Guide to Operating Systems Security Chapter 12 Solutions

advertisement
Guide to Operating Systems Security
0-619-16040-3
Guide to Operating Systems Security
Chapter 12 Solutions
Answers to the Chapter 12 Review Questions
1.
Your organization prints out many logs from servers each morning, but no one looks at them, except
occasionally. What might your organization use in relation to the logs to help make server
administrators aware of possible intrusions?
Answer: a. software that provides alerts from the information in the logs
2.
You are working for a bank that provides Internet banking 24 hours a day, seven days a week. The
bank cannot afford to have security personnel scanning for intruders and taking action against intruders
during every moment that Internet banking is available. What might be the best solution?
Answer: c. implement active intrusion detection
3.
Your company has decided to put intrusion-detection software on all servers and workstations. This is
called:
Answer: d. host-based intrusion detection
4.
You have installed Network Monitor in Windows 2000 Server, but the software is not gathering
statistics on network activity. What might be the problem? (Choose all that apply.)
Answer: c. You need to install Network Monitor Driver
5.
The art director in your company suspects that someone is accessing her Mac OS X computer over the
network. Which of the following enables her to monitor who is logged onto her computer?
Answer: b. the who command from a terminal window
6.
The IT manager in your company wants a way to check which users are logged on to his Windows XP
Professional workstation, because he enables programmers to access employment and vacation
information from his computer. Which of the following do you recommend? (Choose all that apply.)
Answer: a. and d.
7.
Which of the following types of information can you obtain from MONITOR in NetWare 6.x?
(Choose all that apply.)
Answer: a., b., c., and d.
8.
A Mac OS X user, who is also a frequent user of the Internet, has downloaded a worm. You want to
trace the user's steps to determine how this might have happened. Which of the following would be
most productive?
Answer: b. Examine the contents of the FTP Service log.
9.
You are training a new server administrator on the Windows 2000 and 2003 servers in your
organization. You decide to train the new server administrator to use Network Monitor to track only
BPDU traffic. What capability do you show her?
Answer: d. setting up a filter
10. While still training the new server administrator in Question 9, you show her how to monitor shared
folders, and she asks what the "$" reference means in the folder names. You explain that this refers to
_____________________.
Answer: a. hidden folders
11. In Red Hat Linux 9.x, most logs are found in the __________________ directory.
Answer: c. /var/log
1
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
12. Your organization is experiencing lots of port scanning and various attempts at breaking into servers.
Which of the following intrusion-detection methods might you try, to redirect attackers away from
these servers? (Choose all that apply.)
Answer: d. Set up a honeypot.
13. A(n) _____________________ examines logs and other recorded data and determines if there has
been an intrusion attempt.
Answer: b. inspector
14. You want to examine failed attempts to access the Payroll folder in Windows Server 2003. What log
would you check?
Answer: c. Security log
15. When you see a white "x" inside a red circle in Windows 2000 Server or Windows Server 2003 log,
this signifies a(n) ________________________.
Answer: a. error
16. You notice that a process that should be starting when Red Hat Linux 9.x boots is not starting. Where
would you look to track down the error?
Answer: c. in the Boot log
17. You suspect that an attacker has changed the schema in NetWare 6.0. Where would you look to trace
this possibility?
Answer: d. View the SYS:ETC\SCHINST.LOG file.
18. You've identified an intruder on a NetWare 6.5 server on your network. Now you need to quickly
terminate this intruder's log on session. Which of the following tools can you use? (Choose all that
apply.)
Answer: c. and d.
19. In Network Monitor, how might you view traffic only from one workstation, as a way to determine if
that workstation is creating a network load? (Choose all that apply.)
Answer: b. and c.
20. Your assistant is worried that the logs on computers running Red Hat Linux 9.x will become too full
and must be managed. What is your comment about this?
Answer: d. Leave Red Hat Linux's automatic rotation level system in place to rotate the logs.
2
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
Hands-On Projects Tips and Solutions for Chapter 12
Project 12-1
Students learn how to access Event Viewer and to configure a filter in this project. Before students
begin, make sure that you have auditing turned on for one or more files.
In Step 3, the logs students see will depend on which operating system they access and the services
installed in the operating system. In Windows 2000 and XP Professional, they will see the System,
Security, and Application logs. In Windows 2000 Server and Windows Server 2003 they will see
additional logs: File Replication Service, Directory Service, and DNS Service.
In Step 5, students should report about the error events they see in Event Viewer.
In Step 6, students should report on the events they open in the Security Log.
