CONFIDENTIAL DATA: How to Find It IIA El Paso Chapter November 19 19, 2009 Miguel Hernandez IV, CISSP, CISA Outline y y y y y Goals and Expectations CIA Triad Data Classification, Threats, & Data Leakage IP Addresses & Hostnames File Servers & File Shares ◦ Permissions y Web Servers ◦ Clear-text vs Cipher-text y Conclusion Copyright © Miguel Hernandez IV 2009. All rights reserved. Goals y y y y y Learn some terminology. Understand the areas where confidential data leakage can occur. Gather ke key information (IP addresses addresses, hostnames, URLs, etc.) Find confidential data. Somethingg for everybody y y (hopefully) ( p y) ◦ Beginner to Advanced ◦ From policy to practice. Copyright © Miguel Hernandez IV 2009. All rights reserved. Expectations y Don’t expect to find confidential data on your first (or 100+) try(s). ◦ Some automation is possible, but techniques shown are manual and can be time consuming. y Use the techniques with care. ◦ You Y might h break b k something. h Copyright © Miguel Hernandez IV 2009. All rights reserved. Notable Breaches y y y Jan. 11, 2009 - University of Rochester ◦ 450 Social Security numbers were stolen from a database. - Server Jan. 20, 2009 - Heartland Payment Systems ◦ 130 million credit and debit card numbers Server Feb. 19, 2009 - University of Florida ◦ 97,200 Social Security numbers - Server Copyright © Miguel Hernandez IV 2009. All rights reserved. Confidentiality Integrity Availability CIA TRIAD Copyright © Miguel Hernandez IV 2009. All rights reserved. CIA Triad y y y Confidentiality - Data is not disclosed to unauthorized individuals*. Integrity - Data has not been altered or destroyed in an unauthorized manner*. * Availability - Data is available when needed*. Copyright © Miguel Hernandez IV 2009. All rights reserved. * http://www.m-w.com CIA Triad [Ideal Model] Confidentiality I Integrity i Copyright © Miguel Hernandez IV 2009. All rights reserved. A il bili Availability CIA Triad [High Confidentiality] Confidentiality The military loves it’ss secrets! it Top Secret Secret Confidential Unclassified I Integrity i Copyright © Miguel Hernandez IV 2009. All rights reserved. A il bili Availability CIA Triad [High Availability] Confidentiality If eBay goes down, no one’s ’ making k money. I Integrity i Copyright © Miguel Hernandez IV 2009. All rights reserved. A il bili Availability CIA Triad [High Integrity] Confidentiality If only I could add a f more digits few d to my savings account! I Integrity i Copyright © Miguel Hernandez IV 2009. All rights reserved. A il bili Availability What about your organization? y Where does your organization put emphasis? y Do you have a Chief Information Security Officer? y Do you have an information security office? Copyright © Miguel Hernandez IV 2009. All rights reserved. DATA CLASSIFICATION, CLASSIFICATION THREATS, & DATA LEAKAGE Copyright © Miguel Hernandez IV 2009. All rights reserved. What is confidential information? y Depends on your organization. ◦ Social security numbers ◦ Credit card numbers ◦ Health information p p y ◦ Intellectual property ◦ Grades g ◦ Militaryy intelligence ◦ Research and development prototypes ◦ Etc. Copyright © Miguel Hernandez IV 2009. All rights reserved. Data Classification (1) y Data Classification is the conscious decision to assign a level of sensitivity to data as it is being created, amended, enhanced, stored, or t transmitted. itt d y The classification Th l ifi i off the h d data d determines i the h extent to which the data needs to be controlled / secured and is also indicative of its value to an organization. Copyright © Miguel Hernandez IV 2009. All rights reserved. Data Classification (2) y Data Classification Guide – Document that defines confidential data and provides guidance on how to secure it. y If you don’t have a data classification guide, you might i h hhave a confidential fid i l data d leakage l k problem bl and not know it. Copyright © Miguel Hernandez IV 2009. All rights reserved. Where’s Where s the Threat? y y y y Insider Threat ◦ Employees ◦ Contractors ◦ Visitors Outsider Threat ◦ Hackers Our focus is on the Insider Threat. 