current threats

56
CURRENT THREATS Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | [email protected] | www.sevecek.com |

Upload: ashley

Post on 25-Feb-2016

36 views

Category:

Documents


0 download

DESCRIPTION

Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | ondrej@ sevecek.com | www.sevecek.com |. Current Threats. Motto. Thou shalt never assume The Rogue Warrior's Eight Commandment of SpecWar Richard Marcinko US Navy Seal. Current Threats. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Current Threats

CURRENT THREATS

Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security |[email protected] | www.sevecek.com |

Page 2: Current Threats

Motto

Thou shalt never assume

The Rogue Warrior's Eight Commandment of SpecWar

Richard MarcinkoUS Navy Seal

Page 3: Current Threats

THREATSCurrent Threats

Page 4: Current Threats

Attackers

External don’t know anything about your

environment can try brute force passwords at most vulnerability scanning

Internal most severe threat know their environment have already at least some level of

access can steal data they are authorized to

read

Page 5: Current Threats

Protection: External Attackers

Firewalls Antispam/Antimalware Software Updates Account Lockout

Page 6: Current Threats

Current threats

Assuming Physical security

computers data

Passwords cracking, keyloggers

Eavesdropping wired/wireless networks

Spam/malware directed attacks

Remote Access from unsecure computers

Data theft by authorized readers currently one of the most underestimated problem

Page 7: Current Threats

ASSUMPTIONSCurrent Threats

Page 8: Current Threats

Vulnerabilities

Examples: My wife crossing a road PKI misconfiguration in a bank Hidden accounts after virus attack Malicious mail from home vs. from work

Page 9: Current Threats

Protection: Assumptions

Never assume anything Be careful Know your enemy Don’t do anything you don’t

understand

Page 10: Current Threats

PHYSICAL SECURITYCurrent Threats

Page 11: Current Threats

Machines

Servers rack security

Data storage Client computers

desktops, notebooks usually caching data

Peripherals Remote offices

Page 12: Current Threats

Network

Wireless AirPCap

Wired USB Ethernet switch + netbook

Page 13: Current Threats

Vulnerabilities

Computers easily accessed by a lot of people employees maintenance staff theft from branch offices

Attacks stealing the whole machine stealing the data only

Physical access = local administrator

Page 14: Current Threats

Protection: Physical access Limit physical access Place computers/storage into secure

locations +hardware locks, cables

Define security boundaries data stolen passwords compromised

Encryption BitLocker, TrueCrypt

Page 15: Current Threats

Protection: BitLocker

Provide password on startup prevents other from becoming an

administrator Use TPM

Trusted Policy Module stores the password on mother board checks signatures of BIOS, CMOS, MBR,

Boot Sector, loader etc. Windows 7 Enterprise/Ultimate

Page 16: Current Threats

PASSWORDSCurrent Threats

Page 17: Current Threats

Vulnerabilities

Keyloggers software hardware

Cache Cracking

Page 18: Current Threats

Local Password Storage

Full-text passwords IE autocomplete password “lockers” fingerprint readers service/scheduled-tasks accounts

Password hashes local user accounts all domain accounts on Domain

Controllers password caches

Page 19: Current Threats

Password Cracking

Windows MD4 Hashes local storage LAN network capture PPTP VPN

Offline Rainbow Tables

severe up to 7 characters (minutes)

Page 20: Current Threats

Protection: Passwords

Use smart cards vs. fingerprints convenient (3-5 characters PIN) still secure than passwords

Require strong passwords Procedures, policies and audit

Never type sensitive passwords on insecure computers

Training

Page 21: Current Threats

Protection: Comparable Algorithm Strengths (SP800-57)

Strength Symetric RSA ECDSA SHA

80 bit 2TDEA RSA 1024 ECDSA 160 SHA-1

112 bit 3TDEA RSA 2048 ECDSA 224 SHA-224

128 bit AES-128 RSA 3072 ECDSA 256 SHA-256

192 bit AES-192 RSA 7680 ECDSA 384 SHA-384

256 bit AES-256 RSA 15360 ECDSA 512 SHA-512

Page 22: Current Threats

Protection: Smart Cards

Algoritmus Porovnání10 znaků heslo US-ASCII 70 bitSHA-1 80 bitRSA 2048 112 bitSHA-256 128 bit

Algoritmus Náročnost Doba10 znaků heslo US-ASCII 1 2 500 let

SHA-1 1024x lepší 2 600 000 let

RSA 2048 4 398 046 511 104x lepší 11 000 biliónů let

SHA-256 2^58x lepší -

Page 23: Current Threats

Protection: Password Policies For the whole domain only

Windows 2003 Domain Function Level and older

For individual groups/users Granular Password Policies Windows 2008 Domain Functional Level

and newer Non-complex password example

login: Ondrej password: #.J@mES-BonD58

Page 24: Current Threats

EAVESDROPPINGCurrent Threats

Page 25: Current Threats

Vulnerabilities

Free network access No network traffic encryption People ignore warnings ARP poisoning

