ebook img

Hack proofing your network PDF

812 Pages·2002·5.396 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Hack proofing your network

194_HP_Net2e_FC 2/22/02 10:01 AM Page 1 1YEAR UPGRADE BUYER PROTECTION PLAN ™ The Only Way to Stop a Hacker is to Think Like One David R. Mirza Ahmad Dan “Effugas” Kaminsky Ido Dubrawsky F. William Lynch Hal Flynn Steve W. Manzuik Joseph “Kingpin” Grand Ryan Permeh Robert Graham Ken Pfeil Norris L. Johnson, Jr. Rain Forest Puppy K2 Ryan Russell Technical Editor UUPPDDAATTEEDD BBEESSTTSSEELLLLEERR!! 194_HPYN2e_FM.qxd 2/15/02 2:36 PM Page iv Syngress Publishing,Inc.,the author(s),and any person or firm involved in the writing,editing,or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind,expressed or implied,regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights,which vary from state to state. In no event will Makers be liable to you for damages,including any loss of profits,lost savings,or other incidental or consequential damages arising out from the Work or its contents.Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages,the above limitation may not apply to you. You should always use reasonable care,including backup and other appropriate precautions,when working with computers,networks,data,and files. Syngress Media®,Syngress®,“Career Advancement Through Skill Enhancement®,”and “Ask the Author UPDATE®,”are registered trademarks of Syngress Publishing,Inc.“Mission Critical™,”“Hack Proofing™,”and “The Only Way to Stop a Hacker is to Think Like One™”are trademarks of Syngress Publishing,Inc.Brands and product names mentioned in this book are trademarks or service marks of their respective companies. KEY SERIAL NUMBER 001 D7Y4T945T5 002 AKTRT4MW34 003 VMB663N54N 004 SGD34B39KA 005 87U8Q26NVH 006 N4D4RNTEM4 007 2HBVHTR46T 008 ZPB9R5653R 009 J6N5M4BRAS 010 5T6YH2TZFC PUBLISHED BY Syngress Publishing,Inc. 800 Hingham Street Rockland,MA 02370 Hack Proofing Your Network, Second Edition Copyright © 2002 by Syngress Publishing,Inc.All rights reserved.Printed in the United States of America.Except as permitted under the Copyright Act of 1976,no part of this publication may be reproduced or distributed in any form or by any means,or stored in a database or retrieval system, without the prior written permission of the publisher,with the exception that the program listings may be entered,stored,and executed in a computer system,but they may not be reproduced for publication. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 ISBN: 1-928994-70-9 Technical Editor:Ryan Russell Cover Designer:Michael Kavish Acquisitions Editor:Catherine B.Nolan Page Layout and Art by:Shannon Tozier Developmental Editor:Kate Glennon Indexer:Robert Saigh Distributed by Publishers Group West in the United States and Jaguar Book Group in Canada. 194_HPYN2e_FM.qxd 2/15/02 2:36 PM Page v Acknowledgments We would like to acknowledge the following people for their kindness and support in making this book possible. Ralph Troupe,Rhonda St.John,and the team at Callisma for their invaluable insight into the challenges of designing,deploying and supporting world-class enterprise networks. Karen Cross,Lance Tilford,Meaghan Cunningham,Kim Wylie,Harry Kirchner,Kevin Votel, Kent Anderson,Frida Yara,Bill Getz,Jon Mayes,John Mesjak,Peg O’Donnell,Sandra Patterson,Betty Redmond,Roy Remer,Ron Shapiro,Patricia Kelly,Andrea Tetrick,Jennifer Pascal,Doug Reil,and David Dahl of Publishers Group West for sharing their incredible marketing experience and expertise. Jacquie Shanahan and AnnHelen Lindeholm of Elsevier Science for making certain that our vision remains worldwide in scope. Annabel Dent and Paul Barry of Harcourt Australia for all their help. David Buckland,Wendi Wong,Marie Chieng,Lucy Chong,Leslie Lim,Audrey Gan,and Joseph Chan of Transquest Publishers for the enthusiasm with which they receive our books. Kwon Sung June at Acorn Publishing for his support. Ethan Atkin at Cranbury International for his help in expanding the Syngress program. Jackie Gross,Gayle Voycey,Alexia Penny,Anik Robitaille,Craig Siddall,Darlene Morrow, Iolanda Miller,Jane Mackay,and Marie Skelly at Jackie Gross & Associates for all their help and enthusiasm representing our product in Canada. Lois Fraser,Connie McMenemy,Shannon Russell and the rest of the great folks at Jaguar Book Group for their help with distribution of Syngress books in Canada. From Ryan Russell I would like to dedicate my work to my wonderful wife and children,without whom none of this would be worth doing.I love you Sara,Happy Valentine’s Day! I would also like to thank Brian Martin for his assistance in tech editing,and of course the authors who took the time to write the book.Special thanks go out to those authors who worked on the first edition,before anyone had any idea that it would do well or how it would come out. vv 194_HPYN2e_FM.qxd 2/15/02 2:36 PM Page vi Contributors Dan “Effugas” Kaminsky (CISSP) worked for two years at Cisco Systems designing security infrastructure for large-scale network monitoring systems. Dan has delivered presentations at several major industry