GIAC GSECtitle Crashstyle Course Click to edit Master Michael J. Shannon CISSP Cisco CCNP R&S and CCNP Security Palo Alto Networks Certified Network Security Engineer (PNCSE7) GIAC GSEC and Security+ ITIL 4 Managing Professional (MP) OpenFAIR Foundation AWS SysOps Administrator Associate 1 Introduction Click to edit Master title style • Welcome to the GSEC Challenge – that’s exactly what you are officially doing if you attempt a GIAC exam without the official SANS 5-6 day class. • Is the SANS GSEC $7000 worth the price? • It’s an open book exam - All tools are free and open-source • Here is what I’m giving you in this crash course • • • • Slides in PDF – print them An index of the course Cheat sheets YouTube videos for tools 2 Setting up Learning Labs Click to edit Master title style • You have several options for lab environments • A powerful workstation/laptop • VM Workstation Pro or VirtualBox 6 • Kali Linux + Metasploitable + Windows 10 • Virtual networks at AWS, GCP, IBM Cloud, or Azure • Cisco Modeling Labs 2.0 https://www.virtualbox.org/ https://www.kali.org/downloads/ https://github.com/rapid7/metasploitable3 https://www.cisco.com/c/en/us/products/cloud-systems-management/modelinglabs/index.html 3 The OSI Reference Model Click to edit Master title style Number Name Description 7 Application To accomplish a networked user task 6 Presentation Expressing and translating data formats 5 Session To accommodate multiple session connections 4 Transport Connecting multiple programs on same system 3 Network (or Internetwork) Facilitate multihop communications across potentially different link networks 2 Link Communication across a single link including media access control 1 Physical Specifies connectors, data rates, and encoding bits 4 The OSI Reference Model Click to edit Master title style Number Name Example 7 Application HTTP, FTP, SMTP, DNS, TELNET 6 Presentation ASCII, PNG, MPEG, AVI, MIDI 5 Session SSL/TLS, SQL, RPC, NFS 4 Transport TCP, UDP, SPX, AppleTalk 3 Network (or Internetwork) IP, IPX, ICMP, ARP, BGP, OSPF 2 Link PPP/SLIP, Ethernet, Frame Relay, ATM 1 Physical Binary transmission, encoding, bit rates, voltages 5 The TCP/IP Reference Model Click to edit Master title style Number OSI Name TCP/IP Model 7 Application 6 Presentation 5 Session 4 Transport Transport 3 Network (or Internetwork) Internet 2 Data Link 1 Physical Application Network 6 OSI Model Mnemonics Click to edit Master title style • All People Seem To Need Data Processing • All Proper Suitors Tell No Devious Phrase _____________ • Please Do Not Throw Sausage Pizza Away • Please Do Not Tell Secret Passwords Anytime • Physical Data Networks Transport Session Presentation Applications 7 Hexadecimal Math Click to edit Master title style • Hexadecimal is Base-16 math • Digits are 0-9, A, B, C, D, E, F (16 elements) Hexadecimal: 0 1 2 3 4 5 6 7 8 9 A Decimal: B C D E F 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 There are 16 Hexadecimal digits. They are the same as the decimal digits up to 9, but then there are the letters A, B, C, D, E and F in place of the decimal numbers 10 to 15 8 Hexadecimal Math Click to edit Master title style A 2 F 7 163 162 161 160 10 X 163 = 40960 2 X 162 = 512 15 X 161 = 240 7 X 160 =7 40960 + 512 + 240 + 7 = 41719 Just like 2^0 power is one in binary, 16 ^ 0 = 1 in hex -- 7 x 1 = 7 16 ^ 1 is 16 x 1 = 16 -- 15 x 16 = 240 16 ^ 2 is 16 x 16 =256 -- 2 x 256 = 512 16 ^ 3 is 16 x 16 x 6 = 4096 -- 10 x 4096 = 40960 40960 + 512 + 240 + 7 – 41719. Notice how we can now express a much larger number with only 4 characters? 9 Hex to Decimal Click to edit Master title style 10 Hexadecimal Addresses Click to edit Master title style MAC addresses and IPv6 addresses both use Hexadecimal numbers 11 Logical (Virtual) MAC addresses Click to edit Master title style AWS uses Elastic Network Interfaces (ENI). We just call them Network Interfaces. It is a virtual NIC vNIC and is eth0 of the instance by default. 12 Internet Protocol (IP) Click to edit Master title style • • • • IP is the core protocol of the TCP/IP suite and the key protocol of the Network (internetwork) layer Its main purpose is to provide internetwork datagram delivery services to layer 4 protocols like TCP and UDP Often uses layer 3 devices like routers, multilayer switches, load balancers, and firewall appliances to forward datagrams (packets) Exam Tip: The Time To Live (TTL) field designates the number of hops a packet can take before it reaches its destination. 13 Key Characteristics of IP Click to edit Master title style • Universal addressing o Defines addressing mechanism • Protocol independence o Works with both the Ethernet and the 802.11 wireless family • Connectionless delivery o No handshake setup before transmission to remote host • Unreliable and unacknowledged delivery - no tracking of datagrams • Fragmentation – to break up datagram into smaller packets for a neighbor router that supports a smaller max transmission unit (MTU) 14 Address Resolution Protocol (ARP) Click to edit Master title style • A technique used by a host to find the MAC address of another host and map it to an IP address • A protocol and a utility to view the cache • Described in RFC 829 • IPv6 does not use ARP – uses ICMPv6 instead • ARP request = “Who has 10.10.10.33?; tell 192.168.10.45” 15 Main IP Protocol Versions Click to edit Master title style • The functions of IP were planned and designed well before the protocol suite was defined • The original Transmission Control Program was divided into Transmission Control Protocol (TCP) and Internet Protocol (IP) • There were three previous versions of the original TCP; so when split, IP was called version 4 • There were never IP versions 1, 2 or 3 16 RFC 1918 Private Addresses Click to edit Master title style • The Internet Assigned Numbers Authority (IANA) reserved these three blocks of the IP space for private internets address space: • 10.0.0.0 - 10.255.255.255 (10/8 prefix) • 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) • 192.168.0.0 - 192.168.255.255 (192.168/16 prefix) Hosts within enterprises that use IP can be partitioned into three categories: Category 1: hosts that need network layer access outside the enterprise (provided via IP connectivity); hosts in this category require IP addresses that are globally unambiguous. Category 2: hosts that do not require access to hosts in other enterprises or the Internet at large; hosts within this category may use IP addresses that are unambiguous within an enterprise - but may be ambiguous between enterprises. Category 3: hosts that need access to a limited set of outside services (e.g., E-mail, FTP, remote login) which can be handled by mediating gateways (e.g., application layer gateways). For many hosts in this category an unrestricted external access (provided via IP connectivity) may be unnecessary and even undesirable for privacy/security reasons. Such hosts may use IP addresses that are unambiguous within an enterprise - but may be ambiguous between enterprises. 17 IP version 6 Click to edit Master title style • IPv6 was intended to replace the widely used IPv4 that is considered the backbone of the modern Internet • IPv6 is often referred to as the "next generation Internet" because of its expanded capabilities and its growth through recent large-scale deployments 18 IPv4 vs. IPv6 Click to edit Master title style Version 4 Version 6 232 address space 2128 address space Dotted decimal format Hexadecimal notation DHCP dynamic addressing SLAAC and DHCPv6 Header has 20 bytes and 13 fields Header has 40 bytes and 8 fields Variable header length Fixed header length Header options (obsolete) Header extensions Header checksum No header checksum 19 IPv4 vs. IPv6 Click to edit Master title style Version 4 Version 6 Packet size: 576 bytes required, fragmentation optional Packet size: 1280 bytes required without fragmentation Packet fragmentation: Routers and sending hosts Packet fragmentation: Sending hosts only IPv4 was never designed to be secure Has native encryption and authentication IPsec optional IPsec mandatory Non-equal geographical distribution (>50% USA) No geographic limitations IPv4 has the lack of security. IPv4 was never designed to be secure. It was originally designed for an isolated military network, then adapted for a public educational & research networks. 20 Assigning IPv6 Addresses Click to edit Master title style There are three methods for assigning IPv6 addresses: • Manual • Stateful Autoconfiguration (using a DHCPv6 server) • Stateless Autoconfiguration (SLAAC) 21 Stateless Autoconfiguration Click to edit Master title style • Uses ICMP version 6 neighbor discovery to find routers and then dynamically create IPv6 addresses • You must connect the host to a network that uses at least one IPv6-capable router that will send advertisement messages to the link • The connected IPv6 nodes can self-configure with an IPv6 address and routing parameters without further human intervention (RFC 2462) Stateless autoconfiguration uses neighbor discovery mechanisms to find routers and dynamically create IPv6 addresses. To use this method for an IPv6 node, it is important to connect the IPv6 node to a network that uses at least one IPv6 router. The router transmits router advertisements to the link. These announcements can allow the on-link connected IPv6 nodes to configure themselves with an IPv6 address and routing parameters, as specified in RFC 2462, without further human intervention. 22 Stateless Autoconfiguration Click to edit Master title style • The node can automatically configure its global IPv6 address by appending its interface identifier (64 bits) to the prefix (64 bits) that is included in the router advertisement messages • This is an important feature for allowing the rollout of new devices on the Internet, such as mobile phones, wireless devices, home appliances, IoT devices, networks and more A node on the link can automatically configure its global IPv6 address by appending its interface identifier (64 bits) to the prefix (64 bits) that is included in the router advertisement messages. Stateless autoconfiguration enables "plug and play," which connects devices to the network without any configuration and without any stateful servers (such as DHCP servers). It is an important feature for enabling the deployment of new devices on the Internet, such as cell phones, wireless devices, home appliances, and networks. Note: A router announcement can even tell hosts that more configuration parameters are available using stateful configuration (DHCPv6). These would be other services like DNS, NTP, IP extensions, and so on. 23 IPv6 Neighbor Discovery Click to edit Master title style • The ICMPv6 provides the same diagnostic services as ICMPv4 o Error and informational messages • It extends the functionality for some specific IPv6 functions that did not exist in IPv4: o Router solicitation and advertisement o Neighbor solicitation and advertisement o Redirection of nodes to the best gateway (router) Neighbor solicitation and advertisement involves acquiring the data link layer addresses for IPv6 neighbors 24 The IPv6 Header Click to edit Master title style Test Tip: The Version field is 4 bits Traffic Class: Source host uses this field to mark the priority of outbound packets. The IPv6 header has 40 octets (320-bits), instead of 20 octets (160-bits) as in IPv4. The IPv6 header has fewer fields, and the header is aligned on 64-bit boundaries Traffic Class: This 8-bit field is similar to the ToS field in IPv4. The source host uses this field to mark the priority of outbound packets. Next Header: The value of this field determines the type of information that follows the basic IPv6 header. For example, the critically important ICMPv6 packet is identified as 58 in the Next Header field. 25 IPv6 Extension Headers Click to edit Master title style • IPv6 uses two distinct types of headers: The regular IPv6 Header and IPv6 Extension Headers • The extension headers, if there are any, follow the original 8 fields • The number of extension headers is not fixed, so the total length of the extension header chain is variable IPv6 is using two distinct types of headers: Main/Regular IPv6 Header and IPv6 Extension Headers. The main IPv6 header is equivalent to the basic IPv4 one despite some field differences that are the result of lessons learned from operating IPv4. The options field in the IPv4 header (go back and show slide 5) is used to convey additional information on the packet or on the way it should be processed. Routers, unless configured otherwise, must process the options in the IPv4 header. The processing of most header options pushes the packet into the slow path leading to a forwarding performance hit. The options field has also been used as a vector for a variety of network attacks as well. Regardless, the IPv4 Options perform a key role in the IP protocol operation so the functionality had to be preserved in IPv6. On the other hand, the impact of IPv4 Options on performance was taken into consideration in the development of IPv6. So the functionality of options is removed from the main header and implemented through a set of additional headers called extension headers. The main header remains fixed in size (40 bytes) while customized EHs are added as needed. 26 IPv6 Extension Headers Click to edit Master title style Extension headers are an intrinsic part of the IPv6 protocol and they support some basic functions and certain services. 27 Common Use Cases for EH Click to edit Master title style • • • • • • • Hop-by-Hop EH is used for the support of Jumbo-grams Destination EH is used in IPv6 Mobility Routing EH is used in IPv6 Mobility and in Source Routing Fragmentation EH is critical Mobility EH is used in support of Mobile IPv6 service Authentication EH and Encapsulating Security Payload EH Hop-by-Hop EH is used for the support of Jumbo-grams or, with the Router Alert option, it is an integral part in the operation of MLD. Router Alert is an integral part in the operations of IPv6 Multicast through Multicast Listener Discovery (MLD) and RSVP for IPv6. • Destination EH is used in IPv6 Mobility as well as support of certain applications. • Routing EH is used in IPv6 Mobility and in Source Routing. It may be necessary to disable "IPv6 source routing" on routers to protect against DDoS. • Fragmentation EH is critical in support of communication using fragmented packets (in IPv6, the traffic source must do fragmentation-routers do not perform fragmentation of the packets they forward) • Mobility EH is used in support of Mobile IPv6 service • Authentication EH is similar in format and use to the IPv4 authentication header defined in RFC2402 28 • Encapsulating Security Payload EH is similar in format and use to the IPv4 ESP header defined in RFC2406. All information following the Encapsulating Security Header (ESH) is encrypted and for that reason, it is inaccessible to intermediary network devices. The ESH can be followed by an additional Destination Options EH and the upper layer datagram. 28 Internet Control Message Protocol (ICMP) Click to edit Master title style • IP is unreliable and doesn't guarantee delivery, so ICMP is the feedback mechanism offering feedback about network problems • IP also doesn’t offer a direct method for collecting diagnostic information • It resides somewhere between the Transport and Network layers • ICMP provides error messages and informational messages Even though IP is unreliable and doesn't guarantee delivery, it is important to notify the sender when something goes wrong. The Internet Control Message Protocol (ICMP) is the mechanism used to give feedback about network problems that are preventing packet delivery. Upper protocols, like TCP, will be able to realize that packets aren't getting through, but ICMP provides a method for discovering more serious issues such as "TTL exceeded" and "need more fragments." Uncommon problems like the IP checksum being in error, will not be reported by ICMP. ICMP messages are typically acted on by the IP layer, TCP or UDP, or even by some web-enabled applications. 29 ICMP Characteristics Click to edit Master title style • ICMP will affect network operations in both positive and negative ways • Many border routers and firewalls will block most, if not all, ICMP messages • However, if blocked, diagnostic tools like ping and traceroute will not work • There are a number of Types and Codes and only a few are commonly used 30 Common ICMPv4 Messages Click to edit Master title style Name Type E/I Description Echo Reply 0 I Ping reply that returns data Destination Unreachable 3 E Unreachable host/protocol Redirect 5 E Alternate gateway should be used Echo 8 I Ping request (data optional) Time Exceeded 11 E Resource exhausted (TTL decremented) Parameter Problem 12 E Malformed packet or header All of the Types and Codes are on the SANS cheat sheet 31 TCP Functionality Click to edit Master title style • • • • • Addressing and multiplexing Connection handling Packaging and managing data Transferring data Providing reliability and transmission quality • Providing flow control • Congestion avoidance - Many applications use TCP for transport and multiplexing the data is accomplished using the underlying network protocol (IP, IPX, AppleTalk, etc,) and is identified using ports. EXAMPLE: Lets say I open up a Chrome browser session, an Internet Explorer browser session and a Mozilla Firefox session. Each one has a different default Home page: Google for Chrome, Bing for IE, and Yahoo for the Firefox. I also open up my company email through Outlook On The Web in a TOR browser and a Mozilla Thunderbird email client for my POP3 email account -- different ephemeral source ports and different server sockets etc. - Has processes for negotiating, establishing, managing, and terminating connections - Packages upper layer data with a header of valuable metadata - TCP stack on participating node transfers the packaged segments to the TCP process on the other node - Maintains reliability and transmission quality - Flow control and congestion avoidance 32 TCP Characteristics Click to edit Master title style • • • • • • • Connection-oriented Stream-oriented Bidirectional transport Allows multiple connections Reliable and acknowledged Unstructured data Managed data flow Unstructured – multiple messages are sent using TCP, the applications must offer a method for differentiating one message (data element, database record, etc.) from another 33 TCP Operations Click to edit Master title style • TCP takes the bytes from upper layers and sends it on to the network layer protocol (IP) • Bytes are divided into segments (a discrete piece of a stream) • IP places them into datagrams and passes the encapsulated packet to the link layer to be “framed” with a header and trailer • TCP Session Closing: • Graceful = FIN > FIN-ACK> ACK • Abrupt = RST/ACK Look for wireshark output that shows a graceful TCP closing 34 TCP Operations Click to edit Master title style • • • • • • • Since TCP is reliable, it tracks each byte of data with a sequence number applied to blocks Sequence numbers are used to make sure the segmented data can be reassembled and retransmitted if necessary To provide reliability and flow control, TCP uses a sliding window acknowledgement system Each node’s TCP stack uses a retransmission queue Each sent segment is placed in the queue and a retransmission timer is started When an ACK is received, the data is removed from the queue If the timer expires, the segment is retransmitted The sliding window mechanism is very complicated yet at the heart of TCP operations 35 TCP Operations Click to edit Master title style TCP takes the bytes from upper layers and sends it on to the network layer protocol (IP) Bytes are divided into segments (a discrete piece of a stream) IP places them into datagrams and passes the encapsulated packet to the link layer to be “framed” with a header and trailer 36 tcpdump Click to edit Master title style • • • Network packet sniffer that uses libpcap capture library Simply a sniffer and not a protocol analyzer You must be familiar with this tool and what the output looks like on the exam TCP has to use IPsec or SSL/TLS to get security services TCP sends data as a continuous stream of segments instead of as discrete messages – the application decides where one message begins and ends 37 TCP Handshake Click to edit Master title style 38 TCP Header Click to edit Master title style 39 TCP Control Bits Click to edit Master title style Subfield Name* Description URG Indicates priority data transfer feature for this segment ACK Indicates that segment is carrying acknowledgement PSH Push feature requests that data be pushed to receiving application immediately RST Sender has encountered problem and needs to reset the connection SYN A request to synchronize sequence numbers to establish a connection FIN The sender is requesting to terminate the connection *Each Control Flag’s subfield is 1 bit in size 40 Comparing UDP to TCP Click to edit Master title style • • • • • • UDP does not ensure data delivery If TCP is used, the transport layer has those additional responsibilities UDP does not provide segmentation services Behavior is best-effort and connectionless No sequencing of segments Best for video, audio, conferencing, and content streams • Use UDP when… • you need a rapid response from a server (DNS query) • the response comes back in a single packet • Connection costs are too high for TCP • you can afford to lose some data (stock ticker, weather data, gaming data, audio, video) • it can be multicasted to more than one host Both TCP and UDP protocols manage the communication of multiple applications and provide communication services directly to the application process on the host. The basic service that the transport layer provides is tracking individual communication between applications on the source and destination hosts. This service is called session multiplexing, and it is performed by both UDP and TCP. A major difference between TCP and UDP is that TCP can ensure that the data is delivered, while UDP does not. UDP provides applications with best-effort delivery and does not need to maintain state information about previously sent data. As a benefit, UDP does not need to establish any connection with the receiver and is termed connectionless. Multiple communications often happen simultaneously; for instance, you may be searching the web and using FTP to transfer a file at the same time from one laptop host. The transport tracks these communications and keeps them separate. This tracking is provided by both UDP and TCP. To pass data to the proper applications, the transport layer must identify the target application. If TCP is used, the transport layer has the additional responsibilities of establishing end-to-end operations, segmenting 41 data and managing each piece, reassembling the segments into streams of application data, managing flow control, and applying reliability mechanisms. UDP does not provide segmentation services - instead it expects the application process to perform any necessary segmentation and supply it with data chunks that do not exceed the MTU of lower layers. The MTU of the IP protocol is 1500 bytes. Larger MTUs are possible, but 1500 bytes is the normal size. The terms reliable and best effort are terms that describe two types of connections between computers. TCP is a connection-oriented protocol that is designed to ensure reliable transport, flow control, and guaranteed delivery of IP packets. For this reason, it is labeled a "reliable" protocol. UDP is a connectionless protocol that relies on the application layer for sequencing and detection of dropped packets and is considered "best effort." Each protocol has strengths that make them useful for particular applications. 41 Common UDP Services Click to edit Master title style • • • • • • • DNS queries Simple Network Management Protocol (SNMP) Routing Information Protocol (RIP) Dynamic Host Configuration Protocol (DHCP) Datagram TLS (DTLS) Real-time audio and video streaming protocols Business applications Numerous key Internet applications use UDP, including: the Domain Name System (DNS), where queries must be fast and only consist of a single request followed by a single reply packet, the Simple Network Management Protocol (SNMP), the Routing Information Protocol (RIP)[1] and the Dynamic Host Configuration Protocol (DHCP). Voice and video traffic is generally transmitted using UDP. Real-time video and audio streaming protocols are designed to handle occasional lost packets, so only slight degradation in quality occurs, rather than large delays if lost packets were retransmitted. Because both TCP and UDP run over the same network, many businesses are finding that a recent increase in UDP traffic from these real-time applications is hindering the performance of applications using TCP, such as point of sale, accounting, and database systems. When TCP detects packet loss, it will throttle back its data rate usage. Since both real-time and business applications are important to businesses, developing quality of service solutions is seen as crucial by some. Some VPN systems such as OpenVPN may use UDP while implementing reliable connections and error checking at the application level. 42 The CIA Triad Click to edit Master title style Confidentiality CIA Triad Integrity Availability 43 Confidentiality Click to edit Master title style • Confidentiality is the act of preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information using: • Cryptosystems • Compartmentalization • Encapsulation 44 Integrity and Availability Click to edit Master title style • Integrity involves guarding against improper information modification or destruction and ensuring information nonrepudiation and authenticity using: • Cryptographic hashing • Digital signatures • Availability – ensuring timely and reliable access to and use of information using • • • • Backups and snapshots Redundancy and failover Availability zones Business Continuity Planning 45 Categories of Controls Click to edit Master title style • Administrative/Managerial Controls are activities that enforce the guidance, risk treatment, and policy directives of an organization • Examples: acceptable use policies, no piggybacking or tailgating directives, security awareness training • Technical Controls are combinations of software and hardware to achieve confidentiality, integrity, and availability • Examples: firewalls, routers, endpoint protections, web application firewalls, cloud-based threat modeling 46 Categories of Controls Click to edit Master title style • Operational/Physical Controls deal with the effectiveness of your controls combined with the protection of personnel, data, hardware and the facility from physical threats that could harm, damage, or disrupt business operations • Examples: IAM, SSO, gates, etc. 47 Types of Controls Click to edit Master title style • Directive Controls are managerial or administrative measures to advise personnel on the proper behavior and handling of systems, applications, services, and physical components • Examples: AUPs, written policies, guidelines, best practices, etc. • Preventative Controls are physical, technical, and administrative measures to preclude activities that may violate policy or increase risk to resources and assets • Examples: firewalls, IPS, security guards, biometrics, fences and gates, locks, mantraps, etc. 48 Types of Controls Click to edit Master title style • Deterrent controls include implementing warnings and forewarnings of consequences to security violations • Examples: signage, bollards, banners, guards, dogs, lighting, video Surveillance, alarms, etc. • Corrective (compensating) controls leverage all control categories to respond to the detection of an event or incident to eliminate or reduce any unwanted consequences • Examples: software and firmware updates to applications and systems, policy enforcement, privilege removal, etc. 49 Types of Controls Click to edit Master title style • Recovery controls are triggered once an incident compromises confidentiality, integrity, or availability to restore systems back to an acceptable state • Examples: BCP, DRP, offsite facilities, snapshots and backups 50 Enterprise Architecture Click to edit Master title style “Enterprise architecture is a well-defined security architecture that links all necessary security controls to a combination of design, baseline administrative controls, business drivers, legal requirements, and threat scenarios. It ensures that all the necessary physical, administrative, and technical safeguards are in place and in sync with each other and with the overall IT architecture and business culture.