In Step 10, students should record a few of the event sources, such as cdrom, disk, modem, IPSec,
NetBIOS, Tcpip, and many, many others.
In Step 11, students should record some of the other parameters that can be set such as:
 Category
 Event ID
 User
 Computer
 From
 To
In Step 13, after the filter is put into use, students will only see error events for the Netlogon source.
However, the events that are no longer displayed are still in the log, but they are not seen in Event
Viewer because the filter is being used.
Project 12-2
In this project, students access the Log Viewer in Red Hat Linux 9.x and configure a filter and alerts.
In Step 4, the display changes because students are filtering for the word “shutdown” and after they
click the Filter button, they only see messages that contain this word.
In Step 6, students should determine the number of failed messages displayed through the filter.
In Step 11, the word “unauthorized” is added to the list of alert words.
Project 12-3
Students learn how view the Red Hat Linux System Log using the cat command in this project.
In Step 3, students should report viewing all of the default logs with four versions per log:
 Boot.log.x
 Cron.x
 Maillog.x
 Messages.x
 Rpmpkgs.x
 Secure.x
 Spooler.x
 Up2date.x
 XFree86.x.log
3
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
Project 12-4
In this project, students view the contents of the Console Log in NetWare 6.x. They will need a
workstation running Windows XP Professional (or Windows 2000 Professional will work), Client32
already installed on the workstation, and an account from which to access a NetWare server.
In Step 7, students should record the time of the last entry in the log.
Project 12-5
Students learn how to view the System Log in Mac OS X in this project.
In Step 3, students should report seeing the following log files:
 ftp.log
 lastlog
 lookupd.log
 lpr.log
 mail.log
 netinfo.log
 secure.log
 system.log
In Step 5, students should record the topics of two or three messages.
Project 12-6
In this project, students view shared resources and connections in Windows 2000/XP/2003.
In Step 3, students should record one or two resources, such as C$ and print$. Also, they should note
that the "$" means that the resource is hidden.
In Step 4, students should record the number of active sessions. Also, to terminate a session, they
should report that they would right-click the user and click Close Session.
In Step 5, students should report the number of files that are locked.
Project 12-7
Students use the who command in Red Hat Linux to view users who are on their system.
In Step 6, the differences are that:
 Step 2 results show the user, line, and time logged on
 Step 3 results show the same information as Step 2, but with headers
 Step 4 results show the headers and add the idle time information
 Step 5 results provide only the user names and the total number of users
4
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
Project 12-8
In this project, students use MONITOR in NetWare 6.x to view connections, NLMs, and locked files.
In Step 5, students should report the number of connections.
In Step 15, students will see the following columns:
 Connection
 Task
 Lock Status
 Log Status
Project 12-9
In this project, students use the Process Viewer in Mac OS X.
In Step 5, students should report which process is using the most memory.
Project 12-10
Students learn to monitor a network using Microsoft Network Monitor in this project. They will need
access to a Windows 2000/2003 server that has Network Monitor installed along with Network
Monitor Driver. Also, they will need access to an account that has permissions to use Network
Monitor.
In Step 4, students should report the typical % Network Utilization.
In Step 6, students should use the Station and Session Statistics panes to report about stations sending
broadcasts. Also, the Session Statistics pane provides information about the network address of a
station.
5
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
Project 12-10 (Cont.)
In Step 11, examples of the protocols that can be monitored (at this writing) include:
 3ComNBP (ETYPE)
 AppleTalk ARP (ETYPE)
 AppleTalk LAP (ETYPE)
 ARP (ETYPE)
 BPDU (SAP)
 IBM NM (SAP)
 IBM RT (ETYPE)
 IP (SAP and ETYPE)
 IPv6 (ETYPE)
 Loop (ETYPE)
 NetBIOS (SAP)
 NetWare (ETYPE)
 NetWare 802.2
 NetWare SAP (SAP)
 NULL (SAP)
 Other ETYPES (ETYPE)
 PUP (ETYPE)
 PUP ARP (ETYPE)
 RPL (SAP)
 SNA (SAP)
 SNAP (SAP)
 SNMP (ETYPE)
 TCP (ETYPE)
 TRLR (ETYPE)
 UB (SAP)
 VINES (SAP and ETYPE)
 XNS (SAP and ETYPE for 3Com and ETYPE for Xerox)
In Step 14, the stations that are listed will depend on what stations are connected to the network. Some
typical examples besides the server include generic stations such as: *ANY GROUP, *BROADCAST,
*NETBIOS Multicast, and LOCAL. Communications between two stations can be tracked in both
directions, from Station 1 to Station 2, or from Station 2 to Station 1. To view all traffic between a
NetWare server and all other stations, designate the NetWare station as Station 1 and *ANY as Station
2 (or vice versa).
