ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

48
Martinez Technology Consulting Security Audit COVERT Security Syste

description

 

Transcript of ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Page 1: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Martinez Technology ConsultingSecurity Audit

COVERT Security Systems

Page 2: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Who Are We?

• IT Security Audit Firm

• Since June 2011

• Corporate Headquarters located in Milwaukee, WI

• Privately held and operated

• Specializing in logical and physical security audits

Page 3: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Mission Statement

Our mission is simple: We want to make your company’s security an enhancement, not a hindrance. Unlike other IT firms, COVERT will only recommend solutions that are appropriate for the specific client while keeping business operations in mind. We work with our clients to provide the best possible support, training, documentation, policies and plans to ensure the utmost security.

Page 4: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Security Audit Department Staff

Lane Salmon

Joseph Finn

Robert Conti

Ryan Urban

Jason Leitner

Matthew Wiza

Ronald Cox

Project Lead Project Manager Security Staff

Page 5: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Security Industry As A Whole

2011 Cloud Security

Page 6: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Largest Threats

Graph from Infoweek.com article (see Sited Sources)

Page 7: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Scope

Security AuditPrimary• Audit security functions already in place• Physical and virtual audit including penetration testing• Of both MTC as well as the housing Church (Cedar Hills Church)

The Three - P’s ReviewSecondary • Review already in place:• Policies, Processes and Procedures

Recommendations and ReportsFinal• Create final analysis reports• Create updated polies, processes and procedures

Page 8: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

RFP (Request)

Page 9: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

RFP (Response)

Page 10: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Our Process

Data Gathering• Interviewed MCT Staff• Internet and public record

searches

Verification • Verified data collected

Security Audit• Physical,

Logical and Social

Policy Review and Creation

Information Consolidation and Review

• Review policies currently in place, expand upon or create

Page 11: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Data Gathering

Physical Mapping

Interview

Server/Workstation Audit

Page 12: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Physical Floor Plan

Page 13: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Current Network Diagram

Page 14: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Interview – Key FindingsJoe

• CEO of MTC• Specialize in SAP cloud services and

training• Recently terminated an employee• Does not regularly check logs of any kind• No Disaster Recovery Plan in place• Time Warner is the ISP

• Rents a firewall from them• Company web pages are not hosted

locally• Remote access via RDP using open ports

and basic Windows authentication

Page 15: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Social Engineering

Exploit

Create Story A and B

Created Credentials

Verified Info

Took Known Info

Page 16: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Verification

Cross Reference Interview Questions

Web search

Page 17: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Security Audit

Network Audit

Wireless Audit

Software and Hardware Audit

Page 18: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

•802.11G•WEPPinks

•802.11N•WPA2Kitty

•802.11N•WPA2PK Fire

•802.11G•WPA22Wire243

•802.11G•WPA22Wire160

•802.11G•OpenBad Rocket

•802.11G•WEPFinalApproach

•802.11N•WPA2Pegassus3

•801.11G•WEPThe430

•802.11N•WPA22Wire157

•802.11G•WPABelkin.5284

•802.11G•WPA2Pegasus2

Wireless Audit

13%

58%

13%

15%

Wireless Encryption Types Within 1 Block

WEPWPA2OpenWPA

52 Access Points Total

Page 19: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Wireless Audit

Page 20: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Wireless Audit Tools

Backtrack 5

Wireless Adapter (monitor)

Airodump -ng Airplay -ng Airmon -ng

Page 21: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Scanning and Enumeration

MTC Network

IP Schema

Ping Sweeps

Fingerprinting (Limited)

Page 22: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Tools Used for Scanning Process

• NMAP• Hping• Tracert• Dsniff• DFI LANguard

Page 23: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Fingerprint of ServerCCI-SAP14

• Server Data\Win Audit\CCI-SAP14\CCI-SAP14.html

• A few security flaws that were found.Item Name Setting

Screen Saver Enabled Yes

Screen Saver Timeout 9999 Minutes

Screen Saver Password Protected No

All Accounts Minimum Password Length 0 Characters

All Accounts Maximum Password Age Forever

All Accounts Historical Passwords 0 remembered

All Accounts Lockout Threshold 0 Attempts

Automatic Updates Update Status Disabled

Automatic Updates Update Schedule Every day

Internet Explorer Download Files Allow

Page 24: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Fingerprint of ServerCCI-SAP17B