“ - Ken Cutler, CISSP, CISA, Managing Director of Information Security Institute 51 NIST Enterprise Security Architecture Click to edit Master title style 52 The Center for Internet Security (CIS®) Click to edit Master title style • The CIS® (Center for Internet Security, Inc.) is a progressive, nonprofit organization that leverages a global IT community to defend private and public organizations against cyber threat actors and their exploits and malware • The CIS offers four popular services: • The CIS Controls® • CIS Benchmarks™ • CIS Hardened Images® • The Multi-State Information Sharing and Analysis Center® (MSISAC®) • Make sure you are familiar with the CIS on the exam 53 The CIS Controls® Click to edit Master title style • The CIS Controls® are a prioritized collection of activities and controls to protect the enterprise, systems, applications, and data from known cyber attack vectors • There are 20 controls and resources in three categories: • Basic • Foundational • Organizational 54 Sample CIS Control Countermeasures Click to edit Master title style • Inventory of Authorized and Unauthorized Software • Devise a list of authorized software monitored with file-integrity checking tools • Deploy application whitelisting on firewalls from layer 3 to layer 7 of OSI model • Deploy software inventory tools to track operating systems and applications in a CMDB • Virtual machines, containerization, and air-gapped systems should be used as often as feasible 55 CIS Benchmarks™ Click to edit Master title style • CIS Benchmarks™ are best practices to securely configure various systems • The benchmarks are available for more than 140 technologies • They were established using an exclusive technique built from a consensus of global cybersecurity professionals and subject matter experts around the world • CIS Benchmarks™ are security configuration guides created by government, business, industry, and academia 56 CIS Hardened Images® Click to edit Master title style • CIS provides virtual images that are hardened using CIS Benchmarks™ secure configuration guidelines • CIS Hardened Images™ offer a secure, on-demand, scalable computing environment • They are available from the leading cloud computing providers AWS, Azure, and Google Cloud Platform 57 The MS-ISAC® Click to edit Master title style • The Multi-State Information Sharing and Analysis Center® (MSISAC®) has the mission of improving the total cybersecurity stance of the nation's state, local, tribal and territorial governments using concentrated cyber threat prevention, protection, response, and recovery techniques 58 The MS-ISAC® Click to edit Master title style • 24/7 Security Operation Center • Incident Response Services • Cybersecurity Advisories and Notifications • Access to Secure Portals for Communication and Document Sharing • Cyber Alert Map • Malicious Code Analysis Platform (MCAP) • Weekly Top Malicious Domains/IP Report • Monthly Members-only Webcasts • Access to Cybersecurity Table-top Exercises • Vulnerability Management Program (VMP) • Nationwide Cyber Security Review (NCSR) • Awareness and Education Materials 59 Assurance Standards Mapping Click to edit Master title style Assurance Standard References NIST 800-53 rev. 4 CA-7: Continuous Monitoring CM-2: Baseline Configuration CM-8: Information System Component Inventory CM-10: Software Usage Restrictions CM-11: User-Installed Software SA-4: Acquisition Process SC-18: Mobile Code SC-34: Non-Modifiable Executable Programs SI-4: Information System Monitoring PM-5: Information System Inventory NIST Core Framework (2014) ID.AM-2: Asset Management PR.DS-6: Data Security ISO 27002:2013 Annex A A.12.5.1: Installation of software on operational systems A.12.6.2: Restrictions on software installation There are a number of parallels between the CIS Controls and various NIST and ISO controls as seen in this table. This is just a sampling, and although the mappings are not necessarily a one-to-one match, the concepts overlap quite effectively 60 Access Control Concepts Click to edit Master title style • Access management and control must always be driven by the Least Privilege principle • There are a variety of models that can be used depending on the organization type and sensitivity of the subjects and objects involved • Data classification is critical and is the responsibility of the data owner 61 Data Classification Click to edit Master title style • Common government classifications: • Top Secret • Secret • Secret but unclassified • Confidential • Unclassified • Common private sector or commercial classifications: • Confidential • Private • Sensitive • Public Top secret is the highest level of sensitivity and should garner the most mission critical protection controls Secret is very important, and exposure could harm agency, governmental unit, or even national security SBU – is not classified but should be protected as the unauthorized release could jeopardize confidence in the organization or cause embarrassment and loss of goodwill with other entities Confidential data should be well-protected and might be a threat to subjects if compromised – usually personnel files, PII, PHI, and IP Unclassified – some or all of this information could be released under the right circumstances. There may be some redaction to maintain confidential or SBU information 62 Data Classification Process Click to edit Master title style 1. 2. 3. 4. 5. 6. Identify roles such as owner, custodian, steward, and user Classify and label (tag) data Identify exceptions based on review board Designate controls Identify processes for de-classification, transfer, and disposition of data Conduct ongoing awareness and continual improvement The owner is responsible for classifying the data and determining the sensitivity level in the model or architecture A data custodian is accountable for data assets from a technical perspective such as granting temporary access through tickets or assertions. A data steward is accountable for data assets from a business perspective. The user us responsible for working with the data within the permission set and acceptable use policies 63 Key Terms Click to edit Master title style • Identity is claiming to be a certain entity • Authentication is the process of proving who you are using various factors • Something you have, know, are, or reside • Authorization dictates actions • Accounting is for auditing and/or billing purposes 64 Key Principles Click to edit Master title style • Least Privilege is giving just the right amount of access • Need to Know relates to mandatory access controls that use sensitivity levels and lattices • Separation of duties divides critical tasks or systems to be operated by one or more subjects • Rotation of Duties involves a revolving job role for personnel to mitigate against theft, fraud, or a single point of failure • Mediated Access uses proxies Separation of duties is called Dual Operator when 2 high-level parties are involved Rotation of duties can also include the “forced vacation” principle 65 Access Control Models Click to edit Master title style • Discretionary Access Control (DAC) • Managed by the owner of object and can grant permissions to other entities • Mandatory Access Control (MAC) • Uses a strict set of established sensitivity levels and access controls for integrity and confidentiality based on classifications • Role-based Access Control (RBAC) • Based on group or role assignments from directory, org chart, functions, etc. 66 Access Control Models Click to edit Master title style • Rule-based (ruleset) Access Control • A set of rules processed in a certain order and applied to users, data, or traffic common with firewalls and access control lists • Attribute-based Access Control (ABAC) • Dynamic controls based on different variables and user behavior • Token-based Access Control • Temporary access granted by assertions made using federated services like Single Sign-On Token-based: SAML 2.0 assertions, AWS Security Token Service (STS), Microsoft Kerberos tickets, Azure shared access signature (SAS) token, or JSON Web Token (JWT) used in OAUTH 2.0 67 Password Management Click to edit Master title style • Passwords are still widely used credentials for access even though they represent a continuous vulnerability due to human error • They should always be part of a multifactor authentication if used • Consider password managers and SSO solutions 68 Single Sign-On with AWS SSO On-Premise AD Click to edit Master title style SSO SSO Custom SAML 2.0 Applications SSO Cloud Business Applications OU Dev OU Prod AWS Organization 69 Single Sign-On Considerations Click to edit Master title style • Advantages of SSO: • • • • • • Can reduce security risks Simplifies management Reduces password fatigue Protects identities Improves productivity Reduces workloads for helpdesk and service desk • Establishes solutions are readily available • Challenges of SSO: • Passwords must be long and strong • Single point of failure • Can be cumbersome to deploy (SAML for example) • Risky on multi-user systems • Social network use enhances organizational risk • Data can be sold to thirdparties 70 Irreversible Cryptosystems and Hashing Click to edit Master title style • In many organizations, passwords are the only security control used for authentication and authorization of access • Irreversible encryption and hashing algorithms are commonly used by operating systems to store passwords • Common for servers to store hashes on backend databases Computer systems store only the hashed passwords and not the original password on disk. When a user tries to authenticate, the system applies a hash algorithm to the user-supplied password to see if it matches the one in storage. Also common for web servers to store password hashes in a backend SQL or NoSQL database 71 Cryptographic Hashing of Passwords Click to edit Master title style 72 Password Cracking Click to edit Master title style • • • • • The technique to determine or guess plaintext passwords The algorithm is not broken Each guess is hashed and compared to a stored value Can be an online or offline operation There a many standalone tools and module in exploit kits available on the web • The tools are often combined with various published lists 73 Password Hash Cracking Click to edit Master title style 74 Password Cracking Click to edit Master title style 1. Locate a valid username or ID 2. Determine the algorithm used 3. Get the hashed password 4. Create or download a wordlist 5. Hash each password in the list 6. Find a match • Brute Force – attempting every possibility in keyspace • Dictionary – using a word file or dictionary of feasible passwords • Pre-computation – using Rainbow tables of precomputed hash values • Hybrid – a combination of techniques in succession 75 Password Attack Countermeasures Click to edit Master title style • • • • Strong password policies Avoid common patterns Use mnemonic techniques Add additional factors • • • • OTP token/card TOTP soft tokens Challenge/response Biometrics (fingerprint, facial, retina, iris, voice, etc.) Common patterns: dictionary words and jargon, birthdays, names, common numbers, environment attributes, qwerty key patterns 76 Network Types Click to edit Master title style • Personal Area Network (PAN) • Bluetooth, Infrared, Tethered Wi-Fi • Local Area Network (LAN) • Ethernet, fiber, wireless • Campus Area Network (CAN) • Fiber, wireless mesh • Metropolitan Area Network (MAN) • FDDI ring, fiber, wireless mesh • Wide Area Network (WAN) 77 Network Topologies Click to edit Master title style • • • • • • Bus topology Ring topology Star topology Tree topology Hybrid topology Mesh topology 78 Physical Star Topology Click to edit Master title style 79 Logical Star Topology Click to edit Master title style 80 Mesh Networks Click to edit Master title style This type of network offers the greatest fault tolerance 81 Network Zones Click to edit Master title style • Zoning is used to counter the risk of an open network by partitioning infrastructure services into logical groupings that have the same communication security policies and security requirements • Zoning is a logical design approach used to manage and govern access and data communication flows according to security policies • A zone is defined by a logical grouping of services under the same policy constraints, driven by business requirements 82 Network Zones Click to edit Master title style • Every zone contains one or more separate, routable networks • Every separate, routable network is contained within a single zone • Every zone connects to another zone via a perimeter that contains zone interface points (firewalls and load balancers) • The only zone that may connect to the public zone is the public access zone or subnet (DMZ) 83 Network Zones Click to edit Master title style Uncontrolled Zones Internet Controlled Zones DMZ Perimeter Web Tier Perimeter Perimeter DB Tier Perimeter Perimeter Directory Services MGMT VLAN or Other Restricted Tier Perimeter Describe on-premises vs. AWS scenario 84 Network Zones Click to edit Master title style Jump Jump 85 Network Hubs and Taps Click to edit Master title style • Hubs (micro hubs) • Traditional Ethernet hubs have become virtually obsolete and replaced with switches or USB micro hubs • Network Taps • A Network Tap (Terminal Access Point) is used by administrators and attackers to capture packets inline to analyze a network • Has A, B, and C ports These are OSI layer 1 devices 86 Packet Sniffers can use Taps Click to edit Master title style 87 Secure Access Switches Click to edit Master title style • Security Switches or L2 data plane control is part of a trend to move security closer to the endpoints • Security Switches offer a variety of services to secure frames to and from endpoints and between switches • There should be an established secure setup baseline 88 Securing a Cisco 3550 switch Click to edit Master title style 89 Switch Security Features Click to edit Master title style • IEEE 802.1x (PNAC) and RADIUS/DIAMETER • IEEE 802.1AE MACsec with AES-GCM-128/256 • DHCP Snooping Database • IP-ADDR + MAC-ADDR + VLAN-ID + PORT-ID • Supports Dynamic ARP Inspection (DAI) • Supports IP Source Guard (PACLs) • Ethertype ACLs 90 802.1X (PNAC) Click to edit Master title style 91 802.1AE MACsec Click to edit Master title style AES-128-GCM with GMAC or AES-256-GCM with GMAC 92 Wireless APs and Controllers Click to edit Master title style Wireless Analysis IAM IDS/IPS Rogue Detection 802.1X 802.11w – MFP WPA3 Enterprise 93 Secure Routers Click to edit Master title style Routers are primarily layer 3 devices although they can function as Layer 2 (bridged or transparent mode) through Layer 5/7 (Application layer gateways – deep packet inspection) devices. They physically and logically separate broadcast domains or VLANs. Typically route IPv4 and IPv6 traffic although other routed protocols like AppleTalk and IS-IS (Intermediate System-to-Intermediate System protocol) can be supported depending on the environment. IS-IS is still used at the core of some ISP networks. Routers require knowledge of all of the LANs in their domain to decide which destination packets will be forwarded. If the destination does not exist in the router's routing table, the packet should be dropped. Routers use static routing or dynamic routing protocols such as RIPv2, OSPF, EIGRP, BGP, and others. Security Services: (modular and/or integrated into O/S) Firewall services, IDS/IPS, VPN gateways and concentrators; NAT and PAT translation; URL filtering; Proxy services; Inspection of traffic layer 2-7 (DPI,AIC) 94 Secure Routers Click to edit Master title style • Primary roles of a router • Packet forwarding on the data plane and VRF • Inter-area and AS routing • QoS and traffic engineering • Static packet filtering (Infrastructure ACL) • VoIP and Wireless gateways or bridging • Security roles of a router: • Firewall services • IDS/IPS • VPN gateways and concentrators • NAT and PAT translation • URL filtering and proxies • Inspection of traffic layer 2-7 (DPI,AIC) Security Services of a router: (modular and/or integrated into O/S) 95 CSP Elastic Load Balancing Click to edit Master title style • Elastic Load Balancing (ELB) automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses • It can handle the varying load of your network (TCP, UDP) or application (HTTP/HTTPS) traffic in a single Availability Zone or across multiple zones (failover) • Can also perform flow logging, TLS 1.2/3 gateway services (Listener), certificate services, web application firewall (WAF), health checks, offload to HSM or SSL accelerator 96 ELBs and Auto-scaling Click to edit Master title style Internet 97 Firewalls Click to edit Master title style • A firewall is a metaphor representing an integrated security system combining hardware (physical or virtual) and software and/or on-premise and cloud-based solutions • Firewalls should be placed between all domains, zones, networks and subnets (VLANs) in order to “prevent the fire from spreading” • Linux builds have a native stateful firewall called iptables iptables –A INPUT –p tcp –dport ssh –j ACCEPT Append this rule to the input chain to view ingress traffic; look for TCP (-p tcp); if so, does it go to the destination SSH port?; if yes, then permit the traffic (-j ACCEPT) 98 Firewalls Click to edit Master title style • • • • • Physical vs. virtual Stateless (NACLs) vs. stateful Whitelisting only Restrictive vs. permissive Web Application Firewall (ALG/AIC/AVC/DPI/Layer 5-7) • Proxy services (mediated access) for NAT, authentication, IPS, and more 99 Next Generation Firewalls Click to edit Master title style • URL and reputation filtering • Application Visibility and Control (WAF) • Content Security • Intrusion prevention (IDS/IPS) • Advanced malware protection with cloud correlation • VPN gateway with inspection • Integration with directories • Machine Learning URL Filtering: cloud server-based web site reputation scores Application Visibility and Control: For example, applications like Skype and Webex or P2P file sharing that can hop from one port to another can be recognized. Another example is only whitelisting Facebook without features like gaming. IM without web cam or sending files. Context Awareness: Who is connecting, to what, from where, using what device, at what time? Intrusion Prevention System: Advanced Malware Protection with Cloud correlation 100 NG Application Visibility and Control Click to edit Master title style 101 NG Application Visibility and Control Click to edit Master title style 102 NG Application Visibility and Control Click to edit Master title style 103 Web Application Firewall (WAF) Click to edit Master title style • Generate or leverage WebACLs that match on: • • • • IP addresses of originating requests Country that requests originate from Values in request headers (e.g. User-Agent, Content-Type) Literal or regex string patterns that appear in requests (e.g. [cC][mM][dD].[eE][xX][eE]) • Length of requests (buffer overflows) • Presence of SQL injection code that is likely to be malicious • Presence of a malicious cross-site scripting attack 104 Automating WAF at AWS Click to edit Master title style @aws.amazon.com 105 IDS and IPS Click to edit Master title style • Today we typically just use the term IPS for intrusion detection and prevention services depending on the mode of operation • IPS will begin in a passive/monitor (IDS) mode • Traditional sensors are Signature/Rule/Anomaly based • Anomaly-based based builds a knowledge base over several hours and then looks for deviations from the baseline • NGIPS uses cloud-based heuristics and machine learning • Heuristic analysis uses rules and estimation engines to discover anomalies 106 IPS Deployment Options Click to edit Master title style • • • • NIPS or HIPS Switch SPAN port or a network tap (GIGAMON or VIAVI nTap) Between VLANs on multi-layer switch or hypervisor As a multiport bridge or routing appliance with multiple interfaces • Cloud-based MSSP solution 107 IPS Deployment Options Click to edit Master title style • • • • • • IPS sensor is in fail-open or fail-closed modes Tuning and optimization is critical before deploying True positive = correct + action True negative = correct + no action False positive = error + action False negative = error + no action True positives: The security control, such as an IPS sensor, acted as a consequence of malicious activity. This represents normal and optimal operation. True negatives: The security control has not acted, because there was no malicious activity. This represents normal and optimal operation. False positives: The security control acted as a consequence of non-malicious activity. This represents an error, generally caused by too tight proactive controls (which do not permit all legitimate traffic) or too relaxed reactive controls (with too broad descriptions of the attack). False negatives: The security control has not acted, even though there was malicious activity. This represents an error, generally caused by too relaxed proactive controls (which permit more than just minimal legitimate traffic) or too specific reactive controls. 108 Cisco IPS Sensor Click to edit Master title style 109 Snort is an Open-source IDS Click to edit Master title style • • • • Excellent lightweight NIDS with a good reputation since 1998 Low-cost or free versions Can identify several attack variants with flexible ruleset Administrators can create custom pattern matching rules for zero-days, new worms, and exploits 110 A Basic Snort Rule Click to edit Master title style Snort 101 and Snort Rules https://www.youtube.com/watch?v=W1pb9DFCXLw https://www.youtube.com/watch?v=RUmYojxy3Xw 111 IEEE 802.11 Wireless Click to edit Master title style • 802.11 was created in 1997 and ratified by IEEE in 1999 • .11b in 1999 offered max bandwidth of 11 Mbps in the 2.4 GHz frequency • .11a in 1999 with max BW of 54 Mbps in 5 GHz range • .11g in 2003 with max BW of 54 Mbps in 2.4 GHz range • These were all officially incorporated in 2007 • 802.11n came in 2009 and offered BW from 100 – 600 Mbps • Enhanced performance due to Multiple Input Multiple Output (MIMO) and signal reflection • Operates in both 2.4 GHz and 5 GHz ranges • Standardized in 2012 112 802.11ac and .11ax Wireless Click to edit Master title style • 802.11ac is the most recent standard ratified in 2016 • Aggregate BW of 1 Gbps with some deployments to 6.77 Gbps • Utilizes multiple radios and bandwidth aggregation in the 5 GHz range • Newest, non-ratified draft is 802.11ax in ranges below 6 GHz with speeds up to 11 Gbps using aggregated bandwidths 113 Evolution of Wireless Security Click to edit Master title style • Wi-Fi Protected Access 1 (WPA-2003) was a temporary fix to the first WEP security mechanism • Used TKIP to generate “better” keys for underlying RC4 encryption • Used a Message Integrity Check (MIC) to thwart forgery and replay • Both protocols had issues so WPA 2 was introduced afterwards • Remember that Kismet is a popular wireless network sniffer and wireless IDS WEP has been deprecated due to the following reasons: Hackers can easily obtain challenge phrase and encrypted response to crack the WEP key Crackers have decrypted captured data traffic Provides only weak encryption of data The initialization vector (IV) is a clear-text 24-bit field – a pseudo-random number used along with the secret key for data encryption The small space guarantees the re-use of the same key stream The weakness is NOT with the RC4 protocol per se Temporal Key Integrity Protocol - TKIP 114 Evolution of Wireless Security Click to edit Master title style • WPA2 was the replacement for WPA in 2004 and devices required testing and certification from Wi-Fi Alliance by 2006 • Based on IEEE 802.11i • Supports PSK and Enterprise authentication • In October 2017, the major KRACK attack targeted the 4-way handshake Temporal Key Integrity Protocol - TKIP 115 Evolution of Wireless Security Click to edit Master title style • WPA2-PSK (personal) • Shared secret key is used • Manually configured on devices and AP • Local access controls • AES-128 used for encryption • WPA2-Enterprise (802.1X) • Authentication server is required • Centralized RADIUS used for authentication and key distribution • AES-128 used for encryption • Management Frame Protection (PMF or MFP) was introduced in WPA 2 116 Protected Management Frames (PMF) Click to edit Master title style • Wi-Fi uses three different frame types: Management, Control, and Data • Management frames like authentication, de-authentication, association, disassociation, beacons, and probe frames are used by wireless stations to locate and connect wireless networks • They also manage the client connection after a successful association 117 Protected Management Frames (PMF) Click to edit Master title style • To keep your Wi-Fi infrastructure safe from attack, you should implement Management Frame Protection (MFP) features • The management frames sent between APs and clients are protected, so that both APs and clients can detect and drop invalid or spoofed management frames • APs can be set up to not emit certain broadcast management frames like disassociation, deauthentication, or action frames 118 Protected Management Frames (PMF) Click to edit Master title style • Based on IEEE 802.11w, PMF offers integrity protection for both unicast and broadcast management frames • It also encrypts unicast management frames in the same way as data to ensure data confidentiality • Protected Management Frames are intended to stop a variety of wireless attacks such as disconnect, honeypot, and evil twin • Device vendors and security administrator should make sure that Protected Management Frames are configured automatically 119 WPA3 Click to edit Master title style • WPA3 adds new mechanisms to streamline wireless security, support more robust authentication schemes, and deliver increased cryptographic strength for sensitive data • All WPA3 networks will utilize the latest security techniques while prohibiting outdated protocols • WPA3 requires the use of Protected Management Frames (PMF) to preserve the resiliency of mission critical wireless networks 120 WPA3-Personal Click to edit Master title style • Use for SO/HO environments or when devices can’t support 802.1X authentication • WPA3-Personal provides the Simultaneous Authentication of Equals (SAE) • SAE is a secure key establishment protocol between wireless nodes to provide strong protections against third-party password guessing tools 121 WPA3-Personal Click to edit Master title style • The Wi-Fi Alliance said in a past statement: “Recently published research identified vulnerabilities in a limited number of early implementations of WPA3 Personal, where those devices allow collection of side channel information on a device running an attacker’s software, do not properly implement certain cryptographic operations, or use unsuitable cryptographic elements.” This relates to the Dragonfly handshake, which forms the core of WPA3, and is also used on certain Wi-Fi networks that require a username and password for access control: the EAP-pwd protocol. 