Global Information Assurance Certification Paper - GIAC ...

Page created by Micheal Weber
 
CONTINUE READING
Global Information Assurance Certification Paper

                           Copyright SANS Institute
                           Author Retains Full Rights
  This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.

Interested in learning more?
Check out the list of upcoming events offering
"Security Essentials Bootcamp Style (Security 401)"
at http://www.giac.org/registration/gsec
Open File Shares: An Unexpected Business Risk
           Jaime Carpenter
           June 21, 2001

           Over the past few days, well O.K. the last month, I have been stressed over what topic to write

                                                                                                s.
           about for my GSEC practical. Many topics have come to mind. I have found that as I now focus

                                                                                             ht
           on writing my practical my topic has finally crystallized into a topic that we are currently

                                                                                         rig
           working through at my company: Open File Shares.

                                                                                     ull
           Background

                                                                                     f
           The purpose of this report is to talk about the risk of open file shares to a business, reiterate the

                                                                                  ns
           importance  of a security
              Key fingerprint  = AF19policy
                                        FA27on2F94
                                                file sharing, showDE3D
                                                      998D FDB5    you some
                                                                         F8B5 tools
                                                                                06E4to use
                                                                                       A169to4E46
                                                                                             assess the security

                                                                               tai
           posture of your network, and finally outline basic steps to take to secure your network.

                                                                            re
           In this report an open file share or network share is defined as either a Peer-to-Peer or

                                                                        or
           Client/Server NetBIOS/SMB type of shared folder or directory of files that has been improperly

                                                                     th
           secured or not secured at all. At a minimum, the open file share would allow unintended read
           access to information stored in the shared directory. The worst case of an open file share allows
                                                                 Au
           full read/write access to information stored in the shared directory.
                                                              2,

           The Risk
                                                          00
                                                       -2

           File sharing in general is seen as a major benefit of networking. The risk arises when a PC,
           workstation or server is improperly configured and data is exposed. Imagine a manager of a
                                                   00

           payroll department who saves a spreadsheet containing information about this year’s raises on
                                                20

           the hard drive of his PC only to be called in to the CEO’s office later to explain how the
           information was leaked! This is an example of how confidentiality can be compromised and
                                             te

           often the owner of the information has no idea that the data is at risk.
                                          tu

           Unexpected exposure of confidential information is not the only risk. Data integrity and
                                       sti

           availability can be affected by the spread of viruses like Funlove. In my company we have been
                                    In

           hit hard by the Funlove virus, which can propagate itself via open file shares. “Periodically the
           virus scans any network shares with write access, and infects any EXE, SCR and OCX files on
                               NS

           any shared network drives.”(1) Our help desk and workstation support team have been fighting
           the battle of eradication of this virus for months. Each instance of the virus infection requires
                           SA

           hours of recovery work and sometimes a complete reload of the desktop OS. Since January 1,
           2001, there have been 50 Funlove infections reported to our help desk.
                        ©

           A recent eWeek article claims that the number 1 threat to security today is from internal sources
           rather than external sources. According to the respondents of a survey quoted in the article, "57
           percent said the breaches were caused by inside users accessing unauthorized resources"(2).
           Open  filefingerprint
               Key     shares are=certainly
                                   AF19 FA27one 2F94
                                                way this
                                                     998Dtype of unauthorized
                                                            FDB5  DE3D F8B5access
                                                                              06E4 can
                                                                                   A169 occur.
                                                                                          4E46

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                    Author retains full rights.
The need for a good Security Policy

           Because of these risks, it is paramount that you establish a security policy on file sharing. In the
           article “Best Practices in Network Security”(3), Fredrick M. Avolio says that it is important to
           establish a root security policy that includes:

                                                                                                s.
                                                                                             ht
              • Root security policy overview

                                                                                         rig
              • Security architecture guide
              • Incident-response procedures

                                                                                     ull
              • Acceptable use policies
              • System admin procedures

                                                                                     f
                                                                                  ns
              • Other management procedures (data classification and storage)
              Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                               tai
           The Root security policy overview should contain the overall security philosophy of your

                                                                            re
           company. It is the basis or foundation on which the other policies are derived. It is essential that
           you have the commitment of senior management to support your security policies because “if

                                                                        or
           senior management is not committed to information security, your best efforts are wasted”(3).

