Security fundamentals

17
Security fundamentals Topic 6 Securing the network infrastructure

description

Security fundamentals. Topic 6 Securing the network infrastructure. Agenda. Security at the TCP/IP layers Security at the physical layer Securing network devices. Network layer attacks. MAC address spoofing - PowerPoint PPT Presentation

Transcript of Security fundamentals

Page 1: Security fundamentals

Security fundamentals

Topic 6Securing the network infrastructure

Page 2: Security fundamentals

Agenda

• Security at the TCP/IP layers• Security at the physical layer• Securing network devices

Page 3: Security fundamentals

Network layer attacks

• MAC address spoofing– Attackers can create packets with the MAC address of a different

computer and impersonate that computer

• Denial of Service (DoS)– Overloads a single system so that it cannot provide the service it is

configured to provide – Sends frames designed to use up all the resources of the target device

• ARP cache poisoning– Incorrect or spoofed entries are added to the ARP cache – messages

are sent to incorrect destinations

Page 4: Security fundamentals

Internet layer attacks• IP address spoofing

– Source addresses of IP packets are spoofed to impersonate another computer

• Man-in-the-middle attack– Attacker intercepts and reads or modifies packet contents without the knowledge of the

source or destination computers

• Denial of Service– Attacker overloads the TCP/IP stack with a large number of invalid packets which

prevents processing of legitimate packets– Attacker changes entries in routing tables to prevent delivery of packets

• Incorrect reassembly of fragmented datagrams– Offset field used to reassemble fragments is changed so that they can’t be reassembled

correctly – datagram could pass through a firewall when it shouldn’t

• Avoiding detection by fragmenting datagrams– An attacker might fragment a packet to hide patterns (such as virus signatures) to avoid

detection

• Corrupting packets– Information in IP header fields is modified

Page 5: Security fundamentals

Transport layer attacks

• Manipulation of UDP or TCP ports– Attacker can format packets so they appear to come from a port

allowed by the firewall

• Denial of service– SYN flood attack to leave sessions half open until router cannot accept

anymore connections

• Session hijacking– After the connection is established, attacker predicts TCP sequence

numbers and takes over the connection with his own segments

Page 6: Security fundamentals

Application layer attacks

• Specific to the application layer protocol• Common attacks exploit:– Email protocols– Web protocols– DNS

Page 7: Security fundamentals

Network cabling security• Coaxial cables

– Cutting or destroying cables– Noise from EMI or RFI– Removing a terminator

• Eavesdropping traffic by tapping into coaxial cable at any point on network

• Mitigation– Protect the Cable: bury it, inside walls, tamperproof containers– Document the cable infrastructure– Investigate all outages– Inspect your cables regularly– Investigate undocumented hosts and connections

Page 8: Security fundamentals

Network cabling security• Twisted pair

– Cutting or destroying cables– Noise from EMI or RFI, STP mitigates the impact of EMI and RFI

• Mitigation– Protect the cables– Protect the switches and patch panels– Document the cable infrastructure– Investigate all outages– Inspect your cables and infrastructure regularly– Investigate undocumented hosts and connections

• Eavesdropping– Using a protocol analyser or packet sniffer (requires physical connection)– Splicing into a cable– Listening to electromagnetic signals from the signals passing through the

wire

Page 9: Security fundamentals

Network cabling security• Fiber optic cables

– Bend or snap the cable– Any damage will disrupt the signal

• Eavesdropping– Virtually impossible – requires cutting cable and polishing ends and

connecting a device• Mitigation

– Protect the cables– Protect the switches and patch panels– Document the cable infrastructure– Investigate all outages– Inspect your cables and infrastructure regularly– Investigate undocumented hosts and connections

Page 10: Security fundamentals

Device security• Compromising switches and bridges

– If an attacker has physical access, he can disable a switch– Attach a computer to a span port which receives all switch traffic– Transmit frames with spoofed MAC address to corrupt the MAC

address table– Flood the switch with frames to disrupt operations

• Gaining administrative access– Port mirroring: map the input and output of one or more ports to a

single port to eavesdrop on communications– Change the MAC address table to redirect traffic

• ARP cache poisoning– Attacker can overwrite entries in the ARP cache allowing attacker to

eavesdrop or hijack a session

Page 11: Security fundamentals

Securing switches and bridges• Physical security

– Limit physical access, use security personnel and monitoring (cameras)• Protecting admin functions with passwords

– Set complex passwords and change routinely– Restrict access to few staff– Manually enter ARP mappings on critical devices: servers, switches

and bridges– Keep up to date with patches– Document configurations so you know what is normal and authorised

• Monitoring for security breaches– Monitor devices for unauthorised connections– ARPWATCH to monitor traffic and keep MAC-to-IP address mappings

Page 12: Security fundamentals

Securing routers

• Compromising routers– Susceptible to ARP cache poisoning– Routing tables can be changed either administratively or with

incorrect routing updates– RIP spoofing – updating routing tables with bogus updates– ACLs can be changed if admin access is compromised– Insecure protocols, services could be enabled

Page 13: Security fundamentals

Securing routers• Keep routers in secure locations: locked server rooms and

wiring closets• Secure all physical connections to network segments• Use security personnel and monitoring (cameras)• Set complex passwords and change regularly• Keep up to date with latest patches• Restrict staff with access and locations access can come from• Set ACLs to prevent inappropriate connections• Set passwords for routing updates• Disable insecure protocols and services• Document and regularly review the network

Page 14: Security fundamentals

Securing telecommunications

• Compromised by– Free long distance calls by changing billing records– Compromise or shut down the organisation’s

voice mail system– Reroute incoming, transferred or outgoing calls– Gain access to voice mail boxes of employees

Page 15: Security fundamentals

Securing PBX systems• Vulnerabilities

– Insecure or default passwords are used– Older PBX systems don’t implement latest security technology– Lack of knowledge and security procedures: social engineering– Remote management connections could be compromised– Unused floors and offices may have active connections

• Protecting PBX– Physically securing PBX equipment– Control access to PBX wiring room and switching equipment– Document– Routinely check unauthorised connections– Secure offsite transfers with passwords (for updates)– System exclusion lists to limit long distance calling– Shut down services not required during off days and hours– Educate users– Enforce PBX password change and audit policy– Secure maintenance ports, limit entry ports, log all system access

Page 16: Security fundamentals

Securing modems

Compromising modems• Can be used to circumvent firewall security• Can be used to provide direct access to internal computers• War dialling to discover computers with modems attached

Mitigation• Remove all unnecessary modems• If modem is required for outgoing calls make sure it is configured

not to accept incoming calls• Software/security updates for computers with modems• Monitor security bulletins• Isolate computers with modems to limit the damage• Monitor computers with modems to ensure they have not been

compromised

Page 17: Security fundamentals

Lesson summary

• What some TCP/IP layer attacks are, and security practices

• What some physical layer attacks are, and security practices

• Practices for securing network cabling and network devices and threats associated