220 likes | 231 Views
Comprehensive guide on designing an attack box, including OS selection, hardware configuration, software load, and security audits. Learn about setting up a lab, combating web servers, and rooting attackers.
E N D
D0G of WAR Attack Box Design 7/11/01
Blake ~Internet Consultant~ Security Audits & WAN / LAN Infrastructure Designs Netspan@hotmail.com San Jose (408) 907-5003 / San Francisco (415) 561-9374
1. Introduction 2. Attack Box Design: -CUJ0 OS Selection Hardware Selection OS Layout Baseline Software Load Lock & Load: Extended Toolz Selection - Layout of the Lab -Zombies -Those Evil Web Servers -Fighting Back, ‘Rooting the Attacker’ -P0IS0N -Conceptual: The Death Star Design 3. Overview of Security Audits 4. Closing
Building an Attack Box From the Ground Up…. ‘CUJ0’
OS Selection For Tools WINDOWS (98 / NT / Win2k) LINUX BSD SOLARIS Single OS vs Multiboot
Hardware Selection Via Piece-Meal (which Manufacturers, Sizing, etc ???) Motherboard, Processor(s) RAM Hard Drives Floppy NIC Cards CD Rom / CD Burner External Modem Printer Total Cost =
Hardware Selection: (cont’d) • Laptops • Used Hardware • (Where to look for Cheap Stuff)
Multiboot Options MBR Windows Boot.ini Lilo boot FreeBSD multiboot BootMagic System Commander MSTBoot Bootit NG VMWare
OS Load Order Which one first ??? The Problems with Installations
Partitions Primary Extended Logical Virtual Formatting Layout on the Hard Drives Sizing & Resizing
Baseline Software Loads Different Configurations Partition Imaging of Different Loads Drive Imaging Storage
TOOLZ Selection Integration Testing Evaluation Parsing the Code Making you own Scripts & Toolz
Layout of the Lab for Testing Toolz Master File Server Attack, Victim, & Monitoring Boxes
Network Equipment & Configurations Fractional / T1 DSL Cable Modem Dial-up Routers / Switches / Hubs Firewalls Sniffers / Network IDS
Other Types of Attack Boxes (cont’d) Automated vs ‘Hands-on’ Vulnerability Scanners
Other Types of Attack Boxes (cont’d) Zombies
Other Types of Attack Boxes (cont’d) Those Evil Web Servers
FIGHTING BACK ‘Rooting the Attacker’
Other Types of Attack Boxes (cont’d) ‘P0IS0N’ The Honeypot with an Attitude (A Box That Bites Back)
Other Types of Attack Boxes (cont’d) ‘The Death Star Design’
PERFORMING SECURITY AUDITS Discussion