CIW 강사를 위한 Security 특강

advertisement
CIW 강사를 위한 Security 특강
이화여자대학교 컴퓨터학과
용 환승
http://dblab.ewha.ac.kr/hsyong
Before Starting (1/2)
• UNIX and Open System
–
–
–
–
No restriction, Open Source code policy
For Developer’s Workbench
TCP/IP based Internetworking
편리한 사용에 치중, Simple, Fast
• Finger, rwho 등 다양한 기능
• 그러나 해커의 등장으로 서비스 및 기능을 폐쇄
– Default UNIX의 기능을 체크하고 서비스를 close하는 것이 security
package등의 주요 기능
– Tradeoff between Open System and Security
2001-7-30
CIW Security by H.S.Yong
2
Before Starting (2/2)
• 그러나 이제는 security가 중요, 그러나 완벽한 보안은
불가능
– 수천만라인의 코드가 완벽함을 어떻게 알 수 있는가?
• Debugging time이 개발 시간보다 더 소요
– 중국의 정확한 인구 맞추기와 유사
• 우리나라는
– 시스템 admin의 기본 기능
– 보안 기능은 우선순위에서 뒷전
• 정보기관의 보안:
– No E-Mail, No floppy drive. (하드를 떼어가면?)
– 물리적으로 인터넷으로 부터 차단 (100% 보호)
2001-7-30
CIW Security by H.S.Yong
3
Overview
• Network Security and Firewall (2일)
– 보안의 기초적인 내용과 방화벽
• Operating System Security(1일)
– 운영체제에서 제공하는 보안기능
– TCP Wrapper 등
• 모든 TCP/IP 트래픽을 로깅 및 차단 제어 기능
• 특정 IP 에서만 telnet 허용 등 규칙 설정
– Keylogger (422쪽)
• 모든 키 입력을 기록, 메일로 발송
• 관리자도 필요한 기능. (직원 감시 등)
• Security Auditing, Attacks, and Threat Analysis (2일)
– 4시간으로 중요한 것만 발췌
2001-7-30
CIW Security by H.S.Yong
4
강의 계획
• 각 교시별 30분 강의 및 20분 실습
• 1교시
– 1장 개론, 2장 탐지방법 강의 실습(Sniffer Basic, Ping ProPack,
Nmap)
• 2교시
– 3장 Attacking(Hacking) 방법 강의 및 실습(synful, smurf, targa,
nat)
• 3교시
– 4장 Security Auditing 및 control 강의 및 실습(Netbus)
– 5장 IDS(Intrusion Detection System) 강의 및 실습(eTrust)
• 4교시
– 6장 감사 및 로그분석(last 명령)
– 7장 감사결과 및 적극탐지 강의 및 실습(neped, tcpdump)
2001-7-30
CIW Security by H.S.Yong
5
Lesson 1:
Security Auditing
Objectives
•
•
•
•
•
Identify a security auditor’s chief duties
List security auditing principles
Assess risk factor for a network
Describe the security auditing process
Plan an audit
2001-7-30
CIW Security by H.S.Yong
7
What Is an Auditor?
• Network security
• Risk assessment
2001-7-30
CIW Security by H.S.Yong
8
What Does
an Auditor Do?
