Title: INFO1200
1INFO1200 Hardening the Infrastructure
- Defining Perimeter External Segments
- Internal vs. External Segments
- - Explaining the External Segment or Perimeter
Segment - - Explaining the Internal Segment
- Footprinting Finding the IP Addresses Assigned
to Company - - Using whois to Understand Who You Are
- - Using DNS Interrogation for More Information
2INFO1200 Hardening the Infrastructure
- Internal vs External Segments
- External Segment or Perimeter Segment
- - any network that exists in a low security zone
of your environment - eg. network that is attached to the external
interface of your ISP's router - - can extend to other network segments such as
DMZ - - Perimeter network or device
- 1. serves content to the Internet
- 2. can be pinged or connected to by anyone
- - WAP's extend perimeter of network also
potentially allow untrusted user access to network
3INFO1200 Hardening the Infrastructure
- Internal vs External Segments
- Internal Segment
- - any network that resides in the secured portion
of your environment and provides resources and
services that are only for internal use - - must assign network device criticality to
plan how to handle security patches, network
recovery, continuity - ie. some internal segment are more important than
others - - must also have accurate and up-to-date
inventories of network device assets and
owners/maintainers
4INFO1200 Hardening the Infrastructure
- Footprinting Finding the IP Addresses Assigned
to Company - Using whois to Understand Who You Are
- - ICANN defines Address supporting Organization
(ASO) which maintains databases of assigned
public IP addresses - - Databases broken down into Regional Internet
Registries (RIR) each geographic region has an
organization which administers RIR for that
region - ie. ARIN for North South America
- - RIRs can be queried using IP address or domain
name using UNIX whois or by using web sites such
as - www.network-tools.com or www.dnsstuff.com
5INFO1200 Hardening the Infrastructure
- Footprinting Finding the IP Addresses Assigned
to Company - Using DNS Interrogation for More Information
- - If you don't know all of domains or IP
Addresses of company can use SEC's utility
EDGAR to search for subsidiaries - - With info on subsidiaries, can use NSLOOKUP to
search for info on various possible domains of
subsidiaries - ie subsidiary.com, subsidiary.net etc.
- - Once verified through NSLOOKUP, can go to
ARIN's web site to find IP addresses
6INFO1200 Hardening the Infrastructure
- Assessing Your Current Networks
- Monitoring Traffic
- Looking at Logical Layouts
- Performing Security Audits
- Remediation
- Examining the Physical Security
7INFO1200 Hardening the Infrastructure
- Assessing Your Current Networks
- Monitoring Traffic
- Sniffer Basics
- Sniffing Challenges
- Sniffer Applications
- Sniffing the air
- Network Counters
8INFO1200 Hardening the Infrastructure
- Monitoring Traffic
- Sniffer Basics
- -can give valuable insight into performance
bottlenecks in your network - -will copy packets that enter NIC to the screen
in format which can be understood - -can also provide packet header info protocol
decodes
9INFO1200 Hardening the Infrastructure
- Monitoring Traffic
- Sniffing Challenges
- - Unless NIC is set to promiscuous mode only
see packets destined for your PC - - Can only sniff packets in your collision domain
Thus if using switches will only see packets
destined for your PC on the switch can be
solved by using hub but not desirable - - Using a managed switch provides solution by
using feature called port mirroring
10INFO1200 Hardening the Infrastructure
- Monitoring Traffic
- Sniffer Applications
- - Ethereal
- - TcpDump/WinDump
- - Snort
- - Microsoft Network Monitor
- - eEye Iris
- - TamoSoft CommView
- - WinPackets Etherpeek
- - Network Associates Netasyst
11INFO1200 Hardening the Infrastructure
- Monitoring Traffic
- Sniffing the Air
- - need specialized software and hardware
- - Some vendors of Wired sniffing tools provide
wireless tools ie. WildPackets - - may need special wireless NIC as some apps will
only work with NICs having PRISM3 chipset or only
certain models of NIC - - applications include Net Stumbler, Air Snort
etc.
12INFO1200 Hardening the Infrastructure
- Monitoring Traffic
- Network Counters
- - Statistical knowledge of network traffic can be
obtained through use of counters available in
network devices or OSs like Win 2003 - - Useful info can include No. of runts or
oversized packets - - Some examples of sources of counters are
- Routers - ie. Cisco routers
- SMNP counters
- Windows 2003 Performance Monitor
13INFO1200 Hardening the Infrastructure
- Assessing Your Current Networks
- Looking at Logical Layouts
- Bus, Ring and Mesh Topologies
- Network Mapping
- using
- - Vulnerability Assessment Tools
- - Mapping-Only Tools
14INFO1200 Hardening the Infrastructure
- Assessing Your Current Networks
- Performing Security Audits
- Vulnerability Assessment
- - Local Application
- - Free tools
- - Managed Vulnerability Assessment
15INFO1200 Hardening the Infrastructure
- Assessing Your Current Networks
- Remediation
- Delegate Tasks
- Patch Management
- Follow-up
16INFO1200 Hardening the Infrastructure
- Assessing Your Current Networks
- Examining the Physical Security
- Securing Your NOC
- Using Layering Methods for Physical Security
- Monitoring Current on Equipment
- Disabling Extra Ports
- Using Conference Room DMZ
17INFO1200 Hardening the Infrastructure