122 WPA3-Enterprise Click to edit Master title style • WPA3-Enterprise offers a new 192-bit security level based on the NSA’s ‘Suite B’ Cryptography for environments needing stronger security • It allows fewer EAP types to be used: • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (mandatory) • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (optional) • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (optional) • It only allows GCMP-256 encryption 123 Personal Area Networks (PAN) Click to edit Master title style • • The primary PAN technology in use today is Bluetooth Bluejacking is a legacy Bluetooth prank that takes advantage of sending contact information automatically without authentication or authorization • The cracker creates an address book object and a contact in the contact list then spoof a name to appear on your phone • Bluesnarfing is much more dangerous as it can steal data from a wireless device over the Bluetooth connection • Often conducted between iPhones, Android phones, iPods, iPads, laptops, and assorted PDAs • Bluesnarfing can access contact lists, calendars, emails, and text messages 124 Personal Area Networks (PAN) Click to edit Master title style • Zigbee is a low-power solution that can even run on batteries • A collection of automation standards • Based on IEEE 802.15.4 • Less expensive and easier to deploy PAN alternative to Bluetooth 125 Near Field Communications (NFC) Click to edit Master title style • NFC technologies let you harness the benefits of rapid and contactless payments • They facilitate entry and exit from transit systems without long waiting times • The advantages of RFID/NFC for travelers and shoppers are abundant and the technology will only expand in the future 126 NFC Threats and Vulnerabilities Click to edit Master title style • Cloning and emulating Point-of Sale (POS) devices • Sniffing, spoofing, and replay attacks • Man-in-the-middle attacks • Denial of service • RFID malware 127 NFC Threats and Vulnerabilities Click to edit Master title style • NFC and RFID blocker tags and jammers can mitigate • Special blocking wallets • RFID zapper • Disposable cameras that disable RFID chips 128 5G Click to edit Master title style • 5G offers bigger channels to speed data transfer, lower latency, and the ability to connect to many devices simultaneously • Low-band 5G operates in frequencies below 2GH - the oldest cellular and TV frequencies • Mid-band 5G is in the 2-10GHz range. That covers most current cellular and Wi-Fi frequencies, as well as frequencies slightly above those Low-band can go great distances, but there aren't very wide channels available, and many of those channels are being used for 4G. So low-band 5G is slow. It acts and feels like 4G, for now. Low-band 5G channels are from 5MHz in width (for AT&T) up to 20MHz (for T-Mobile), so you can see they aren't roomier than 4G. Complicating things, AT&T and T-Mobile low-band phones sometimes show 5G icons when they aren't even using 5G, making it hard to tell any difference. Mid-band 5G is in the 2-10GHz range. That covers most current cellular and Wi-Fi frequencies, as well as frequencies slightly above those. These networks have decent range from their towers, often about half a mile, so in most other countries, these are the workhorse networks carrying most 5G traffic. Most other countries have offered around 100MHz to each of their carriers for mid-band 5G. Here in the US, New TMobile will use Sprint's spectrum for a mid-band network, using up to 120MHz per city. AT&T and Verizon will shave off little bits of their 4G spectrum using DSS for midband 5G, 10MHz here and 10 there. 129 5G Click to edit Master title style • High-band 5G is also called millimeter-wave • So far, it is mostly airwaves in the 20-100GHz range that haven't been used for consumer applications before • They are very short range with 800-foot distances from towers • Can provide very fast speeds using up to 800MHz at a time • Verizon relies extensively on high-band, which it calls “ultra wideband” 130 5G Click to edit Master title style • With current phones in low- and mid-bands, you can combine two 100MHz channels, for 200MHz usage and you can also stack three more 20MHz 4G channels on top of that • In high-band 5G, you can use up to eight 100MHz channels • Dynamic spectrum sharing (DSS) allows carriers (like AT&T and Verizon) to dynamically split channels between 4G and 5G based on demand with DSS-compatible phones • Studies are not definitive on the dangers to people and animals from high-band Many devices: sensors, smart devices, IoT. The great speeds 5G carriers promise are just about leveraging more airwaves at once. But if you don't have the airwaves available, you don't get the speeds. 131 Attacks: Replay Click to edit Master title style • On a wireless network, it is easier to gather the data necessary for a replay attack • WEP and WPA are vulnerable to ARP replay attacks, among others, as there are many tools available that will crack their encryption keys (AirSnort and AirCrack are classics) • Ettercap and dsniff are two popular man-in-the-middle attack tools that use Wireshark to modify the data in transit 132 Attacks: Rogue APs Click to edit Master title style • Honeypots and Evil Twins are malicious rogue APs tricking users to associate • Can be a wireless man-in-themiddle attack or DHCP starvation • An evil twin AP replaces an existing network so users will connect to the fake one instead of the real one • Evil twins spoofing a public hotspot can also be a serious concern Modern managed APs and controllers can detect other APs over the air, and if not known it is classified as a rogue The location of the rogues can be plotted on a floor-plan map If the found AP is determined to be a known internal AP, it can be marked accordingly If the AP is found to be a neighboring wireless LAN, such as in a hotspot or adjacent business, then it can be marked as a known external 133 Attacks: Jamming Click to edit Master title style • Jamming is a form of wireless DoS attack that floods the RF with interference or excessive traffic so that wireless links cannot be sustained • Exploit kits have several jamming modules and scripts included for hard and soft APs • Some DoS attacks may not be due to malicious activity, but rather poorly written drivers on endpoint Wireless NICs 134 Attacks: Disassociation Click to edit Master title style • Wireless clients use authentication, deauthentication, association, disassociation, beacons, and probe frames to find an AP and initiate a network session • Attacker spoofs the AP MAC address and sends management frames, usually deauthentication or disassociation messages, to valid clients • The goal is typically to perform a DoS attack against the network or to force the client to reauthenticate Wireless clients use control and management frames, such as authentication and deauthentication, association and disassociation, beacons, and probes, to choose an AP and initiate a session for network service AP impersonation is a common attack against wireless networks where the attacker spoofs the AP MAC address and sends management frames, usually deauthentication or disassociation messages, to valid clients The goal is typically to perform a DoS attack against the network or to force the client to reauthenticate 135 Attacks: Wi-Fi Protected Setup (WPS) Click to edit Master title style • • • • Originally called “Wi-Fi Simple Config” Attacks on the PIN generated by the AP entered on the device Online and offline brute-force attacks are possible Captured packets determine PIN and gain unauthorized access • If the device does not allow the pin to be changed, unauthorized access is possible • If the AP is accessible by anyone, just push the button PIN is printed on device or listed in configuration menu 136 Attacks: WPA2 KRACK Click to edit Master title style • • • • Key reinstallation attacks (KRACK) are a form of cyberattack that exploits a vulnerability in WPA2 resulting in stolen data transmitted over networks An encrypted WPA2 connection is initiated with a four-way handshake sequence, but the entire sequence is not required for a reconnect - only the third part of the four-way handshake needs to be retransmitted When a user reconnects to a familiar Wi-Fi network, the network resends the third part of the handshake sequence and this resending can occur multiple times to ensure the connection succeeds This repeatable step is the vulnerability that can be exploited by a man-in-the-middle evil twin or rogue AP An encrypted WPA2 connection is initiated with a four-way handshake sequence, although the entire sequence isn’t required for a reconnect. In order to enable faster reconnections, only the third part of the four-way handshake needs to be retransmitted. When a user reconnects to a familiar WiFi network, the WiFi network resends them the third part of the handshake sequence; this resending can occur multiple times to ensure the connection succeeds. This repeatable step is the vulnerability that can be exploited. 137 Attacks: WPA3 Click to edit Master title style • In July 2019 two security researchers disclosed information regarding several vulnerabilities (known as Dragonblood) in the Wi-Fi Alliance's WPA3 Wi-Fi security and authentication standard • Three main attack categories: • Downgrading to WPA2 • Offline password cracking through side-channel attack • Denial of service Dragonfly is the key exchange mechanism through which users authenticate on a WPA3 router or access point. In April, Vanhoef and Ronen found that Dragonfly key exchanges that relied on P-521 elliptic curves could be downgraded to use the weaker P-256. As a result, the WiFi Alliance recommended that vendors use the stronger Brainpool curves as part of the Dragonfly algorithms. However, we found that using Brainpool curves introduces a second class of side-channel leaks in the Dragonfly handshake of WPA3. 138 Common Social Engineering Attacks Click to edit Master title style • • • • Tailgating and piggybacking Scams, fraud, and hoaxes Dumpster diving Shoulder surfing • Watering hole • Influence campaigns • Trolling organizational social media sites Eliciting information and reconnaissance, hoaxes, Identity fraud, Impersonation and pretending, Invoice scams, Credential harvesting Influence campaigns are also called misinformation operations and influence operations: To Launch propaganda or disinformation initiative – and - Gain a competitive advantage or confuse adversary or competitor 139 Phishing Attacks and Variants Click to edit Master title style • Phishing is a cyber attack that uses disguised email and webmail as a delivery method • The goal is to hoax the recipient into accepting it as a real message • Attackers request reply, clicking a hyperlink or downloading an attachment • Spear phishing targets specific roles and responsibilities • Whaling targets high-profile, highly privileged, or C-suite • Vishing attacks telephones, cell phones, and VoIP systems • Smishing uses SMS texting as the vector 140 Indicators of Phishing Click to edit Master title style • • • • • • • • Vague salutations – "Dear valued customer" Suspicious display names or domains Entity name is farther down the URL path Wrong information or suspicious IP addresses when you hover over links Awkward grammar and misspelled words Subject line has urgent or intimidating phrases Lack of legitimate contact information Spoofed headers, graphics and logos 141 Business Email Compromise (BEC) Click to edit Master title style • Business Email Compromise (BEC) is a type of special attack that targets entities who outsource, conduct wire transfers, and have suppliers abroad, and more • Corporate email accounts of high-level employees are either spoofed or compromised through keyloggers or phishing attacks, in order to perform fraudulent transfers 142 Typosquatting Click to edit Master title style • Typosquatting involves sitting on sites under someone else's brand or copyright and targeting Internet users who erroneously type a web site address into their browser address bar • Examples: gooogle, facebooj, amaxon, insdagram • Other terms are URL hijacking, sting sites, or fake URL 143 Common Malware Payloads Click to edit Master title style • • • • • • Trojans and RATs Polymorphic worms DDoS Bots Spyware and adware Keyloggers Ransomware Potentially unwanted programs (PUPs) will show up as red flags in anti-virus/antimalware tools Malvertisments 144 Remote Access Trojans Click to edit Master title style Command and Control Server (C&C-C2) Act as client Act as server Attacker Capture webcam Keystrokes logging Remote shell Update RAT version Download file Upload file RAT-infected PC 145 Complex Malware Types Click to edit Master title style • Rootkits • Backdoors • File-less/memory-only viruses • Logic bombs • Stegomalware • Polymorphic packers • Multipartite A rootkit is a category of malicious software intended to advance administrator-level or root level control over a computer system without being detected by authorized users. The term is a combination of the words "root", which represents the root user in a UNIX/Linux system or the administrator in a Windows system and "kit", meaning software toolkit. Typically, the goal of a rootkit is to execute malicious activities on a target system at a later time without the knowledge of the users of that computer. This malicious software can target the BIOS, boot loader, kernel, system files, and much more. Rootkits are difficult to detect since they are initiated before the operating system has fully booted. It might install hidden files, processes, and hidden user accounts. Because rootkits can be installed in firmware or software, they can even intercept data from network connections, keyboard input and output, among others. 146 Injection Attacks Click to edit Master title style • DLL Injection • Malicious code forces itself to run in place of other benign code • This "injected" code is usually code written by a third-party developer, designed to perform some malicious function • SQLi • Involves inserting a SQL query through input data from client to server application and can allow for several exploits • Read sensitive database data (SELECT FROM) • Change database data (INSERT, UPDATE, DELETE) • Defend with input validation and length limits The injection attack is often the result of MITM exploit or RAT attack. Malware can inject false MAC or IP addresses. 147 Injection Attacks Click to edit Master title style • LDAP Injection • The web server accepts input from the client for additional processing • The attacker exploits the data not being properly sanitized or data/commands being sent directly to a back-end database • The attacks can render sensitive user information or change information in the LDAP directory 148 Yersinia for Layer 2 – 7 Injection Click to edit Master title style 149 Cross-site Scripting (XSS) Click to edit Master title style • DOM-Based: (Local XSS or Type 0) • • Reflected XSS (Nonpersistent/Type 1) • • Insecurely written HTML page on end user's system or local gadgets and widgets An input trust vulnerability where the app expects input like a query string, but the attacker sends something the developer did not expect Stored XSS (Persistent or Type 2) • A variant of type 1 where, rather than reflecting the input, the web server persists the input DOM-Based: Also called Local XSS or Type 0, Does not involve vulnerable web servers, Insecurely written HTML page on end user's system or local gadgets and widgets (Widgets – Apple, Nokia, Yahoo; Gadgets – Microsoft and Google; Also have similar code in GNOME and KDE (stock tickers, RSS feeds, sports scores, clocks, mini-games, social networking tools, notifications, etc, and much more) Allows the attacker to manipulate the DOM through untrusted input and they can render input that might lead to other XSS vulnerabilities Reflected XSS (Nonpersistent or Type 1): A classic input trust vulnerability where the application is expecting some input (i.e. a query string) and the attacker sends something developer did not expect. Example: attacker provides a JavaScript code fragment as the querystring and the victim clicks on the link. Prevalent since it's not feasible to turn off all scripting in browsers. Stored XSS (Persistent or Type 2): A variant of type 1 where, rather than reflecting the input, the web server persists the input. The user is served up later to unsuspecting victims. Difference is an intermediate phase where the untrusted input is stored in a file or a database before unloading on the victim. Often found in blogs and review/feedback web applications. 150 Cross-site Request Forgery (CSRF) Click to edit Master title style • CSRF occurs when a malicious web site, blog, email, instant message, or program causes a web client to do unsolicited actions on a trusted site for which a user (preferably an administrator) is presently authenticated • An effective CSRF/XSRF attack can force users to perform exploits like changing passwords and email addresses to conducting transactions such as funds transfers • If the victim is an administrative or root account, the attack can affect the entire web site application Cross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious web site, email, blog, instant message, or program causes a user’s web browser to perform an unwanted action on a trusted site for which the user is currently authenticated. 151 Common Application Attacks Click to edit Master title style • Cookie storage and transmission • Buffer overflow and integer overflows • Memory leaks • Short lived user-land application • Long lived user-land application • Kernel-land process • Race conditions and TOC/TOU • The result of an unexpected ordering of events – poor code design Cookies typically don’t hold confidential info, but attackers can still use them to develop well-crafted attacks. For example they can extract a users regular visits to a banking or brokerage site to support a spear phishing or pharming attack. Cookies should be securely stored using encryption. Sensitive cookies should be stored securely on the web server will pointers on the clients. Buffer overflows take advantage of poorly written applications or operating system code. Injection of malicious code can be accomplished with a DoS to memory buffers and addresses or even SQL injection methods. They cause errors or command shells and programs to run in order to further launch the exploit or deliver the malware. One example is a packet holding a long string of NOP – no-operation instructions followed by a command (NOP Slide) that forces the processor to locate where a command can actually be executed. This can be mitigated with proper input validation and regular vendor patches and updates. OWASP = “Arithmetic operations cause a number to either grow too large to be represented in the number of bits allocated to it, or too small. This could cause a positive number to become negative or a negative number to become positive, 152 resulting in unexpected/dangerous behavior.” SOLUTION: Never perform arithmetic operations on numeric primitives without strict checking for overflow/underflow conditions. Static analysis can be helpful in checking for possible overflow/underflow conditions. Some runtime environments automatically check for overflow/underflow and trigger exceptions, but no mainstream language runtimes used for web application development currently do this except for some flavors of Python. A memory leak is unintentional memory consumption where the programmer fails to free an allocated block of memory when it’s no longer needed. Consider the following general three cases: • Short Lived User-land Application: Little if any noticeable effect. Modern operating system recollects lost memory after program termination. • Long Lived User-land Application: Potentially dangerous. These applications continue to waste memory over time, eventually consuming all RAM resources. Leads to abnormal system behavior • Kernel-land Process: Very dangerous. Memory leaks in the kernel level lead to serious system stability issues. Kernel memory is very limited compared to user land memory and should be handled cautiously. Race Conditions happen when a piece of code doesn’t function as designed. They are the result of an unexpected ordering of events, which can lead to the finite state machine of the code transitioning to a undefined state. It can also cause contention of more than one thread of execution over the same resource. Multiple threads of execution acting or manipulating the same area in memory or persisted data which gives rise to integrity issues. FIX: programmers have to test for race conditions or use something like OWASP ZAP to test for vulnerabilities. Time of Check/Time of Use = (OWASP) Time-of-check, time-of-use race conditions occur when between the time in which a given resource is checked, and the time that resource is used, a change happens in the resource to invalidate the results of the check. Consequences: • Access control: The attacker can gain access to otherwise unauthorized resources. • Authorization: race conditions such as this kind may be employed to gain read or write access to resources which are not normally readable or writable by the user in question. • Integrity: The resource in question, or other resources (through the corrupted one), may be changed in undesirable ways by a malicious user. • Accountability: If a file or other resource is written in this method, as opposed to in a valid way, logging of the activity may not occur. • Non-repudiation: In some cases it may be possible to delete files a malicious user 152 might not otherwise have access to, such as log files. Related Controls: • Design: Ensure that some environmental locking mechanism can be used to protect resources effectively. • Implementation: Ensure that locking occurs before the check, as opposed to afterwards, such that the resource, as checked, is the same as it is when in use. The most common result of resource exhaustion exploits is denial of service. The software may slow down, crash due to unhandled errors, or lock out legitimate users. In some situations, it may be possible to force the software to "fail open" in the event of resource exhaustion. The state of the software - and possibly the security functionality - may then be compromised. The aforementioned memory leaks are forms of RE. 152 Firmware Vulnerabilities Click to edit Master title style • Embedded systems increasingly use software-driven lowpower microprocessors for security-critical settings • Firmware programs are often written in the C language so existing source-code analysis tools do not work well for this • Intel, Apple, and Android still fight this battle among many other manufacturers and vendors • Rootkits and tools can modify a computer’s UEFI (Unified Extensible Firmware Interface) so that it silently reinstalls its surveillance tool even if the hard drive is wiped clean or replaced UEFI is a replacement for the traditional BIOS (Basic Input/Output System) and is meant to standardize modern computer firmware through a reference specification. But there are multiple companies that develop UEFI firmware, and there can be significant differences between the implementations used by PC manufactures. 153 CryptoMalware Click to edit Master title style • CryptoMalware technically applies to any malicious code that involves encryption and/ decryption during the lifecycle • • • • Rogue cryptomining (cryptojacking) Ransomware Crypto DDOS Steganography The goal of a cryptojacking crypto-malware isn’t to steal data – it is to remain in place for as long as possible, quietly mining in the background. Crypto-malware can also impact the DDoS market. Instead of botnet CPUs being used to generate packets to blackmail the victim, who may or may not pay the ransom, the DDoS botnet could be repurposed to mine cryptocurrencies, guaranteeing a payoff for the criminal. 154 Ransomware Lifecycle Click to edit Master title style 1. INSTALL Crypto-ransomware installs itself after bootup 2. CONTACT HQ The installed malware contacts a server belonging to an attacker or group (C&C) 3. HANDSHAKE AND KEYS The ransomware client and server "handshake" and the server generates two cryptographic keys 4. ENCRYPT The ransomware starts encrypting every file it finds with common file extensions 5. EXTORT A screen displays giving a time limit to pay up before the criminals destroy the key to decrypt the files 155 Ransomware Click to edit Master title style 156 Cryptolocker Infection Chain Click to edit Master title style This is a Cryptolocker infection chain 157 Stegomalware Click to edit Master title style • Stegomalware uses steganography to avoid detection • Steganography is a method of hiding concealing files, messages, images, or videos within another file, message, image, video or network traffic • Cryptography offers confidentiality – not steganography 158 Samples and Case Studies Click to edit Master title style • • • • Rig EK Exploit Toolkit Facebook Compromise of 2013 WannaCry Ransomware of 2017 Marriot Data Breach of 2018 159 Rig EK Exploit Toolkit Click to edit Master title style • Rig Exploit Kit (EK) is one of the best-known malware and exploit tools to attack popular applications • It has been used more recently to launch cryptojacking campaigns • Fallout EK, GrandSoft EK, Magnitude EK, Underminer EK, GreenFlash Sundown EK 160 Facebook Compromise of 2013 Click to edit Master title style • Internal Facebook workstations were attacked in 1/2013 due to insecure Java builds • Developers went to mobile development site that hosted an Oracle Java exploit • Apple and Microsoft were also affected around the same time 161 WannaCry Ransomware of 2017 Click to edit Master title style • • • • CIA attack spread over 150 nations and over 200,000 devices Banks, schools, hospitals, municipalities and more Many organizations decided to pay the $3 - $600+ ransom Began on 5/12/2017 in Asia using a U.S. born kit (NSA) on mostly Microsoft systems 162 WannaCry Ransomware of 2017 Click to edit Master title style • Multi-layered attack used Eternal Blue against SMBv1 and DoublePulsar trojan backdoor • Ping first did diagnostics • Kill terminated running processes • Exec loaded ransomware on the victim system 163 Common WannaCry Characteristics Click to edit Master title style • The system could be reached from the Internet • Security flags and alerts from scanning and enumeration were ignored • Exploited unpatched known vulnerabilities • Systems used weak and long-term credentials 164 Marriot Data Breach of 2018 Click to edit Master title style • A data breach of 8.6 million credit cards and over 25 million passports • Timeline of breach: • First active in Q3 of 2014 • Marriot discovered 9/8/18 • Breach reported 11/30/18 • 380 - 500+ records affected and full impact TBD Marriot implemented: Free Web Watcher enrollment for customers with free credit monitoring Created new call centers to deal with calls Millions spent on new security technology Thousands of people hours to find root of attack – still ongoing 165 Internet of Things (IoT) Click to edit Master title style • This is the most rapidly emerging global vulnerabilities • There will soon be billions of IPv4 and IPv6 devices in homes, offices, retail sites, factories, utility companies, hospitals, cars, and many other places • With the explosion of Internet-connected devices, you must find solutions to connect them and collect, store, analyze, and secure the device and data 166 Internet of Things (IoT) Click to edit Master title style • IoT developers are building industrial IoT applications for predictive quality and maintenance as well as the remote monitoring of operations • They build connected home applications for automation, security, monitoring, and home networking • Some IoT developers are building commercial applications for traffic monitoring, public safety, and health monitoring • Eventually everything will be identified with a unique IPv6 address for global end-to-end connectivity 167 Example: AWS IoT Defender Click to edit Master title style AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits your IoT configurations to make sure that they aren’t deviating from security best practices. A configuration is a set of technical controls you set to help keep information secure when devices are communicating with each other and the cloud. AWS IoT Device Defender makes it easy to maintain and enforce IoT configurations, such as ensuring device identity, authenticating and authorizing devices, and encrypting device data. AWS IoT Device Defender continuously audits the IoT configurations on your devices against a set of predefined security best practices. AWS IoT Device Defender sends an alert if there are any gaps in your IoT configuration that might create a security risk, such as identity certificates being shared across multiple devices or a device with a revoked identity certificate trying to connect to AWS IoT Core. 168 Defense in Depth Click to edit Master title style • Defense in depth involves implementing multiple layers of security to defend property, facilities, systems, applications, and data • Can be physical, logical or virtual • The goal is to protect CIA and beyond (prevent D.A.D.) • Security is a continuous balancing act • According to the SANS institute, there are four fundamental approaches to DiD, based on risk treatment: • Uniform protection • Protected zoning • Information-centric • Analyze threat vectors Confidentiality vs. Disclosure; Integrity vs. Alteration; Availability vs. Destruction is often quoted. However, this isn’t the most accurate as the opposite of destruction would be “Durability”. 