                                                                     th
                                                                 Au
           The security architecture guide needs to show how file sharing is used in your company. A small
           company may implement a peer-to-peer technology while a large company may have a mix of
                                                              2,
           peer-to-peer and client/server or just client/server. Whichever suites your need, it is important to
                                                          00

           spell it out clearly in your policy. File sharing will also need to be covered in the acceptable use
           policies, system admin procedures and other management procedures (like data classification and
                                                       -2

           storage).
                                                   00

           In your policies you must also clearly spell out the consequences of a policy violation. It may be
                                                20

           only a reprimand or it could lead to termination of employment. It is a good idea to check with
           your human resources and/or legal departments on the language used in your policies.
                                            te
                                          tu

           Tools
                                       sti

           There are three network scanning tools that I have chosen to demonstrate in this paper.
                                    In

               •
                               NS

                   SMBScanner 1.0 available at: http://hispahack.ccc.de/smb.htm
                           SA

               •   Legion v2.1 available at: http://packetstorm.securify.com/groups/rhino9/
                        ©

               •   ISS Internet Scanner available at: https://www.iss.net/cgi-
                   bin/download/evaluation/evaluation-select.cgi

           Test Lab Setup
              Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
           Here is the test lab setup I will use to demonstrate the scanning tools. (This is not a
           recommended security setup, just an example)

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                    Author retains full rights.
IP Address        Name       Operating System         Share Name     Access Type

                    192.168.0.1 WINKIN           Windows 98             C               Password/Full
                                                                        RESTRICTED      Password/Full

                                                                                                  s.
                                                                        PRINTER         Full

                                                                                               ht
                                                                        HIDDEN$         Full

                                                                                           rig
                    192.168.0.2 BLINKIN          Windows 2000 Pro
                                                             ADMIN$       Admin

                                                                                       ull
                                                             C$           Admin
                                                             DATA         Everyone/Full

                                                                                      f
                                                                                   ns
                                                             PROGRAMS Everyone/Read
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                                tai
                    192.168.0.3 NOD              Windows 95             PROGRAMS        Read

                                                                             re
                                                                        CDROM           Read

                                                                         or
                                                                      th
           SMBScanner 1.0
                                                                  Au
           The first tool is SMBScanner 1.0. Although I don’t understand Spanish, the translated web page
                                                                2,
           states: “SmbScanner does not have limitation and it is not necessary to pay for use rights.”)(4). I
                                                           00

           understood that to mean “Free”.
                                                        -2

           Setup was easy enough. I downloaded the zip
           file, extracted the files to a directory and I was
                                                    00

           ready to go.
                                                 20

           Running the program displays a dialog that allows
                                             te

           you to enter an IP address range to scan. Enter
                                           tu

           the IP address range to scan and click the Scan
                                       sti

           button. When the scan completes you will be
                                     In

           given a tree view of hosts where file shares were
           found. You will notice that this tool does not
                                NS

           display hidden shares (a share with a $ sign at the
           end of the name). There is also no option to
                            SA

           export or save a list of the scan results.
                         ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002                 As part of GIAC practical repository.                  Author retains full rights.
Once you have the list of hosts, you can right
           click on a share and you will be given the choice
           to connect, browse or brute force the share.

                                                                                                 s.
                                                                                              ht
                                                                                          rig
                                                                                     full
                                                                                  ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                               tai
                                                    The brute force option uses a userlist file and a

                                                                            re
                                                    passlist file to attack a password protected share.
                                                    There is a sample of each included with the

                                                                        or
                                                    program. They are text files named user.dat and

                                                                     th
                                                    pass.dat. You can create your own files or modify
                                                    the ones provided. However you will have to use a
                                                                 Au
                                                    text editor to edit the files, because the brute force
                                                    dialog will not allow editing even though it appears
                                                              2,

                                                    that it will.
                                                          00
                                                       -2
                                                   00
                                                20

           Legion v2.1
                                             te
                                          tu

           The next tool is Legion v2.1. This is a very well known scanning tool. Legion v2.1 was
           mentioned in the SANS Security Essentials class I attended, in the book “Hacking Exposed:
                                       sti

           Network Security Secrets and Solutions”(5) and in one of my searches there was even a link to a
                                    In

           tutorial for Legion v2.1 on a hackers website!(6)
                               NS

           After downloading the zip file, just extract the setup files and run setup.exe to install. Legion is
           shareware and if you use the program beyond the 14-day evaluation period you are expected to
                           SA

           pay $25 for continued use.
                         ©

           You have a few more options with Legion v2.1 beyond just IP address range scanning. The
           startup dialog gives you options for Scan Type and Connection Speed. The Scan Type allows
           you to use a range or a predefined list of IP addresses. Connection Speed allows you to adjust
           what type of line speed you have on your network connection.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                    Author retains full rights.
s.
                                                                                             ht
                                                                                         rig
           I chose to use the Scan Range option. Enter a range of IP addresses then click Scan (you are
           limited to scanning only 64 subnets at a time). When the scan is complete, you will be given a

                                                                                     ull
           dialog that shows a tree view of the hosts where shares were found. A nice feature is the ability
           to save a listing of shares to a text file, which is very useful for reporting. Legion v2.1 also does

                                                                                     f
                                                                                  ns
           not display hidden shares.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                               tai
                                                                            re
                                                                        or
                                                                     th
                                                                 Au
                                                              2,
                                                          00
                                                       -2
                                                   00
                                                20
                                             te
                                          tu
                                       sti
                                    In

           ISS Internet Scanner
                               NS

           The most powerful scanning tool of those covered in this report is Internet Security Systems’
                           SA

           Internet Scanner. This is a full-featured vulnerability and threat assessment tool. You can
           download a trial copy but you will be limited on both time and features. Internet Scanner uses an
                        ©

           expiring key to limit the number of addresses that you may scan and also ensure that you have
           properly licensed the product.

