Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments,...

39
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments Paul Asadoorian Product Evangelist Tenable Network Security

description

I will never forget my assignment for a vulnerability assessment against a control systems network. “Hey, can you go somewhere, run “scans” against this system, and oh by the way don’t crash it or a large portion of the USA could lose power”. Needless to say, I turned down that assignment, as they required that a traditional network-based “scan” be run. There has to be a better way to preform assessments in such environments! Fast forward 10 years later and I’ve worked with much safer techniques for assessing the security of SCADA/Control systems infrastructure. Working for Tenable Network Security has also provided me great insights into several techniques, including: - Using credentials to login to systems and audit for missing patches and configuration changes - Tuning vulnerability scans to be less intrusive yet still accurate and providing useful information - Implementing passive vulnerability scanning to discover hosts on the network and enumerate vulnerabilities, without sending a single packet to the end-user system

Transcript of Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments,...

Page 1: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Tiptoe Through The Network:

Practical Vulnerability Assessments in Control Systems Environments

Paul Asadoorian

Product Evangelist

Tenable Network Security

Page 2: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

About Me

• Currently Product Evangelist at Tenable Network Security• Founder & CEO of Security Weekly (formerly “PaulDotCom”)• Worked for Digital Bond in 2008/2009• Love hacking and breaking embedded systems

Page 3: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Warning: Sub-Themes I am Known to Use in All My Presentations

•Ninjas (Check)•Star Wars Reference•ONE lolcat•Old Joke directed at my friend Jack Daniel•Wife/Kids related humor•Unicorns

Page 4: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

I can “scan” your networks without breaking “stuff”

And spoons don’t really sound like airplanes?

Page 5: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

You Don’t Have to Feel Vulnerable

•There is typical hesitation when scanning a network and/or any systems

•Scans may “cause an undesirable condition on a remote host” (Okay, it could crash it)

•Problem is you must:o Identify the deviceo Enumerate vulnerabilities

Page 6: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Goals

• Identify assets•Don’t break stuff•Discover vulnerabilities•Report them to people who can fix them

•Continuously discover vulnerabilities that remain

•Report progress to management

Page 7: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

You Can’t Fix it if You Don’t Know it Exists

•Detect hosts:o Netflow Datao Firewall Logso Arp Tableso Sniff Network Traffico Connection tableso Query VMWareo Look at your logs

Page 8: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Check out Bro IDS

•Regex for your network

•Write rules to discover hosts, attacks, vulnerabilities and more

•Command line kung fu, Security Onion

Liam has the coolest title: “Brovangelist”

Page 9: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

P0f – Passive OS and Host detection

•This tool is 14 years old…(Been around a long time)•Big thanks to Rob over at the SANS ISC, nice articles and exampleso http://isc.sans.org/diary/Passive+Scanning+Two+Ways+-+H

ow-Tos+for+the+Holidays/17246

o http://isc.sans.org/diary/Scanning+without+Scanning/17189 Not as long as Jack….

Page 10: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Sniffing the Network

•Passive sniffing•Firewalls•Virtualization•This shouldn’t be on the network

Page 11: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Sniffing & Logging – New Hosts

Page 12: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Nessus for Host Discovery

• Nessus is an active vulnerability scanner, however:

o You can use credentials to audit patches

o Configuration auditing points out flaws

o Policies are highly configurable

• http://www.tenable.com/blog/using-nessus-for-host-discovery

Ninja convention

Page 13: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Credentials: Checking for Patches

•Easy to create, use the wizard

•Upload the SSH keys •Nessus automatically selects the appropriate plugins

Page 14: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Credentials: Checking for Patches (2)

Page 15: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Lots of Results, “No Problem”

Page 16: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Credentials: Checking

Configuration

Page 17: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Credentials: Checking Configuration (2)

Page 18: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

VMware Virtual Machine Info

Page 19: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Vulnerability Management•You must keep up with patches on ALL of your systems

•You must identify easily exploitable vulnerabilities and patch them FAST

Page 20: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

The Patch Management Struggle

Security Guy Sysadmin

Our systems

are missing patches!

Page 21: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Step 1 – Define•Policy – What you will do and where you will do it•Procedures – How you will do it and who you will do it with

•Get management to sign off on both of the above

Page 22: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Step 2 – Communication & Process

•Communicate your policy and procedures to the right people!

•Management, security, administrators and end users

Page 23: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Step 3 – Find Them All

•Scan your network (frequently)•Perform authenticated vulnerability scanso Servers & Desktopso Network infrastructureo Virtualization platformo Storage systems

•Sniff your network for vulnerabilities

•Mine your logs for data

These are not the vulnerabilities you’re looking for

Page 24: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Application Discovery

•Get rid of applications not supported or not in use

•Reduce your attack platform•Less stuff to patch

Page 25: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Eek, why TELNET?

Page 26: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Phone + Wifi

Here’s my number, call me after you patch your phone.

Page 27: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Applications

How many browsers do you need?

Page 28: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Scanning Embedded Systems

Page 29: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

This is not a tablet, phone or “phablet”

Page 30: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

2012 Wife Christmas Gift

•Has Wifi• “Runs” Android

Page 31: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

2013 Wife Christmas Gift

•Has Wifi•Runs….?

Page 32: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

“Scanning” Embedded Systems

•Many embedded devices are Wifi-only•Some devices are transient or only are online for a short time then go away

•Many do not react well to an active network-based scan (ICS type devices for example)

•Resources are an issue (not enough CPU/RAM)

Page 33: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Passive Vulnerability Scanner Trending

Page 34: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Conclusions

•There are many ways to continually perform host discovery, from sniffing to log monitoring

•Once you’ve identified all the hosts, have a process for vulnerability management

•There are numerous ways in which to “scan” a host, including credentialed patch audits and configuration auditing

•Embedded systems are tricky, require special attention, and passive scanning is best in this case

Page 35: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Sub-Themes Check list

Ninjas Star Wars ReferenceONE lolcatOld Joke directed at my friend Jack DanielWife/Kids related humorUnicorns

Page 36: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Tenable Resources

Blog:http://blog.tenable.com

Podcast:http://www.tenable.com/podcast

Videos:http://www.youtube.com/tenablesecurity

Discussion portal:https://discussions.nessus.org

Buy Nessus, Perimeter Service, Training & Bundles:https://store.tenable.com

Become a Tenable Partner:https://www.tenable.com/partners

Page 37: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Try SecurityCenter and Nessus now

For more information, or to evaluate

SecurityCenter Continuous View:

http://www.tenable.com/products/securitycenter-continuous-view

Evaluate Nessus free for 14 days:http://www.tenable.com/products/nessus/evaluate

Page 38: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Questions?

????

Page 39: Tiptoe Through The Network: Practical Vulnerability Assessments in Control Systems Environments, Paul Asadoorian of Tenable Network Security

Thank you

Contact me:

Paul Asadoorian – [email protected] for Tenable related items

[email protected] for anything else…