169 Uniform Protection Click to edit Master title style • Involves identical controls for all systems which are deemed to be of equal value • Assets are not considered to be missioncritical • A very traditional and common approach at least as the starting point in the lifecycle • “Drinking the firewall Kool-Aid” 170 Protected Zoning Click to edit Master title style • Creates logical and physical security domains or zones • Software-defined-networking using VLANs and PVLANs is a modern example • There are interface points between all zones and mediated access from any public zones (Internet) • Can also be a secure enclave on a mobile or embedded device 171 Zoning Click to edit Master title style 172 172 Cloud Service Provider Zoning DiD Click to edit Master title style 173 Data or Information-Centric DiD Click to edit Master title style Network Endpoint Application Data At the center is data and information in this model: IP, PII, PHI. But it could be things stored in a walk-in safe or highly secure room such as where safe deposits boxes are in a bank. Or perhaps it is an HSM storing Private Keys and Access Keys. This process involves asset assessment, valuation, labeling (tags), classification, and handling = risk management. Could involve elaborate DLP systems and Digital Rights Management solutions 174 Vector-oriented DiD Click to edit Master title style • Identifying all ingress and egress points and all probable threat agents and specific vectors • Disable USB fobs • Block email attachments • Use DLP engines for IP leakage • Leverage the threat matrices and risk registers • Conduct vulnerability and risk assessment with a quantitative analysis focus • OpenFAIR is an emerging taxonomy to identify vulnerability and handle subjectively 175 NIST Security Strategy Click to edit Master title style 176 Understand the Physical Architecture Click to edit Master title style • Where is the defensible property boundary? • Work back to the location of core mission-critical assets • • • • • • • Gates and fences Guards Lighting and sensors Bollards Locks and cameras All entry/exit points Service provider junctions and demarcation 177 Understand the Physical Architecture Click to edit Master title style • Diagram the physical topology of the campus with graphical tools • Include wireless analysis and topologies • Document all cable runs and distribution frames • Map the physical topologies to the logical networking flow 178 Recognize All Communication Flows Click to edit Master title style • Identify all information flows with all possible technologies • • • • • Corporate edge Email and webmail Messaging and social media Telephony and cellular Bluetooth, RFID, NFC, etc. • Information flow may also be governed by mandatory access control architectures 179 Identify Critical Data Click to edit Master title style • • • • • Data at rest, in transit, in use Understand the SAN, NAS solutions Evaluate all database and storage systems Abstract data whenever possible Strict access controls and mediated access 180 What is Active Defense? Click to edit Master title style • Active defense involves an offensive approach to security defense • Involves understanding more about how the attack is performed • Takes the point of view of the attacker • Enhances existing technologies Enhance and augment – not replace technologies 181 Active Defense Lifecycle Click to edit Master title style Phase 1 - Identify Critical Internal Assets Phase 2 – Provide Environmental Context Phase 3 – Classify Threat Agents Phase 4 – Launch Active Threat Campaigns 182 Spectrum of Attacks and Defenses Click to edit Master title style @ Defense Science Board 183 Main Types of Active Defense Click to edit Master title style Deception Attribution Counterattack 184 Deception as Active Defense Click to edit Master title style • Slows down or redirects the attacker • Presents false information • • • • Honeypots and honeynets Evil twin WAPs Server decoys DNS fabrication • Has the lowest impact from a legal perspective but can affect scanning and pentesting 185 Attribution as Active Defense Click to edit Master title style • Attribution discovers information about the attacker(s) and their goals or targets • It is a valuable activity for incident response team members • It may be ineffective since source addresses are likely spoofed • It actively uses trace back tools and beaconing software 186 Counterattack as Active Defense Click to edit Master title style • This strategy involves: • Information gathering • Seek and disrupt • Seek and destroy • Attack back involves the most negative legal issues • It has a high degree of risk and consequences 187 Honeypots Click to edit Master title style • Honeyfiles are bait files strategically placed for attackers to access (passwords.txt) • They usually reside on a file server, which will trigger an alert when read • These also include honeytokens, honeycreds, honeynets 188 Tarpits Click to edit Master title style • A Tarpit is a network security technique of delaying inbound connections to intentionally slow down scanning attacks and spam • This method can often restrict and discourage spammers from sending bulk messages towards you • Tarpits are applied to: • Networks • Email (ESMTP) • Authentication (Teergube in German). To avoid being tarpitted, a spammer may send bulk emails in short batches over a relatively longer period than normal. 189 Decoys Click to edit Master title style • Decoys can be honeycreds representing fake privileged accounts • They are also decoy IP addresses and honeynets • Routers and firewalls • Virtual machines • They can be TCP and UDP ports on a gateway or server 190 Jailed Environments Click to edit Master title style • A jailed environment is a subcomponent of a host environment that allows all attackers in • The authentic environment allows authorized access while attackers are redirected to the jailed environment for active defense measures • This can also be an evil twin wireless environment 191 Fake DNS Records Click to edit Master title style • DNS is a common recon action by attackers • Bogus DNS records can redirect attackers to honeypot databases or domain controllers in a jailed subnet • Often used in combination with other active defense measures such as decoys 192 False Headers Click to edit Master title style • Various TCP/IP services will offer metadata in headers • HTTP response, SMTP, and FTP headers are common vectors • As a countermeasure, remove header data or insert false information into header • Example: declare that a web server is running IIS when it is really running Apache Service banners are often used by system administrators for inventory taking of systems and services on the network. The service banners identify the running service and often the version number too. Banner grabbing is a technique to retrieve this information about a particular service on an open port and can be used during a penetration test for performing a vulnerability assessment. When using Netcat for banner grabbing you actually make a raw connection to the specified host on the specified port. When a banner is available, it is printed to the console. 193 Making a Raw Connection with Netcat Click to edit Master title style Example: To demonstrate how a raw connection works we issue some FTP commands after we’re connected to the target host on the FTP service. Let’s then see if anonymous access is allowed on this FTP server by issuing the USER and PASS command followed by anonymous. Netcat is the Swiss army knife of networking tools and it can be run standalone or in Kali Linux as seen here. The most common cracking uses for Netcat are setting up reverse and bind shells, piping and redirecting network traffic, port listening, debugging programs and scripts and banner grabbing by making a raw connection to an FTP or Web server. https://www.hackingtutorials.org/networking/hacking-with-netcat-part-3-advancedtechniques/ To demonstrate how a raw connection works we will issue some FTP commands after we’re connected to the target host on the FTP service. Let’s see if anonymous access is allowed on this FTP server by issuing the USER and PASS command followed by anonymous. 194 NIST on User Responsibility Click to edit Master title style According to NIST: "The responsibilities and accountability of owners, providers, and users of computer systems and other parties concerned with the security of computer systems should be explicit. The assignment of responsibilities may be internal to an organization or may extend across organizational boundaries. Depending on the size of the organization, the program may be large or small, even a collateral duty of another management official." Enhance and augment – not replace technologies 195 NIST on User Responsibility Click to edit Master title style According to NIST (continued): "However, even small organizations can prepare a document that states organization policy and makes explicit computer security responsibilities. This element does not specify that individual accountability must be provided for on all systems. For example, many information dissemination systems do not require user identification and, therefore, cannot hold users accountable." Enhance and augment – not replace technologies 196 Acceptable Use Policies (AUP) Click to edit Master title style • The most important aspect of the written security policy from the endpoint perspective is the Acceptable Use Policy (AUP) • It should be a dynamic published document updated for new technologies (augmented reality, TikTok, mobile solutions, etc.) 197 Endpoint Physical Security Click to edit Master title style • • • • • • Computer and laptop locks Clean desk policies Visibility screens Disable unused peripheral ports Removable device policy MDM onboarding and offboarding • Geofencing • Geotagging • Remote-wipe Clean desk = locked drawers, cabinets, and safes 198 Endpoint Physical Security Click to edit Master title style • • • • • Use hardware and software multi-factor authentication Consider biometric authentication Disconnect and/or remove unused computers Use client-side and full disk encryption Employ SSO and/or password managers Use smart cards and tokens according to AUP 199 Update Personal Endpoints Click to edit Master title style • Update and upgrade the most secure browsers and clients • Auto-update with digitally signed patches (Java, Adobe, Zoom, etc.) • Update and upgrade all anti-x software • Install manufacturer firmware updates 200 Browser Best Practices Click to edit Master title style • Be certain browser software is updated • Manage and disable unnecessary/malicious plugins • Always connect using HTTPS and TLS1.2 or 1.3 • Choose EV validated sites if possible • Clear browser histories automatically • Use strong passwords and password managers • Never store passwords in a browser • Disable popups (install AdBlock) • Use VPNs and Proxy servers (Cisco Umbrella) • Make use of browser security configurations 201 Web Safaris for Endpoint Protection Click to edit Master title style https://www.sans.org/securityresources/policies/general/pdf/acceptable-use-policy https://www.quest.com/kace/ https://resources.infosecinstitute.com/best-practices-webbrowser-security/ https://www.sans.org/security-resources/policies/general/pdf/acceptable-use-policy https://www.quest.com/kace/ https://resources.infosecinstitute.com/best-practices-web-browser-security/ 202 Host-Based IDS Click to edit Master title style • Host-based IDS monitors the host system infrastructure through an installed agent to analyze traffic and log suspicious and malicious behavior • HIDS should provide deep visibility into critical systems and files to detect and respond when anomalous activities are discovered • HIDS often works in conjunction with SIEM systems and other advanced threat intelligence – often using Sec-as-a-Service (MSSP) 203 Common HIDS Activities Click to edit Master title style • Detect attempts at unauthorized access • Identify anomalous activities • Enumerate access and changes to critical files with File Integrity Monitoring (FIM) • Protect integrity of data and other host-based assets • Conduct continuous threat intelligence • Integrate with other agents (VPN, .1X, OpenDNS, etc.) 204 Snort – a network IDS Click to edit Master title style • Since the late 90’s it has been an open-source solution • Has a powerful rule language • New patterns can be used from the community Alert tcp any any -> 10.10.10.0/24 80 (msg “inbound HTTP Traffic”; sid: 3251022;) 205 Intrusion Prevention Defined Click to edit Master title style • Intrusion Prevention Systems (IPS) are proactive inline systems that have the ability to drop packets and block attackers before the payload enters the network or host • • • • • Signature-based Anomaly-based Heuristic and UBA Machine-learning Cloud-based 206 Host-based IPS Click to edit Master title style • A host-based intrusion prevention system (HIPS) is a program that is usually installed on a single host • It often complements traditional fingerprint-based and heuristic antivirus detection applications as part of an integrated endpoint security suite • When malware or some other exploit attempts to alter the system or software, HIPS can prohibit the action automatically or alert the end user to grant permission • Most endpoint protection systems are actually IPS sensors installed on hosts that can be deployed in IDS or IPS modes 207 IPS Tuning Click to edit Master title style • True Positive • Accurate + alarm fires • True Negative • Accurate + alarm does not fire • False Positive • Error + alarm fires • False Negative • Error + alarm does not fire True positives: The security control, such as an IPS sensor, acted as a consequence of malicious activity. This represents normal and optimal operation. True negatives: The security control has not acted, because there was no malicious activity. This represents normal and optimal operation. False positives: The security control acted as a consequence of non-malicious activity. This represents an error, generally caused by too tight proactive controls (which do not permit all legitimate traffic) or too relaxed reactive controls (with too broad descriptions of the attack). False negatives: The security control has not acted, even though there was malicious activity. This represents an error, generally caused by too relaxed proactive controls (which permit more than just minimal legitimate traffic) or too specific reactive controls (with too specific descriptions of the attack). 208 IEEE 802.1X (PNAC) Click to edit Master title style • The 802.1X framework delivers authentication and authorization of endpoints attempting to get network access • VLAN assignment - the authentication server can associate a VLAN with a specific user or group and instruct the switch to dynamically assign the authenticated user into that VLAN VLANs = wired, wireless, Guest, Restricted until remediation, full access with additional EAP (like EAP-TLS using PKI certificates), leverage SSO with directory service as Identity Provider (OpenLDAP, AD) 209 IEEE 802.1X (PNAC) Click to edit Master title style • • • ACL assignment - the authentication server associates an ACL with a specific user or group and commands the NAD to dynamically assign the ACL to the session of the user Time-based access - the authentication server can control the times at which the user can connect to the network Security group access - security group access provides topologyindependent, scalable access control • The ingress switches classify data traffic for a specific role and label the traffic with security group tags • The egress network devices read the security group tags and perform filtering by applying the appropriate security group ACLs to the packets 210 IEEE 802.1X (PNAC) Click to edit Master title style Supplicant Authentication server Authenticator EAPOL-Start EAP-Request/Identity RADIUS Access-Request EAP-Response/Identity RADIUS Access-Challenge EAP-Request/OTP EAP-Response/OTP RADIUS Access-Request EAP-Success RADIUS Access -Accept Port authorizes EAPOL-Logoff Port unauthorized 211 IEEE 802.1AE (MACsec) Click to edit Master title style Guest user without MACsec supplicant AES-GCM-128 with GMAC or AES-GCM-256 with GMAC 212 Endpoint Detection and Response (EDR) Click to edit Master title style • Endpoint Detection and Response (EDR) are tools that are mainly dedicated to detection and investigation of suspicious activities and indicators of compromise (IoCs) on hosts/endpoints • EDR tools monitor endpoint and network events and send information to a SIEM system or centralized database so further analysis, investigation, and reporting can take place 213 Endpoint Detection and Response (EDR) Click to edit Master title style • A software agent installed on the host system often provides the basis for event monitoring and reporting • EDR systems are more modern than traditional HIDS/HIPS solutions but considered legacy software compared to newer next-generation endpoint protection 214 Key EDR Features Click to edit Master title style • Filtering - better solutions excel at filtering out false positives which can lead to alert fatigue and increasing the possibility for real threats to go unnoticed • Advanced Threat Blocking -preventing threats as soon as detected and throughout the lifecycle of the attack • Incident Response Capabilities - threat hunting and incident response can help avert full-scale data breaches to augment DLP • Multiple Threat Protection - advanced attacks can overwhelm endpoints if the installed security solution is not prepared to handle multiple types of threats simultaneously Advanced Threat Blocking: Prevent threats as soon as detected and throughout the lifecycle of the attack. Persistent attacks could eventually overcome security measures on products with weaker offerings. Multiple Threat Protection - advanced attacks, or multiple different attacks at once, can overwhelm endpoints unless the installed security solution is prepared to handle multiple types of threats at the same time (i.e. ransomware, malware, suspicious data movements). 215 Next-generation Endpoint Protection Click to edit Master title style • IT hygiene • Next-generation Antivirus • Offers verifiable vendor claims • Doesn’t focus exclusively on IoCs • Looks for indicators of attack (IoA) • Managed hunting service • Threat intelligence • Cloud-based architecture IT Hygiene - allows you to identify and close gaps in your environment by offering the visibility and information your security teams need to implement preemptive actions and make sure you’re as prepared as possible to face today’s sophisticated threats. Out-of-date and unpatched applications, credential abuse and employing stolen credentials are key attack vectors. The ability to discover, patch and update vulnerable applications and monitor login activities is critical. Next-Generation Antivirus (NGAV) Traditional antivirus (AV) solutions boast of up to 99 percent effectiveness, but a gap of just one percent means 100% probability of a breach by adversaries using either known or unknown malware. That’s why NGAV can be an important tool, though finding the right solution can be challenging. A recent blog on this topic outlines the four steps to choosing the right AV replacement. Among those steps is verifying vendor claims. Organizations should be wary that some vendors claiming to have behavioral analytics capabilities offer solutions that focus exclusively on indicators of compromise (IOCs), which are only present after an attack has occurred. Effective NGAV must also look for indicators of attack (IOAs) that identify active attacks and allow you to stop an event before damage is done. This gives you a tremendous advantage over attackers. 216 Managed Hunting At the end of the day, attackers are people and as such, they can be adaptive and creative — relying on technology alone to thwart them is simply not enough. To be truly next-gen, a cybersecurity platform should include a managed hunting service. An elite team can find things your automated response systems may miss. It can learn from incidents that have taken place, aggregating crowdsourced data and providing response guidance when malicious activity is discovered. Having expert hunters working 24/7 on your behalf matches the ingenuity of determined attackers like no automated technology can. Threat Intelligence Because sophisticated adversaries can move so quickly and stealthily, security teams must receive intelligence that ensures your defenses are automatically and precisely instrumented throughout your enterprise to stop breaches with minimum impact and maximum protection. Such threat intelligence needs to provide more than the tactical advantage of understanding and resolving incidents faster; it must also offer the proactive alerts and reports that security experts need in order to prioritize their resources at an operational level. Cloud-Based Architecture Delivering these crucial elements can only be accomplished via purpose-built cloud architecture. The older on-premises model simply isn’t capable of performing the tasks required of a true next-gen EPP solution, such as collecting a massive, rich data set in real time, storing it for long periods and thoroughly analyzing it in a timely manner to prevent breaches. With the cloud, it is possible to store and instantly search petabytes of data, gaining historical context on any activity running on any managed system. Many vendors claiming to have a cloud-based solution actually are still relying on older architectures developed primarily for on-premises systems, though perhaps retrofitted with some newer "cloud-enabled" features. Such a "bolton" model can never match the performance of a purpose-built, cloud-native solution. 216 Endpoint Protection Suites Click to edit Master title style • These are all-in-one, full-scale security packages that offer a single, integrated solution • There is only one vendor to get the upgrades and updates from • Depending on the security vendor, the suite may also include a two-way firewall, parental control system, a local spam filter, VPN to protect your data in transit, online backup, and dedicated ransomware protection 217 Endpoint Protection Suites Click to edit Master title style 218 Endpoint Encryption Products Click to edit Master title style 219 Endpoint Encryption Products Click to edit Master title style 220 System Logging Click to edit Master title style • There are many sources of system logs in the enterprise: • Infrastructure devices • Windows server system, application, and security logs • Web, Email, and Unified Communications services • Firewalls, IDS/IPS, WAF, and specialty appliances • Database and storage • • • • • • • • Messages Alerts Traps Log files Debugging Traces Devices Log servers 221 System Logging Concepts Click to edit Master title style • Log output can be overwhelming in the beginning • Filtering and tuning is critical to gathering meaningful metrics (events and information) • There are too many standards! • Some use the Syslog RFC as a standard Cisco, Microsoft, Juniper, AWS flow logs, Linux builds 222 Syslog Click to edit Master title style • Syslog is a standard defined in IETF RFCs 3164 then 5424 • Messages include: • • • • • • Time stamps Event messages Severity level (0-7) Host IP addresses Diagnostics And more Syslog is a standard for sending and receiving notification messages–in a particular format–from various network devices. The messages include time stamps, event messages, severity, host IP addresses, diagnostics and more. In terms of its built-in severity level, it can communicate a range between level 0, an Emergency, level 5, a Warning, System Unstable, critical and level 6 and 7 which are Informational and Debugging. Moreover, Syslog is open-ended. Syslog was designed to monitor network devices and systems to send out notification messages if there are any issues with functioning–it also sends out alerts for pre-notified events and monitors suspicious activity via the change log/event log of participating network devices. The Syslog protocol was initially written by Eric Allman and is defined in RFC 3164. The messages are sent across IP networks to the event message collectors or syslog servers. Syslog uses the User Datagram Protocol (UDP), port 514, to communicate. Although, syslog servers do not send back an acknowledgment of receipt of the messages. Since 2009, syslog has been standardized by the IETF in RFC 5424. 