understanding e-mail and web security

41
U N C L A S S I F I E D U N C L A S S I F I E D Understanding e-mail and web Security By Richard Hammer LANL LA-UR-08-2558

Upload: zandra

Post on 10-Feb-2016

27 views

Category:

Documents


0 download

DESCRIPTION

Understanding e-mail and web Security. By Richard Hammer LANL LA-UR-08-2558. In the news!. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Understanding e-mail and webSecurity

ByRichard Hammer

LANLLA-UR-08-2558

Page 2: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

In the news!•The initial entry of malware into the ORNL networks reportedly came via a phishing email that took advantage of a temporary vulnerability in the Internet Explorer (a Microsoft fix came April 12, a day after the lab identified the intrusion). knoxnews.com

•RSA, the security division of EMC, has revealed the firm's data breach in mid March was the result of a spear phishing attack. The spear phishing attack exploited an Adobe Flash vulnerability that was unpatched at the time. computerweekly.com

•Sony is warning customers who use the Playstation Network and/or Sony Online Entertainment to be on the alert for possible spearphishing attacks. The company suffered a data breach and says a hacker may have gained access to over 24 million accounts including email addresses, birthdates, phone numbers, passwords, and more-including credit card numbers, which have been spotted for sale in several cybercrime forums. allspammedup.com

•Epsilon--the largest distributor of permission-based email in the world--revealed that millions of individual email addresses were exposed in an attack on its servers. While no other information was apparently compromised, security experts are warning users to brace for a tidal wave of more precise spear phishing attacks. pcworld.com

•Among Epsilon’s clients affected are three of the top ten U.S. banks – JP Morgan Chase, Citibank and U.S. Bank — as well as Barclays Bank and Capital One.

Page 3: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Old and New Threats

Page 4: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

What attackers need from us!

• Need us to execute a program• Need us to NOT securely configure our programs/systems• Need us to NOT pay attention• Need us to NOT patch/update• Need us to be careless, gullible or curious• Need us to NOT understand the technology

Computing as a Privileged User makes it real easy!

“It’s that easy because we allow it to be that easy”Frank Abagnale

Page 5: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Understanding e-mail

• Clear text e-mail is completely unreliable.

• How do you recognize bogus e-mail?• What is URL redirection?• How do you protect yourself?• Secure settings?• Stop Phishing!• Outlook?

Page 6: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Why you should not Trust Clear Text e-mail

• Do not know who sent it• Do not know who sees it• Do not know where it went• Do not know who read it• Do not know if content changed• Still on server, backups?• Sys Admins have full access

Page 7: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Encrypting e-mail?

• Only Intended Recipients can read messages or open files

• Data has not been modified• Data is from the expected source• Not readable in transit

• Not just SSL/TLS to server• PGP/SMIME/Entrust

Page 8: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

How do you recognize bogus e-mail?

• Don’t know the sender?• Is the offer “too good to be true?”• Asks for personal information!• Embedded links that point to an address that

doesn’t appear right.• Your email address is not listed on the “TO” or

“CC”.• The “FROM” & “Return-Path” don’t match.• Unexpected attachments.

Page 9: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Phishing right here in LA!

• Guy Lisella“Anytime they ask for personal

information, it’s a scam.”• Legitimate businesses will

NEVER ASK for personal information to be transmitted over clear text e-mail!

• If unsure, call them.

Page 10: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

What is wrong?

Page 11: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Understanding URLs/Redirection

http://computername.subdomain.domain.name/directoryname/resourcefile.htm

Where you thought you were going:

http://www.dncu.org/login.aspx?update

Computer name – wwwDomainname – dncu.orgIP Address – 206.107.78.175Resource file – login.aspx

Where you are redirected:

http://www.dncu.org.hi-position.com/register/login.html

Computer name – wwwSubdomain – dncu.orgDomainname – hi-position.comIP Address – No longer registered, but was 202.168.210.1XXDirectory – registerResource file – login.html

Page 12: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Look at the e-mail header• Eudora – Blah, Blah, Blah• Outlook – Open Message, Message tab, Options, Internet Headers• Webmail – Click on Full Headers• Thunderbird – Menu Bar, VIEW/HEADER, ALL

Page 13: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

http://www.facebook.com.herrazzb.eu/...

