620 likes | 793 Views
UCCSC 2009 - Focus on Security. An Overview of Non-Commercial Software for Network Administrators Doug Nomura doug.nomura@gmail.com June 16 2009. Disclaimer. Don’t blame me if your workstation breaks or something bad happens to your network. Scientist Gone Bad - this is me!. Expectations.
E N D
UCCSC 2009 - Focus on Security An Overview of Non-Commercial Software for Network Administrators Doug Nomura doug.nomura@gmail.com June 16 2009
Disclaimer Don’t blame me if your workstation breaks or something bad happens to your network
Expectations • General overview - Only have 60 minutes! • Focus will be on tools to help detect problems with your network • Two Hat Perspective • If you can use the tool, think how it can be used against you!
Approach • Tool will be described • What the tool does • How can you use it • Advantages/disadvantages
Topics to be covered • Data Mining 1A • Web 2.0 • Kismet • OpenVAS • Metasploit
More Topics • NMap • Web Vulnerability Scanners • Pros and Cons of the free stuff • The Future
Data Mining 1A • Every network leaks or broadcasts information • What is allowable or acceptable by your organization? • This section will give examples of types of information being broadcast - allowable and sensitive
Classic Sources of Data Leaks • DNS & MX records • Technical forums • Job sites
Google’sAdvanced Operators • Reduce noise • Help to refine search • Operator:search term • Tutorial to advanced operators http://www.googletutor.com/google-manual/web-search/adding-advanced-operators/
Operators • domain:ucdavis.edu • “Exact phrase” • Intitle: Look for phrase in page
Types of information • Personal information • Technical information
Does anyone from UCD know person?or My Gosh - Lookat the SSN!!!
Is anyone from UCSF?Or this probably shouldnot be broadcast to the world
Text Example of a technical google hack revealing Nessus Scan Reports
Summary of Google Hacking • Use Google to peruse your servers for sensitive information • Clean up your mess like old scan reports • Educate users about the danger of broadcasting information
The Pros of Google Hacking • Find information you didn’t know was being broadcast • It’s cheap and works
The Cons of Google Hacking • Someone may have found the information already • You may not find everything • Fear the Google cache!!!!!
References for Google Hacking • See Johnny Long’s book - Google Hacking for Penetration Testers - ISBN-10 1597491764 • Any questions - just send me an email
Web 2.0 • Example: Twitter • Technical • Exploitation of code • Passive enumeration • Users careless of information being broadcast
Solution • Identify types of data not be broadcast • Educate • Users need to be made aware there are people “watching.”
“Free” Tools • Many released under GNU/GPL • Range from simple to complex • Many have great support and documentation
Kismet • Detects presence of 802.11 APs • Sniffs traffic • IDS • kismewireless.net
Kismet Note error messages at bottom - ignore them
Why use Kismet? • Pen testing of APs • Seek out rogue APs • Survey and map 802.11 installation • Distributed IDS
Kismet Advantages • Initial cost is free • Very powerful • Customizable • plugins
Cons of Kismet • Interface • May require significant configuration • Incompatibilities • Long term cost could be high due to time spent configuring and tweaking apps
OpenVAS • Vulnerability Assessment • Based upon Nessus 2.2 • Released under GNU/GPL • openvas.org
OpenVAS • Runs well on Linux • Financially - free VA tool • Growing support for project
Disadvantages • Problems with some NVTs • Some difficulty non-linux platform
Metasploit • Security Framework identifies vulnerabilities and exploits them • Intended for penetration testing and research • Customizable • metasploit.org
Metasploit Text Command line interface of Metasploit
Metasploit Example vulnerability to be used on Windows 2000 machine
Metasploit Selection of exploit
Metasploit Access has been achieved on remote machine
Metasploit Advantages • Growing community of users • Growing documentation • Runs well on most flavors of *nix • Excellent tool to identify and exploit vulnerability
Metasploit Disadvantages • Do not expect all exploits nor may be up to date with latest exploits • Lack of logging or reports • Machine running Metasploit can be compromised • This is a very dangerous tool and may violate policy at your institution. Use on test network
NMap - Network Mapper • Sends raw IP packets to specific host, or a range of hosts • Determines OS, version, open ports, identifies potential vulnerability • nmap.org
NMap • Network administrators and other IT folk responsible for network based assets • Pen testers and other security folk
NMap Loki:/Users/Doug root# nmap -sV 192.168.1.1-25 Starting Nmap 4.85BETA9 ( http://nmap.org ) at 2009-06-14 23:56 PDT Interesting ports on 192.168.1.1: Not shown: 998 closed ports PORT STATE SERVICE VERSION 23/tcp open telnet Cisco telnetd (IOS 6.X) 443/tcp open ssl/http Cisco PIX Device Manager MAC Address: 00:08:21:3A:29:B2 (Cisco Systems) Service Info: OS: IOS; Device: firewall Interesting ports on 192.168.1.2: Not shown: 997 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp tnftpd 20061217 22/tcp open ssh OpenSSH 5.1 (protocol 1.99) 548/tcp open afp Apple AFP (name: Feline; protocol 3.2; Mac OS X 10.4/10.5) MAC Address: 00:0D:93:32:D0:26 (Apple Computer) Service Info: Host: Feline.local Interesting ports on 192.168.1.4: Not shown: 999 closed ports PORT STATE SERVICE VERSION 5009/tcp open airport-admin Apple AirPort admin MAC Address: 00:03:93:1F:01:65 (Apple Computer) Interesting ports on 192.168.1.6: Part of a Nmap scan report
Strengths of NMap • Large base of support from user and developer community • Mature product • Fast and versatile scanner • Extremely stable. Install and go!