-
Vulnerability Scanner
-
Tujuan
-
Defender
- Used by defenders to automatically check for many known problems
-
Attacker
- Used by attackers to prepare for and plan attacks
- identify common security configuration mistakes.
-
Makna
- Vulnerability scanners can test systems and network devices for exposure to common attacks.
- Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses
-
PortScanner
- Port scanning utilities (port scanners) are tools used by both attackers and defenders to identify computers that are active on a network, as well as ports and services active on those computers, functions and roles the machines are fulfilling, and other useful information
- The more specific the scanner is, the better and more useful the information it provides is, but a generic, broad-based scanner can help locate and identify rogue nodes on the network
- Port is a network channel or connection point in a data communications system
- Within TCP/IP, TCP and UDP port numbers differentiate multiple communication channels used to connect to network services being offered on same device
- In all, there are 65,536 port numbers in use for TCP and another 65,536 port numbers for UDP
- Ports greater than 1023 typically referred to as ephemeral ports and may be randomly allocated to server and client processes
- Open port is an open door and can be used by attacker to send commands to a computer, potentially gain access to a server, and possibly exert control over a networking device
-
Contoh Tools
-
Port Scanner
-
Nessus
- comprehensive vulnerability scanner which is developed by Tenable Network Security.
-
Nmap
- http://insecure.org/
-
Online Scanner
- https://freescan.qualys.com/freescan-front/
- https://pentest-tools.com/home
- https://hackertarget.com/
- http://www.arachni-scanner.com/download/
- https://subgraph.com/vega/download/index.en.html
- https://github.com/zaproxy/zaproxy
- http://wapiti.sourceforge.net/
- http://websecuritytool.codeplex.com/
-
Open VAS
- OpenVAS is a framework of several services and tools offering a vulnerability scanning and vulnerability management solution
- http://www.openvas.org/index.html
-
Vulnerability Management
-
Why
- Patch Management is ineffective and inefficient.
- the discovery of vulnerabilities and assessment of the risk to the network, is a critical part of the business landscape for long term success.
- The root cause of the problem is the existence of vulnerabilities in the corporate network.
-
Tujuan
- Building a strong program based on mitigating known vulnerabilities has transformed from a security centric process to an operational necessity for business success
- automatically and cost-effectively determine whether to eliminate, mitigate or tolerate threats based upon risk and the cost associated with repair
- cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities",
-
Activity
- Classify. Assign network resources with a heirarchy based on criticality
- Measure. Assess security performance in reducing exposures to key vulnerabilities
- Integrate. Vulnerability Management bolsters effectiveness of patch management, configuration control, and early warning.
- Audit. Regularly audit the effectiveness of integrated vulnerability processes
- is not a penetration test
-
LifeCycle and Best Practice
-
Law Of Vulnerability
-
Vulnerability Assesment
-
Makna
- Vulnerability assessment is a process that works on a system to identify, track, and manage the repair of vulnerabilities on the system.
- to provide a comprehensive security review of the system including both the perimeter and system internals.
- Vulnerability assessment scans a network for known security weaknesses
- Summary
-
Tujuan
- network mapping and system finger printing of all known vulnerabilities
- a complete vulnerability analysis and ranking of all exploitable weaknesses based on potential impact and likelihood of occurrence for all services on each host
- prioritized list of misconfigurations
-
Report
- detailing the findings and the best way to go about overcoming such vulnerabilities.
- prioritized recommendations for mitigating or eliminating weaknesses,
- based on an organization’s operational schedule, it also contains recommendations of further reassessments of the system within given time intervals or on a regular basis.
-
Technique
- Network Scanning
- Vulnerability Scanning
- Password Cracking
- Log Review
- Integrity Checkers
- Virus Detection
- War Dialing
- War Driving (802.11 or wireless LAN testing)
-
Penetration Testing
- A penetration test is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source.
- The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures.
- The intent of a penetration test is to determine feasibility of an attack and the amount of business impact of a successful exploit, if discovered.
-
Istilah
- Threat: potential occurrence that can have an undesired effect on the system
- Vulnerability: characteristics of the system that makes is possible for a threat to potentially occur
- Attack: action of malicious intruder that exploits vulnerabilities of the system to cause a threat to occur
- Risk: measure of the possibility of security breaches and severity of the damage
- Summary
-
Security
-
Problem
-
Securing computing resources: prevent/detect/deter improper use of computing resources
- Hardware
- Software
- Data
- Network
- Security is a continuous process of protecting an object from attack. That object may be a person, an organization such as a business, or property such as a computer system or a file.
