Network Vulnerability Scanning - Texas Tech University Departments

advertisement
Network Vulnerability Scanning
Xiaozhen Xue
Akbar Siami Namin
Dept. of Computer Science
Texas Tech University, USA
xiaozhen.xue@ttu.edu
Dept. of Computer Science
Texas Tech University, USA
akbar.namin@ttu.edu
Summer Cyber-Security Workshop, Lubbock, July 2014
Need for Vulnerability Management
– Vulnerabilities on a network
are GOLD to cyber criminals:
• Provide unauthorized entry to
networks
• Can expose confidential
information, fuel stolen identities,
violate privacy laws, or paralyse
operations
• Exposure is extreme for networks
with vulnerable devices
connected by IP
Sources of Vulnerabilities
 Programming errors
 Unintentional mistakes or
intentional malware in General
Public License software
 Improper system configurations
 Mobile users sidestepping
perimeter security controls
 Rising attacks through viewing
popular websites
Summer Cyber-Security Workshop, Lubbock, July 2014
Need for Vulnerability Management
– Despite utilization of basic
defenses, network security
breaches abound
• TJX exposed 46M records
• DSW exposed 1.4M records
• CardSystems exposed 40M
records
• 215M+ reported record
exposures since 2005
(actual is significantly higher)
– Automation is Crucial
• Manual detection and
remediation workflow is too slow,
too expensive and ineffective
Attack Trends
 Increased professionalism and
commercialization of malicious
activities
 Threats that are increasingly
tailored for specific regions
 Increasing numbers of
multistaged attacks
 Attackers targeting victims by
first exploiting trusted entities
 Shift from “Hacking for Fame”
to “Hacking for Fortune”
Summer Cyber-Security Workshop, Lubbock, July 2014
Need for Vulnerability Management
– Did we learn our lessons?
• Most vulnerabilities are long
known before exploited
• Successful exploitation of
vulnerabilities can cause
substantial damage and
financial loss
• A few vulnerable systems can
disrupt the whole network
• System misconfiguration can
make systems vulnerable
Challenges IT Security Face
 NOT enough TIME, PEOPLE,
BUDGET
 Prioritization of efforts for
minimize business risks and
protecting critical assets. We
can’t fix all problems - what can
we live with?
 Adapting to accelerating
change in sophistication of
attacks.
Summer Cyber-Security Workshop, Lubbock, July 2014
Vulnerability Management
Vulnerability Scanning
1. DISCOVERY
(Mapping)
6. VERIFICATION
(Rescanning)
2. ASSET
PRIORITISATION
(and allocation)
5. REMEDIATION
(Treating Risks)
3. ASSESSMENT
(Scanning)
4. REPORTING
(Technical and
Executive)
Summer Cyber-Security Workshop, Lubbock, July 2014
Mapping
Vulnerability Scanning
– Mapping
• Gives hacker’s eye view of you
network
• Enables the detection of rogue
devices
Summer Cyber-Security Workshop, Lubbock, July 2014
Prioritisation
Vulnerability Scanning
– Asset Prioritisation
• Some assets are more critical to
business than others
• Criticality depends of business
impact
Summer Cyber-Security Workshop, Lubbock, July 2014
Vulnerability Scanning
– Scanning:
• takes an “outside-in” and “inside-in”
approach to security, emulating the
attack route of a hacker
• tests effectiveness of security policy
and controls by examining network
infrastructure for vulnerabilities
Summer Cyber-Security Workshop, Lubbock, July 2014
Vulnerability scanners
Vulnerability Scanning
• Vulnerability scanners are automated tools
that scan hosts and networks for known
vulnerabilities and weaknesses
Summer Cyber-Security Workshop, Lubbock, July 2014
How Vulnerability Scanners Work
Vulnerability Scanning
GUI
Vulnerability
Database
Scanning
Engine
Target 1
Target 2
Target 3
Knowled
ge Base
Target 4
Results
Summer Cyber-Security Workshop, Lubbock, July 2014
Vulnerability scanners
Vulnerability Scanning
• Similar to virus scanning software:
– Contain a database of vulnerability signatures that
the tool searches for on a target system
– Cannot find vulnerabilities not in the database
•New vulnerabilities are discovered often
•Vulnerability database must be updated regularly
Summer Cyber-Security Workshop, Lubbock, July 2014
Typical Vulnerabilities Checked
Vulnerability Scanning
• Network vulnerabilities
• Host-based (OS) vulnerabilities
– Misconfigured file permissions
– Open services
– Missing patches
– Vulnerabilities in commonly exploited applications
(e.g. Web, DNS, and mail servers)
Summer Cyber-Security Workshop, Lubbock, July 2014
Vulnerability Scanners - Benefits
Vulnerability Scanning
• Very good at checking for hundreds (or
thousands) of potential problems quickly
– Automated
– Regularly
• May catch mistakes/oversights by the system
or network administrator
• Defense in depth
Summer Cyber-Security Workshop, Lubbock, July 2014
Vulnerability Scanners - Drawbacks
Vulnerability Scanning
•
•
•
•
•
Report “potential” vulnerabilities
Only as good as the vulnerability database
Can cause complacency
Cannot match the skill of a talented attacker
Can cause self-inflicted wounds
Summer Cyber-Security Workshop, Lubbock, July 2014
Vulnerability Scanners tools
Port scanner (Nmap, Nessus)
Network enumerator
Network vulnerability scanner (BoomScan)
Web application security scanner
Database security scanner
Host based vulnerability scanner (Lynis, ovaldi, SecPod Saner)
ERP security scanner
Computer worm
Summary
Vulnerability Scanning
• Vulnerability scanners are automated tools that scan
hosts and networks for known vulnerabilities and
weaknesses
• Used by defenders to automatically check for many
known problems
• Used by attackers to prepare for and plan attacks
Summer Cyber-Security Workshop, Lubbock, July 2014
Vulnerability Scanners tools
comprehensive vulnerability scanner which is developed by Tenable
Network Security.
Vulnerability Scanners tools
Port scanner (Nmap)
Qualys
https://freescan.qualys.com/freescan-front/
Summer Cyber-Security Workshop, Lubbock, July 2014
Qualys
http://lhs.lubbockisd.org
Summer Cyber-Security Workshop, Lubbock, July 2014
Download