Difference between revisions of "CCNA Explorer 4 Network Security"

From Teknologisk videncenter
Jump to: navigation, search
m
m (Hacket Checklist)
 
(9 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{TOCright}}<br/>
+
{{TOCright}}
 +
=Sikkerhed=
 +
==Security Terms==
 +
;White hat:An individual who looks for vulnerabilities in systems or networks and then reports these vulnerabilities to the owners of the system so that they can be fixed.
 +
;Black hat: Another term for individuals who use their knowledge of computer systems to break into systems or networks that they are not authorized to use.
 +
;Hacker:A general term that has historically been used to describe a computer programming expert. More recently, this term is often used in a negative way to describe an individual that attempts to gain unauthorized access to network resources with malicious intent.
 +
;Cracker:A more accurate term to describe someone who tries to gain unauthorized access to network resources.
 +
;Phreaker:An individual who manipulates the phone network to cause it to perform a function that is not allowed.
 +
;Spammer:An individual who sends large quantities of unsolicited e-mail messages.
 +
;Phisher:Uses e-mail or other means to trick others into providing sensitive information.
 +
==Hacker Checklist==
 +
#Performe footprint analysis also called reconnaissance
 +
##Find responsive IP addresses
 +
#Enumerate information
 +
##Collect more information about servers/network and version numbers
 +
#Manipulate users to gain access
 +
##Test common known usernames and passwords
 +
##Find out how the company chooses usernames and default passwords
 +
#Escalete privileges
 +
#Gather additional usernames, password and secrets
 +
#Install backdoors
 +
#Levage the compomised system
 +
##Attack other systems
 +
 
 +
==Network Security Policies==
 +
ISO 27002 define some guidelines for developing organizational security standards through the following 12 sections:
 +
*Risk assessment
 +
*Security policy
 +
*Organization of information security
 +
*Asset management
 +
*Human resources security
 +
*Physical and environmental security
 +
*Communications and operations management
 +
*Access control
 +
*Information systems acquisition, development, and maintenance
 +
*Information security incident management
 +
*Business continuity management
 +
*Compliance
 +
See RFC 2196, Site Security Handbook
 +
 
 +
==Security Weaknesses==
 +
There are three primary vulnerabilities or weaknesses:
 +
*Technological weaknesses
 +
**TCP/IP protocol weakness
 +
***Syn flood
 +
***Unsecure protocols
 +
**OS Weakness
 +
***All operating systems have weaknesses
 +
***Is documented in CERT archives at [http://www.cert.org/ www.cert.org]
 +
**Network Equipment weakness
 +
***Routing protocols
 +
***Firewall holes
 +
***Lack of authentication
 +
*Configuration weaknesses
 +
**Unsecure user accounts
 +
**Weak password
 +
**Misconfigures internet services
 +
**Default configuration
 +
*Security policy weaknesses
 +
**Lack of written security policy
 +
**Lack of authentication continuity
 +
**Missing change management
 +
**Missing disaster recovery plan
 +
*Physical security
 +
**Access Threats
 +
***Unlocked doors to equipment
 +
**Temperature Control
 +
**Electrical
 +
***No surge protection
 +
***Missing UPS
 +
**Maintenance threats
 +
***Poor maintenance of critical components
 +
***Lack of spare parts
 +
***Poor cabling
 +
***Poor labeling
 +
==Security Threats==
 +
{|
 +
|[[Image:ScreenShot1220.jpg|800px|left|thumb|Threats to network]]
 +
|}
 +
*Social engineering
 +
**Phishing
 +
**Niagara letters
 +
**Fake Helpdesk calls to users
 +
*Reconnaissance
 +
**Internet Queries
 +
**Ping sweeps
 +
**PortScans
 +
**Packet sniffers
 +
*Access
 +
**Password Attacks
 +
***Easy passwords
 +
***Dictionary
 +
***Brute-force
 +
**Trust Exploitation
 +
***JumpHosts
 +
**Port redirection
 +
**MITM
 +
*Denial of Service
 +
**DoS
 +
**Ping of Death
 +
**SYN Flood
 +
**DDoS
 +
***Smurf Attack
 +
***Tribe flood network(TFN)
 +
***Stacheldraht
 +
***MyDoom
 +
*Worms, Viruses, and Trojan Horses
 +
**Worms
 +
***The enabling vulnerability
 +
***Propagation mechanism
 +
***Payload
 +
**Virus
 +
**Trojan Horses
 +
==Mittegation Techniques==
 +
*Host mittegation
 +
**Update OS
 +
**Install firewall
 +
**Install antivirus
 +
**Shutdown unnecessary services
 +
*Network Mittegation
 +
**IPS
 +
**IDS
 +
**NAC
 +
**ASA Firewalls
 +
**IOS Firewalls
 +
 
 
== Logging ==
 
== Logging ==
 
{|
 
{|
 
|[[Image:Exp4sec1.png|800px|left|thumb|]]
 
|[[Image:Exp4sec1.png|800px|left|thumb|]]
 
|}
 
|}
 +
 
== Sårbare Router Services ==
 
== Sårbare Router Services ==
 
{|
 
{|

Latest revision as of 13:59, 25 January 2012

Sikkerhed

Security Terms

White hat
An individual who looks for vulnerabilities in systems or networks and then reports these vulnerabilities to the owners of the system so that they can be fixed.
Black hat
Another term for individuals who use their knowledge of computer systems to break into systems or networks that they are not authorized to use.
Hacker
A general term that has historically been used to describe a computer programming expert. More recently, this term is often used in a negative way to describe an individual that attempts to gain unauthorized access to network resources with malicious intent.
Cracker
A more accurate term to describe someone who tries to gain unauthorized access to network resources.
Phreaker
An individual who manipulates the phone network to cause it to perform a function that is not allowed.
Spammer
An individual who sends large quantities of unsolicited e-mail messages.
Phisher
Uses e-mail or other means to trick others into providing sensitive information.