70% of data breaches are from insiders*. Copyright © Miguel Hernandez IV 2009. All rights reserved. [* www.eccouncil.org] Insider Threat y y y Unintentional / Accidental ◦ I didn’t know I couldn’t do that! Intentional ◦ Disgruntled employee. Means Opportunity Motive (MOM) pp y all ◦ The insider has the Means & Opportunity, they need is Motive. Copyright © Miguel Hernandez IV 2009. All rights reserved. Where are the data leaks? y y y y y Servers ◦ File Our focus is here! ◦ Web Removable storage ◦ USB ◦ External Hard Drives ◦ CD/DVDs Email Instant Messaging g g P2P Copyright © Miguel Hernandez IV 2009. All rights reserved. So what is a Server? y A server is nothing more than a computer that provides resources (services) to another computer. y Best to define in terms of specific types of servers. ◦ File, Web, Email, Database, Print, Antivirus, Game etc… Game, etc y A server is i just j t another th computer. t Copyright © Miguel Hernandez IV 2009. All rights reserved. Why is a server vulnerable? y A server is meant to make a resource available (files, databases, websites, etc.). ◦ Servers are necessarily high availability devices. y No hacking required! You probably have some form of access to it. Low hanging fruit. y Copyright © Miguel Hernandez IV 2009. All rights reserved. IP ADDRESSES & HOSTNAMES Copyright © Miguel Hernandez IV 2009. All rights reserved. Prerequisites to Server Auditing y Must identify IP Addresses and Hostnames. ◦ Analogous to Mailing Addresses. y IP Address Add – numericall label l b l assigned d to a computer. Ex. 192.168.1.2 Hostname – a computer computer’ss name. name Ex. Ex Web servers on the internet are usually named “www”. y y “Hi, my name is 74.125.65.105, but my friends callll me www.google.com.” l ” Copyright © Miguel Hernandez IV 2009. All rights reserved. Danger, Will Robinson! y While not inherentlyy dangerous g or destructive, the following techniques can result is a loss of data, denial of service, or other unintended results. y Proceed with caution and do not attempt any of the following if not 100% confident and comfortable. Copyright © Miguel Hernandez IV 2009. All rights reserved. Finding the IP Address (1) DEMO Copyright © Miguel Hernandez IV 2009. All rights reserved. Finding the IP Address (2) 192.168.1.2 255.255.255.0 192.168.1.1 DEMO Copyright © Miguel Hernandez IV 2009. All rights reserved. Finding the Hostname DEMO Copyright © Miguel Hernandez IV 2009. All rights reserved. FILE SERVERS & FILE SHARES Copyright © Miguel Hernandez IV 2009. All rights reserved. File Servers (1) y File Server – A computer that stores and shares files. Contains file shares. y File Share – The resource made available (shared) on a network where files are stored. R f Refers to folders f ld (directories). (di i ) y FFile l SServer – the h physical h l computer File Share – the shared resource y Copyright © Miguel Hernandez IV 2009. All rights reserved. File Servers (2) y y y A file server can have many file shares! File Server is like a File Cabinet. The drawers are the File Shares. File Share vs Shared Folder vs Network Drive vs NFS mounts … ◦ All the same thing! Copyright © Miguel Hernandez IV 2009. All rights reserved. File Sharing Files File Server Client File Share Network Client Files Copyright © Miguel Hernandez IV 2009. All rights reserved. Locating File Servers and Shares Shares* DEMO File Share File Server IP Address Hostname Copyright © Miguel Hernandez IV 2009. All rights reserved. *Applies to Windows-based client systems only. Auditing File Shares (1) y Connect to the File Server using \\TheHostname\TheFileShare or \\TheIPAddress\TheFileShare UNC syntax. *UNC – Uniform Naming Convention Copyright © Miguel Hernandez IV 2009. All rights reserved. Auditing File Shares (2) DEMO Copyright © Miguel Hernandez IV 2009. All rights reserved. Auditing File Shares (3) DEMO Copyright © Miguel Hernandez IV 2009. All rights reserved. More File Shares, Please (1) y y y Recall that a file server can have multiple file shares. You may be auditing Department X and have identified all of X’s file shares on the file server, but the same file server may also contain file shares for Department Y Y, Z, Z etc… etc There is a way to identify ALL file shares on a file server! Copyright © Miguel Hernandez IV 2009. All rights reserved. More File Shares, Please (2) File Server Copyright © Miguel Hernandez IV 2009. All rights reserved. File Share More File Shares, Please (3) y y Connect to the File Server using \\TheHostname or \\TheIPAddress UNC syntax. Omit the specific file share name when connecting to the server. DEMO Copyright © Miguel Hernandez IV 2009. All rights reserved. *UNC – Uniform Naming Convention File Share Auditing Methodology y y Identify file shares and file servers. For each share identified ◦ Connect to each share using UNC. x If connection attempt is successful p files & look for confidential data. x Sample x Otherwise p x Connect to the next share & repeat. Copyright © Miguel Hernandez IV 2009. All rights reserved. Q: Does this always work? y A: No. Will only work if file permissions do not limit your access. ◦ DEMO y Q: Is it a finding if I am able to connect to a file share and no confidential information is found? A: Depends on organizational policy. y Copyright © Miguel Hernandez IV 2009. All rights reserved. FILE SERVERS: PERMISSIONS Copyright © Miguel Hernandez IV 2009. All