Page 26: Current Threats

Protection: Eavesdropping

Implement IPSec/SSL encryption Always encrypt WiFi

not only require authentication Implement 802.1x for network

access Implement ARP protection Train people

Page 27: Current Threats

Protection: 802.1x

Switch

Switch

Switch

PC

PC

PC

PCPrinte

r

PC PC

PC

PC

Page 28: Current Threats

SECURE SOCKET LAYERCurrent Threats

Page 29: Current Threats

Secure Socket Layer / IPSec

WebServer

Client

Certificate

Public key

Private key

Page 30: Current Threats

Public key

Secure Socket Layer

WebServerClient

Certificate

Public key

Private keyRandom

Random Data

Page 31: Current Threats

Attacking SSL

WebServer

Client

Certificate

Public key

Private key

Attacker

False Certificate

Public key

Private key

Page 32: Current Threats

SSL Certificate prices

Verisign – 1999 300$ year

Thawte – 2003 150$ year

Go Daddy – 2005 30$ year

GlobalSign – 2006 250$ year

StartCom – 2009 free

Page 33: Current Threats

SSL Assurance

Email loopback confirmation Requires just a valid email address No assurance about the target

identity

Page 34: Current Threats

EV browsers

Browser VersionInternet Explorer 7.0Opera 9.5Firefox 3Google Chrome -Apple Safari 3.2Apple iPhone 3.0

Page 35: Current Threats

EV Certificate prices

Verisign – 1999 1500$ year

Thawte – 2003 600$ year

Go Daddy – 2005 100$ year

GlobalSign – 2006 900$ year

StartCom – 2009 50$ year

Page 36: Current Threats

TMG Forward SSL Inspection

Page 37: Current Threats

No SSL Inspection

Page 38: Current Threats

TMG CA Not Trusted

Page 39: Current Threats

TMG CA Not Trusted

Page 40: Current Threats

Web Server Certificate

Page 41: Current Threats

TMG CA Trusted on the Client

Page 42: Current Threats

SPAM/MALWARECurrent Threats

Page 43: Current Threats

Vulnerabilities

No real prevention against spam Spam created anonymously

no traces/auditing Directed attacks cannot be

automatically recognized Users tend to use same passwords

for more services Stability and performance

Page 44: Current Threats

Spam Threats

Phishing Hoax

think something do something online do something physically!

Personal reputation after forwarding

Page 45: Current Threats

Malware Threats

Virus must be first detected after infection!

Backdoors just download the real infection does antimalware know what exactly it

was? Reinstallation of the whole

environment!

Page 46: Current Threats

Protection: Spam and malware Train people

Implement antispam/antimalware Words/Open Relay Lists etc. SenderID

Page 47: Current Threats

REMOTE ACCESSCurrent Threats

Page 48: Current Threats

Vulnerabilities

Prone to keylogger attacks when used with passwords

Can be connected from quite anywhere insecure home computers, internet cafes

Some protocols not secure PPTP – passwords hashes offline cracking

Page 49: Current Threats

Client VPN Comparison

VPN Connection requirements Logon

Client Availability

Authentic.

RDPTCP 3389server certificate (not required)

random keys (D-H)certificate private key (2048bit)

Windows XP

passwordsmart card

RDS/TS Gateway

TCP 443server certificate

random keys (D-H)certificate private key (2048bit)

Windows XP

passwordsmart card

PPTP GRE + TCP 1723depends on password qualityvulnerable to offline cracking

MS-DOSpasswordsmart card

L2TP

IPSec ESP + UDP 500/4500server certificateclient computer certificate

random keys (D-H)certificate private key (2048bit)

Windows 98

passwordsmart card

SSTP TCP 443server certificate

random keys (D-H)certificate private key (2048bit)

Windows Vista

passwordsmart card

Page 50: Current Threats

Protection: Remote Access

Use RDP when possible sends only keystrokes and mouse receives only pictures

Use L2TP or SSTP IPSec or SSL encrypts the channel with strong random

private keys (2048 bit etc.) IPSec requires and limits connection to

those who have client computer certificate Implement VPN Quarantine

Page 51: Current Threats

LAN

DirectAccessClien

tClient

Client DA

Server

Page 52: Current Threats

AUTHORIZED USERSCurrent Threats

Page 53: Current Threats

Vulnerabilities

Authorized users can read print copy send emails upload FTP/SSL/VPN

Page 54: Current Threats

Protection: Authorized users Procedures Limit public online access and

services Limit use of removable hardware Use some Rights Management

software Data Leakage Protection

Page 55: Current Threats

TAKEAWAYCurrent Threats

Page 56: Current Threats

Takeaway

Anything you don’t have under your direct control is insecure

Don’t use insecure computers Use strong passwords or rather

smart cards Encrypt data and transmissions Never trust email