223 Syslog on a Cisco Device Click to edit Master title style 224 Syslog on a Cisco Device Click to edit Master title style 225 Syslog on a Cisco Device Click to edit Master title style 226 Syslog on a Cisco Device Click to edit Master title style 227 Syslog on a Cisco Device Click to edit Master title style 228 Syslog on a Cisco Device Click to edit Master title style 229 Log Distinctives to Remember Click to edit Master title style • Logs are critical records for metrics, indicators, documentation, reporting, and governance • Servers should be in a high-availability or cluster solution • Logging may be a component of larger SIEM system or cloudbased analysis tool 230 Build a Basic Linux Log Server Click to edit Master title style 1. Build a Linux server on a network, virtual environment, or cloud service provider virtual network (AWS VPC) 2. Place in the same VLAN as devices generating logs 3. Allow SSH (TCP 22) and Syslog (TCP/UDP 514) access only 4. Forward syslog logs to the server IP address from Linux source devices by modifying /etc/syslog.conf files 5. On Syslog server, change syslog.conf to send logs to files or backend storage 6. Configure logrotate.conf on server to retain logs 231 Key Log Reporting Activity Click to edit Master title style • Authentication and authorization • Failures and critical errors • Malware activities (IoC/IoA) • Modification and change reports • Network activity • Resource access • Never Before Seen (NBS) analytics reporting 232 Common NBS Activities Click to edit Master title style • • • • • • • • • Log message types/event types Users authenticating successfully Sources connected to systems using privileged accounts Internal system connecting to external system External IP addresses connecting to new entry points Ports accessed on internal systems HTTP requests and methods Downloaded and uploaded content types Query types on databases 233 Basic Logging Analysis Click to edit Master title style • Phase 1: Log Collection • Kiwi, syslog-ng, LASSO • Phase 2: Log Storage • MySQL, PostgreSQL • Phase 3: Log Analysis • Splunk, grep, LogParser • Phase 4: Log Correlation and Alerting • SEC, OSSEC, OSSIM, CSPs 234 Organizational Logging Challenges Click to edit Master title style • • • • • • • Siloed corporate environments Geographical and jurisdictional boundaries Access to remote systems In-house built custom applications Mandates and regulations Outsourcing issues Unclear data retention policies 235 Security Incident and Event Monitoring Click to edit Master title style • SIEM has evolved from separate security event and security information monitoring • It is the primary centralized log correlation, aggregation, and normalization solution • SolarWinds Security Event Manager, ManageEngine EventLog Analyzer, Splunk Enterprise Security, OSSEC, LogRhythm NextGen SIEM Platform, Splunk, AlienVault, and QRadar 236 Vulnerability Management Click to edit Master title style • Vulnerability Management begins with assessment and prioritization of assets • Determine the Return on Security Investment (ROSI) • Start building the risk register (log or ledger) based on semiquantitative or quantitative approach (OpenFAIR) • Through visibility and analysis you should deliver calibrated estimates of the most likely threat agents, scenarios, and magnitude of impact against each asset or asset class • Decision-makers (C-suite and stakeholders) should be given results with modern visibility reporting and real numbers ROSI is more specific than ROI. 237 Indications (Indicators) of Compromise (IoCs) Click to edit Master title style • IOCs are remnants, artifacts, and traces of a breach or attack on a system, network, application, or hosts • Can be precursors of a fully successful attack with all phases not being activated yet • Some practitioners call these indicators cyber observables or malware observances • The presence of malware, signatures, exploits, vulnerabilities and IP addresses are characteristic of evidence left behind when an exploit has happened According to Symantec, there are really only 2 main ways that most attackers drop the malware on your system: 1) Drive-by web surfing downloads 2) Email spam, attachments, phishing (e.g. fake invoice with Word document [macro] from financial/ransomware hackers) The presence of malware, signatures, exploits, vulnerabilities and IP addresses are typical of the evidence left behind when a breach has occurred. In the case of an information breach, IOCs might include a variety of electronic evidence left behind, such as an MD5 hash, a C2 domain or hardcoded IP address, a registry key, filename, etc. These IOCs are constantly changing, however, making a proactive approach to securing the enterprise impossible. Because IOCs represent a reactive method of tracking the bad guys, by the time you find an IOC, there is a high probability that you have already been compromised. 238 Indications (Indicators) of Compromise (IoCs) Click to edit Master title style • IOCs are commonly an MD5 hash, a C&C URL or domain, hardcoded IP address, registry keys, anomalous files and filenames • IOCs are persistently varying, which makes proactive security of the enterprise difficult 239 Indications (Indicators) of Compromise (IoCs) Click to edit Master title style • IOCs epitomize a reactive approach to tracking exploits so that when they are found there is high probability that the breach has occurred • Focusing on IOCs is much like relying on an IDS 240 Indicators of Attack (IoAs) Click to edit Master title style • Takes an early, proactive stance looking for: • • • • • Stealth behavior Persistence Code execution Lateral movement C2 server connections • Not focused on tools being used but rather steps taken • Trying to detect and stop specific tools is a losing battle IOAs, on the other hand, represent a proactive stance, in which defenders are looking for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. IOAs are concerned with the execution of these steps, which expose the intent of the adversary and the outcomes they are trying to achieve. IOAs are not focused on the specific tools criminals use to accomplish the objectives, and are thus more adaptable to the ever-changing tactics they employ to accomplish their goals. By monitoring these execution points, gathering the indicators and analyzing them, we can determine how a threat agent successfully gains access to the network, and we can infer intent. No advance knowledge of the specific tools or malware (IOCs) is required to stop the attack while it’s still in progress. In fact, IOAs can detect attacks where no malware is present. 241 Key Indicators Abuse and Access of Data Click to edit Master title style • • • • • • Abuse of service accounts Accessing data outside of normal days/hours Excessive logon failures Disproportionate file or data access Suspicious access of application data Takeover of systems Data is the one thing that can most easily be monetized and commoditized by the malicious hacker Using service accounts to access data A human user touching data base tables that are typically only used by applications Disproportionate access based on behavioral analytics and peer group comparisons 242 Identifying Malicious Code Click to edit Master title style MONITOR LEARN & DETECT UBA on SIEM Systems Deception Technologies throughout Management stations BIG DATA ANALYSIS BLOCK / QUARANTINE Contain and investigate Talk about when you I managed a bookstore and suspected Asst. Manager of taking money from till and marking a shortage – put extra $20 in the till as I left the store. Next morning no overage. Many enterprises are implementing UBA – User Behavior Analytics that run on top of their SIEM solutions. Also some large companies are using Deception Technologies on internal network: Honey Pots and Honey Nets are still being used – these are resource intensive and not effective. Deception (honey tokens) Tokens across enterprise – fake clues placed on endpoints – tokens are pointers to internal data, trap accounts, configuration files, passwords, cookies, authentication tokens; Mock internal web apps, databases records, and files on servers. Placed on systems in reasonable locations but not where the average end user would find them. No affect on productivity. Wait for attacker to use the token: fewer false positives (Advanced/Power users could find them but not use them); learn about steps being taken (Indicators of Attack). 243 Critical to determine the source, scope, and process of bad internal user/privileged insider without “tipping them off” to the fact that they are operating on deception tokens. Taking action against an internal user is much more complex: HR, Legal, compliance, regulations. Malicious insider OR Compromised insider – there is a difference. 243 We call this saccadic movements – jumping longer distances across screen 244 There’s a great quote by a guy named Steven Few who says “Save the pie for desert”. IOW, there is a whole slew of analysts that feel there is always a better way to present data besides a pie chart. Man, what I wouldn’t give for a piece of apple pie a la mode right this moment. 245 Scanners Click to edit Master title style • Vertical scans Port scan that broadly scans ports on a host – easy to detect • Horizontal scans Targets the same port(s) on several hosts looking for exploit vector – fairly effective • Block scans Combines the first two methods for large sweep of networks • Stealth scans Designed to go undetected by auditing tools There are four main types of scans that a malicious user would typically use against a server environment: vertical scans, horizontal scans, block scans, and stealth scans. 1.Vertical Scans – A vertical scan is a port scan that will in essence target numerous destination ports on a singular host running SharePoint. This is an extremely broad scan and is typically easy to detect because only local detection mechanisms (those that will directly exist on the target server) are necessary in order to build up proper alerts and begin to mitigate threats from such a scan. The amount of valuable information that a malicious user gathers from a vertical scan can be defined as the size of the return packet from a particular probe. Vertical scans tend to predominate port scanning activity, mostly because when an exploit is made public it tends to arose the community. 2.Horizontal Scans (also called a block scan) – A horizontal scan is a port scan that targets the same port on several hosts, effectively looking for a universal exploit that may exist. This is a fairly common when the attacker is privy to certain vulnerability information and seeks out within an arbitrary network susceptible host machines. The amount of valuable information that a malicious user gathers from a horizontal scan on a target can be defined as the amount of destination sets that the user receives. 3.Block Scans – It is feasible to combine the above two methods to derive a new 246 method which will, in essence, compose a large sweep of a network for either type of derived exploits, this is common when producing assets for future exploitations. 246 Scanning Methods Click to edit Master title style • Bounce scans Looks for systems to bounce their attacks through (FTP) • UDP scanning These also implement retransmission of packets that appear to be lost • ICMP scanning Not port scanning, but useful for finding hosts • The big three scanners: SAINT, nmap (Zenmap), and Nessus The ability to hide their tracks is important to attackers. Therefore, attackers scour the Internet looking for systems they can bounce their attacks through. FTP bounce scanning takes advantage of a vulnerability of the FTP protocol itself. It requires support for proxy ftp connections. This bouncing through an FTP server hides where the attacker comes from. This technique is similar to IP spoofing in that it hides where the attacker comes from. For example, bad.com establishes a control connection to the FTP server-PI (protocol interpreter) of equifax.com. (Let’s pick on them since they deserve it for allowing that huge data breach that probably will end up affecting most of us). Then request that the server-PI initiate an active server data transfer process to send a file anywhere on the Internet. 247 Zenmap – The GUI Nmap Tool Click to edit Master title style Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database. 248 Zenmap Click to edit Master title style 249 Zenmap Click to edit Master title style 250 Vulnerability Scanners Click to edit Master title style @softwsp.com Nessus is a powerful vulnerability scanner for professionals and Red/Blue Teams: Vulnerability scanning = Assess systems, networks and applications for weaknesses Configuration auditing = Ensure that IT assets are compliant with policy and standards Compliance checks = Audit system configurations and content against standards Malware detection = Detect malware as well as potentially unwanted and unmanaged software Web application scanning = Discover web server and services weaknesses and OWASP vulnerabilities Sensitive data searches = Identify private information on systems or in documents Control system auditing = Scan SCADA systems, embedded devices and ICS applications Cloud support = Assess configuration weaknesses in Amazon Web Services, Microsoft Azure and Rackspace public clouds High-speed asset discovery and scanning = Network devices including next generation firewalls, operating systems, databases, web applications, virtual and cloud environments and more Scan multiple networks = Scan on IPv4, IPv6 and hybrid networks Credentialed / non-credentialed = Flexible scanning options to meet different needs 251 Scan scheduling = Set up scans to run when and how often you want Selective host re-scanning = After a scan, re-scan all or a subsection of previously scanned hosts Automatic scan analysis = Remediation action priority and scan tuning recommendations Agent-based scanning = Increase scan coverage with Nessus Agents Multi-scanner support = Manage and share scan resources from a central console 251 Security Content Automation Protocol Click to edit Master title style • Methodology for using exact standards to allow for automated vulnerability management, measurement, and policy compliance evaluation of systems FISMA compliance • The National Vulnerability Database (NVD) is the U.S. government content repository for SCAP • Security Content Automation Protocol Validated Products and Modules @ https://nvd.nist.gov/scap/validated-tools • Rapid7 (Metasploit), SPAWAR, Tenable (Nessus), IBM, ThreatGuard, Intel, CIS, SAINT, and more e.g. Brio is using SCAP for one of our clients who needs FISMA compliance. Methodology for using exact standards to allow for automated vulnerability management, measurement, and policy compliance evaluation of systems FISMA compliance The National Vulnerability Database (NVD) is the U.S. government content repository for SCAP Security Content Automation Protocol Validated Products and Modules @ https://nvd.nist.gov/scap/validated-tools Rapid7 (Metasploit), SPAWAR, Tenable (Nessus), IBM, ThreatGuard, Intel, CIS, SAINT, and more 252 Introduction to Penetration Testing Click to edit Master title style • Penetration testing can include vulnerability assessment, but they are two different activities • Vulnerability scanning is typically planned, automated and shorter timed • Pentesting can be white, black, or white box and is more manual and longer timed 253 Why Do Pentesting? Click to edit Master title style • • • • • • Security vulnerabilities or loopholes may be present in a system, service or application Clients need to assess the business impact of successful attacks Customers must implement effective organizational security strategy PII, financial, health, or other sensitive critical data must be secured while at rest or in transit Clients are asking for pentesting as part of a software release cycle The client needs assurance that user data is secure or meets other information security regulations 254 Pentesting Lifecycle Click to edit Master title style Scope the Test Exploit Enumerate Gather Information Scan Scoping involves Pre-engagement activities – W,B, or G box; agreements (NDA); exceptions; parameters; credentialed? Passive or active? Time of day… 255 Reconnaissance & Fingerprinting Click to edit Master title style • Reconnaissance is information gathering • Fingerprinting (footprinting) is identification of network attributes, hosts, O/S, running services and applications • May involve internal and/or external recon teams • Passive or Active methodologies • Numerous free and commercial tools are available In footprinting , the attacker may utilize “whois”, nslookup, traceroute, enumerators, pinging, social engineering, , or other tools to ascertain information about the network, such as: key personnel, topology, protocols used, IDS / IPS in use, IPs of machines on the network, ports, shares and services that are vulnerable , et cetera. OSINT - Whois - Nslookup - Foca - Theharvester - Shodan - Maltego - Recon-NG Censys In fingerprinting, the attacker will direct specially crafted packets at the target, which will elicit a signature response from the device. This response will tell the attacker what OS, service, version et cetera, the node is using, as a result the attacker is able to fine-tune their assault. These acts of remote fingerprinting can be either active or passive. When the fingerprinting is passive, the attacker is monitoring for traffic that is occurring between the device, and other nodes. When there is active fingerprinting, the attacker is sending uniquely constructed packets to the device, and monitors the response. 256 Fingerprinting can be mitigated against by using "scrubbers", which will "normalize" the packets, and remove the unique identifying traits that the attacker is seeking. There are also “personality” strategies, such as the use of IP Personality, which will alter packets, and cause responses from the device to appear as if it was from a another device, with different characteristics. Additionally, firewalls may be deployed to block traffic with abnormal combinations of IPs, and ports. 256 Social Engineering Click to edit Master title style • • • • • • • • Phone calls SMS texting Email phishing and whaling Pharming Watering hole Hoaxing Shoulder surfing Dumpster diving 257 Exploitation: Pivoting Click to edit Master title style • Pivoting is a technique of using an instance (aka ‘plant’ or ‘foothold’) to be moved around inside of a network • Using the first compromise to assist in vertical or horizontal (N/S or E/W) movement to aid in the compromise of other otherwise unreachable systems Pivoting is the unique technique of using an instance (also referred to as a ‘plant’ or ‘foothold’) to be able to “move” around inside a network. Basically using the first compromise to allow and even aid in the compromise of other otherwise inaccessible systems. In this scenario we will be using it for routing traffic from a normally nonroutable network. 258 Pivoting Click to edit Master title style Pivoting is an extremely powerful feature and is a critical capability to have on penetration tests. Metasploit Meterpreter is a common exploit tool to accomplish a pivot attack For example, we grab the company directory from a server. We then target a user in the target IT department. We call up the user and say that you are from a vendor and we need them like them to visit our website in order to download a new security patch. We know they use IE, so at the URL we are pointing them to, we run an Explorer exploit. When the victim visits our malicious URL, a meterpreter session in Metasploit is opened for us giving full access their system. When we connect to our meterpreter session, we run ipconfig and see that the exploited system is dual-homed, a common configuration with IT staff. We want to leverage this newly discovered information and attack this other network. Metasploit has an autoroute meterpreter script that will let us attack this second network through the first compromised machine. Now that we have added our additional route, we will escalate to SYSTEM directory, dump the password hashes, and put our meterpreter session in the background by 259 pressing Ctrl-z. Now we need to determine if there are other systems on this second network we have discovered. We will use a basic TCP port scanner to look for ports 139 and 445. We have discovered an additional machine on this network with ports 139 and 445 open so we will try to re-use our gathered password hash with the psexec exploit module. Since many companies use imaging software, the local Administrator password is frequently the same across the entire enterprise. 259 Exploitation: Privilege Escalation Click to edit Master title style • Privilege escalation launches from info gathered from the enumeration phase • It leverages configuration errors, poor patching, programming errors and system design flaws • It can be vertical or horizontal • The goal of this exploit is to become a root or administrative user, level 15 user on a switch or router, exec user, Domain Admin group member, etc. Leverages programming errors and system design flaws to give an attacker elevated access to the network and related systems, data, and applications Privilege escalation can occur during the attack kill chain or as part of penetration testing Can be vertical vs. horizontal Advanced Persistent Threats (APTs) often attempt an escalation of access privileges soon after the initial compromise phase The goal is to become a root or administrative user, level 15 user on a switch or router, exec user, Domain Admin group member, etc. The higher the level, the broader the access, and the more potential there is to damage or exfiltrate critical data 260 Basic Linux Privilege Escalation Click to edit Master title style 1. 2. 3. 4. 5. Check the OS release of the vulnerable system View its kernel version Check the available users and the current user privileges List the SUID files View the installed packages, programs, and running services (outdated versions may be vulnerable) SUID (Set owner User ID up on execution) is a special type of file permissions given to a file. Normally in Linux/Unix when a program runs, it inherits access permissions from the logged in user. SUID is defined as giving temporary permissions to a user to run a program/file with the permissions of the file owner rather that the user who runs it. In simple words users will get file owner's permissions as well as owner UID and GID when executing a file/program/command. 261 Penetration Test Report Click to edit Master title style 1. 2. 3. 4. Executive summary to guide the strategic direction Walkthrough of physical and technical risks Potential impact of found vulnerabilities Multiple vulnerability remediation options 1 - Executive Summary for Strategic Direction The executive summary serves as a high-level view of both risk and business impact in plain English. The purpose is to be concise and clear. It should be something that non-technical readers can review and gain insight into the security concerns highlighted in the report. 2 - Walkthrough of Technical Risks Most reports use some sort of rating system to measure risk, but seldom do they take the time to explain the risk. The client’s IT department needs to make swift, impactful decisions on how best to resolve vulnerabilities. To do so, they require approval from the people upstairs. To simply state that something is dangerous does not properly convey risk. 3 - Potential Impact of Vulnerability Risk can be broken down into two pieces: likelihood (probability) and potential impact (magnitude) over a time frame. 4 - Multiple Vulnerability Remediation Options 262 Most penetration test reports will include a generic, high-level description of how to handle these problems; however, these generic “catch-all’ remediation guides often fall short when it comes to the unique context of the client’s needs. If a client has a vulnerable service running on a webserver that they depend on, the remediation should offer more than telling them to simply disable the service altogether. 262 Virtualization Defined Click to edit Master title style • According to NIST: • "Virtualization is the simulation of the software and/or hardware upon which other software runs." • "It is a methodology for emulation or abstraction of hardware resources that enables complete execution stacks including software applications to run on it." 263 Virtualization Components Click to edit Master title style • A hypervisor is the software that generates and controls a virtual infrastructure allowing multiple OSs (multi-tenancy) to run on a single physical machine • The system running the hypervisor is called the “host” • The virtual machines running on the host are “guests” 264 Virtualization Components Click to edit Master title style • Proprietary hypervisors: • • • • Hyper-V vSphere/ESXi OVM FusionSphere • Open source hypervisors: • • • • KVM OpenVZ Red Hat Xen 265 Type 1 Hypervisor Click to edit Master title style (Paravirtualization Drivers and Tools) There are two types of hypervisors: Type 1 and Type 2. Type 1 hypervisors run directly on the system hardware. They are often referred to as a native or bare metal (or even embedded hypervisors) in vendor documentation. The first thing installed is the hypervisor itself which functions as the OS for the bare metal physical host. The hypervisor software talks directly to the host hardware and boots before the OS. This is where you really earn your stripes in a private cloud environment – making these key well-researched decisions. IaaS pretty much removes that overhead – but you will pay for it. Google Cloud uses the open-source KVM hypervisor that has been validated by scores of researchers as the foundation of Google Compute Engine and Google Container Engine. Every AWS AMI uses the Xen hypervisor on bare metal. Xen offers two kinds of virtualization: HVM (Hardware Virtual Machine) and PV (Paravirtualization). Oracle also uses Xen hypervisor The Physical Host is also called the Virtualization Host and the first step is to make 266 sure that your system meets the requirements to serve as a physical host based on the open-source or proprietary solution specifications. In the traditional x86 architecture, operating system kernels expect direct CPU access running in Ring 0, which is the most privileged and protected level. With software virtualization, guest operating systems can’t run in Ring 0 because the Hypervisor sits there. The guest operating systems must therefore run in Ring 1, but there's a catch: Some x86 instructions work only in Ring 0, so the operating systems must be recompiled to avoid them. This process is called paravirtualization, and it is impractical — especially if the source code for the OS is not available. To get around this, the Hypervisor traps these instructions and emulates them, which unfortunately results in an enormous performance hit making these Virtual machines significantly slower than real physical ones. The solution is Hardware-Assisted Virtualization 266 Hardware-Assisted Virtualization Click to edit Master title style • With hardware-assisted virtualization, the operating system has direct access to resources without any emulation or OS modification • Intel (Intel VT) and AMD (AMD-V) have supporting virtualization technologies providing a set of new instructions and – crucially – a new privilege level • The hypervisor can now run at Ring -1 so the guest operating systems can run in Ring 0 • There's no need for paravirtualization, the VMM does less work, and the performance hit is reduced 267 Type 2 Hypervisor Click to edit Master title style Type 2 hypervisors are loaded on top of an already installed HOST operating system like Windows Server, Windows 10 or Linux Ubuntu or Debian. Common ones are VMware Workstation and Oracle VirtualBox to name a couple. A Type 2 hypervisor depends on the underlying operating system. Mention your penetration testing detonation chamber (Kali, Parrot Project to Metasploitable2/3 OS, Windows clients and Servers) Type 2 are less scalable since they run on another OS. They can be more complex to manage. The security of the Host operating system can also represent a security vulnerability. These are more likely to fit the needs of consumers as they support desktop virtualization. 