A ttack B ox D esign 7/11/01

22
A ttack B ox D esign 7/11/01 D0G of WAR

description

D0G of WAR. A ttack B ox D esign 7/11/01. Blake ~Internet Consultant~ Security Audits & WAN / LAN Infrastructure Designs [email protected] San Jose (408) 907-5003 / San Francisco (415) 561-9374. 1. Introduction 2. Attack Box Design: -CUJ0 OS Selection - PowerPoint PPT Presentation

Transcript of A ttack B ox D esign 7/11/01

Page 1: A ttack  B ox  D esign 7/11/01

Attack Box Design7/11/01

D0Gof

WAR

Page 2: A ttack  B ox  D esign 7/11/01

 

Blake~Internet Consultant~

Security Audits & WAN / LAN Infrastructure Designs

[email protected]

San Jose (408) 907-5003 / San Francisco (415) 561-9374

Page 3: A ttack  B ox  D esign 7/11/01

1. Introduction2. Attack Box Design:

-CUJ0 OS Selection Hardware Selection OS Layout Baseline Software Load Lock & Load: Extended Toolz Selection - Layout of the Lab -Zombies -Those Evil Web Servers -Fighting Back, ‘Rooting the Attacker’

-P0IS0N -Conceptual: The Death Star Design 3. Overview of Security Audits 4. Closing

Page 4: A ttack  B ox  D esign 7/11/01

Building an Attack Box

From the Ground Up….

‘CUJ0’

Page 5: A ttack  B ox  D esign 7/11/01

OS Selection For Tools

WINDOWS (98 / NT / Win2k)

LINUX

BSD

SOLARIS

Single OS vs Multiboot

Page 6: A ttack  B ox  D esign 7/11/01

Hardware SelectionVia Piece-Meal

(which Manufacturers, Sizing, etc ???)Motherboard, Processor(s)

RAM

Hard Drives

Floppy

NIC Cards

CD Rom / CD Burner

External Modem

Printer

Total Cost =

Page 7: A ttack  B ox  D esign 7/11/01

Hardware Selection: (cont’d)

Laptops

Used Hardware(Where to look for Cheap Stuff)

Page 8: A ttack  B ox  D esign 7/11/01

Multiboot Options

MBRWindows Boot.ini

Lilo bootFreeBSD multiboot

BootMagicSystem Commander

MSTBoot Bootit NGVMWare

Page 9: A ttack  B ox  D esign 7/11/01

OS Load Order

Which one first ???

The Problems with Installations

Page 10: A ttack  B ox  D esign 7/11/01

Partitions

PrimaryExtendedLogicalVirtual

Formatting

Layout on the Hard DrivesSizing & Resizing

Page 11: A ttack  B ox  D esign 7/11/01

BaselineSoftware Loads

Different ConfigurationsPartition Imaging of Different Loads

Drive ImagingStorage

Page 12: A ttack  B ox  D esign 7/11/01

TOOLZSelection

Integration

Testing

Evaluation

Parsing the Code

Making you own Scripts & Toolz

Page 13: A ttack  B ox  D esign 7/11/01

Layout of the Lab for Testing Toolz

Master File Server

Attack, Victim, & Monitoring Boxes

Page 14: A ttack  B ox  D esign 7/11/01

Network Equipment & Configurations Fractional / T1

DSL

Cable Modem

Dial-up

Routers / Switches / Hubs

Firewalls

Sniffers / Network IDS

Page 15: A ttack  B ox  D esign 7/11/01

Other Types of Attack Boxes

(cont’d)

Automated vs ‘Hands-on’

Vulnerability Scanners

Page 16: A ttack  B ox  D esign 7/11/01

Other Types of Attack Boxes

(cont’d)

Zombies

Page 17: A ttack  B ox  D esign 7/11/01

Other Types of Attack Boxes

(cont’d)

Those

Evil Web Servers

Page 18: A ttack  B ox  D esign 7/11/01

FIGHTING BACK

‘Rooting the Attacker’

Page 19: A ttack  B ox  D esign 7/11/01

Other Types of Attack Boxes

(cont’d)

‘P0IS0N’The Honeypot with an Attitude

(A Box That Bites Back)

Page 20: A ttack  B ox  D esign 7/11/01

Other Types of Attack Boxes

(cont’d)

‘The Death Star Design’

Page 21: A ttack  B ox  D esign 7/11/01

PERFORMING SECURITY AUDITS

Discussion

Page 22: A ttack  B ox  D esign 7/11/01

END