-
Pseudosecurity
-
Security Through Obscurity (STO)
- STO is a false hope of security.
- any resource on the system can be secure so long as nobody outside the core implementation group is allowed to find out anything about its internal mechanisms
- “bunk mentality” security.
-
Security Objective
-
CIA
- Confidentiality: prevent/detect/deter improper disclosure of information (informasi dapat diakses oleh yang mempunyai hak)
- Integrity: prevent/detect/deter improper modification of information (object tetap orisinil, tidak diragukan keasliannya, tidak dimodifikasi dalam perjalanannya dari sumber menuju penerimanya)
- Availability: prevent/detect/deter improper denial of access to services (user yang mempunyai hak akses atau authorized users diberi akses tepat waktu dan tidak terkendala apapun)
-
Authentication and non-repudiation
- Authentication: proses menentukan apakah sesorang yang masuk merupakan orang yang benar dan berhak
- Non Repudiation: pengirim dan penerima tidak dapat mengelak bahwa benar-benar mereka yang melakukannya. Non repudiation dapat dilakukan dengan menggunakan digital signature, confirmation services, dan time stamps.
-
Access Control :
-
Entitas
- Subject of the Access Control. Yang menjadi subject di sini adalah entitas yang mengajukan request / permintaan untuk melakukan akses ke data.
- Object of the Access Control. Yang menjadi object di sini adalah entitas yang mengandung atau mengatur data. Atau dengan kata lain object adalah resource yang tersedia di dalam suatu sistem
-
Tujuan
- proses untuk mengatur / mengontrol siapa saja yang berhak mengakses suatu resource-rosource tertentu yang terdapat di dalam sebuah sistem
- memproteksi data terhadap unauthorize access atau akses yang dilakukan oleh orang yang memang tidak memiliki hak akses terhadap reource tersebut
-
Jenis
- Physical Access Control
- Perimiter Security
- membatasi akses masuk ke area atau lokasi di mana perangkat hardware berada
- Cable Protection
- shielding untuk meningkatkan ketahanan terhadap EMI (Electro Magnetic Interference
- Pembagian Area Kerja (separation of duties and work areas)
- Pembagian area kerja secara fisik di antara karyawan ditujukan untuk meminimalisir terjadinya shoulder surfing. Yang dimaksud dengan istilah shoulder surfing adalah di mana seorang karyawan dapat melihat dan mengamati aktifitas yang dilakukan oleh karyawan lainnya dengan mengintip lewat balik bahu
- Administrative Access Control
- Policies and Procedure
- prosedur yang jelas berkaitan dengan akses terhadap resource-resource yang terdapat di dalam sistem
- Hiring Pratices
- mekanisme perekrutan karyawan baru
- Monitoring Point
- pengawasan terhadap kebijakan dan prosedur yang berlaku
- Security Awareness Training
- dilakukan pelatihan / training berkaitan dengan security awareness
- Logical Access Control
- Object Access Restriction
- akses kepada authorized user
- Encryption
- Melakukan penyandian data sehinga data hanya bisa dibaca oleh orang-orang yang memang memiliki hak akses
- Network Architecture / Segregation
- egmentasi pada infrastruktur jaringan komputer yang ada. Hal ini ditujukan untuk menghindari adanya aksi pencurian data yang dilakukan melalui infratruktur jaringan yang ada
-
Prinsip
- Least Privilage
- Yang dimaksud dengan Least Privilege di sini adalah hanya memberikan hak akses yang memang dibutuhkan oleh subject yang bersangkutan untuk melakukan tugas-tugas yang memang menjadi bagian dari tanggung jawabnya
- Full Access
- jangan pernah memberikan akses penuh (Full Access) terhadap semua resource yang tersedia di dalam sistem kepada subjec
- Authorization Creep
- suatu kejadian yang tidak disengaja di mana suatu subject diberi hak akses yang seharusnya tidak dia miliki. Kondisi ini tentunya memiliki potensi untuk memunculkan threat / ancaman terhadap sistem yang kita miliki
-
Accountability
- Accountability (Audit) adalah merujuk kepada kemampuan untuk melacak atau audit apa yang sedang dilakukan oleh user (individu maupun kelompok) terhadap sistem jaringan komputer.