268 Containers Click to edit Master title style • According to Docker: “A container is a standard unit of software that packages up code and all its dependencies, so the application runs quickly and reliably from one computing environment to another.” • “A Docker container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings.” A container runtime is the environment for each container - comprised of binaries coordinating multiple operating system components that isolate resources and resource usage for running containers 269 VM Sprawl Click to edit Master title style • VM sprawl can happen if the number of virtual machines on a network gets to the point where the administrator can no longer efficiently manage them effectively • It can also be a scenario where unauthorized and unlicensed operating systems and application cause shadow IT 270 VM Escape Click to edit Master title style • The ability for the guest operating system to break into the host • It began as a simple directory traversal attack in VMware (2007) to side-channel attacks • A major vulnerability was found at Black Hat USA 2009 • There have been over 30 known vulnerabilities In 2008, a vulnerability (CVE-2008-0923) in VMware discovered by Core Security Technologies made VM escape possible on VMware Workstation 6.0.2 and 5.5.4. A fully working exploit labeled Cloudburst was developed by Immunity Inc. for Immunity CANVAS (commercial penetration testing tool). Cloudburst was presented in Black Hat USA 2009. The most recent is “AMD ATI Radeon ATIDXX64.DLL MOVC shader functionality denial-of-service vulnerability” January 21, 2020 CVE Number: CVE-2019-5147 271 Infrastructure as a Service Click to edit Master title style • The capabilities offered to the consumer is rapid on-demand provisioning of processing, storage, networks, and other fundamental computing resources • Consumers can then deploy and run operating systems and applications – sometimes from a third-party marketplace of partner vendors 272 Infrastructure as a Service at AWS Click to edit Master title style @aws.amazon.com The customer does not manage or control the underlying cloud infrastructure (everything in orange) but does have control over operating systems, block and object storage, and deployed applications including possibly limited control of select networking components (e.g. Routing, NAT, NACLS, and L2/3 and WAF firewalls to name a few) For example: AWS products that fall into the well-understood category of Infrastructure as a Service (IaaS), would be Amazon EC2 OS instances, Elastic Block Storage (EBS) made up of directly attached SSD and HDD drives deployed in RAID arrays, and Amazon Virtual Private Clouds (VPC). These are completely under your control and require you to perform all of the necessary security configuration, updates and management tasks. For example, for EC2 instances, you’re responsible for management of the guest OS (including updates and security patches), any application software or utilities you install on the instances, and the configuration of the AWS-provided firewall (called a security group) on each instance. 273 Platform-as-a-Service (PaaS) Click to edit Master title style • PaaS offers capability to build or buy applications onto the cloud infrastructure • It uses a variety of programming languages, libraries, services, and tools supported by the cloud provider • The PaaS customer will control the deployed applications and often configuration settings for the application-hosting environment Platform as a service remove the need for organizations to control the underlying infrastructure (typically hardware and operating systems) and let you focus on the deployment and management of your applications. This helps you be more efficient as you don’t need to worry about resource procurement, capacity planning, software maintenance, patching, or any of the other undifferentiated heavy lifting involved in running your application. Containers are also popular PaaS solutions 274 Platform-as-a-Service (PaaS) Click to edit Master title style • .NET, Java, Ruby, Python, Go, JSON, YAML, etc. • Amazon Web Services examples • • • • • Lightsail Amazon Aurora DB Lambda Elastic Beanstalk CloudFront Can be server-based applications or serverless code like AWS Lambda functions Can be containerized (with Kubernetes) or not Can leverage many partner marketplace Amazon Machine Images (AMIs) or you can create your own of course 275 Platform-as-a-Service at AWS Click to edit Master title style @aws.amazon.com @aws.amazon.com Managed Services like Relational Database Service (RDS) and Elastic MapReduce (EMR) grant more responsibility with the CSP RDS - Amazon Relational Database Service (Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching and backups. It frees you to focus on your applications so you can give them the fast performance, high availability, security and compatibility they need. Amazon RDS is available on several database instance types - optimized for memory, performance or I/O - and provides you with 6 familiar database engines to choose from: Amazon Aurora, PostgreSQL, MySQL, MariaDB, Oracle, and Microsoft SQL Server. Elastic MapReduce - Amazon EMR provides a managed Hadoop framework that makes it easy, fast, and cost-effective to process vast amounts of data across dynamically scalable Amazon EC2 instances. You can also run other popular distributed frameworks such as Apache Spark and HBase in Amazon EMR, and interact with data in other AWS data stores such as Amazon S3 and Amazon DynamoDB. Amazon EMR securely and reliably handles a broad set of big data use 276 cases: • Log analysis • Web indexing • Data transformations (ETL – extract, transform, and load) • Machine learning • Financial analysis • Scientific simulation • Bioinformatics 276 Software-as-a-Service (SaaS) Click to edit Master title style • Customer uses the service provider’s applications running entirely on a cloud infrastructure • The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email) or a program interface • There are possible exceptions of limited user-specific application configuration settings The consumer doesn’t not manage or control the underlying infrastructure or even individual application capabilities Zoho.com is a good example Many vendors actually build their SaaS companies and offerings on top of AWS IaaS and using AWS PaaS services and marketplace partners! 277 Common SaaS Use Cases Click to edit Master title style • • • • • • • Customer Relationship Management (CRM) Enterprise Resource Planning (ERP) Community services Billing services Analytics services Personal storage services Security services 278 *-as-a-Service Click to edit Master title style • • • • • • Database as a Service (DBaaS) Functions as a Service (FaaS) Communications as a Service (CaaS) Business Process as a Service (BPaaS) Security as a Service (Sec-as-a-Service or MSSPs) Malware as a Service (MaaS) 279 Cloud Deployment Models Click to edit Master title style • This decision will have a significant impact on the organization regarding: • • • • • Business strategy and objectives Regulations and governance Costs and forecasted budgets Risk treatment (handling) New technologies and green initiatives A deployment model also has to be selected to determine residency, ownership, and shared responsibilities Risk treatment – Avoidance, Acceptance, Reduction/Mitigate, Share/Transfer 280 Public Cloud Deployment Click to edit Master title style • Public cloud is provisioned for open use by the general public • It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them, yet it exists on the premises of the cloud provider AWS fully deploys the cloud and all applications run in their cloud. Applications in the cloud have either been created in the cloud or have been migrated from an existing infrastructure to take advantage of the benefits of cloud computing. Cloud-based applications can be built on low-level infrastructure pieces or can use higher level services that provide abstraction from the management, architecting, and scaling requirements of core infrastructure. 281 Private Cloud Deployment Click to edit Master title style • The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers • It may be owned, managed, and operated by the organization, a third-party, or some combination of them • Offers the same benefits of a public cloud without giving up control, privacy, and security • May be necessary due to regulations (HIPAA) • Private cloud may exist on or off premises Deploying resources on-premises, using virtualization and resource management tools, is sometimes called “private cloud”. On-premises deployment does not provide many of the benefits of cloud computing but is sometimes sought for its ability to provide dedicated resources. In most cases this deployment model is the same as legacy IT infrastructure while using application management and virtualization technologies to try and increase resource utilization. 282 Community Cloud Deployment Click to edit Master title style • Provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns • Often owned and operated by one or more of the organizations in the community, a third party, or some combination of them • Common examples are healthcare and finance communities • AWS GovCloud is an example Shared concerns e.g., mission, security requirements, policy and compliance considerations Common use case is several healthcare providers using a community cloud to share patients information while maintaining HIPAA compliance. 283 Hybrid Cloud Deployment Click to edit Master title style • A combination of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities • They are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds) 284 Hybrid Cloud Deployment Click to edit Master title style • Organizations may need to keep certain resources internal and private for mission-criticality or regulatory reasons • Often involves “Bursting Up” to the cloud as needed • AWS offers Outposts – Hybrid as a Service • Simply using SaaS solutions does not make it a hybrid 285 Cloud Deployments Click to edit Master title style A hybrid deployment is a way to connect infrastructure and applications between cloud-based resources and existing resources that are not located in the cloud. The most common method of hybrid deployment is between the cloud and existing on-premises infrastructure to extend, and grow, an organization's infrastructure into the cloud while connecting cloud resources to internal system. SDN – Cisco Software-Defined Networking 286 Cloud Value Propositions: Cost Click to edit Master title style • Some customers experience 50% or more cost reduction from their previous private cloud or traditional hosted data center • Eliminates large upfront investments for: cabling, cooling, power, networks, racks, servers, storage, certifications, and labor • Cost reduction due to economy of scale • Pay-as-you-go and pay-as-you-use Some AWS customers experience 50% or more lower cost than their previous on premise or traditional hosted data center. A significant portion of the savings comes from eliminating large upfront investments for: Cabling – Cooling – Power – Networking – Racks – Servers – Storage – Certifications – Labor Secondly, the massive scale will reduce costs on an ongoing basis as shown in the graphic below from AWS. This benefit is one of the primary reasons AWS has grown to be 5 times the size of it's next 5 competitors and also the difficulty of start ups being able to deliver lower costs. The third component of lower costs come from customers paying only for what they use. This ability is attributable to the elasticity of AWS services as compared to on premise and traditional data centers. The graphic below from AWS highlights the waste required to meet infrastructure demand by paying for more than needed or the customer dissatisfaction when paying for less than is needed to save money. AWS's ability to provide what is needed when it is needed as an infrastructure service removes this inefficiency. 287 Value Propositions: Agility and Elasticity Click to edit Master title style • Companies can leverage the infrastructure for speed, experimentation and innovation • Rapidly respond to markets trends and new potential • Unlimited scalability and dynamic provisioning & deprovisioning of processing, storage, database, and memory • Allows organizations to shift and pool resources over different infrastructures to avoid overprovisioning and cost overruns 288 Value Proposition: On-Demand Access Click to edit Master title style • Represents anywhere, anytime access to resources on a wide-variety of devices • Offers an online portal that allows consumers the ability to provision cloud resources as needed automatically and rapidly without human interaction in most scenarios • Uses edge locations caching CDN resources in many global cities 289 Value Propositions: Auto Scaling Click to edit Master title style • Auto Scaling monitors your applications and automatically adjusts capacity to maintain steady, predictable performance at the lowest possible cost • CSPs allow for easy setup of application scaling for multiple resources across multiple services in minutes • Service offers simple, powerful user interfaces that let you build scaling plans for instances, fleets, tasks, database tables, indexes, and replicas 290 Value Propositions: Security Click to edit Master title style • Cloud providers operate and manage the components from the host operating system and virtualization layer down to the physical security of the facilities in which the services operate • They are designed to security best practices and security compliance standards on top of some of the most secure computing infrastructure in the world 291 Value Propositions: Security Click to edit Master title style • • • Nondescript, undisclosed locations 24/7 security staffing MFA with biometrics for facility access with frequent refreshing of authorization • Continuous monitoring and auditing • Network boundary devices monitor and audit access • Intrusion detection and analysis • Automated change control • Bastion services act as gateways for privileged access 292 AWS Global Infrastructure Click to edit Master title style The AWS Type 1 Xen hypervisors on massive NAS and RAID arrays are deployed within AWS datacenters located in the 60 Availability Zones within 20 geographic regions around the world, with announced plans for 12 more Availability Zones and four more AWS Regions in Bahrain, Cape Town, Hong Kong SAR, and Milan. Availability Zones are connected to each other with fast, private fiber-optic networking, enabling you to easily architect applications that automatically fail-over between Availability Zones without interruption. In addition to replicating applications and data across multiple data centers in the same Region using Availability Zones, you can also choose to increase redundancy and fault tolerance further by replicating data between geographic Regions. You can do so using both private, high speed networking and public internet connections to provide an additional layer of business continuity, or to provide low latency access across the globe. AWS Edge Network Locations: Edge locations - Ashburn, VA (3); Atlanta GA (3); Boston, MA; Chicago, IL (2); Dallas/Fort Worth, TX (5); Denver, CO (2); Hayward, CA; Hillsboro, OR; Jacksonville, FL; Los Angeles, CA (4); Miami, FL (3); Minneapolis, MN; Montreal, QC; New York, NY 293 (3); Newark, NJ (3); Palo Alto, CA; Phoenix, AZ; Philadelphia, PA; San Jose, CA (2); Seattle, WA (3); South Bend, IN; St. Louis, MO; Toronto, ON; Regional Edge Caches Northern Virginia; Ohio; Oregon 293 Root Account Compromise Click to edit Master title style • All providers have a standalone single-sign on root or billing account • This has highest privileges and is linked to the direct or credit card billing and original email address • This is the primary target for external attackers • Fake access keys are common honey tokens to catch privileged insiders 294 Access Keys Click to edit Master title style • Some CSPs require all API calls be digitally signed using HMAC-SHA128/256 • Keys offers origin authentication, non-repudiation, and integrity • Forward secrecy demands that you use a key derived from the secret access key • Do NOT embed credentials into API calls or application code! If you use any of the AWS SDKs to generate requests, the digital signature calculation is done for you; otherwise, you can have your application calculate it and include it in your REST or Query requests by following the directions in the AWS documentation. Not only does the signing process help protect message integrity by preventing tampering with the request while it is in transit, it also helps protect against potential replay attacks. A request must reach AWS within 15 minutes of the time stamp in the request. Otherwise, AWS denies the request. Version 4 provides an additional measure of protection over previous versions by requiring that you sign the message using a key that is derived from your secret access key rather than using the secret access key itself. Because access keys can be misused if they fall into the wrong hands, you should save them in a safe place and not embed them in your code if you’re a developer. For customers with large fleets of elastically scaling EC2 instances, the use of IAM roles is a more secure and convenient way to manage the distribution of access keys. IAM roles provide temporary credentials, which not only get automatically loaded to 295 the target instance, but are also automatically rotated multiple times a day. We will look at the IAM Roles functionality as well today… 295 Command Line Interface Access Click to edit Master title style 296 CSP Attacks: Instance Backdoors Click to edit Master title style • • • • • • • Spambots C&CActivity DenialOfService.Tcp DenialOfService.Udp DenialOfService.Dns DenialOfService.UdpOnTcpPorts DenialOfService.UnusualProtocol 297 CSP Attacks: Cryptojacking Click to edit Master title style • CryptoCurrency:EC2/ BitcoinTool.B!DNS • An instance is querying a domain name associated with cryptocurrency-related activity • CryptoCurrency:EC2/ BitcoinTool.B • An instance is querying an IP address that is associated with cryptocurrency-related activity 298 CSP Attacks: Pentest Threats Click to edit Master title style • There are popular penetration testing tools that can identify weaknesses in instances that need patching • Attackers also use this tool to find configuration weaknesses and gain unauthorized access to your environment • Machines running Linux are making API calls using credentials that belong to your account using: • Kali Linux • Parrot Linux • Pentoo Linux 299 CSP Attacks: Persistence Click to edit Master title style • Your credentials might be compromised when configuration settings are changed under suspicious circumstances • Principal invokes an API commonly used to change the access permissions for firewalls, security groups, and ACLs in an account • Network Permissions • Resource Permissions • User Permissions A user is exhibiting behavior that is different from the established baseline as they have no prior history of invoking an API. 300 CSP Attacks: Policy Changes Click to edit Master title style • Attacker changes the public access policy for your object storage (S3, Google Cloud Storage, Azure Blob) • A suspicious API is invoked using the root or billing account • A principal attempts to assign a highly permissive policy to themselves – behavior associated with a privilege escalation attack 301 CSP Attacks: Reconnaissance Click to edit Master title style • An instance has an unprotected port being probed by a known malicious host • Instance is performing outbound port scans to a remote host • API was invoked from a: • Tor exit node IP address • IP address on a custom threat list • Known malicious IP Tor is software for enabling anonymous communication. It encrypts and randomly bounces communications through relays between a series of network nodes. The last Tor node is called the exit node. This can be a reconnaissance attack: an anonymous user trying to gather information or gain access to your AWS resources for malicious purposes. 302 CSP Attacks: Reconnaissance Click to edit Master title style • API commonly used to discover the network, resource, and user access permissions • A principal with no prior history of doing so invokes the RunInstances API 303 CSP Attacks: Stealth Click to edit Master title style • Server access logging is disabled for an object storage container • Account password policy has been weakened – not strengthened • A principal invoked an API call commonly used to stop logging, delete existing logs, and otherwise eliminate traces of activity in your cloud account. AWS S3 – Google Cloud Storage – Azure Blob Storage 304 CSP Attacks: Trojans Click to edit Master title style • Attempting to communicate with the IP of a remote host that is a known black hole or remote host known to hold credentials and other stolen data captured by malware (DropPoint) • Querying a domain name that is being redirected to a black hole, drive-by download, or DGA address An instance in your environment might be compromised because it is trying to communicate with an IP address of a black hole (or sink hole). Black holes refer to places in the network where incoming or outgoing traffic is silently discarded without informing the source that the data didn't reach its intended recipient. A black hole IP address specifies a host machine that is not running or an address to which no host has been assigned. There is an instance in your environment trying to query domain generation algorithms (DGA) domains. Such domains are commonly used by malware and could be an indication of a compromised instance. 305 CSP Attacks: Trojans Click to edit Master title style • Instance is exfiltrating data through DNS queries • Instance is querying domains involved in phishing attacks • Unauthorized access through: • Tor IP Caller • Metadata DNS Rebind (169.254.169.254) • Multiple worldwide successful console logins Tor is software for enabling anonymous communication. It encrypts and randomly bounces communications through relays between a series of network nodes. The last Tor node is called the exit node. This can indicate unauthorized access to your AWS resources with the intent of hiding the attacker’s true identity. DNS Rebinding involves tricking an application running on the instance to load a return data from a URL, where the domain name in the URL resolves to the instance metadata IP address (169.254.169.254). This causes the application to access metadata and possibly make it available to the attacker. It is possible to access metadata using DNS Rebinding only if the EC2 instance is running a vulnerable application that allows injection of URLs, or if a human user accesses the URL in a web browser running on the EC2 instance. 306 Cryptology Click to edit Master title style • Cryptology is an umbrella term which covers both cryptography and cryptanalysis • It is the study of ciphers: • Algorithms and techniques used for hashing, encryption and decryption • Presents a well-defined series of steps to perform operations • There are many different types of ciphers from the basic to the multifaceted 307 Cryptography Click to edit Master title style • Cryptography creates techniques to secure communications in the presence of third parties • Offers confidentiality, integrity, origin authentication, and nonrepudiation • Cryptographic problems can be tractable or intractable • Tractable are easier problems that can be solved quickly for certain inputs (constant, linear, quadratic) • Intractable problems are difficult and cannot be solved quickly • Factoring large primes (RSA) • Computing elliptic curves (ECC) • Exponential or super-polynomial problems Historically, cryptography was synonymous with encryption. Its goal was to keep messages private. 308 Cryptanalysis Click to edit Master title style • • • • • You can only prove that an algorithm is not vulnerable to known cryptanalytic attack Cryptanalysis is the practice and study of determining and exploiting weaknesses in cryptographic techniques There is a symbiotic relationship between cryptographers and cryptanalysts Three main types of attacks • Brute force attacks • Implementation attacks • Side channel attacks Poor key management is the main weakness in systems today It is an ironic fact of cryptography that it is impossible to prove that an algorithm is secure. You can prove only that it is not vulnerable to known cryptanalytic attacks. If there are methods that have been developed but are unknown to the cryptographers, then an algorithm may be able to be cracked. You can prove only invulnerability to known attacks, except for a brute-force attack. All algorithms are vulnerable to brute force. If every possible key is tried, one of the keys has to work. Therefore, no algorithm is unbreakable. The best you can hope for are algorithms that are vulnerable only to brute-force attacks. 309 Encryption Click to edit Master title style • Encryption hides the original data or message content by scrambling the clear text into a random appearing string of characters called ciphertext • Decryption reverses the process of encryption when an entity has the proper decryption key • Many applications store and send information in clear text 310 Cryptographic Keys Click to edit Master title style • Cryptographic keys are strings of bits used by cryptographic algorithms to transform plain text into cipher text or vice versa • The keys should remain private to ensure secure communication • A cryptographic key is the core aspect of cryptographic operations 311 Block Ciphers Click to edit Master title style • Block ciphers perform their operations on varying chunks of data in different sized blocks • With encryption operations, blocks are actually the mode of operation When you encrypt or decrypt a message with a block cipher (of any size), you don't use the block cipher directly, but put it into a mode of operation. The simplest such mode would be electronic code book mode (ECB) used by the deprecated DES, which simply cuts the message in blocks, applies the cipher to each block and outputs the resulting blocks. 312 Block Ciphers Click to edit Master title style • MD5 hashing uses compression function operating on 512-bit blocks divided into smaller 32-bit blocks • DES, 3DES, Blowfish, Twofish and AES use block modes • AES is iterated block cipher based on Rijndael using key lengths of 128, 192, or 256 to encrypt 128-bit blocks AES is an iterated block cipher, which means that the initial input block and cipher key undergo multiple transformation cycles before producing output. It is based on the more general Rijndael cipher. Rijndael specifies variable block sizes and key sizes, but AES specifically uses keys with a length of 128, 192, or 256 bits to encrypt 128-bit blocks. MD5 - The main algorithm itself is based on a compression function, which operates on blocks. The input is a data block, plus feedback of previous blocks. The 512-bit blocks are divided into sixteen 32-bit sub-blocks. These blocks are then rearranged with simple operations in a main loop, which consists of four rounds. The output of the algorithm is a set of four 32-bit blocks, which concatenate to form a single 128-bit hash value. The message length is also encoded into the digest. 313 Stream Ciphers Click to edit Master title style • Stream ciphers encrypt one bit or byte at a time with a stream of pseudorandom bits as a key • A One-Time Pad (OTP) is an effective stream cipher that applies the exclusive OR (XOR) operation to plaintext • Using an unpredictable and never re-used purely random key should make OTP unbreakable Often such stream ciphers work by producing a keystream from the actual key (and maybe an initialization vector) and then simply XOR-ing it with the message – these are called synchronous stream ciphers. Other stream ciphers might vary the encryption of future parts of the message depending on previous parts. Some block cipher modes of operation actually create a synchronous stream cipher, like CTR and OFB mode. The One-Time Pad, is supposed to use a purely random key to achieve "perfect secrecy". IOW, it's supposed to be totally immune to brute force attacks – or what physicists would call ‘absurdity’. The practical challenge with the one-time pad is that, in order to create a guaranteed cipher, its key should be longer than the plaintext. In other words, if I want perfect encryption of a 500 MB video of my band - I would need a key that is Gigabits long. 314 Stream Ciphers Click to edit Master title style • RC4 is a prevalent stream cipher used to secure web traffic in SSL and TLS • RFC 7465 prohibits the use of RC4 in all versions of TLS due to cryptographic weaknesses • These recent findings may allow other stream ciphers like SALSA, SOSEMANUK, PANAMA, and others to gain ground RFC 7465: Because of the RC4 deficiencies, the following apply: ➢ TLS clients MUST NOT include RC4 cipher suites in the ClientHello message ➢ TLS servers MUST NOT select an RC4 cipher suite when a TLS client sends such a cipher suite in the ClientHello message 315 Simple Stream Cipher Example Click to edit Master title style The Boolean Exclusive OR (XOR) function is a fundamental cryptographic operation. The output of a XOR is TRUE if exactly one of the inputs is true (1). Otherwise, the output is false (0). 