understanding e-mail and web security

Post on 10-Feb-2016

27 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Understanding e-mail and web Security. By Richard Hammer LANL LA-UR-08-2558. In the news!. - PowerPoint PPT Presentation

TRANSCRIPT

U N C L A S S I F I E D

U N C L A S S I F I E D

Understanding e-mail and webSecurity

ByRichard Hammer

LANLLA-UR-08-2558

U N C L A S S I F I E D

U N C L A S S I F I E D

In the news!•The initial entry of malware into the ORNL networks reportedly came via a phishing email that took advantage of a temporary vulnerability in the Internet Explorer (a Microsoft fix came April 12, a day after the lab identified the intrusion). knoxnews.com

•RSA, the security division of EMC, has revealed the firm's data breach in mid March was the result of a spear phishing attack. The spear phishing attack exploited an Adobe Flash vulnerability that was unpatched at the time. computerweekly.com

•Sony is warning customers who use the Playstation Network and/or Sony Online Entertainment to be on the alert for possible spearphishing attacks. The company suffered a data breach and says a hacker may have gained access to over 24 million accounts including email addresses, birthdates, phone numbers, passwords, and more-including credit card numbers, which have been spotted for sale in several cybercrime forums. allspammedup.com

•Epsilon--the largest distributor of permission-based email in the world--revealed that millions of individual email addresses were exposed in an attack on its servers. While no other information was apparently compromised, security experts are warning users to brace for a tidal wave of more precise spear phishing attacks. pcworld.com

•Among Epsilon’s clients affected are three of the top ten U.S. banks – JP Morgan Chase, Citibank and U.S. Bank — as well as Barclays Bank and Capital One.

U N C L A S S I F I E D

U N C L A S S I F I E D

Old and New Threats

U N C L A S S I F I E D

U N C L A S S I F I E D

What attackers need from us!

• Need us to execute a program• Need us to NOT securely configure our programs/systems• Need us to NOT pay attention• Need us to NOT patch/update• Need us to be careless, gullible or curious• Need us to NOT understand the technology

Computing as a Privileged User makes it real easy!

“It’s that easy because we allow it to be that easy”Frank Abagnale

U N C L A S S I F I E D

U N C L A S S I F I E D

Understanding e-mail

• Clear text e-mail is completely unreliable.

• How do you recognize bogus e-mail?• What is URL redirection?• How do you protect yourself?• Secure settings?• Stop Phishing!• Outlook?

U N C L A S S I F I E D

U N C L A S S I F I E D

Why you should not Trust Clear Text e-mail

• Do not know who sent it• Do not know who sees it• Do not know where it went• Do not know who read it• Do not know if content changed• Still on server, backups?• Sys Admins have full access

U N C L A S S I F I E D

U N C L A S S I F I E D

Encrypting e-mail?

• Only Intended Recipients can read messages or open files

• Data has not been modified• Data is from the expected source• Not readable in transit

• Not just SSL/TLS to server• PGP/SMIME/Entrust

U N C L A S S I F I E D

U N C L A S S I F I E D

How do you recognize bogus e-mail?

• Don’t know the sender?• Is the offer “too good to be true?”• Asks for personal information!• Embedded links that point to an address that

doesn’t appear right.• Your email address is not listed on the “TO” or

“CC”.• The “FROM” & “Return-Path” don’t match.• Unexpected attachments.

U N C L A S S I F I E D

U N C L A S S I F I E D

Phishing right here in LA!

• Guy Lisella“Anytime they ask for personal

information, it’s a scam.”• Legitimate businesses will

NEVER ASK for personal information to be transmitted over clear text e-mail!

• If unsure, call them.

U N C L A S S I F I E D

U N C L A S S I F I E D

What is wrong?

U N C L A S S I F I E D

U N C L A S S I F I E D

Understanding URLs/Redirection

http://computername.subdomain.domain.name/directoryname/resourcefile.htm

Where you thought you were going:

http://www.dncu.org/login.aspx?update

Computer name – wwwDomainname – dncu.orgIP Address – 206.107.78.175Resource file – login.aspx

Where you are redirected:

http://www.dncu.org.hi-position.com/register/login.html

Computer name – wwwSubdomain – dncu.orgDomainname – hi-position.comIP Address – No longer registered, but was 202.168.210.1XXDirectory – registerResource file – login.html

U N C L A S S I F I E D

U N C L A S S I F I E D

Look at the e-mail header• Eudora – Blah, Blah, Blah• Outlook – Open Message, Message tab, Options, Internet Headers• Webmail – Click on Full Headers• Thunderbird – Menu Bar, VIEW/HEADER, ALL

U N C L A S S I F I E D

U N C L A S S I F I E D

http://www.facebook.com.herrazzb.eu/...

U N C L A S S I F I E D

U N C L A S S I F I E D

http://up-dates.lanl.gov.secure.1-central.net/...