In Step 15, the relationship under (Address Pairs) is now displayed as:
INCLUDE *ANY GROUP ↔ *ANY
6
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
Solutions to the Case Project Assignments
Xtreme is a company that manufactures fast snowboards and skis. The company's research department has
been developing new materials that not only increase the speed of its old products, but also increase the
products' durability. Xtreme operates in a very competitive industry, and the company takes many
precautions to protect its secret product and design information. Xtreme is aware that competitors
frequently attempt to access its network, through both inside sources and the Internet.
Xtreme uses Windows 2003 and NetWare 6.0 servers to house product and research information. Research
and design activities are performed on Red Hat Linux 9.0 and Mac OS X workstations. Xtreme hires you
through Aspen IT Services to consult about implementing intrusion-detection measures for its servers and
workstations.
Case Project 12-1: Passive and Active Intrusion Detection
Xtreme's IT department is debating whether to use passive intrusion detection or active intrusion detection.
However, many members of the department are confused about the differences between these approaches.
They ask you to create a short report that:
 Explains the differences between passive and active intrusion detection
 Discusses the pros and cons of passive and active intrusion detection
Answer:
In their reports, students should first compare passive intrusion detection to active intrusion detection. As
mentioned in the text, passive intrusion detection uses ways to detect and record intrusion attempts, but
does not take action on those attempts. Some examples of the activities monitored as provided in the text
include:
 Login attempts that have succeeded and failed
 Suspicious attempts to access accounts used by administrators
 Changes to files
 Changes to accounts
 Changes to security
 Changes to DNS services
 Successful and failed attempts to access files
 Files that are open under suspicious circumstances
 Unplanned system shut downs
 Unexpected communications adapter events or activities
 Services that are unexpectedly shut down
 Unusual or excessive e-mail traffic
 File quotas about to be exceeded
 Successful and failed network connections
 Network connections from suspicious locations
 Network probes
 Port scans
 Suspicious file transfers
 Suspicious network traffic
7
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
Case Project 12-1: Passive and Active Intrusion Detection (Cont.)
Active intrusion detection uses event tracking and logs to provide alerts or to take specific actions against
an intrusion., such as blocking an intruder.
In discussing the pros and cons of active versus passive intrusion detection, students should note that
passive intrusion detection does not take any action against intruders, and so an inattentive system
administrator may never know an intrusion has taken place and nothing may be done. Passive intrusion
detection requires that the system administrator regularly review logs and records, and use filters and traps
to detect intrusions. On the positive side, it does not prevent legitimate users from accomplishing their
work.
A limitation of active intrusion detection is that it can go too far in preventing intrusions by also preventing
legitimate users from accomplishing their work. Thus, it must be configured carefully. It is an advantage,
though, in that a response to an intrusion can be faster than with passive intrusion.
Many organizations use a combination of active and passive intrusion detection for best coverage and
response.
Case Project 12-2: Using Decoys
The IT department director has heard about using decoys for security. He asks you to prepare a report that
explains a decoy and how a decoy might be used on Xtreme's network.
Answer:
A decoy or honeypot is a computer and operating system that is set up to be attractive for intruders and
attackers. Often it is a fully functional server operating system with dummy or useless data. Also, it may be
configured with little or no security so that it is an even more attractive target. The idea behind a decoy is to
draw attention away from servers and other computers that do contain important information. Also, a decoy
can be used to quickly identify an attacker so that preventive/blocking action can be taken before the
attacker targets other computers on the network.
On the Xtreme network, the company might consider setting up a DMZ and placing the decoy in the DMZ.
Next, they might use the decoy to identify attackers, so that they can configure a firewall to block these
users.