316 Hashing Click to edit Master title style • A hash function operates much like the checksums performed on frames and file transfers to maintain integrity • Hash functions are algorithms that change input (or data) of an arbitrary or random length into a smaller, fixed-sized output called a digest or fingerprint • The most common for years was MD5 which is a 128-bit hashing algorithm that has been deprecated 317 Cryptographic Hashing Click to edit Master title style • The function should be collision resistant - computationally infeasible to find two messages that can produce the same hash result • Birthday paradox affects strength • The avalanche effect is applied to result 318 Hashed-Message-Authentication-Code Click to edit Master title style HMAC operates by interleaving the hashing key with the message in a secure manner. 319 HMACs Click to edit Master title style • SHA-2 HMACs are always preferable • With TLS 1.2, all cipher suites are required to explicitly specify a pseudorandom function (PRF) based on HMAC and SHA-256 • TLS 1.2 will generate a key block which is made up of 2 MAC keys, 2 encryption keys (preferably AES-256_CGM) and 2 initialization vectors (IV) when needed with block ciphers 320 Symmetric Key Systems Click to edit Master title style • Symmetric key cryptosystems use the same key to encrypt and decrypt data • They are also called secret-key or private-key encryption • The sender and receiver must share the same secret key before achieving secure communication so protecting this key is tantamount • They are often used to protect data in storage and with VPNs • Key management can be a challenge with symmetric systems 321 Symmetric Key Systems - AES Click to edit Master title style • They work fast and are often used for bulk encryption when data privacy is needed using 40 to 256-bit keys (1.5 x 1077 possible keys) • Common algorithms are DES, 3DES-EDE and AES • AES uses 4 cryptographic transformations: • • • • AddRoundKey: XOR the round key bit-by-bit SubBytes: uses an S-box to substitute each 8-bit value ShiftRows: a left circular shift of rows 1, 2 and 3 MixColumns: an additional byte value substitution AES is an iterated block cipher, which means that the initial input block and cipher key undergo multiple transformation cycles before producing output. 322 Symmetric Key Cryptography Click to edit Master title style 323 Block vs. Stream Click to edit Master title style A block cipher mode is an algorithm that features the use of a symmetric key block cipher algorithm to provide an information service, such as confidentiality or authentication. Currently, NIST has approved fourteen modes of the approved block ciphers in a series of special publications. In this classic example we see 3DES in block chain mode. Currently, there are two NIST approved block cipher algorithms that can be used for both applying cryptographic protection (e.g., encryption) and removing or verifying the protection that was previously applied (e.g., decryption): AES and Triple DES. Two other block cipher algorithms were previously approved: DES and Skipjack; however, their approval has been withdrawn. Stream ciphers use of a symmetric key that uses plaintext combined with a pseudorandom cipher digit stream called a keystream. Stream ciphers will encrypt plaintext digits “one at a time” along with the corresponding figure of the keystream. The resulting output will provide the corresponding output of the ciphertext stream. Another name for the stream cipher is a state cipher because every digit is dependent on the current state of the cipher. Typically a digit will be a bit and the combination operation will use the XOR operation. 324 RC4 is the most popular stream cipher that's been around for several years. However, it is now “illegal” to use RC4 with TLS on public websites. The ChaCha family of stream ciphers, also known as Snuffle 2008, which is a variant of the Salsa20 family of stream ciphers is gaining in popularity. 324 Key Stretching Click to edit Master title style • Converts passwords using various algorithms to produce a more random and longer key than the original • Tries to make passwords based on one-way hashes much harder to compromise • Uses key derivation processes such as a salt (and/or pepper) combined with a a specialized function such as PBKDF2, bcrypt, or scrypt Key stretching is the practice of converting a password to a longer and more random key for cryptographic purposes such as encryption. This is generally recognized as making encryption stronger as it ensures that the encryption itself is reasonably hard. The process of converting a password into a key is accomplished by a type of algorithm known as a key derivation function that may include salt and pepper with the password to make the key more difficult to guess. Key stretching can also be applied to a master key as well as a password Pepper: The main idea is to add random bits to the password encryption, similar to the "salt" bits that are currently used to protect passwords against dictionary attacks. We call the new bits: "pepper" bits. Unlike the "salt" bits that are saved with the encrypted password, the pepper bits are used to encrypt the password, but are never saved. 325 Asymmetric Key Systems Click to edit Master title style • Asymmetric encryption is also known as public key encryption • The system uses a pair of mathematically related keys • Entities generate the key pair and share the public key while keeping the private key secret • Data that is encrypted with the private key requires the public key to decrypt and vice versa • Common asymmetric protocols are RSA, DSA, ElGamal, DiffieHellman, ECDH (elliptic curve) and EC-DSA Asymmetric algorithms utilize a pair of keys for encryption and decryption. The paired keys are mathematically related and are generated together – think of them as fraternal twins as opposed to identical twins. Typically, an entity – let’s say a corporate edge router – that generates an RSA key pair will share one of the keys (the public key) and it keep the other key (the private key) secret. Data that is encrypted with the private key requires the public key to decrypt and vice versa. Asymmetric encryption is also known as public key encryption. Common Asymmetric protocols are: RSA, DSA, ElGamal, Diffie-Hellman, and elliptic curve ECDH, and EC-DSA. 326 Asymmetric Key Confidentiality Click to edit Master title style Alice Bob RSA Encryption Decryption Bob’s Public Key Bob’s Private Key The security services that are provided by asymmetric encryption can differ by scenario. Imagine that Bob has generated a public/private key pair. Bob keeps the private key totally secret but publishes the public key so it is available to everyone. Alice has a message that she wants to send to Bob in private. If Alice encrypts the message using Bob’s public key, only Bob has the private key that is required to decrypt the message, providing confidentiality. 327 Asymmetric Key Origin Authentication Click to edit Master title style Alice Bob Encryption Decryption Alice’s Private Key Alice’s Public Key RSA Now, let’s say that Alice has an important message that she wants to send to Bob. Alice encrypts the message with her private key and sends it to Bob. Bob can use Alice’s public key to decrypt the message, but so can anyone else who has intercepted the message. Obviously, this does not provide privacy, but there is a security benefit. If Bob can use Alice’s public key to decrypt the message, Bob then knows that the message was originally encrypted with Alice’s private key. Only Alice has that private key, so Bob knows that the message originated from Alice. This provides origin authentication. 328 (Perfect) Forward Secrecy Click to edit Master title style • Ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the (long-term) private keys is compromised in the future • IPsec can negotiate new keys for every communication and if a key is compromised only the specific session it protected will be revealed • With forward secrecy, every TLS connection to the web server is individually protected Ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the (long-term) private keys is compromised in the future. IPsec can negotiate new keys for every communication and if a key is compromised only the specific session it protected will be revealed With forward secrecy every TLS connection to the web server is individually protected One of the biggest flaws of RSA is that it does not provide forward secrecy for TLS (check out: FHMQV-C protocol on Wikipedia) 329 Digital Signatures Click to edit Master title style • Digital signatures offer a service comparable to handwritten signatures but over the network • They use hashing algorithms to append a fingerprint (or digest) to the original data or message • The fingerprint is encrypted with the sender’s (signer) private key and becomes the digital signature • The original message/data and signature are sent together to the recipient Suppose that you send transaction instructions through email to your online stock trading company for a pretty substantial sum and the transaction timing was really bad - so you lost a ton of money on some options trade. It is plausible that you could claim never to have sent the transaction order or that someone forged your email account. The brokerage firm could protect itself by requiring the use of digital signatures before accepting instructions via email. Digital signatures can provide the same functionality as handwritten signatures, but even more. The idea of encrypting a file with your private key is a step towards digital signatures. Anyone who decrypts the file with your public key knows that you were the one who encrypted it. But, since asymmetric encryption is computationally expensive, this is not optimal. Digital signatures actually leave the original data unencrypted. It does not require expensive decryption to simply read the signed documents. Digital signatures, instead, use a hash algorithm to produce a much smaller fingerprint of the original data. This fingerprint is then encrypted with the signer’s private key. The document and the signature are delivered together. The digital signature is validated by taking the document and running it 330 through the hash algorithm to produce its fingerprint. The signature is then decrypted with the sender’s public key. If the decrypted signature and the computed hash match, then the document is identical to what was originally signed by the signer. Usually asymmetric algorithms, such as RSA and DSA, are used for digital signatures. 330 Digital Signatures Click to edit Master title style 331 Digital Signature Services Click to edit Master title style • Digital signatures provide integrity of the digitally signed message or information • They verify the source authenticity of the digitally signed data • Digital signatures provide transactional non-repudiation • The properties of digital signatures must be nonforgeable, authentic, non-reusable, unchangeable, and not repudiated That scenario showed how the authenticity and integrity of the message is confirmed, even though the actual data is public. Keep in mind that BOTH digital signatures AND encryption and are necessary to ensure that the message is confidential and has not changed. Digital signatures provide three basic security services in secure communications: • Authenticity of digitally signed data: Digital signatures authenticate a source, proving that a certain party has seen and has signed the data in question. • Integrity of digitally signed data: Digital signatures guarantee that the data has not changed from the time it was signed. • Nonrepudiation of the transaction: The recipient can take the data to a third party, and the third party accepts the digital signature as a proof that this data exchange did take place. The signing party cannot repudiate that it has signed the data. 332 Adding a Programmatic IAM User Click to edit Master title style Applications running outside of an AWS environment will need access keys for programmatic access to AWS resources. For example, monitoring tools running onpremises and third-party automation tools will need access keys. These are called “Service Accounts” as well in AWS. In GCP they are specifically configured Service Accounts in fact. If you use any of the AWS SDKs to generate requests, the digital signature calculation is done for you; otherwise, you can have your application calculate it and include it in your REST or Query requests by following the directions in the AWS documentation. Not only does the signing process help protect message integrity by preventing tampering with the request while it is in transit, it also helps protect against potential replay attacks. A request must reach AWS within 15 minutes of the time stamp in the request. Otherwise, AWS denies the request. Version 4 provides an additional measure of protection over previous versions by requiring that you sign the message using a key that is derived from your secret access key rather than using the secret access key itself. 333 AWS Command Line Interface Click to edit Master title style 334 AWS Key Management Service Click to edit Master title style 335 Digitally Signed Code Click to edit Master title style 336 Digitally Signed Code Click to edit Master title style 337 IP Security (IPsec) Click to edit Master title style • IP security (IPsec) is a suite of protocols created for IPv4 to maintain the integrity, confidentiality, and authentication of data communications over an IP network • The two main protocols are Authentication Header (AH) and Encapsulating Security Payload (ESP offers confidentiality) • IPsec can function in tunnel mode between two terminating devices, or in transport mode in an end-to-end configuration • It is used for virtual private networks, application-level security, and routing security 338 IPsec Algorithms Click to edit Master title style • • • • • HMAC-SHA1/SHA2 for integrity protection and authenticity 3DES-CBC for confidentiality AES-CBC for confidentiality AES-GCM for confidentiality and authentication ChaCha20 + Poly1305 providing confidentiality and authentication together efficiently 339 IKE version 1 (IKEv1) Click to edit Master title style • IKE phase one’s job is to establish a secure authenticated communication channel using the Diffie–Hellman key exchange algorithm • This generates a shared secret key to encrypt further IKE communications • This creates a bidirectional IKE peering SA • 2 peers begin the DH process by agreeing on a large prime number • The authentication can be performed using either pre-shared key (shared secret), signatures, or public key encryption Main Mode protects the identity of the peers and the hash of the shared key by encrypting them; Aggressive Mode does not. 340 IKE version 1 (IKEv1) Click to edit Master title style • Phase one operates in either main mode or aggressive mode • During IKE phase two, the peers use the secure channel established in phase one to negotiate security associations (SA) for IPsec • This negotiation creates a minimum of two unidirectional SA’s • IKEv1 phase two operates in quick mode 341 VPN Gateways Click to edit Master title style • Can be based on servers, routers, firewalls, dedicated appliances • Terminate S2S and remote access VPNs • Typically IPSec (IKEv1/2) and/or SSL/TLS • Support client-based full tunnel or clientless • Often will also be a CA server for VPN PKI 342 SSL/TLS Click to edit Master title style • Transport Layer Security (TLS) is arguably the most important protocol for global communication • It is a message and handshake structure for entities to: • • • • Agree on cryptographic parameters Establish secret keys Authenticate identities Transmit messages In Nov 1994, SSL1 and SSL2 was developed by Netscape – In August 2019, TLS 1.3 was released in RFC 8446 343 Transport Layer Security (TLS) Click to edit Master title style • All TLS packets are sent using the record protocol • Data is sent using one of the four subprotocols in the record layer: • • • • 20-ChangeCipherSpec 21-Alert 22-Handshake 23-Application data 20 ChangeCipherSpec - Switching to a new encryption suite 21 Alert – an alert mechanism 22 Handshake - Handshake messages 23 Application Data - Opaque application data 344 Transport Layer Security (TLS) Click to edit Master title style • The TLS handshake protocol contains its own header and is used to form parameters for the rest of the session, and it must: • • • • Agree ciphers and protocols Authenticate the server (and client) Be robust against tampering and attack Establish shared secrets 345 TLS 1.3 is a Major Change Click to edit Master title style • All ciphers removed except for modern AEAD • Provides a wider use of extensions • The key exchange and authentication are separated from the ciphers • There are major handshake improvements • 0-RTT is resumed In 1.3, the handshake embeds much of the key exchange into the hello messages. 0-RTT Resumption means that during application data, the server can send a pre shared key for use next time. 346 Transport Layer Security (TLS) Click to edit Master title style TLS defines cipher suites that describe the cryptographic primitives and other security parameters that will be used in that session 347 Public Key Infrastructure (PKI) Click to edit Master title style • PKI has 2 main goals: • Scalable and secure way to distribute public keys in digital certificates • Reliable method to revoke keys in certificates when they are no longer valid 348 Certificate Life Cycle Click to edit Master title style 1. The subscriber submits a Certificate Signing request (CSR) to a Certificate Authority (CA) 2. CSR transports a public key (plus other metadata) and reveals the public key ownership using a digital signature 1. 2. 3. 4. Subscriber submits Certificate Signing request (CSR) to CA CRS transports public key (plus other metadata) and reveals public key ownership using a digital signature CA then follows a validation process: a) Domain Validated (DV) b) Organization Validated (OV) c) Extended Validation (EV) Upon validation, CA issues certificate and all intermediary certificates needed to chain to its root 349 Certificate Life Cycle Click to edit Master title style Content PU-A User CA Public Key of User A RSA PR-CA PU-CA Private Key of CA Public Key of CA Sign PU-A Public Key of User A, signed by the CA Signing Key 350 Certificate Life Cycle Click to edit Master title style 3. The CA then follows a validation process: • Domain Validated (DV) • Organization Validated (OV) • Extended Validation (EV) 4. Upon validation, the CA issues the certificate and all intermediary certificates needed to chain to its root 1. 2. 3. 4. Subscriber submits Certificate Signing request (CSR) to CA CRS transports public key (plus other metadata) and reveals public key ownership using a digital signature CA then follows a validation process: a) Domain Validated (DV) b) Organization Validated (OV) c) Extended Validation (EV) Upon validation, CA issues certificate and all intermediary certificates needed to chain to its root 351 Certificate Life Cycle Click to edit Master title style CA PR-CA PU-CA Private Key of CA Public Key of CA User A PR-A Private Key of User A PU-A Public Key of User A User B PU-CA PU-A PR-C PU-C PU-CA PU-C Public Key of CA Public Key of User A signed by the CA Private Key of User C Public Key of User C Public Key of CA Public Key of User C Signed by the CA CA CA Certificates are then returned to the customers from the CA’s which are part of a web of trust. Certificates can now be exchanged over untrusted network. Certificates/public keys of entities are now verified with public key of CA. 352 X509v3 Certificate Click to edit Master title style 353 X509v3 Certificate Click to edit Master title style • • • • • Version number Serial number Signature algorithm ID Issuer name Validity period • Not before • Not after • Subject name • Subject Alternate Name (SAN) • Used to associate additional names like email address, IP addresses, and DNS names 354 X509v3 Certificate Click to edit Master title style • • • • • • • • Subject public key info Public key algorithm Subject public key Issuer unique identifier Subject unique identifier Extensions Certificate signature algorithm Certificate signature 355 Certificate Types Click to edit Master title style • Self-signed • Signed by the entity it certifies • Root CAs • Root unsigned or self-signed that identifies the root CA • Trust anchor for digital certificates in the chain of trust • Email (S/MIME) • Sign and encrypt email messages 356 Certificate Types Click to edit Master title style • • • Wildcard • Used with multiple subdomains like *.mycompany.com Code signing • Used to authenticate the source and integrity of code, like device drivers, applications, macros, configuration files, and binaries User and machine/computer • Used by the local machine, device, or user to authenticate to a directory (EAP-TLS) 357 Reasons for Invalid Certificates Click to edit Master title style • Misconfiguring virtual servers • A common mistake is to put plaintext sites on the same address as another site using encryption on TCP port 443 • Private CAs and self-signed certificates • Expired certificates • Inadequate name coverage • Certificates are bought but operator does not designate all of the required hostnames (for example: www.example.com AND example.com AND the wildcard *.example.com ) Miscofiguring virtual servers Common mistake is to put plaintext sites on the same address as another site using encryption on TCP port 443 Private CAs and self-signed certificates Expired certificates Inadequate name coverage Certificates are bought but operator does not designate all of the required hostnames (for example: www.pearson.com AND pearson.com) 358 CRL Revocation Click to edit Master title style • The CRL is a list of revoked, but not yet expired, serial numbers • Every certificate should have the location of a CRL in the CRL Distribution Point extension • Real-time lookups are slow and often ignored by browsers and other clients • Long validity periods are another problem Chrome doesn’t check CRLs by default; Firefox doesn’t check URLs even for EV certificates; IE does check; Safari checks but ignores failures. Clients often will not check the validity of Intermediate certificates – even then they can be considered fresh for 12 months. Biggest problem with OCSP wasn’t built fresh from the ground up but simply attempted to improve on CRL. Actally, the OCSP attacks are less threatening since so many user agents ignore it completely - and some modern browsers choose not to use OCSP. OCSP has a reputation for unreliability and therefore most browsers take a soft-fail approach. 359 OCSP Revocation Click to edit Master title style • OCSP relies on responder servers to return the status • The location of responder is in Authority Information Access extension • Responders bring privacy and performance challenges • Replay and response suppression attacks are common 360 OCSP Stapling Click to edit Master title style • OCSP Stapling forces the server to send fresh certificate data to clients in the CertificateStatus handshake • Clients implement “status_request extension” to support OCSP stapling • Stapling supports only one response (changing in RFC 6961) and only checks the status of the server certificate • New proposals are for “Must Staple” feature with either a new type of certificate that only works with stapled responses OR the server can advertise in response header (possibly as an extension to the HSTS protocol) • Forces server to send fresh certificate data to clients in the CertificateStatus handshake • Clients implement “status_request extension” to support OCSP stapling • Supports only one response (changing in RFC 6961) and only checks the status of the server certificate • New proposals are for “Must Staple” feature with either a new type of certificate that only works with stapled responses OR server can advertise in response header (possibly as an extension to the HSTS protocol) 361 Certificate Pinning Click to edit Master title style • Pinning a service to one or more cryptographic identities for: • Reducing attack surfaces • Maintaining continuity of keys • Performing authentication • TLS can pin the SubjectPublicKeyInfo (SPKI) field in server certificate • Doing this elsewhere in the certificate chain may be more practical …identities such as certificates and public keys – keep track of certificates based on their SHA256 hashes. Reducing attack surfaces – Today, a domain owners authorization is not required for a CA to issue a certificate! A CA can issue for any domain name and that is a huge attack surface. Noe domain owners can “PIN” the Cas that they allow to issue certificates for their domains. They can pick Verisign and GoDaddy or Comodo and Thawte and configure the pins accordingly Continuity of keys – just like with SSH, keys are associated with pinned web servers when visited for the first time then checked on subsequent visits. TOFU –Trust On First Use. This is similar to the way Mozilla Firefox lets you create an Exception for a certificate it can’t verify. Authentication – Can also be used for authentican in the future especially if combined with DNSSEC. 362 Written Security Policies Click to edit Master title style • A written information security policy is the keystone of an Information Security Program • The policy should mirror the organization’s mission, goals, and objectives for security • It is the established management strategy for delivering CIA In order to be useful in providing authority to execute the remainder of the Information Security Program, it must also be formally agreed upon by executive management. This means that, in order to compose an information security policy document, an organization has to have well-defined objectives for security and an agreed-upon management strategy for securing information. 363 Written Security Policies Click to edit Master title style • The first step in writing a security policy is to determine how executive management positions and prioritizes security • It is acceptable to use existing templates, but it should be as customized and targeted as possible 364 365 366 An effective computer security awareness and training program might be a SevenStep program. This 7-Steps will not be on the exam per-se. Approach this process from a common sense real-world approach: Scope of the program: should provide training to all of the types of people who interact with IT systems. Because users need training that relates directly to their use of particular systems, you need to supplement a large organization-wide program with more system-specific programs. New hires should undergo this training within the first 30 days if possible. Staff: It is important that trainers have sufficient knowledge of computer security issues, principles, and techniques. It is also vital that they know how to communicate information and ideas effectively. Target Audience: Not everyone needs the same degree or type of computer security information to do their jobs. A computer security awareness and training program that distinguishes between groups of people, presents only the information that is needed by that particular audience, omitting irrelevant information, to obtain the best results. 