Hacker Checklist

  1. Performe footprint analysis also called reconnaissance
    1. Find responsive IP addresses
  2. Enumerate information
    1. Collect more information about servers/network and version numbers
  3. Manipulate users to gain access
    1. Test common known usernames and passwords
    2. Find out how the company chooses usernames and default passwords
  4. Escalete privileges
  5. Gather additional usernames, password and secrets
  6. Install backdoors
  7. Levage the compomised system
    1. Attack other systems

Network Security Policies

ISO 27002 define some guidelines for developing organizational security standards through the following 12 sections:

  • Risk assessment
  • Security policy
  • Organization of information security
  • Asset management
  • Human resources security
  • Physical and environmental security
  • Communications and operations management
  • Access control
  • Information systems acquisition, development, and maintenance
  • Information security incident management
  • Business continuity management
  • Compliance

See RFC 2196, Site Security Handbook

Security Weaknesses

There are three primary vulnerabilities or weaknesses:

  • Technological weaknesses
    • TCP/IP protocol weakness
      • Syn flood
      • Unsecure protocols
    • OS Weakness
      • All operating systems have weaknesses
      • Is documented in CERT archives at www.cert.org
    • Network Equipment weakness
      • Routing protocols
      • Firewall holes
      • Lack of authentication
  • Configuration weaknesses
    • Unsecure user accounts
    • Weak password
    • Misconfigures internet services
    • Default configuration
  • Security policy weaknesses
    • Lack of written security policy
    • Lack of authentication continuity
    • Missing change management
    • Missing disaster recovery plan
  • Physical security
    • Access Threats
      • Unlocked doors to equipment
    • Temperature Control
    • Electrical
      • No surge protection
      • Missing UPS
    • Maintenance threats
      • Poor maintenance of critical components
      • Lack of spare parts
      • Poor cabling
      • Poor labeling

Security Threats

Threats to network
  • Social engineering
    • Phishing
    • Niagara letters
    • Fake Helpdesk calls to users
  • Reconnaissance
    • Internet Queries
    • Ping sweeps
    • PortScans
    • Packet sniffers
  • Access
    • Password Attacks
      • Easy passwords
      • Dictionary
      • Brute-force
    • Trust Exploitation
      • JumpHosts
    • Port redirection
    • MITM
  • Denial of Service
    • DoS
    • Ping of Death
    • SYN Flood
    • DDoS
      • Smurf Attack
      • Tribe flood network(TFN)
      • Stacheldraht
      • MyDoom
  • Worms, Viruses, and Trojan Horses
    • Worms
      • The enabling vulnerability
      • Propagation mechanism
      • Payload
    • Virus
    • Trojan Horses

Mittegation Techniques

  • Host mittegation
    • Update OS
    • Install firewall
    • Install antivirus
    • Shutdown unnecessary services
  • Network Mittegation
    • IPS
    • IDS
    • NAC
    • ASA Firewalls
    • IOS Firewalls

Logging

Exp4sec1.png

Sårbare Router Services

Exp4sec2.png
Exp4sec3.png

Sårbare Router interfaces

Exp4sec4-1.png
Exp4sec4-2.png

SNMP, NTP og DNS sårbarheder

Exp4sec5.png

Routenings protokoller sårbarheder

Exp4sec6.png

Routing Protocol Authentication

Exp4sec7.png
Exp4sec8.png

RIP version 2

Exp4sec9.png
Exp4sec10.png
Exp4sec11.png
Exp4sec12.png

EIGRP og OSPF

Exp4sec13.png
Exp4sec14.png
Exp4sec15.png

Cisco Auto secure

Exp4sec16.png
Exp4sec17.png

Cisco SDM (Secure Device Manager)

Exp4sec18.png
Exp4sec19.png

Configuring SDM

Exp4sec20.png
Exp4sec21.png

Starting SDM

Exp4sec22.png
Exp4sec23.png
Exp4sec24.png
Exp4sec25.png

SDM Wizards

Exp4sec26.png

SDM - One-Step Lockdown

Exp4sec27.png
Exp4sec28.png
Exp4sec29.png

Installer nyeste version af IOS

Exp4sec30.png

IOS Filsystemer

Exp4sec31.png
Exp4sec32.png
Exp4sec33.png

Filsystemer prefixer

Exp4sec34.png
Exp4sec35.png
Exp4sec36.png
Exp4sec37.png

copy kommando syntax

Exp4sec38.png

IOS filnavn opbygning

Exp4sec39.png

TFTP backup og upgrade af IOS image

Exp4sec40.png
Exp4sec41.png
Exp4sec42.png

Recovering lost IOS image via TFTP

Exp4sec43.png
Exp4sec44.png
Exp4sec45.png
Exp4sec45.png
Exp4sec46.png

Recovering lost IOS image via XMODEM

Exp4sec47.png
Exp4sec48.png
Exp4sec49.png
Exp4sec50.png

Cisco IOS Trouble shooting commands

Exp4sec51.png

using SHOW commands

Exp4sec52.png
Exp4sec53.png

using DEBUG commands

Exp4sec54.png
Exp4sec55.png
Exp4sec56.png
Exp4sec57.png

Recovering lost Router password

Exp4sec58.png
Exp4sec59.png
Exp4sec60.png
Exp4sec61.png
Exp4sec62.png

Opsummering

Exp4sec63.png