Defining Security Fundamentals: © 2005 Cisco Systems, Inc. All Rights Reserved
Defining Security Fundamentals: © 2005 Cisco Systems, Inc. All Rights Reserved
Defining Security Fundamentals: © 2005 Cisco Systems, Inc. All Rights Reserved
Fundamentals
IPS v5.01-1
IPS v5.01-2
High
Stealth Diagnostics
Sniffers
Hijacking Sessions
Scanners
Back Doors
Self-Replicating
Code
Password
Cracking
Technical
Knowledge
Required
Password
Guessing
Low
1980
1990
2000
IPS 5.01-3
Network security is a
continuous process
built around a security
policy.
Step 1: Secure
Step 2: Monitor
Secure
Manage
and Improve
Corporate
Security
Policy
Monitor
and Respond
Step 3: Test
Step 4: Improve
Test
IPS 5.01-4
IPS v5.01-5
IPS 5.01-6
Primary Network
Threats and Attacks
IPS v5.01-7
Variety of Attacks
Internal
Exploitation
Internet
Dial-In
Exploitation
Compromised
Host
IPS 5.01-8
Internal threats
IPS 5.01-9
IPS 5.01-10
Reconnaissance Attacks
and Mitigation
IPS v5.01-11
Reconnaissance Attacks
Reconnaissance refers to
the overall act of learning
about a target network by
using readily available
information and
applications.
IPS 5.01-12
Packet Sniffers
Host A
Router A
Router B
Host B
IPS 5.01-13
Router A
Router B
Host B
Here are techniques and tools that can be used to mitigate sniffer attacks:
Authentication: A first option for defense against packet sniffers is to
use strong authentication, such as one-time passwords.
Switched infrastructure: Deploy a switched infrastructure to counter the
use of packet sniffers in your environment.
Antisniffer tools: These tools to consist of software and hardware
designed to detect sniffers on a network.
Cryptography: The most effective method for countering packet sniffers
does not prevent or detect them but rather renders them irrelevant.
IPS 5.01-14
IPS 5.01-15
IPS 5.01-16
IPS v5.01-17
Password Attacks
Hackers can
implement password
attacks by using
several methods:
Brute-force attacks
Trojan horse
programs
IP spoofing
Packet sniffers
IPS 5.01-18
IPS 5.01-19
Denial of Service
Attacks and Mitigation
IPS v5.01-20
IPS 5.01-21
IP Spoofing
IP spoofing occurs when a hacker inside or outside a network
impersonates the conversations of a trusted computer.
Two general techniques are used during IP spoofing:
A hacker uses an IP address that is within the range of
trusted IP addresses.
A hacker uses an authorized external IP address that is
trusted.
Here are uses for IP spoofing:
IP spoofing is usually limited to the injection of malicious
data or commands into an existing stream of data.
If a hacker changes the routing tables to point to the spoofed
IP address, then the hacker can then receive all the network
packets that are addressed to the spoofed address and
reply, just as any trusted user can.
IPS 5.01-22
IPS 5.01-23
IPS 5.01-24
IPS 5.01-25
Management Protocols
and Functions
IPS v5.01-26
Configuration Management
Configuration management protocols include SSH,
SSL, and Telnet.
Telnet issues include the following:
The data within a Telnet session is sent as clear
text and may be intercepted by anyone with a
packet sniffer located along the data path
between the device and the management server.
The data may include sensitive information,
such as the configuration of the device itself,
passwords, and so on.
IPS 5.01-27
Configuration Management
Recommendations
When possible, the following practices are
advised:
Use IPSec, SSH, SSL, or any other encrypted and
authenticated transport.
ACLs should be configured to allow only
management servers to connect to the device. All
attempts from other IP addresses should be denied
and logged.
Use RFC 2827 filtering at the perimeter router to
mitigate the chance of an outside attacker
spoofing the addresses of the management hosts.
2005 Cisco Systems, Inc. All rights reserved.
IPS 5.01-28
Management Protocols
The following management protocols can be
compromised:
SNMP: The community string information for
simple authentication is sent in clear text.
Syslog: Data is sent as clear text between the
managed device and the management host.
TFTP: Data is sent as clear text between the
requesting host and the TFTP server.
NTP: Many NTP servers on the Internet do not
require any authentication of peers.
IPS 5.01-29
IPS 5.01-30