marcus.murray @ truesec.com blog: truesecurity.se twitter: marcusswede

40
MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter: marcusswede

Upload: elga

Post on 23-Feb-2016

46 views

Category:

Documents


0 download

DESCRIPTION

MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter: marcusswede. Whoami ?. Design secure infrastructure. MVP – Enterprise Security. Speaking engagements. Security Team Manager Truesec. Incident responce. Security Assessments/Penetration Testing. Session Goal. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

MARCUS.MURRAY @ TRUESEC.COMBlog: Truesecurity.se Twitter: marcusswede

Page 2: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Whoami?

2

MVP – Enterprise Security

Security Team Manager Truesec

Security Assessments/Penetration Testing

Design secure infrastructure

Speaking engagements

Incident responce

Page 3: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Session Goal

• Make you start thinking about testing your security

• Give some EXAMPLES of things you can test

• Provide some tools/methods/ideas on testing

Page 4: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Why do wee need to care about threats?

4

Page 5: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Sony PSN

5

Page 6: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 7: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 8: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 9: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 10: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 11: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 12: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 13: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 14: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 15: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 16: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

16

Page 17: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede
Page 18: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

8 Deadly sins in IT-Security

1. Unpatched systems2. Weak passwords3. Weak exposed client applications (Hardening/configuration)4. Weak exposed server services (Hardening/configuration)5. Weak local applications (Hardening/configuration)6. Sensitive network traffic exposure7. Weak access control to protect sensitive data8. System dependencies

18

Page 19: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Unpatched systems

• 2 different approaches to choose from

• Patch inventory platforms • MBSA• Shavlic • Etc..

• Vulnerability scanners/attack testing platforms • Core Impact• Nessus• Metasploit• Etc...

19

Page 20: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Unpatched systems

20

Page 21: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak passwords

• Many places to test• Active Directory• User accounts• Computer accounts!

• Local SAM• Other services (SQL/Webapplications/VNC etc., etc.)

• 2 main methods• Active testing (Brute force/dictionary)• WARNING – don’t forget password lockout policys!

• Passive testing

21

Page 22: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak passwords

22

Page 23: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak exposed client applications (Hardening/configuration)

• Common issues:• Macro Security!• Outdated versions of applications• Browser plugins• Acrobat reader (over and over again...)• Java

• Tools:• https://browsercheck.qualys.com/

23

Page 24: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak exposed client applications (Hardening/configuration)

Page 25: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak exposed server services (Hardening/configuration)

• Most common:• WEB• SQL

• Testing:• Web/sql is challenging to test• There are automated tools out there• Often misses weaknesses• False positives common

• Manual testing by experienced tester is recommended• Common weaknesses: Injections/XSS/shared passwords

embedded in client application etc. etc.25

Page 26: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak exposed server services (Hardening/configuration)

Page 27: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak local applications (Hardening/configuration)

• Anything that is run in admin privs and writable with user privs• Registry• File system• Services• Scheduled Tasks• Processes

27

Page 28: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak local applications (Hardening/configuration)

28

Page 29: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Sensitive network traffic exposure

• Weak protocols:• SMB• http• telnet• Snmp• ftp• RDP• Etc..

• Tools:• Wireshark/Cain etc.

29

Page 30: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Sensitive network traffic exposure

30

Page 31: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak access control to protect sensitive data

• Very often high privileges are stored in files accessible by domain users or even everyone!• Scripts• Backups• Webconfigs• Password reaminder docs• Config files

31

Page 32: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Weak access control to protect sensitive data

Page 33: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

System dependencies

• Very often the privileged accounts are stored on systems with lowers security demands• Local admin reuse• Exposed Domain admin logons• Reused service accounts• Tools:• Gsecdump• Lslsass• parallelltask

33

Page 34: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

System dependencies

34

Page 35: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Process of testing

• Decide what tests you want to run• For each test:

• Set up a test goal• Identify targets• Find the right tools• Identify risks• Define and try methology to manage risks

• Backup/restore/Rollback/Failover/Point of contact• Set up a test methology• Test in a controlled environment• Get acceptance from system owners!!• Perfom test• Analyse result• Take actions

Page 36: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Some resources • Open Source Security Testing Methodology Manual

http://www.isecom.org/osstmm/

• Microsoft Baseline Security Analyzer 2.2http://technet.microsoft.com/en-us/security/cc184923

• Nessushttp://www.nessus.org/products/nessus

• Truesec.comwww.truesec.com

Page 37: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Stay up to date with TechNet Belux

Register for our newsletters and stay up to date:http://www.technet-newsletters.be

• Technical updates• Event announcements and registration• Top downloads

Join us on Facebookhttp://www.facebook.com/technetbehttp://www.facebook.com/technetbelux

LinkedIn: http://linkd.in/technetbelux/

Twitter: @technetbelux

Download MSDN/TechNet Desktop Gadget

http://bit.ly/msdntngadget

Page 38: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

TechDays 2011 On-Demand

• Watch this session on-demand via TechNet Edge http://technet.microsoft.com/fr-be/edge/

http://technet.microsoft.com/nl-be/edge/• Download to your favorite MP3 or video player• Get access to slides and recommended resources by the speakers

Page 39: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

Security Training event! Understand how hackers attack Microsoft platforms

• 3 days with Marcus Murray

• Hands on labs

• Understand how hackers attack Microsoft platforms

• The tools & methods they use

• Amsterdam, Netherlands June 20-22, 2011

Register at www.truesec.com

Page 40: MARCUS.MURRAY @ TRUESEC.COM Blog: Truesecurity.se Twitter:  marcusswede

THANK YOUMarcus.Murray @ Truesec.com