Compliance
Risk Analysis
2001-7-30
CIW Security by H.S.Yong
9
Auditor Roles
and Perspectives
• Auditor as security manager
• Auditor as consultant
• Insider threats
2001-7-30
CIW Security by H.S.Yong
10
Conducting a
Risk Assessment
•
•
•
•
•
Check for a written security policy
Analyze, categorize and prioritize resources
Consider business concerns
Evaluate existing perimeter and internal security
Use existing management and control architecture
2001-7-30
CIW Security by H.S.Yong
11
Risk Assessment Stages
• Discovery
• Penetration
• Control
2001-7-30
CIW Security by H.S.Yong
12
Summary





Identify a security auditor’s chief duties
List security auditing principles
Assess risk factor for a network
Describe the security auditing process
Plan an audit
2001-7-30
CIW Security by H.S.Yong
13
Lesson 2:
Discovery Methods
Objectives
• Describe the discovery process
• Identify specific discovery methods
• Install and configure network-based and host-based
discovery software
• Conduct network-level and host-level security scans
• Configure and deploy enterprise-grade network
vulnerability scanners
2001-7-30
CIW Security by H.S.Yong
15
Security Scans
•
•
•
•
• Network-discovery and serverdiscovery applications
• NMAP(Network Mapper)
The whois service
nslookup
The host command
The traceroute (tracert)
command
• Ping scanning
– 특정 TCP/IP 구현 정보를 이
용하여 OS 파악
– Stack fingerprinting
– 전체 IP주소 Range로 파악
• Port scans
2001-7-30
• Share scans
– Directory 공유 구조 파악
• Default configuration and
patch-level scans
• Using Telnet
CIW Security by H.S.Yong
16
탐지 방법
• Using SNMP(Network management Protocol)
– SNMP software
– 기본 설정값과 암호를 그대로 사용하는 데 따르는 보안의 취
약성
• Telnet을 이용한 웹 서버의 버전 파악
– % telnet 서버 80
• Tftp(Trivial File Transfer Protocol)
– Diskless Workstation의 Remote booting
– X terminal 등 login process없이 ftp하도록 지원
– Default가 잘못 세팅된 OS도 많아서 취약
2001-7-30
CIW Security by H.S.Yong
17
TCP/IP
Services
• Finger
–
–
–
–
–
User names
Server names
E-mail accounts
User connectivity
User logon status
2001-7-30
CIW Security by H.S.Yong
18
Enterprise-grade
Auditing Applications
•
•
•
•
•
Protocol support
Network scanners
Subnetting
Configuring network scanners
Configuring host scanners
2001-7-30
CIW Security by H.S.Yong
19
Scan Levels
•
•
•
•
•
•
•
Profiles and policies
Reporting
NetRecon
CyberCop Scanner
Security Analyzer
ISS scanning products
Additional scanning application vendors
2001-7-30
CIW Security by H.S.Yong
20
Social Engineering
• Telephone calls
• Fraudulent e-mail
• Education
2001-7-30
CIW Security by H.S.Yong
21
What Information
Can You Obtain?
•
•
•
•
Network-level information
Host-level information
Research
Legitimate versus illegitimate network tools
2001-7-30
CIW Security by H.S.Yong
22
Summary
 Describe the discovery process
 Identify specific discovery methods
 Install and configure network-based and host-based
discovery software
 Conduct network-level and host-level security scans
 Configure and deploy enterprise-grade network
vulnerability scanners
2001-7-30
CIW Security by H.S.Yong
23
2장 탐지 방법
• 침투할 대상 시스템 파악
• 웹주소로 부터 출발가능
–
–
–
–
–
서버들의 이름 및 IP 주소
각 서버들의 port 서비스 현황
모든 네트워크 패킷을 검사, 암호 등 탐지
네트워크 현황 파악
원격 제어
• Ping ProPack - Throughput, Port, Info, 등 기타 기능 시
험
• Sniffer Basic(NetXRay)
• Nmap
2001-7-30
CIW Security by H.S.Yong
24
Lesson 3:
Auditing Server Penetration and Attack
Techniques
Objectives
• Identify common targets
• Discuss penetration strategies and methods
• List potential physical, operating system, and TCP/IP stack
attacks
• Identify and analyze specific brute-force, social
engineering, and denial-of-service attacks
• Implement methods designed to thwart penetration
2001-7-30
CIW Security by H.S.Yong
26
Attack Signatures
and Auditing
• Reviewing common attacks
– Dictionary: 암호를 사전을 가지고 추정
– Man in the middle: Sniffing을 통해 암호 중간에서 탈취
– Hijacking: 두 접속 사이에서 한 참여자를 배제하고 중간에 접
속을 대체
– Viruses: 다양한 종류 등장, 기업 비밀을 유출
• 문서에 첨부된 바이러스
