A ttack B ox D esign 7/11/01
description
Transcript of A ttack B ox D esign 7/11/01
Attack Box Design7/11/01
D0Gof
WAR
Blake~Internet Consultant~
Security Audits & WAN / LAN Infrastructure Designs
San Jose (408) 907-5003 / San Francisco (415) 561-9374
1. Introduction2. Attack Box Design:
-CUJ0 OS Selection Hardware Selection OS Layout Baseline Software Load Lock & Load: Extended Toolz Selection - Layout of the Lab -Zombies -Those Evil Web Servers -Fighting Back, ‘Rooting the Attacker’
-P0IS0N -Conceptual: The Death Star Design 3. Overview of Security Audits 4. Closing
Building an Attack Box
From the Ground Up….
‘CUJ0’
OS Selection For Tools
WINDOWS (98 / NT / Win2k)
LINUX
BSD
SOLARIS
Single OS vs Multiboot
Hardware SelectionVia Piece-Meal
(which Manufacturers, Sizing, etc ???)Motherboard, Processor(s)
RAM
Hard Drives
Floppy
NIC Cards
CD Rom / CD Burner
External Modem
Printer
Total Cost =
Hardware Selection: (cont’d)
Laptops
Used Hardware(Where to look for Cheap Stuff)
Multiboot Options
MBRWindows Boot.ini
Lilo bootFreeBSD multiboot
BootMagicSystem Commander
MSTBoot Bootit NGVMWare
OS Load Order
Which one first ???
The Problems with Installations
Partitions
PrimaryExtendedLogicalVirtual
Formatting
Layout on the Hard DrivesSizing & Resizing
BaselineSoftware Loads
Different ConfigurationsPartition Imaging of Different Loads
Drive ImagingStorage
TOOLZSelection
Integration
Testing
Evaluation
Parsing the Code
Making you own Scripts & Toolz
Layout of the Lab for Testing Toolz
Master File Server
Attack, Victim, & Monitoring Boxes
Network Equipment & Configurations Fractional / T1
DSL
Cable Modem
Dial-up
Routers / Switches / Hubs
Firewalls
Sniffers / Network IDS
Other Types of Attack Boxes
(cont’d)
Automated vs ‘Hands-on’
Vulnerability Scanners
Other Types of Attack Boxes
(cont’d)
Zombies
Other Types of Attack Boxes
(cont’d)
Those
Evil Web Servers
FIGHTING BACK
‘Rooting the Attacker’
Other Types of Attack Boxes
(cont’d)
‘P0IS0N’The Honeypot with an Attitude
(A Box That Bites Back)
Other Types of Attack Boxes
(cont’d)
‘The Death Star Design’
PERFORMING SECURITY AUDITS
Discussion
END