views
ServiceTrak Meets NLOG/NMAP. Jon Finke Rensselaer Polytechnic Institute. Objectives. Identify existing security exposures Identify potential security exposures Validate meta system configuration Build on existing work Internal - Simon, ServiceTrak External - NMAP/NLOG.
E N D
ServiceTrak Meets NLOG/NMAP Jon Finke Rensselaer Polytechnic Institute
Objectives • Identify existing security exposures • Identify potential security exposures • Validate meta system configuration • Build on existing work • Internal - Simon, ServiceTrak • External - NMAP/NLOG
Computing Environment • Computer Center Machines • Unix - Centrally administered • WinTel - Mixed administration • Departmental Machines • Unix Administered by CC Staff • Unix Administered by non CC Staff • WinTel - Mixed Administration
NLOG/NMAP • NMAP port scans networks • Matches TCP/IP Fingerprint for OS • Identifies open ports (services) • NLOG • Provides some data management • Provides a web interface
ServiceTrak • Tracks Services and Servers • Web interface to Simon host info
Host Groups lpr_Specials pop_Specials All_Workstations lpr_ok pop_ok Public Workstations Private Workstations AIX_Workstations Public_AIX Private_AIX Public_Irix Irix_Workstations Private_Irix Public_Solaris Solaris_Workstations Private_Solaris
Service “Safety” • My Standards • History of attack/exposure - SMTP • Encourage Exposure - Telnet • Not required for user workstation • Specific servers only (ftp, dns, etc) • Set for the needs of my department • Your Mileage May Vary
Similar Hosts • Do all hosts offer the SAME services • Do the services make sense for that group? • Is the OS fingerprint correct for each host?
Ssh (22/tcp)Remote Access NMAP • Safety Level: Safe • Secure Shell • TSV File
Safety Level Breakdown • Special Group of ALL HOSTS • Which ones are running unsafe protocols? • Do we care?
Protocol Specific Lists • Service specialists interested in their particular service. • Hostmaster interested in DNS servers • Webmaster interested in WWW servers • Operating system specialists interested in their own OS.
Problems • NLOG can crash some services • Trips scan detectors • Irate email from other sys admins • False reports from detection tools • Back Officer Friendly • Policy Issues
Our Results • Identified some exposures • OS upgrade turned some things on • Identified site configuration errors • “Trusted” unix host running NT • Integration of NLOG info with existing tools helpful.
Lessons Learned • Host grouping is VERY useful • NLOG may be a good approach • OS (via TCP Fingerprint) very handy • Policy Issues • Let someone else run it and take the heat…..
ServiceTrak Meets NLOG/NMAP Jon Finke Rensselaer Polytechnic Institute finkej@rpi.edu http://www.rpi.edu/~finkej