• 메일 바이러스(?): 바이러스 조심하라는 메일 바이러스
– Illicit servers: 불법 서버 프로세스를 동작
– Denial of service: 패킷 공격으로 서비스 중단
• 침투하지 않고 서비스 정지를 시키는 방법
2001-7-30
CIW Security by H.S.Yong
27
Common Targets
•
•
•
•
Routers
FTP servers
Databases
Web servers: 웹 graffiti로 웹 사이트에 다른 내용 게시
– CIA(Central Idiot Agency) 등
• DNS
– False DNS entry 추가: DNS “poisoning”
• WINS: Microsoft Windows Internet Name Service
• SMB(server message block) services
– client server, request-response protocol
– Windows SMB, Unix Samba
2001-7-30
CIW Security by H.S.Yong
28
Auditing Trap Doors
and Root Kits
• Auditing bugs and back doors
• 사용 시스템이 갖는 취약성 목록 파악 중요
– CERT 센터(www.cert.org)
2001-7-30
CIW Security by H.S.Yong
29
Buffer Overflow
• Preventing denial-of-service attacks
• Auditing illicit servers, Trojans and worms
2001-7-30
CIW Security by H.S.Yong
30
Combining Attack Strategies
• Penetration strategies
–
–
–
–
Physical
Operating system: OS의 설치 등에 관련된 문제이용
Bad password policies: FTP로 로그인 관리하면 암호 유출 가능
NAT(NetBIOS Auditing Tool)
• 취약한 암호 검사 도구
• ID 리스트와, 암호 리스트를 이용 공격 체크
– Bad system policies
– Auditing file system weaknesses
• IP spoofing and hijacking
– Blind and non-blind spoofing
2001-7-30
CIW Security by H.S.Yong
31
The TCP/IP Stack의 문제를 이용한 공격
•
•
•
•
•
SYN flood
Smurf and Fraggle attacks
Teardrop/Teardrop2
Ping of death
Land attack
2001-7-30
CIW Security by H.S.Yong
32
Summary
 Identify common targets
 Discuss penetration strategies and methods
 List potential physical, operating system, and TCP/IP stack
attacks
 Identify and analyze specific brute-force, social
engineering, and denial-of-service attacks
 Implement methods designed to thwart penetration
2001-7-30
CIW Security by H.S.Yong
33
3장 서버 침입과 공격 기술
• 연습문제 3-1, Linux Synflood 공격
– Synful.c
– 두 명의 팀
– Linux: Synful 공격, 윈도우 NT로 connection 조회
• 연습문제 3-2 Smurf 공격: Denial of Service
–
–
–
–
Papasmurf.c
Smurf는 ICMP를, fraggle은 UDP를 사용
그림 3.3(631쪽) 참조
연습 3-1의 경우와 동일, 두 명이 한 팀으로 공격과 상태 관찰
• 연습문제 3-3, Land, Teardrop 공격 실습
– Targa2.c 사용
• NAT 실습(627쪽)
2001-7-30
CIW Security by H.S.Yong
34
Lesson 4:
Security Auditing
and the Control Phase
Objectives
• Define control procedures
• Identify control methods
• List ways to document control procedures and methods
2001-7-30
CIW Security by H.S.Yong
36
Control Phases
• Gaining root access
• Obtaining information
2001-7-30
CIW Security by H.S.Yong
37
UNIX Password File Locations
•
•
•
•
•
•
The shadow password file
Redirect information
Create new access points
Erase evidence of penetration
Spread to other systems
Port redirection
2001-7-30
CIW Security by H.S.Yong
38
Control Methods
•
•
•
•
System defaults
Services, daemons, and loadable modules
Illicit services, daemons, and loadable modules
Keyloggers
2001-7-30
CIW Security by H.S.Yong
39
Auditing and
the Control Phase
• The auditor never truly enters the control phase
– 해커와 차이점
• The auditor must recognize suspicious traffic
• 감사자는 자신이 감사를 위해 침투했다는 것을 증빙할
필요가 있음
– 각종 사용 소프트웨어의 출력 자료
– 감사자 활동 증빙 시스템 로그 파일
– 침투한 자원에 대한 스크린 셧 등
2001-7-30
CIW Security by H.S.Yong
40
NetBus 기능
•
•
•
•
•
•
•
응용 시작 및 재부팅
사용자 로그오프
웹브라우저 제어 (특정 URL로)
키입력을 다른 응용으로 전송
파일 업/다운 로드
패스워드 관리
시스템 윈도우/registry 등 관리
2001-7-30
CIW Security by H.S.Yong
41
4장 보안 감사 및 제어
• 원격 관리 및 정보 탐지
• NetBus 실습 (Windows NT 용)
–
–
–
–
서버와 CLIENT 설치 및 실습
TELNET 설정 및 실습
HTTP 설정 및 실습
SERVER의 기타 기능
• File Manager
• Cool Function (CD-ROM, Keystroke 제어, URL 등)
• 연습문제 4-3, 4-4, 4-5, 4-6 등
2001-7-30
CIW Security by H.S.Yong
42
Lesson 5:
Intrusion Detection
Objectives
• Define intrusion detection
• Differentiate between intrusion detection and automated
scanning
– Scanning은 미리 알려진 결함만을 찾음
– IDS는 모든 트래픽을 감시, 제어
• List the elements used in an intrusion-detection system
• Implement intrusion-detection software
2001-7-30
CIW Security by H.S.Yong
44
What Is
Intrusion Detection?
• Capabilities
– Network traffic management
– System scanning, jails, and the IDS
– Tracing(중요)
• Is intrusion detection necessary?