conferences including Linuxworld,DEF CON,and the Black Hat Briefings,and he also contributes actively to OpenSSH,one of the more significant cryptographic systems in use today.Dan founded the cross-disciplinary DoxPara Research (www.doxpara.com) in 1997,seeking to integrate psychological and techno- logical theory to create more effective systems for non-ideal but very real environments in the field.He is based in Silicon Valley,presently studying Operation and Management of Information Systems at Santa Clara University in California. Rain Forest Puppy is a security research and development consultant for a Midwest-based security consulting company.RFP has been working in R&D and coding in various languages for over seven years.While the Web is his primary hobby focus point,he has also played in other realms including: Linux kernel security patches,lockdown of various Windows and UNIX operating systems,and the development of honeypots and other attack alert tools.In the past he’s reported on SQL tampering and common CGI prob- lems,and has contributed security tools (like whisker) to the information security community. Ken Pfeil is the Security Program Manager for Identix Inc.’s information technology security division.Ken started with Identix following his position as Chief Information Security Officer for Miradiant Global Network,Inc. Ken has over 14 years of IT and security experience,having served with such companies as Microsoft,Dell,and Merrill Lynch.While employed at Microsoft,Ken co-authored Microsoft’s “Best Practices for Enterprise Security”whitepaper series,and is the founder of “The NT Toolbox”Web site.He currently covers new security risks and vulnerabilities for Windows and .Net magazines’Security Administrator publication,and was the resident expert for multiplatform integration and security issues for “The Windows 2000 Experts Journal.” vi 194_HPYN2e_FM.qxd 2/15/02 2:36 PM Page vii Joseph “Kingpin” Grand is a Boston-based electrical engineer and product designer.His pioneering hardware and security research has been published in various academic and industry journals.He has lectured widely on security product design and analysis,portable devices,and digital foren- sics.In addition to testifying before the United States Senate Governmental Affairs,Joseph has presented his research at the United States Naval Post Graduate School Center for INFOSEC Studies and Research,the USENIX Security Symposium,and the IBM Thomas J.Watson Research Center. Joseph was a long-time researcher with the L0pht hacker think tank.He holds a Bachelor’s of Science in Computer Engineering from Boston University in Boston,Massachusetts. K2 is a security engineer.He works on a variety of systems ranging from UNIX to all other operating systems.He has spent a lot of time working through security issues wherever they exist;core kernels,networking ser- vices,or binary protections. K2 is a member of w00w00 and is a con- tributing member of The Honeynet Project.He would like to thank Anya for all her help and support throughout the year. David M.Ahmad is Threat Analysis Manager for SecurityFocus and mod- erator of the Bugtraq mailing list.SecurityFocus is the leading provider of security intelligence services.David has played a key role in the develop- ment of the vulnerability database at SecurityFocus.The focus of this duty has been the analysis of software vulnerabilities and the methods used to exploit them.David became the moderator of Bugtraq,the well-known computer security mailing list in 2001.He currently resides in Calgary, Alberta,Canada with his family. F.William Lynch (SCSA,CCNA,LPI-I,MCSE,MCP,Linux+,A+) is co- author for Hack Proofing Sun Solaris 8 (ISBN:1-928994-44-X),also pub- lished by Syngress Publishing.He is an independent security and systems administration consultant and specializes in firewalls,virtual private net- works,security auditing,documentation,and systems performance analysis. William has served as a consultant to multinational corporations and the Federal government including the Centers for Disease Control and Prevention headquarters in Atlanta,Georgia as well as various airbases of the USAF.He is also the founder and director of the MRTG-PME project, vii 194_HPYN2e_FM.qxd 2/15/02 2:36 PM Page viii which uses the MRTG engine to track systems performance of various UNIX-like operating systems.William holds a Bachelor’s degree in Chemical Engineering from the University of Dayton in Dayton,Ohio and a Masters of Business Administration from Regis University in Denver, Colorado. Hal Flynn is a Threat Analyst at SecurityFocus,the leading provider of Security Intelligence Services for Business.Hal functions as a Senior Analyst, performing research and analysis of vulnerabilities,malicious code,and net- work attacks.He provides the SecurityFocus team with UNIX and Network expertise.He is also the manager of the UNIX Focus Area and moderator of the Focus-Sun,Focus-Linux,Focus-BSD,and Focus- GeneralUnix mailing lists. Hal has worked the field in jobs as varied as the Senior Systems and Network Administrator of an Internet Service