367 Motivate management and employees: To successfully implement an awareness and training program, it is important to gain the support of management and employees. Consider using motivational techniques to show management and employees how their participation in a computer security and awareness program benefits the organization. Examine step 5 – Conduct the Program – in detail on the next slide… Maintain the program: The organization should make an effort to keep current with changes in computer technology and security requirements. A training program that meets the needs of an organization today may become ineffective when the organization starts to use a new application or changes its environment, such as by connecting to the Internet. Evaluate the program: An evaluation should attempt to ascertain how much information is retained, to what extent computer security procedures are being followed, and general attitudes toward computer security. 367 Administer the program: Several important considerations for administering the program include visibility, selection of appropriate training methods, topics, materials, and presentation techniques. Visual reminders: login banners, posters, short periodic email reminders, mouse pads, coffee cups, awards for days without a breach (pizza party – casual Friday) 368 Administer the program: Several important considerations for administering the program include visibility, selection of appropriate training methods, topics, materials, and presentation techniques. Visual reminders: login banners, posters, short periodic email reminders, mouse pads, coffee cups, awards for days without a breach (pizza party – casual Friday) 369 Policies Click to edit Master title style • Policies are formal declarations that are produced and reinforced by senior management or a steering committee • They can be directed at the entire organization, select business or organizational unit, department, system, or initiative (i.e. mobility) • The policies should reflect the goals for the information security program and driven by business objectives and risk management 370 Standards Click to edit Master title style • Standards are mandatory activities or rules that underpin the broader formal policies • A challenge of developing standards for an information security program is getting a company-wide consensus on what standards need to be in place • This can be a time-consuming process but is vital to the success of your information security program. • Used to indicate expected user behavior • For example, a consistent company email signature • Might specify what hardware and software is used 371 Guidelines Click to edit Master title style • Guidelines are recommendations to users when specific standards do not apply • Guidelines are designed to streamline certain processes according to what the best practices are. Guidelines, by nature, should open to interpretation and do not need to be followed to the letter • Are more general vs. specific rules • Provide flexibility for unforeseen circumstances • Should NOT be confused with formal policy statements 372 373 Written Security Policies Click to edit Master title style • On the exam remember that the most common section of the written security policy is the AUP • Try to collect as many examples off the web and from expert peers as you can to help you form the best possible policy • It will be a document that should change regularly with new threats, new technology, and new apps – what will be the next TikTok? • Also, keep in mind that security is a continual balance between restriction and productivity • You don’t want a policy that actually thwarts interactivity and efficiency of employees • Morale is important so try to strike a good balance 374 Defining Risk Click to edit Master title style • Risk is defined differently by various organizations and methodologies • Risk is a potential loss, disaster, or other undesirable event measured with probabilities assigned to losses of various magnitudes [long] • It is the possibility that something bad could happen [short] A state of uncertainty where some of the possibilities involve a loss, injury, catastrophe or other undesirable outcome 375 Defining Risk Click to edit Master title style • Inherent risk is the present risk level given the existing set of controls (rather than the hypothetical idea of the absence of any controls) • Residual risk is whatever risk level remains after additional controls are applied • Risk Treatment (Handling): • • • • Acceptance Avoidance Transference Mitigation Inherent risk is current risk level given the existing set of controls rather than the hypothetical notion of an absence of any controls. The flaw with inherent risk is that in most cases, when used in practice, it does not explicitly consider which controls are being included or excluded. Residual risk would then be whatever risk level remain after additional controls are applied. 376 Risk Acceptance Click to edit Master title style • Risk acceptance involves retaining the risk and accepting the loss if it happens • This assumes that you have accounted for the possibility of loss from the risk • This type of risk handling is a viable strategy for small risks, where the cost of controls or insurance would be greater over time than the total sustained losses • Acceptance assumes that the cost of protecting the asset is generally substantially more than the value of the asset 377 Risk Avoidance Click to edit Master title style • Avoidance results in not performing an activity that could carry risk • An example is never using mobile device on the premises • This might seem like the best way to address all risks, but avoiding risk also means losing out on the potential gain that accepting (retaining) the risk might allow • An example is not starting a new partnership to avoid the risk of loss but losing out on potential revenue gained 378 Risk Transference Click to edit Master title style • Transfer or sharing of risk involves distributing the burden of loss or the benefit of gain with another entity • The term "risk transfer" is often used in place of risk sharing, although in practice the transfer of risk to an insurance or outsourcing company may result in loss if the company goes out of business • In most cases, the buyer of insurance generally retains legal responsibility for the losses that are transferred Taking advantage of the shared responsibility model of a cloud service provider is also a way to transfer or share risk. 379 Risk Mitigation Click to edit Master title style • Risk mitigation is also known as risk reduction or optimization • It involves reducing the severity of the loss or the likelihood that the loss will occur • Risk is mitigated at various levels, based on the effectiveness of the control • Most technical controls fall within this category: • Firewalls, NG-IPS, IAM, endpoint detection and response, physical security, and security awareness Risk is mitigated at various levels, based on the effectiveness of the control (difficulty or resistance strength) 380 Top 5 Risks based on Recent Surveys Click to edit Master title style Aon EIU Pro Damage to reputation Weakening demand Disruptive technologies Economic slowdown Market sector instability Internal resistance to change Increased competition Difficulty raising funds Cyber threats Regulatory changes Labor issues Regulatory changes Cyber threats Fluctuating exchange rates Timely identification of handling of risks The Economist Intelligence Unit (EIU) Aon Global Risk Consulting Protiviti 381 Defining Risk Management Click to edit Master title style • Risk management involves identifying, analyzing, and prioritizing risks • This process should be followed up with a coordinated and economically efficient deployment of resources to: • Monitor meaningful metrics • Control the probability of events and incidents • Reduce overall impact 382 Defining Risk Analysis Click to edit Master title style • Risk analysis is the meticulous examination of all risk components • This includes the evaluation of the probabilities (likelihood) of varying likely events and the ultimate consequences (impact) • The primary objective is to inform the efforts of risk management 383 Main Challenges for Risk Management Click to edit Master title style • A lack of consensus on the concept of risk • An unrelenting reliance on subjective human judgment • A reliance on traditional methods with arbitrary rules and values • A general lack of quality control • Accepting various institutional factors 384 Threat Enumeration Click to edit Master title style • Threat enumeration is the process of launching an active connection to various target hosts to ascertain potential attack vectors in the system, service, or application • This information can be used for threat assessment and penetration testing or it could be used maliciously to further exploit the target Enumeration is defined as a process which establishes an active connection to the target hosts to discover potential attack vectors in the system, and the same can be used for further exploitation of the system. 385 Threat Enumeration Click to edit Master title style • Enumeration is used to gather: • • • • • • Hostnames, usernames and group names Network shares and service IP addresses and routing tables Service settings and Audit configurations Application and banners SNMP, DHCP and DNS info • Enumeration can be also be performed on: NetBios, LDAP, NTP, SMTP, Windows, UNIX/Linux, iOS and Android Significance of enumeration: Enumeration is often considered as a critical phase in Penetration testing as the outcome of enumeration can be used directly for exploiting the system. Enumeration classification: Enumeration can be performed on the below. NetBios Enumeration SNMP Enumeration LDAP Enumeration NTP Enumeration SMTP Enumeration DNS Enumeration Windows Enumeration UNIX /Linux Enumeration 386 Threat Matrix Click to edit Master title style From Intel 387 Sample Entity Relationship Diagram (ERD) Click to edit Master title style Mention LucidChart 388 FAIR-based Capability Maturity Model Click to edit Master title style Level 5 – Purely Explicit Level 4 – Mature Explicit Level 3 – Early Explicit Level 2 – Implicit Level 1 – Chaotic 1 – Decision-making is on-the-fly and ad-hoc; based almost completely on experience (if any), instincts and intuition. Poorly defined decision-making authority; inconsistent and not-aligned with C-Suite. Total lack of KGIs, KRIs, and KPIs. 2 – Decision-making driven by strict adherence to standards and policies that may or may not align with expectations and demands from leadership. Superficial and poorly scrutinized information is the most common input. Roles and responsibilities are vague. Most assessments are done qualitatively and are dependent on subjective “expert judgment”, SMEs, or clear bias and agenda. KGIs, KRIs, and KPIs may exist but are basically immaterial from a practical standpoint. Understanding of risk concepts are unreliable or artificial at this maturity level. 3 – Here terminology is becoming standardized with a clear path to an ontology (according to Wikipedia: “In computer science and information science, an ontology is a formal naming and definition of the types, properties, and interrelationships of the entities that really or fundamentally exist for a particular domain of discourse. It is thus a practical application of philosophical ontology, with a taxonomy.”) Decisionmaking is supported by more complete and reliable information. Visibility tools are being used and updated (Dashboards). The beginning of robust and defensible 389 analysis is being performed. C-Suite is performing high-level policy reviews and steering committees are being formed and are productive. A risk register is being compiled and severity scales (qual and quant) are being established. KGIs, KRIs, and KPIs are established. 4 – The quality of the visibility of the risk management program is evident. Data and information is timely. Information is transitioning into real knowledge where aggregate and correlating views of the enterprise risk treatment is quantitatively being decided. The pros and cons are becoming clear. Executives are strategically prioritizing and selecting the proper controls based on a variety of well-established metrics. Here one could see the introduction of data science tools in R programming; machine-learning; and big data analysis. 5 – All decisions are being made completely based on risk appetite using proven quantifiable and visible metrics and analysis. There is a near-complete wisdom into terminology, risk concepts and treatment (residual and inherent risk), visibility, analysis, and authority of decision-making. 389 Risk Assessment & Management Program Click to edit Master title style 1. 2. 3. 4. 5. 6. 7. Purpose and context of program Scope and charter (C-suite must sign) Authority, structure, and reporting Asset identification, classification, and ownership Risk management objectives Select the methodology Choose the implementation team 390 OCTAVE Click to edit Master title style © OCTAVE • OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation) - is one of the best known risk management methodologies. It is a structured approach to evaluating risk that addresses operational risk, security practices and the technology that is used to mitigate the recognized risk. The goal of this approach, compared to others, is that it takes a more strategic approach compared to a tactical one. It not only focuses on the technology but the practices and processes also. This is also a methodology that a company can learn and use in-house instead of requiring security consultants to run this type of program. 391 ISO/IEC 31000:2009 Click to edit Master title style Context Establishment Risk Identification Risk Assessment Risk Analysis Risk Evaluation Risk Treatment ISO 31000:2009 is Risk Management Principles and guidelines. It offers principles, framework and a process for managing risk. It can be used by any organization regardless of its size, activity or sector. Using ISO 31000 can help organizations increase the likelihood of achieving objectives, improve the identification of opportunities and threats and effectively allocate and use resources for risk treatment. It’s meant for people who create and protect value in an organization by managing risks, making decisions, setting and achieving objectives and improving performance. The standard’s revision process discovers the virtues of keeping risk management simple. However, ISO 31000 can’t be used for certification purposes, but does provide guidance for internal or external audit programs. Organizations using it can compare their risk management practices with an internationally recognized benchmark, providing sound principles for effective management and corporate governance. Context example: Brio is introducing a CASB SaaS initiative for all of our customers who use Office 365 and Workday. We will recommend a third-party company like Cloudlock or Forcepoint – as opposed to Microsoft’s own CASB solution which at this point in time isn’t mature enough for our standards. 392 Risk Identification: This simply what can happen, when, where, how & why. It is combining gap analysis and vulnerability assessment. Involves identifying key processes, tasks, activities and recognizing risk areas due to lack of adequate controls. You will define, categorize, and prioritize risks of all types. Analyzing risk involves processes to identify controls, determine likelihood, determine consequence/impact, and determine levels of risk using meaningful metrics and calibrated estimates. Risk Evaluation activities include: Compare against criteria. Identify & assess options. Decide on response. Establish priorities. A Risk Treatment Plan (RTP) is used to identify each information asset flagged in the Risk Assessment report that has an unacceptable level of risk and will state the method of treatment intended to handle or treat that risk. . 392 Translating Risk into Business Terms Click to edit Master title style • Business dependency assessment is the process of identifying resources vital to the successful operation of business • Translating risk into simpler results for the non-technical business executives and stakeholders • Use a variety of graphical tools to simplify and communicate findings of risk assessment and analysis • SIEM Dashboards preferable to charts • If charting use: bar and bullet graphs, dot and scatterplots, boxplots, spatial and heat maps 393 Dashboards Click to edit Master title style Courtesy: Security Wizardry 394 Translating Risk into Business Terms Click to edit Master title style • Total Cost of Ownership (TCO) • The original cost plus maintenance, upgrades (HW/SW), support, training, impact on user productivity • Return on Investment (ROI) • The operating performance and efficiency by dividing net income by total investment over a certain timeframe • Return on Security Investment (ROSI) • The results of added controls to increase resistance or difficulty 395 Defining an Event Click to edit Master title style • An event is a recognized occurrence in the state of data, network, application, or system • A web server crashes • Unauthorized access is attempted • Cryptojacking indications of compromise at you cloud service provider account Risk Treatment (Handling): • An event can be benign or destructive and is usually discovered by monitoring or logging activities 396 Defining an Incident Click to edit Master title style • An incident is an established negative occurrence that affects the state of data, network, application, or system • An incident can cause damage or loss either directly (primary) or indirectly (secondary) • All incidents are made up of events , but not all events are categorized as incidents 397 Incident Handling Click to edit Master title style • The first responders to an occurrence must skillfully determine what is an event and what is considered an incident • Events that are not incidents will be dealt with by change, configuration, and problem management • Incidents are managed by incident handlers and/or incident response teams (IRT or CSIRT) 398 E-discovery Click to edit Master title style • State-of-the-art technology that has appeared to lower the risk and costs associated with big data • Used especially in litigation and corporate/government investigations • The e-discovery process includes three phases: 1. 2. 3. Identifying and collecting documents Sorting through data by relevance Creating production sets 399 E-discovery Click to edit Master title style Electronic Discovery Reference Model Processing Preservation Information Governance Identification Review Production Presentation Collection Analysis 400 Six Step Incident Handling Lifecycle Click to edit Master title style 1 Preparation 6 Lessons Learned 2 Identification Incident Handling Lifecycle 3 Containment 5 Recovery 4 Eradication 401 1. Preparation Click to edit Master title style • Establishing processes for quantified incidents before one occurs • Gathering information from all available sources and experts • Should be a section in the written security policy • Involve executive management and other key stakeholders across multiple roles and departments 402 1. Preparation Click to edit Master title style • • • • • • • • • Dedicated IRT or swarm First responders C-team point of contact Budgetary concerns Relationship to business continuity Gather toolkits and jump bags Establish procedures and checklists Testing, drills, and exercises Continual improvement training 403 2. Identification Click to edit Master title style • Know all methods for being alerted to an event – then determine if it is an incident • Rely on the first responders and primary handlers • Classify and categorize incident as quickly and as accurately as possible • These skills provide the glue between preparation and containment 404 3. Containment Click to edit Master title style • Stabilize the situation • Remove systems from the network • Do not power down • Secure the area • Physical containment • Virtual containment • For multiple incidents use a triage approach • Remain steady and calm • Decide to bring in third-parties • Forensic teams • Law enforcement • Security consultants (insurance company teams) 405 3. Containment Click to edit Master title style • Be prepared to use forensic methods and tools if necessary and you have in-house expertise • • • • • • Perform extraction of data using write-blockers Hash all volumes, drives, and memory images Package and label physical evidence Take videos and photos Maintain chain of custody Fully document all activities 406 4. Eradication Click to edit Master title style • • • • • • Solve the problem or remove the threat Determine the root cause Identify IoC’s, backdoors, and remnant artifacts Conduct vulnerability scanning and assessment Introduce additional controls for improved defense Return systems and applications to a production state 407 5. Recovery Click to edit Master title style • Eradication and recovery are often combined in to one phase • Involves using restoration from backups and snapshots • Returning to a known validated state by installing and updating systems and data • May involve disaster recovery procedures if the incident qualifies as a catastrophic event 408 6. Lessons Learned Click to edit Master title style • The knowledge gained from the process of performing incident response • It is often included in both an After-Action Report (AAR) and the Risk Register (ledger) • Formal "lessons learned" sessions are usually held by the team after recovery phase • These lessons can and should be recognized and documented at all point during the life cycle Remember that these lessons can and should be recognized and documented at all point during the life cycle 409 6. Lessons Learned Click to edit Master title style • The purpose of lessons learned is: • • • • To share and use knowledge derived from an experience To sanction the recurrence of positive outcomes To prevent the reappearance of negative outcomes To provide input for improving the initial preparation phase Remember that these lessons can and should be recognized and documented at all point during the life cycle 410 Business Continuity Planning (BCP) Click to edit Master title style • Business continuity planning involves creating an actionable continuity solution to prepare for the impact of a broad range of threats including natural disasters, disease outbreaks, accidents and terrorism • Business continuity planning can assist with technology-related hazards like the failure of systems, equipment or software • BCP consists of the following: • • Business Impact Analysis (BIA) • Backups and Restoration • Disaster Recovery Planning (DRP) (optionally incident response teams) PlanBcp is a Team-Based Disaster Recovery and Business Continuity Planning App made for Office 365 SharePoint Online 411 Business Impact Analysis (BIA) Click to edit Master title style • BIA is an analysis of an information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption • The BIA is a key step in implementing the Continuity Planning controls in NIST SP 800-53 and in the contingency planning process overall 412 Business Impact Analysis (BIA) Click to edit Master title style 1. Determine mission/business processes and recovery criticality • Mission/business processes supported by the system are identified and the impact of a system disruption to those processes is determined along with outage impacts and estimated downtime 2. Identify resource requirements • Realistic recovery efforts require a thorough evaluation of the resources required to resume mission/business processes and related interdependencies as quickly as possible 3. Identify recovery priorities for system resources • Based on the results from the previous activities, system resources can be linked more clearly to critical mission/business processes and functions The downtime should reflect the maximum time that an organization can tolerate while still maintaining the mission. 413 Disaster Recovery Planning (DRP) Click to edit Master title style • • • • • The DRP applies to major (usually physical) disruptions to service that deny access to the primary facility infrastructure for a period A DRP is an information system-focused plan designed to restore operability of the target system, application, or computer facility infrastructure at an alternate site after an emergency The DRP may be supported by information system contingency plans to address recovery of impacted individual systems once the alternate facility has been established A DRP may support an existing BCP by recovering supporting systems for mission/business processes or essential functions at an alternate location The DRP only addresses information system disruptions that require relocation to a cold, warm, hot, mobile, or cloud site The downtime should reflect the maximum time that an organization can tolerate while still maintaining the mission. 414 General Tools to Know for the GSEC Exam Click to edit Master title style • • • • • • • • Windows Process Hacker SECEDIT.EXE Nessus Nmap Wireshark tcpdump John the Ripper Cain and Abel • • • • • • • • Kismet and aircrack.ng Snort Hping3 Image Steganography Pretty Good Privacy (PGP) GNU Privacy Guard (GPG) Hashing and file integrity tools PowerShell ISE basics 415 Windows Admin Concepts to Know Click to edit Master title style • • What is a SID (example: local administrator group is S-1-5-32-544) A Security Access Token (SAT) contains SID of user account, all groups, and a list of your privileges • Permissions: NTFS is default file system, shared folders (Example: Full Control, Change, and Read are Share permission) • • • • NTFS DACLs are ALWAYS enforced Deny ALWAYS overrides Allow Kerberos is default authentication mechanism in Active Directory environments and uses a Ticket Granting Service Multi-master replication – if a conflict then the later change overrides the previous change 416 Windows Admin Concepts to Know Click to edit Master title style • • • • • • • • REGEDIT.EXE = Key > Value > Value Type> Value Data AGULP = Accounts > Global Groups > Universal Groups > Local Groups > Permissions and Rights Permission is always attached to an object vs. Rights (privileges) which are general capabilities Administrator may have to take ownership from another user who owns an object Workgroups vs. Domains Define forests and cross-forest trusts models How Group Policy Objects operate (Local GPO security Settings vs. Domain GPO’s) Security Configuration and Analysis (SCA) Snap-in and Security Templates • SECEDIT.EXE is command-line version of SCA – but can’t apply template over networks 417 Windows Admin Concepts to Know Click to edit Master title style • Servicing Channels (Semi-Annual, Windows Insider, Long-Term Channel) • • Widows Server Update Services (WSUS) • • • • • • • Home edition users can defer quality (not feature) updates for up to 35 days A single server can handle more than 10,000 client systems WSUS can be managed with PowerShell and logs to a local SQL Server database WSUS is free but you still must purchase the Server and client CAL licenses AppLocker and BitLocker User Account Control (UAC) Common ports use by Windows (i.e. RDP 3389, DNS 53, SQL 1433/1434, NetBIOS) Be familiar with the Process Hacker tool from processhacker.sourceforge.net 418 Windows Admin Concepts to Know Click to edit Master title style • • • • • Kerberos ticket authentication BitLocker drive encryption and TPM Windows Remote Assistance and RDP Password policies Microsoft Azure • Office 365 uses Azure Active Directory 419 Linux Admin Concepts to Know Click to edit Master title style • • • • • • • Linux filesystem basics and mounting disk partitions *nix file permissions chmod, chown, chgrp Escalate privileges with sudo Shadow file Systemd and Cron Sysctl hardening and /etc/sysctl.conf file • • Modprobe SELinux adds multi-level mandatory access control (MAC) security • net.ipv4.conf.all.accept_source_route=0 420 Linux Admin Concepts to Know • Click to edit Master title style Linux logging • • • • • • Commands to know • • • • • using the “last” and “utmpdump” commands Files = utmp, wtmp, dmesg, messages Syslog-NG and Rsyslogd Logrotate Auditd Ls –l Netstat, top, tail Ps –ef | grep syslog Iptables, Bastille, CIS Hardening Guides Advanced Packaging Tool: apt-get 421