– 내부 해킹의 증대
– 방화벽 내부의 보안도 중요
– 방화벽의 보안 불완전
• IDS concerns: IDS가 주요 해커의 공격 대상
2001-7-30
CIW Security by H.S.Yong
45
Intrusion Detection
Architecture
• Network-based IDS
– 호스트에 설치하는 것으로 간단
– 모든 서브넷의 네트워크 트래픽 감시
– 복잡한 네트워크에 부적합
• Host-based IDS
– 하나의 관리자(Manager)와 여러 에이전트(agent)로 구성
– Manager-to-agent ratio: 50개 또는 100개로 제한
– Agents
• 네트워크 모니터역할
• Promiscuous mode 로 동작
– Optimal agent placement(중요 호스트에 설치)
– Auditing manager-to-agent communication
2001-7-30
CIW Security by H.S.Yong
46
IDS Rules
• Network anomalies
– NetBus, Smurf 공격 등을 탐지
• Network misuses
– 웹 서핑, 게임 등 사용 방지
• Actions
– 보호 호스트 범위 지정
– 시간 주기
– 차단, 통지 등 제반 기능
• False positives and IDS configuration
– 과잉 탐지 문제 발생 가능(정상을 이상하다고 보고)
– 규칙을 잘 제정해야 함.
2001-7-30
CIW Security by H.S.Yong
47
Intrusion Detection
Software
•
•
•
•
•
•
•
Computer Associates eTrust Intrusion Detection
Axent Intruder Alert
Cisco NetRanger
ISS RealSecure
Computer Misuse Detection System
Network Flight Recorder
Network Associates CyberCop Monitor
2001-7-30
CIW Security by H.S.Yong
48
Purchasing an IDS
•
•
•
•
Product support
Product training
Update policy
Company reputation
2001-7-30
•
•
•
•
IDS capacity
Product scalability
Network support
Encryption
CIW Security by H.S.Yong
49
Summary
 Define intrusion detection
 Differentiate between intrusion detection and automated
scanning
 List the elements used in an intrusion-detection system
 Implement intrusion-detection software
2001-7-30
CIW Security by H.S.Yong
50
5장 Intrusion Detection
• eTrust Intrusion Detection 실습: 연습문제 5-1부터 5-5까지
• 주요 기능
– See your users WEB usage
- See where they are going
- See what they are doing
- Generate easy-to-read management and detail reports
– View Web, Telnet, FTP, POP traffic activity
– View all E-mail messages (message content masked)
– Blocking
– View and terminate inappropriate active sessions
– Send message, e-mail and fax alert messages (limits user e-mail
notification)
– Receive notifications of:
- Non-productive URL access
- Predefined intrusions and suspicious network activity
- Malicious Java and ActiveX applets
- Viruses entering the network
2001-7-30
CIW Security by H.S.Yong
51
Lesson 6:
Auditing and
Log Analysis
Objectives
•
•
•
•
Establish a baseline for your users’ activities
Conduct log analysis
Filter events found in NT and Linux systems
Establish auditing for logins, system restarts, and specific
resource use
2001-7-30
CIW Security by H.S.Yong
53
Baseline Creation and Firewall and Router
Logs
• Baseline is standard activity for a network
– Baseline에 벗어나는 것을 즉시 파악
• Logs help determine activity patterns of users
– 트래픽 패턴 추출
– 사용량의 최대/최소 패턴 변화 추출
2001-7-30
CIW Security by H.S.Yong
54
Operating
System Logs
• Logging UNIX systems
• Logging NT systems
2001-7-30
CIW Security by H.S.Yong
55
Filtering Logs
• Filtering logs in Windows NT
• Filtering logs in Linux
• Operating system add-ons and third-party logging
2001-7-30
CIW Security by H.S.Yong
56
Suspicious Activity
• Skilled hacking attempts to camouflage its use as
legitimate system activity
– 새벽 1시에 로그인 시도
– 주 서버가 아침 일찍 재부팅
– 하루 중 시스템에 가끔 둔화현상 발생
2001-7-30
CIW Security by H.S.Yong
57
Additional Logs
•
•
•
•
Intrusion detection systems
Telephony connections
ISDN and/or frame relay connections
Employee access logs
2001-7-30
CIW Security by H.S.Yong
58
Log Storage
• Sending logs to a different machine for storage
• Replicating logs to a writable CD-ROM drive
• Scheduling hard-copy backups
2001-7-30
CIW Security by H.S.Yong
59
Auditing and
Performance Degradation
• 감사로 인한 성능 저하 문제 고려 필요
• Network traffic
• Packet sniffers
2001-7-30
CIW Security by H.S.Yong
60
Summary




Establish a baseline for your users’ activities