Provider,to contracting the United States Defense Information Systems Agency,to Enterprise-level con- sulting for Sprint.He is also a veteran of the United States Navy Hospital Corps,having served a tour with the 2nd Marine Division at Camp Lejeune,North Carolina as a Fleet Marine Force Corpsman.Hal is mobile, living between sunny Phoenix,Arizona and wintry Calgary,Alberta,Canada. Rooted in the South,he still calls Montgomery,Alabama home. Ryan Permeh is a developer and researcher with eEye Digital Security.He works on the Retina and SecureIIS product lines and leads the reverse engi- neering and custom exploitation efforts for eEye’s research team.Ryan was behind the initital analysis of the CodeRed worm,and has developed many proof of concept exploits provided to vendors and the security community. Ryan has experience in NT,UNIX,systems and application programming as well as large-scale secure network deployment and maintenance.Ryan currently lives and works in sunny Orange County,California.Ryan would like to offer special thanks to Riley Hassel for his assistance in providing the Linux exploitation of a sample buffer overflow.He would also like to thank the rest of the eEye team,Greg Hoglund,and Ryan Russell,for the original foundation ideas included in his chapter. Norris L. Johnson, Jr. (MCSE,MCT,CTT+,A+,Network +) is a tech- nology trainer and owner of a consulting company in the Seattle-Tacoma viii 194_HPYN2e_FM.qxd 2/15/02 2:36 PM Page ix area.His consultancies have included deployments and security planning for local firms and public agencies,as well as providing services to other local computer firms in need of problem solving and solutions for their clients. He specializes in Windows NT 4.0,Windows 2000,and Windows XP issues, providing planning,implementation,and integration services.In addition to consulting work,Norris provides technical training for clients and teaches for area community and technical colleges.He co-authored Configuring and Troubleshooting Windows XP Professional (Syngress Publishing,ISBN:1- 92899480-6), and performed technical edits on Hack Proofing Windows 2000 Server (ISBN:1-931836-49-3) and Windows 2000 Active Directory,Second Edition (ISBN:1-928994-60-1). Norris holds a Bachelor’s degree from Washington State University. He is deeply appreciative of the support of his wife Cindy and three sons in helping to maintain his focus and efforts toward computer training and education. Ido Dubrawsky (CCNA,SCSA) is a Network Security Engineer and a member of Cisco’s Secure Consulting Services in Austin,Texas.He currently conducts security posture assessments for clients as well as provides technical consulting for security design reviews.His strengths include Cisco routers and switches,PIX firewall,Solaris systems,and freeware intrusion detection systems.Ido holds a Bachelor’s and a Master’s degree from the University of Texas at Austin and is a member of USENIX and SAGE.He has written several articles covering Solaris security and network security for Sysadmin magazine as well as SecurityFocus.He lives in Austin,Texas with his family. Robert Graham has been developing sniffers since 1990,where he wrote most of the protocol decodes for the ProTools protocol-analyzer,including real-time tools for password sniffing and Telnet session spying.Robert worked for Network General between 1994 and 1998 where he rewrote all of the protocol-decodes for the Sniffer protocol-analyzer.He founded Network ICE in 1998 and created the BlackICE network-snifing intrusion detection system.He is now the chief architect at Internet Security Systems in charge of the design for the RealSecure IDS. Steve Manzuik (MCP) was most recently a Manager in Ernst & Young’s Security and Technology Solutions practice specializing in profiling services. ix 194_HPYN2e_FM.qxd 2/15/02 2:36 PM Page x Over the last ten years Steve has been involved in IT integration,support,and security.Steve is a published author on security topics,a sought after speaker and information security panelist and is the moderator of a full disclosure security mailing list,VulnWatch (www.vulnwatch.org).Steve also has acted as a Security Analyst for a world wide group of White Hat Hackers and Security Researchers,the BindView RAZOR Team. Steve is a board member of the Calgary Security Professionals Information Exchange (SPIE) group,which is an information-sharing group of local security professionals from various private and government sectors. Steve has a strong background in Microsoft technologies and the various security issues surrounding them,and has successfully guided multiple orga- nizations in securing Microsoft Windows NT hosts for use in a hostile envi- ronment.He lives in Calgary,Alberta,Canada with his wife Heather,son, Greyson and newborn daughter Hope. From the First Edition The following individuals contributed to the first edition of Hack Proofing Your Network:Internet Tradecraft.Although not contributors to the second edi- tion,their work and ideas from the first edition have been included. Oliver Friedrichs has over twelve years of experience in the