8
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
Case Project 12-3: Using Windows Server 2003 and NetWare 6.0 Logs
The two administrators for the Windows Server 2003 and NetWare 6.0 servers have ignored using the audit
logs on these systems, because they have had only a few problems—which they've solved without using
logs. The IT director has instructed both administrators to check the logs regularly for security purposes. To
help the administrators get started, the IT director asks you to prepare written information about:
 Logs that are available on both systems
 Your recommendations about which logs to check most frequently
Answer:
Windows Server 2003 offers the following logs that were discussed in the text:
Log
Description
System log
Records information about system-related events such as hardware errors,
driver problems, and hard drive errors
Security log
Records access and security information about logon accesses, file, folder, and
system policy changes
Application log
Records information about how software applications are performing
Directory Service log
Records events that are associated with Active Directory, such as updates to
Active Directory, events related to the Active Directory’s database, replication
events, and startup and shutdown events
DNS Server log
Provides information about instances in which DNS information is updated,
when there are problems with the DNS service, and when the DNS Server has
started successfully after booting
File Replication log
Contains information about changes to file replication, when the file
Replication service has started, and completed replication tasks
NetWare 6.0 offers the following logs, as discussed in the text:
Log
Description
Access Log
Contains information about access services to the NetWare server
Audit Log
Contains an audit trial of user account activities
Console Log
Traces activities performed at the System Console, such as loading NLMs
Error Log
Contains error information recorded for the NetWare server
Module Log
Contains a listing of modules that have been loaded.
NFS Server Log
Provides information about NFS server services, including changes to the
service and communications through TCP and UDP
Schema Instructions Log
Tracks schema events, including changes to the schema
9
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
Case Project 12-3: Using Windows Server 2003 and NetWare 6.0 Logs (Cont.)
Students may discuss different logs to monitor most frequently, and may provide the reasons for their
recommendations. A good place to start in Windows Server 2003 is to frequently monitor the System and
Security logs, because the System log provides a very complete listing of all types of events and the
Security log is intended for security monitoring, such as accesses to accounts and files. In NetWare 6.0, the
Console Log is valuable for verifying what actions have been taken on the server and the Access and Audit
Logs provide tracking of access activities.
Case Project 12-4: Monitoring Users in Red Hat Linux and Mac OS X
The research department director wants the Red Hat Linux 9.0 and Mac OS X users to regularly monitor
who is accessing their workstations. He asks you to prepare a training document that explains how to
monitor users on both systems.
Answer:
Both Red Hat Linux 9.0 and Mac OS X offer the ability to monitor users through the who command.
The steps in Red Hat Linux are:
1. Click Main Menu, point to System Tools, and click Terminal.
2. Type who -H or who -iH and press Enter.
3. Type who am i, and press Enter, if you want information about your own logon session.
4. Type exit, and press Enter to close the terminal window
The steps in Mac OS X are:
1. Click the Go menu.
2. Click Applications.
3. Double-click the Utilities folder.
4. Double-click Terminal.
5. Type who -H and press return.
6. Type who am i, and press return, if you want information about your own logon session.
7. Close the terminal window.
10
© 2004 Course Technology and Michael Palmer. All rights reserved.
Guide to Operating Systems Security
0-619-16040-3
Case Project 12-5: Monitoring a Possible Intruder
A network administrator has determined that a particular workstation user is frequently accessing one of the
Windows 2003 servers in what appears to be an unauthorized fashion. The IT director asks you to prepare a
document for the two Windows 2003 server administrators, outlining how to use Network Monitor to track
activity from this workstation. When you prepare this training document, cover the following:
 How to watch the activities of this workstation in the Session Statistics and Station Statistics panes
 How to create a filter to monitor the workstation's activities
 How to periodically use the capture summary information to trace the activities of this workstation
Answer:
Students should note that they can use the Session Statistics pane to track the network address or computer
name of the possible intruder. If Xtreme tracks NIC device addresses, this information can be used to locate
the intruder, or it can be used with other network monitor software or an SNMP network management
station to trace the IP address (more advanced students may note that there are ways to use IP protocols to
query the IP address). Also the Session Statistics pane can be used to correlate communications of the
suspected intruder with access to the server. In the Station Statistics pane, the computer name or device
address can be traced to watch traffic relating to frames, bytes, multicasts, and broadcasts.
To create a filter to monitor the workstation's activities:
1. Open Network Monitor.
2. Click the Edit Capture Filter button.
3. There may be a warning that this version of Network Monitor only captures data coming across
the local computer. Click OK.
4. Double-click SAP/ETYPE = Any SAP or Any ETYPE.
5. Click the Enable All button (or select to view only TCP and IP traffic).
6. Click OK.
7. Double-click (Address Pairs). For Station 1 select the station device address or computer name
you identified in the Session Statistics pane. For Station 2, select the server.
8. Click OK.
9. Click the Start Capture button on the button bar.
To view the capture summary data, click the Captured Data button. Click the Find button on the button bar
to view communication associated with the server or possible intruder’s IP address. Note that the capture
data summary does provide IP address information that can be correlated to the intruder.
11
© 2004 Course Technology and Michael Palmer. All rights reserved.
Download