Conduct log analysis
Filter events found in NT and Linux systems
Establish auditing for logins, system restarts, and specific
resource use
2001-7-30
CIW Security by H.S.Yong
61
6장 감사 및 로그 분석
• 741쪽, Linux Log filtering
– Last
– Lastlog
– Lastb
• 연습문제 6-3 Linux 감사도구 사용하기
– Last, lastlog
– Cat /var/log/secure | grep telnet
– Lastb
2001-7-30
CIW Security by H.S.Yong
62
Lesson 7:
Audit Results
Objectives
•
•
•
•
Recommend solutions based on specific network problems
Suggest ways to improve compliance to a security policy
Create an assessment report
Enable proactive detection services
2001-7-30
CIW Security by H.S.Yong
64
Objectives (cont’d)
•
•
•
•
Cleanse operating systems
Install operating system add-ons
Implement native auditing
Use SSH as a replacement for Telnet, rlogin, and rsh
2001-7-30
CIW Security by H.S.Yong
65
Auditing
Recommendations
• Recommending specific ways to continue or implement
efficient auditing
• Confronting and correcting virus, worm and Trojan
infections
• Recommending changes and improvements
2001-7-30
CIW Security by H.S.Yong
66
Network Auditing
Categories
2001-7-30
Firewalls
and Routers
Host and
Personal
Security
Intrusion
Detection
and
Traceback
Policy
Enforcement
CIW Security by H.S.Yong
67
Creating the
Assessment Report
• Sample audit report elements include:
–
–
–
–
–
–
–
Overview of existing security
Estimates of time hackers require to enter system
Summary of important recommendations
Outline of audit procedures
Network element recommendations
Physical security discussion
Terms
2001-7-30
CIW Security by H.S.Yong
68
Improving Compliance
• Steps for continued auditing and strengthening
2001-7-30
CIW Security by H.S.Yong
69
Security Auditing
and Security Standards
•
•
•
•
ISO 7498-2
British Standard (BS) 7799
Common Criteria (CC)
Evaluation Assurance Levels
2001-7-30
CIW Security by H.S.Yong
70
Improving
Router Security
• 물리적 접근 제한
• Ingress and egress filtering
– 통신 패킷에 대한 필터링
– 지정된 IP의 패킷만 통과
• Disable broadcast filtering
2001-7-30
CIW Security by H.S.Yong
71
Enabling
Proactive Detection
• Scan detection, honey pots and jails
– Detecting a NIC in promiscuous mode
2001-7-30
CIW Security by H.S.Yong
72
Host Auditing
Solutions
•
•
•
•
•
•
Cleaning up infections
Personal firewall software
IPSec and personal encryption
Native auditing services
Fixing system bugs
IPv6
2001-7-30
CIW Security by H.S.Yong
73
Secure Shell (SSH)
•
•
•
•
•
•
Security services provided by SSH
Encryption and authentication in SSH
SSH2 components
Preparing SSH components
SSH and DNS
SSH and authentication
2001-7-30
CIW Security by H.S.Yong
74
Summary




Recommend solutions based on specific network problems
Suggest ways to improve compliance to a security policy
Create an assessment report
Enable proactive detection services
2001-7-30
CIW Security by H.S.Yong
75
Summary (cont’d)




Cleanse operating systems
Install operating system add-ons
Implement native auditing
Use SSH as a replacement for Telnet, rlogin, and rsh
2001-7-30
CIW Security by H.S.Yong
76
Security Auditing,
Attacks, and Threat Analysis







Security Auditing
Discovery Methods
Auditing Server Penetration and Attack Techniques
Security Auditing and the Control Phase
Intrusion Detection
Auditing and Log Analysis
Audit Results
2001-7-30
CIW Security by H.S.Yong
77
7장 감사결과
• 탐지 활성화(Proactive Detection)
– 방어의 수동적 자세에서 해커를 적극적으로 탐지 추적
– Honeypot and Jails
– Promiscuous mode의 NIC 탐지
• 연습문제7-3
– Anti Sniffing Technique
– Linux에 Neped.c 설치 및 tcpdump 시험
• 연습문제 7-6, 789쪽 실습
– Telnet/rlogin 대체로서 SSH 설치
– www.ssh.com 에서 down, linux
– 현재 Evaluation Version을 제공하지 않음.
2001-7-30
CIW Security by H.S.Yong
78
Download