-
Achieving Security
- Policy : What to protect?
- Mechanism : How to protect?
- Assurance : How good is the protection?
-
Basic Concept
-
Makna
- A system vulnerability is a condition, a weakness of or an absence of security procedure, or technical, physical, or other controls that could be exploited by a threat
- weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network
-
Source
-
Design Philosophy
- the philosophy was not based on clear blueprints
- new developments and additions came about as reactions to the shortfalls and changing needs of a developing infrastructure
-
Weaknesses in Network Infrastructure and Communication Protocols
- Paket Data:As packets are di-assembled, transmitted, and re-assembled, the security of each individual packet and the intermediary transmitting elements must be guaranteed
- The cardinal rule of a secure communication protocol in a server is never to leave any port open in the absence of a useful service. If no such service is offered, its port should never be open
-
Rapid Growth of Cyberspace
- The Growth of the Hacker Community
- The Invisible Security Threat -The Insider Effect
-
Social Engineering
- uses to gain system authorization through masquerading as an authorized user of the network
- Physical Theft
-
Design Flawns/Kelemahan
-
the biggest problems in system security vulnerability are due to software design flaws
- human factors,
- Memory lapses and attentional failures: For example, someone was supposed to have removed or added a line of code, tested, or verified but did not because of simple forgetfulness.
- Rush to finish: The result of pressure, most often from management, to get the product on the market either to cut development costs or to meet a client deadline can cause problems.
- Overconfidence and use of nonstandard or untested algorithms: Before algorithms are fully tested by peers, they are put into the product line because they seem to have worked on a few test runs.
- Malice: Software developers, like any other professionals, have malicious people in their ranks. Bugs, viruses, and worms have been known to be embedded and downloaded in software, as is the case with Trojan horse software, which boots itself at a timed location.
- Complacency: When either an individual or a software producer has significant experience in software development, it is easy to overlook certain testing and other error control measures in those parts of software that were tested previously in a similar or related product, forgetting that no one software product can conform to all requirements in all environments.
- software complexity,
- Complexity: Unlike hardwired programming in which it is easy to exhaust the possible outcomes on a given set of input sequences, in software programming a similar program may present billions of possible outcomes on the same input sequence.
- Difficult testing: There will never be a complete set of test programs to check software exhaustively for all bugs for a given input sequence.
- Ease of programming: The fact that software programming is easy to learn encourages many people with little formal training and education in the field to start developing programs, but many are not knowledgeable about good programming practices or able to check for errors.
- Misunderstanding of basic design specifications: This affects the subsequent design phases including coding, documenting, and testing. It also results in improper and ambiguous specifications of major components of the software and in ill-chosen and poorly defined internal program structures.
- trustworthy software sources
- There are thousands of software sources for the millions of software products on the market today. However, if we were required to name well known software producers, very few of us would succeed in naming more than a handful. Yet we buy software products every day without even ever minding their sources. Most important, we do not care about the quality of that software, the honesty of the anonymous programmer, and of course the reliability of it as long as it does what we want it to do.
- Even if we want to trace the authorship of the software product, it is impossible because software companies are closed within months of their opening. Chances are when a software product is 2 years old, its producer is likely to be out of business. In addition to the difficulties in tracing the producers of software who go out of business as fast as they come in, there is also fear that such software may not even have been tested at all.
- The growth of the Internet and the escalating costs of software production have led many small in-house software developers to use the marketplace as a giant testing laboratory through the use of beta testing, shareware, and freeware. Shareware and freeware have a high potential of bringing hostile code into trusted systems.
- Hardware systems are less susceptible to design flaws
-
Attack
-
Step
- Reconnaissance: Active/Passive
- Scanning
-
Gaining Access:
- Operating systems level/ application level
- Network level
- Denial of service
- Maintaining Access: Uploading/altering/downloading programs or data
- Clearing Tracks
- Summary
-
Standard
-
Secure Coding
-
OWASP
-
OWASP Top 10 :2013
- Subtopic 1
-
Web Hacking Incident Database
- WASC
-
Standard Penamaan dan Klasifikasi
-
CVE
- Common Vulnerability Enumeration
- http://cve.mitre.org/
- naming standard for vulnerabilities
-
CWE
- classification of the types of weaknesses that causes vulnerabilities.
- https://nvd.nist.gov/cwe.cfm