• Server Data\Win Audit\CCI-SAP17B\CCI-SAP17B.htmlItem Name Setting

Screen Saver Enabled Yes

Screen Saver Timeout 10 Minutes

Screen Saver Password Protected Yes

All Accounts Minimum Password Length 0 Characters

All Accounts Maximum Password Age 42 Days

All Accounts Historical Passwords 0 remembered

All Accounts Lockout Threshold 0 Attempts

Automatic Updates Update Status Notify before installation

Automatic Updates Update Schedule Every day

Internet Explorer Download Files Not allowed

Page 25: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Fingerprint of ServerECC6C2

• Server Data\Win Audit\ECC6C2\ECC6C2.htmlItem Name Setting

AutoLogon Enabled No

Screen Saver Enabled Yes

Screen Saver Timeout 0 Seconds

Screen Saver Password Protected No

All Accounts Force Network Logoff Never

All Accounts All Accounts All Accounts All Accounts Automatic Updates Automatic Updates Internet Explorer Internet Explorer Internet Explorer Internet Explorer Internet Explorer Internet Explorer

Minimum Password Length 0 Characters Maximum Password Age Forever Historical Passwords 0 remembered Lockout Threshold 0 Attempts Update Status Disabled Update Schedule Every day Run Script Allow Run ActiveX Allow Run Java Allow Download Files Allow Install Desktop Items Prompt user Launch Applications Prompt user

Page 26: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Fingerprint of ServerSVCTAG-2KXKWC1

• Server Data\Win Audit\SVCTAG-2KXKWC1\SVCTAG-2KXKWC1.htmlItem Name Setting

Screen Saver Enabled Yes

Screen Saver Timeout 10 Minutes

Screen Saver Password Protected Yes

All Accounts Minimum Password Length 0 Characters

All Accounts Maximum Password Age 42 Days

All Accounts Historical Passwords 0 remembered

All Accounts Lockout Threshold 0 Attempts

Automatic Updates Update Status NotConfigured

Automatic Updates Update Schedule Every day

Internet Explorer Download Files Allow

Page 27: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Fingerprint of ServerSVCTAG-5KXKWC1

• Server Data\Win Audit\SVCTAG-5KXKWC1\SVCTAG-5KXKWC1.htmlItem Name Setting

Screen Saver Enabled Yes

Screen Saver Timeout 10 Minutes

Screen Saver Password Protected Yes

All Accounts Minimum Password Length 0 Characters

All Accounts Maximum Password Age 42 Days

All Accounts Historical Passwords 0 remembered

All Accounts Lockout Threshold 0 Attempts

Automatic Updates Update Status NotConfigured

Automatic Updates Update Schedule Every day

Internet Explorer Download Files Allow

Page 28: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Fingerprint of ServerSVCTAG-CJXKWC1

• Server Data\Win Audit\SVCTAG-CJXKWC1\SVCTAG-CJXKWC1.htmlItem Name Setting

Screen Saver Enabled Yes

Screen Saver Timeout 10 Minutes

Screen Saver Password Protected Yes

All Accounts Minimum Password Length 0 Characters

All Accounts Maximum Password Age 42 Days

All Accounts Historical Passwords 0 remembered

All Accounts Lockout Threshold 0 Attempts

Automatic Updates Update Status Scheduled installation

Automatic Updates Update Schedule Every day

Internet Explorer Download Files Allow

Page 29: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Win Audit

• WinAudit is a software program that audits Windows based personal computers. Just about every aspect of computer inventory is examined. The report is displayed as a web page, which can be saved in a number of standard formats. You can e-mail it to your technical support or even post the audit to a database for archiving. When used in conjunction with its command line functionality, you can automate inventory administration at the network level.

http://www.pxserver.com/WinAudit.htm

Page 30: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

System Information for Windows (SIW)

• SIW is an advanced System Information for Windows tool that analyzes your computer and gathers detailed information about system properties and settings and displays it in an extremely comprehensible manner.

http://www.gtopala.com/

Page 31: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

SIW Continued

• The System Information is divided into few major categories:• Software Information: Operating System, Software Licenses (Product Keys /

Serial Numbers / CD Key), Installed Software and Hot fixes, Processes, Services, Users, Open Files, System Uptime, Installed Codec's, Passwords Recovery, Server Configuration.