information security industry,ranging from development to management.Oliver is a co- founder of the information security firm SecurityFocus.com.Previous to founding SecurityFocus,Oliver was a Co-Founder and Vice President of Engineering at Secure Networks,Inc.,which was acquired by Network Associates in 1998.Post acquisition,Oliver managed the development of Network Associates’award-winning CyberCop Scanner network auditing product,and managed Network Associates’vulnerability research team. Oliver has delivered training on computer security issues for organizations such as the IRS,FBI,Secret Service,NASA,TRW,Canadian Department of Defense,RCMP,and CSE. Greg Hoglund is a software engineer and researcher.He has written sev- eral successful security products for Windows NT.Greg also operates the x 194_HPYN2e_FM.qxd 2/15/02 2:36 PM Page xi Windows NT Rootkit project,located at www.rootkit.com.He has written several white papers on content-based attacks,kernel patching,and forensics. Currently he works as a founder of Click To Secure,Inc.,building new security and quality assurance tools.His web site can be found at www.clicktosecure.com. Elias Levy is the moderator of Bugtraq,one of the most read security mailing lists on the Internet,and a co-founder of Security Focus. Throughout his career,Elias has served as computer security consultant and security engineer for some of the largest corporations in the United States. Outside of the computer security industry,he has worked as a UNIX soft- ware developer,a network engineer,and system administrator. Mudge is the former CEO and Chief Scientist of renowned ‘hacker think- tank’the L0pht,and is considered the nation’s leading “grey-hat hacker.”He and the original members of the L0pht are now heading up @stake’s research labs,ensuring that the company is at the cutting edge of Internet security.Mudge is a widely sought-after keynote speaker in various forums, including analysis of electronic threats to national security.He has been called to testify before the Senate Committee on Governmental Affairs and to be a witness to the House and Senate joint Judiciary Oversight com- mittee.Mudge has briefed a wide range of members of Congress and has conducted training courses for the Department of Justice,NASA,the US Air Force,and other government agencies.Mudge participated in President Clinton’s security summit at the White House.He joined a small group of high tech executives,privacy experts,and government officials to discuss Internet security. A recognized name in cryptanalysis,Mudge has co-authored papers with Bruce Schneier that were published in the 5th ACM Conference on Computer and Communications Security,and the Secure Networking – CQRE International Exhibition and Congress. He is the original author of L0phtCrack,the award winning NT pass- word auditing tool.In addition,Mudge co-authored AntiSniff,the world’s first commercial remote promiscuous mode detection program.He has written over a dozen advisories and various tools,many of which resulted in numerous CERT advisories,vendor updates,and patches. xi 194_HPYN2e_FM.qxd 2/15/02 2:36 PM Page xii Stace Cunningham (CMISS,CCNA,MCSE,CLSE,COS/2E,CLSI, COS/2I,CLSA,MCPS,A+) is a security consultant currently located in Biloxi,MS.He has assisted several clients in the development and imple- mentation of network security plans for their organizations.Both network and operating system security has always intrigued Stace,so he strives to constantly stay on top of the changes in this ever-evolving field.While in the Air Force he held the positions of Network Security Officer and Computer Systems Security Officer.While in the Air Force,Stace was heavily involved in installing,troubleshooting,and protecting long-haul cir- cuits with the appropriate level of cryptography necessary to protect the level of information traversing the circuit as well as protecting the circuits from TEMPEST hazards.Stace was a contributor to The SANS Institute booklet “Windows NT Security Step by Step.”In addition,he has co- authored over 18 books published by Osborne/McGraw-Hill,Syngress,and Microsoft Press.He has also performed as Technical Editor for various other books and has written for Internet Security Advisor magazine. Technical Editor and Contributor Ryan Russell is the best-selling author of Hack Proofing Your Network: Internet Tradecraft (Syngress Publishing,ISBN:1-928994-15-6).He is an Incident Analyst at SecurityFocus,has served as an expert witness on secu- rity topics,and has done internal security investigation for a major software vendor.Ryan has been working in the IT field for over 13 years,the last 7 of which have been spent primarily in information security.He has been an active participant in various security mailing lists,such as BugTraq,for years, and is frequently sought after as a speaker at security conferences.Ryan has contributed to four other Syngress Publishing titles on the topic of net- working,and four on the topic of security.He holds a Bachelors of Science degree in Computer Science. xii

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.