Page 14: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

http://up-dates.lanl.gov.secure.1-central.net/...

Page 15: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Stop Right There!

Page 16: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

E-mail client configuration

• Do NOT auto execute anything

• Do NOT automatically download HTML graphics or content

• Do NOT display graphics in message• Do NOT allow executable html content• Turn OFF Attachment Preview

• If NOT sure configure to “WARN ME BEFORE”

Page 17: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Outlook Settings (Tools/Trust Center)

Page 18: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Before and After (Mac Mail)

Page 19: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Outlook, do you see Xs?

Page 20: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

What’s Wrong? Unknown sender, not addressed to me, has an attachment I did not expect.

Page 21: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Virus protection caught it three weeks later, don’t be the first to open it!

Page 22: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Web Browser Security

• Understand how it works• SSL/TLS• Privacy Settings• Security Settings• “Warn me” is always a good option when not

sure• Scripts• Understand Threats• Internet Explorer?

Page 23: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Web Access (SSL/TLS)

• SSL Developed by Netscape (1994)• Certificate Exchange• System to System• Certificate Authority

• Should only use SSL 3.0 or TLS 1.0

• Is it secure?• Redirection• Man-in-Middle Attack

Page 24: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Keeping Track of State

• SessionID

https://ucfy.ucop.edu/ucfy/BaseServlet;jsessionid=0000q9ZvjIPe7xWTjxeftFjTqBy:-1

• Cookie– Persistent– Non- Persistent

• Hidden Form Element

Page 25: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Redirection and Man-in-Middle

WWW Server

Desktop Client

TCP/IP Port 443

WWW Server

Desktop Client

TCP/IP Port 443

Bad Guy

TCP/IP Port 443

Page 26: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Warning, should I proceed?

Page 27: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Secure ???

Page 28: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Private Browsing (Firefox)

<Tools><Start Private Browsing>

Page 29: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

InPrivate Browsing (IE)

<Tools><InPrivate Browsing>

Page 30: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Security Settings (Firefox)

<Tools><Options>

Page 31: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Firefox - Noscript

Page 32: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Firefox – Noscript (2)

Page 33: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Firefox – Noscript, Temporary Allow ALL

Page 34: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Recipe for a Secure Web Transaction

• Ensure SSLv3/TLS (one time thing)

• Open New Firefox Browser• Start Private Browsing • You initiate the connection• Only go to sites associated with transaction• Use Noscript and only allow needed scripts• Pay attention to error messages• Logout when done

THESE ARE NOT THE SAME!!!• Close browser

Page 35: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Redirection, not just networking

Page 36: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Passwords Everywhere?

Page 37: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Client Protection Summary

• User vs Admin Privilege• Virus Protection• Spyware/Adaware Protection• Keep Systems & Applications updated• Remove programs you don’t need• Secure Program Settings• Don’t Auto execute

Page 38: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Client Protection Summary

• DO NOT open attachments unless you expect them.

• Don’t click on embedded links• Pay attention to warning messages• POP-UP blockers• Clear privacy settings• Noscript

Page 39: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Client Protection Summary

• If it’s “too good to be TRUE,” it is!• When configuring programs keep

personal information to a minimum.• Stay away from shady web sites• Backup your data• One-time Credit Card Numbers• Shutdown when not using system

Page 40: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Client Protection Summary

• Encrypt sensitive information• Password Wallet• Application Layer Personal Firewall• Outlook and Internet Explorer:

– Consider replacing these programs.– Keep them patched/updated.

Page 41: Understanding e-mail and web Security

U N C L A S S I F I E D

U N C L A S S I F I E D

Educate Yourself!

&Always Initiate

the Communication