Intro To CCNA Security
Intro To CCNA Security
Overview
What is security?
Why do we need security?
Who is vulnerable?
Common security attacks and countermeasures
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security
if a visitor acts suspicious.
2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
etc.
4
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security
if a visitor acts suspicious.
2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
etc.
5
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security
if a visitor acts suspicious.
2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
etc.
6
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety.
2. Freedom from doubt, anxiety, or fear; confidence.
3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security
if a visitor acts suspicious.
2. Measures adopted by a government to prevent espionage,
sabotage, or attack.
3. Measures adopted, as by a business or homeowner, to prevent
a crime such as burglary or assault: Security was lax at the firm's
smaller plant.
etc.
7
Provide
Guarantee
availability of resources
Who is vulnerable?
Financial
Denial of Service
Ingress filtering, IDS
TCP hijacking
IPSec
Packet sniffing
Encryption (SSH, SSL, HTTPS)
Social problems
Education
10
Firewalls
Basic
Firewalls
A firewall
be hardware or software
12
Firewalls
Internet
DMZ
Firewall
Firewall
Intranet
13
Firewalls
Firewalls
Here
Might
Firewalls
What
ipfw
Other
Intrusion Detection
Used
Open
17
Intrusion Detection
Example
IRIX vulnerability in webdist.cgi
Can make a rule to drop packets containing the line
/cgi-bin/webdist.cgi?distloc=?;cat%20/etc/passwd
Minor Detour
Say
19
Dictionary Attack
Denial of Service
Purpose:
21
Denial of Service
Denial of Service
23
Denial of Service
SMURF
24
Denial of Service
I C M P e c h o ( s p o o f e d s o u r c e a d d r e s s o f v ic t im )
S e n t to IP b ro a d c a s t a d d re s s
IC M P e c h o r e p ly
In te rn e t
P e rp e tra to r
V ic t im
25
Denial of Service
Denial of Service
Mini
27
Denial of Service
Why
28
Denial of Service
How
Ingress filtering
If the source IP of a packet comes in on an interface
which does not have a route to that packet, then drop
it
RFC 2267 has more information about this
TCP Attacks
Recall
how IP works
TCP Attacks
TCP
values?
Port numbers are sometimes well known to begin
with (ex. HTTP uses port 80)
Sequence numbers are sometimes chosen in
very predictable ways
31
TCP Attacks
If
TCP Attacks
Say
33
TCP Attacks
Alice
34
TCP Attacks
Mr.
35
TCP Attacks
First,
Packets
TheVoid
36
TCP Attacks
Then,
ISN,SRC=Alice
37
TCP Attacks
What
How
TCP Attacks
Why
Webserver
Trustingwebclient
Malicioususer
39
TCP Attacks
How
do we prevent this?
IPSec
Provides source authentication, so Mr. Big Ears
cannot pretend to be Alice
Encrypts data before transport, so Mr. Big Ears
cannot talk to Bob without knowing what the
session key is
40
41
Packet Sniffing
Recall
Packet Sniffing
This
43
Packet Sniffing
What
44
Packet Sniffing
IPSec
Provides network-layer confidentiality
45
Social Problems
People
Social Problems
Fun
Example 1:
47
Social Problems
Fun
Example 2:
Social Problems
Fun
Example 3:
Social Problems
50
Conclusions
The
intrusion-detection.html
http://online.securityfocus.com/infocus/1527
http://www.snort.org/
http://www.cert.org/
http://www.nmap.org/
http://grc.com/dos/grcdos.htm
http://lcamtuf.coredump.cx/newtcp/
52