U N C L A S S I F I E D

U N C L A S S I F I E D

Stop Right There!

U N C L A S S I F I E D

U N C L A S S I F I E D

E-mail client configuration

• Do NOT auto execute anything

• Do NOT automatically download HTML graphics or content

• Do NOT display graphics in message• Do NOT allow executable html content• Turn OFF Attachment Preview

• If NOT sure configure to “WARN ME BEFORE”

U N C L A S S I F I E D

U N C L A S S I F I E D

Outlook Settings (Tools/Trust Center)

U N C L A S S I F I E D

U N C L A S S I F I E D

Before and After (Mac Mail)

U N C L A S S I F I E D

U N C L A S S I F I E D

Outlook, do you see Xs?

U N C L A S S I F I E D

U N C L A S S I F I E D

What’s Wrong? Unknown sender, not addressed to me, has an attachment I did not expect.

U N C L A S S I F I E D

U N C L A S S I F I E D

Virus protection caught it three weeks later, don’t be the first to open it!

U N C L A S S I F I E D

U N C L A S S I F I E D

Web Browser Security

• Understand how it works• SSL/TLS• Privacy Settings• Security Settings• “Warn me” is always a good option when not

sure• Scripts• Understand Threats• Internet Explorer?

U N C L A S S I F I E D

U N C L A S S I F I E D

Web Access (SSL/TLS)

• SSL Developed by Netscape (1994)• Certificate Exchange• System to System• Certificate Authority

• Should only use SSL 3.0 or TLS 1.0

• Is it secure?• Redirection• Man-in-Middle Attack

U N C L A S S I F I E D

U N C L A S S I F I E D

Keeping Track of State

• SessionID

https://ucfy.ucop.edu/ucfy/BaseServlet;jsessionid=0000q9ZvjIPe7xWTjxeftFjTqBy:-1

• Cookie– Persistent– Non- Persistent

• Hidden Form Element

U N C L A S S I F I E D

U N C L A S S I F I E D

Redirection and Man-in-Middle

WWW Server

Desktop Client

TCP/IP Port 443

WWW Server

Desktop Client

TCP/IP Port 443

Bad Guy

TCP/IP Port 443

U N C L A S S I F I E D

U N C L A S S I F I E D

Warning, should I proceed?

U N C L A S S I F I E D

U N C L A S S I F I E D

Secure ???

U N C L A S S I F I E D

U N C L A S S I F I E D

Private Browsing (Firefox)

<Tools><Start Private Browsing>

U N C L A S S I F I E D

U N C L A S S I F I E D

InPrivate Browsing (IE)

<Tools><InPrivate Browsing>

U N C L A S S I F I E D

U N C L A S S I F I E D

Security Settings (Firefox)

<Tools><Options>

U N C L A S S I F I E D

U N C L A S S I F I E D

Firefox - Noscript

U N C L A S S I F I E D

U N C L A S S I F I E D

Firefox – Noscript (2)

U N C L A S S I F I E D

U N C L A S S I F I E D

Firefox – Noscript, Temporary Allow ALL

U N C L A S S I F I E D

U N C L A S S I F I E D

Recipe for a Secure Web Transaction

• Ensure SSLv3/TLS (one time thing)

• Open New Firefox Browser• Start Private Browsing • You initiate the connection• Only go to sites associated with transaction• Use Noscript and only allow needed scripts• Pay attention to error messages• Logout when done

THESE ARE NOT THE SAME!!!• Close browser

U N C L A S S I F I E D

U N C L A S S I F I E D

Redirection, not just networking

U N C L A S S I F I E D

U N C L A S S I F I E D

Passwords Everywhere?

U N C L A S S I F I E D

U N C L A S S I F I E D

Client Protection Summary

• User vs Admin Privilege• Virus Protection• Spyware/Adaware Protection• Keep Systems & Applications updated• Remove programs you don’t need• Secure Program Settings• Don’t Auto execute

U N C L A S S I F I E D

U N C L A S S I F I E D

Client Protection Summary

• DO NOT open attachments unless you expect them.

• Don’t click on embedded links• Pay attention to warning messages• POP-UP blockers• Clear privacy settings• Noscript

U N C L A S S I F I E D

U N C L A S S I F I E D

Client Protection Summary

• If it’s “too good to be TRUE,” it is!• When configuring programs keep

personal information to a minimum.• Stay away from shady web sites• Backup your data• One-time Credit Card Numbers• Shutdown when not using system

U N C L A S S I F I E D

U N C L A S S I F I E D

Client Protection Summary

• Encrypt sensitive information• Password Wallet• Application Layer Personal Firewall• Outlook and Internet Explorer:

– Consider replacing these programs.– Keep them patched/updated.

U N C L A S S I F I E D

U N C L A S S I F I E D

Educate Yourself!

&Always Initiate

the Communication

top related