rights reserved. A Word About File Permissions y A set of conventions for controlling access to a file that consists of access modes and deny modes*. y “John, I give you permission to look at my files. “Sorry Jane, you can’t look at my files.” y Copyright © Miguel Hernandez IV 2009. All rights reserved. * http://developer.apple.com File Permissions (1) DEMO Warning! Copyright © Miguel Hernandez IV 2009. All rights reserved. File Permissions (2) y y y The “Everyone” group is usually the problem. If the file share has confidential data, “Everyone” should not have access. Strong access controls refer to permissions where only those with a need-to-know have access. Copyright © Miguel Hernandez IV 2009. All rights reserved. WEB SERVERS Copyright © Miguel Hernandez IV 2009. All rights reserved. Web Servers y Web Server – A computer that contains a website b i ((not lilimited i d to the h IInternet). ) C Contains i web pages. y Internal Web Server – A computer that contains a website that is onlyy available on the lntranet. ◦ Intranet – A network within the organization. ◦ Our focus is here. y TIP: Some file servers are also web servers! Copyright © Miguel Hernandez IV 2009. All rights reserved. Locating Web Servers From File Servers y Identify file servers using the techniques just presented. y Connect to the Web Server / File Server using ◦ http:\\TheHostname or http:\\TheIPAddress URL* syntax (clear text). ◦ https:\\TheHostname or https:\\TheIPAddress URL syntax ((encrypted). d) Copyright © Miguel Hernandez IV 2009. All rights reserved. *URL – Uniform Resource Locator Auditing Web Servers (1) Copyright © Miguel Hernandez IV 2009. All rights reserved. DEMO Auditing Web Servers (2) Copyright © Miguel Hernandez IV 2009. All rights reserved. DEMO Web Server Auditing Methodology y y Identify file servers. For each server identified ◦ Connect to each server using URL syntax. x If connection attempt is successful g & look for confidential x Browse web ppages data. x Otherwise x Connect to the next server & repeat. Copyright © Miguel Hernandez IV 2009. All rights reserved. WEB SERVERS: CLEAR--TEXT VS CLEAR CIPHER--TEXT CIPHER Copyright © Miguel Hernandez IV 2009. All rights reserved. Clear-text vs CipherClearCipher-text Transmission y Clear-text – Information transmitted over the networkk iin unencrypted d form. f ◦ Information Æ Clear-text Æ Information y Cipher-text – Information transmitted over the network in encrypted form. ◦ Information Æ Cipher-text Æ !@#$%^&*() y The key is in the URL. ◦ HTTP vs HTTPS Copyright © Miguel Hernandez IV 2009. All rights reserved. Who cares about clearclear-text vs cipher--text? cipher y y y y The bad guys, that’s who. Confidential information transmitted in cleartext can be easily intercepted using tools freely available on the Internet. Usernames and passwords can also be intercepted! If the h web b site is password d protected, d there’s h ’ probably some confidential information involved. involved Copyright © Miguel Hernandez IV 2009. All rights reserved. The Bad Guy Confidential C fid i l Data Network Confidential C fid i l Data Thanks for the clear-text Confidential Data Copyright © Miguel Hernandez IV 2009. All rights reserved. Clear--text Web Server (1) Clear y y y Connect to server. ◦ http://192.168.137.132/webgoat/attack u:guest p:guest Wireshark: Network Monitor (sniffer). ( ) ◦ Let’s use this to capture some passwords. Sniff, sniff Copyright © Miguel Hernandez IV 2009. All rights reserved. Clear--text Web Server (2) Clear Copyright © Miguel Hernandez IV 2009. All rights reserved. DEMO Clear--text Web Server (3) Clear Copyright © Miguel Hernandez IV 2009. All rights reserved. Cipher--text Web Server (1) Cipher y y Connect to server. ◦ https://192.168.137.132/webgoat/attack u:guest p:guest Sniff, sniff Copyright © Miguel Hernandez IV 2009. All rights reserved. Cipher--text Web Server (2) Cipher Copyright © Miguel Hernandez IV 2009. All rights reserved. DEMO Q: Does this always work? y A: No. Will only work if the server is / is also a web server. server Q: Can I always “sniff” clear-text information off the wire?? y A: Only if encryption is not used. There are also switched network vs hubbed network considerations (advanced topic). y Q: Is it a finding if I am able to connect to an internal web server and no confidential information is found? y A: Depends on organizational policy. policy y Copyright © Miguel Hernandez IV 2009. All rights reserved. Conclusion y CIA Data Classification, Threats, & Data Leakage IP Addresses & Hostnames File Servers Web Servers y Go forth and find some confidential data! y y y y Copyright © Miguel Hernandez IV 2009. All rights reserved. QUESTIONS Copyright © Miguel Hernandez IV 2009. All rights reserved.
© Copyright 2024