• Hardware Information: Motherboard, CPU, Sensors, BIOS, chipset, PCI/AGP, USB and ISA/PnP Devices, Memory, Video Card, Monitor, Disk Drives, CD/DVD Devices, SCSI Devices, S.M.A.R.T., Ports, Printers.

• Network Information: Network Cards, Network Shares, currently active Network Connections, Open Ports.

• Network Tools: MAC Address Changer, Neighborhood Scan, Ping, Trace, Statistics, Broadband Speed Test

• Miscellaneous Tools: Eureka! (Reveal lost passwords hidden behind asterisks), Monitor Test, Shutdown / Restart.

• Real-time monitors: CPU, Memory, Page File usage and Network Traffic.

Page 32: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Microsoft Baseline Security Analyzer

• Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems.

http://technet.microsoft.com/en-us/security/cc184924

Page 33: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

SIW Audit of Server CCISAP\ECC6C2

• Server Data\SIW\ECC6siwReport.htmlSIW Audit of Server

CCI-SAP14• Server Data\SIW\SIW_FREEWARE_CCI-SAP14_20110718_19225

0.html

SIW Audit of ServerCCI-SAP17B

• Server Data\SIW\SIW_FREEWARE_CCI-SAP17B_20110718_194229.html

Analyzer Audit of Server CCISAP\ECC6C2

• Server Data\Analyzer\ECC6.xps

Analyzer Audit of ServerWORKGROUP\SVCTAG-2KXKWC1

• Server Data\Analyzer\ubuntu.mht

Page 34: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

SIW Audit of Server CCISAP\ECC6C2

• Server Data\SIW\SIW_FREEWARE_ECC6C2_20110718_192841.htmlSIW Audit of Server

WORKGROUP\SVCTAG-5KXKWC1• Server Data\SIW\SIW_FREEWARE_SVCTAG-5KXKWC1_20110718_1927

26.html

SIW Audit of Server WORKGROUP\SVCTAG-CJXKWC1

• Server Data\SIW\SIW_FREEWARE_SVCTAG-CJXKWC1_20110718_184840.html

Analyzer Audit of Server WORKGROUP\SVCTAG-CJXKWC1

• Server Data\Analyzer\C4.xps

Analyzer Audit of ServerWORKGROUP\SVCTAG-5KXKWC1

• Server Data\Analyzer\c3ecc6.mht

Page 35: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Physical Site Security

Fire Suppressions

Power Issues

Access Control

Door & Window Reinforcement

Site Monitoring

Page 36: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Policy Review and Creation

Review Current Polices & Procedures Update Existing

Create New

Page 37: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Acceptable Use Policy

Define Responsibility

System And Network Activates

Communications

Remote Connection

Proprietary Information Enforcement

Page 38: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Business Continuity Plan

1. Know the Business

2. Assess the Risks

3. Formulate the Plan4. Implement

5. Test

Page 39: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Disaster Recovery Policy

Current Policy

Current Threats

Acceptable Risk Assessment

Update

Page 40: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Information Consolidation and Review

Audit Overview Recommendations

Suggested Network Diagram

Page 41: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Audit Findings Summery

Wireless• Cedar Hills WEP -> WPA2• Cedar Hills wireless and LAN same network

Network• Flat Network• Lack of central management (AD)• Lack of enforced network security policy• Windows Updates

Physical• Social Engineering successful• Power Issues• High Availability and Redundancy• Cooling

• Fire Suppression• Battery backup• Backup process• Security Camera

Page 42: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Recommendations Specifics

• Implement AD system• This will allow constant

server hardening and polies to be pushed to all machines

• IDS• Logging

• Wireless change to WPA2• Change password to

complex on all networking devices

• Including church router and printer

• Backup system • High Availability

• Switches, routers, ISP, Important servers

• Redundancy• Switches, routers, ISP,

UPS, Cooling• Possibly Hot or Cold site

• Inventory Control

Page 43: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Recommendations Specifics (Continued)

• Physical Security• Camera and access controls• Must include logging capabilities• Reinforced doors and walls• Glass into server room - remove

• Fire suppression• Seal Server room for better cooling• Power issues

• Extension cord• Encryption on Laptops• More Secure method of Remote

Access

Page 44: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Final suggested network diagram

Page 45: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Cost Analysis

Page 46: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Continually Evolving

By Incident

Page 47: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

Questions?

Thank You For Your Time

Page 48: ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security Audit

References