           ISS Internet Scanner works by scanning a range of IP addresses using policies, which are made
           up of exploits
               Key        or checks,
                    fingerprint      to FA27
                                = AF19  assess 2F94
                                                the vulnerabilities
                                                     998D FDB5 DE3D of the host(s) found.
                                                                           F8B5 06E4      You4E46
                                                                                       A169   can create your
           own policies based on your environment. Use caution when creating your own policies because
           Internet Scanner can also perform denial of service checks that will in fact cause a denial of
           service on a host.

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                    Author retains full rights.
After you have installed the program, you will need to create a policy to use. For this report, I
           created a policy called Open Shares and included only a few of the checks available for shares.
           To create the policy, follow these steps:

               1. Choose Policy on the Internet Scanner menu

                                                                                               s.
               2. Choose New (this will step you through a wizard like creation tool)

                                                                                            ht
               3. Select the “Blank” policy as the base for your new policy

                                                                                        rig
               4. Give the policy a name: Open File Shares
               5. When the policy editor starts choose Vulnerabilities, Standard, Shares

                                                                                    ull
               6. Enable the checks for
                      a. All Access NetBIOS share – Everyone

                                                                                    f
                      b. All Access NetBIOS share found

                                                                                 ns
                      c. NetBIOS
               Key fingerprint     share
                               = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                              tai
                      d. Open NetBIOS share

                                                                           re
                      e. Open Samba Share
                      f. Writable NetBIOS Share

                                                                       or
                                                                    th
                                                                Au
                                                             2,
                                                         00
                                                      -2
                                                  00
                                               20
                                            te
                                         tu
                                      sti
                                   In
                               NS
                           SA
                        ©

           After you have created your policy, you will be ready to perform your scan. Choose File, New
           Session from the menu. Select your newly created Open File Shares policy, add a session
               Key fingerprint
           comment,            = AF19
                      then specify      FA27 2F94
                                   the hosts. There998D   FDB5
                                                    are three   DE3DtoF8B5
                                                              options   use to06E4 A169
                                                                               specify the4E46
                                                                                           hosts: Use Host
           File, Use Command Line Facility or Ping valid hosts in your key. For simplicity I chose Use
           Command Line Facility and entered the IP addresses of the Test Lab hosts.

© SANS Institute 2000 - 2002               As part of GIAC practical repository.                  Author retains full rights.
s.
                                                                                          ht
                                                                                      rig
                                                                                  ull
                                                                                   f
                                                                                ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                             tai
           After you enter in the IP addresses to scan and click Finish your session will be defined. Now
           from the ISS Internet Scanner menu choose Scan, Scan Now. When the scan has completed you

                                                                          re
           will see a screen much like the one below.

                                                                      or
                                                                   th
                                                               Au
                                                            2,
                                                        00
                                                     -2
                                                 00
                                              20
                                           te
                                        tu
                                     sti
                                   In
                               NS
                           SA
                        ©

           On Key
               the left of the screen
                    fingerprint       there
                                 = AF19     are 2F94
                                         FA27   4 tabs: Hosts,
                                                      998D     Vulnerabilities,
                                                            FDB5  DE3D F8B5Services   and Accounts.
                                                                                06E4 A169 4E46      Click on
           the Vulnerabilities tab and expand the tree view. ISS Internet Scanner did find the hidden share
           HIDDEN$, but it does not show the Windows 2000 Professional administrative shares ADMIN$
           and C$

© SANS Institute 2000 - 2002              As part of GIAC practical repository.                 Author retains full rights.
s.
                                                                                          ht
                                                                                      rig
                                                                                  ull
                                                                                   f
                                                                                ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                             tai
                                                                          re
                                                                      or
                                                                   th
                                                               Au
                                                            2,
                                                        00
                                                     -2
                                                 00

           ISS Internet scanner also has predefined reports that show varying levels of detail. There are
                                                20

           reports for Line Management that contain the vulnerabilities found and a brief description and
           there are Technician reports that show the vulnerabilities along with fix information.
                                           te
                                        tu
                                      sti

           Basic steps to take to secure your network
                                   In
                               NS

           Now that you have seen an overview of scanning tools, you are ready to secure your network.
           Remember to get permission from your management, in writing, BEFORE you use any scanning
                           SA

           tools on your network. If your company uses a change management system, you may need to
           document your activity so that system administrators will be on alert and expect the scan.
                        ©

           Here are some basic steps to take:

               1. Get permission to perform your security scan
               2. Document the planned scanning activity
               Key fingerprint
               3. Select your =target
                                 AF19IPFA27   2F94
                                        address    998D
                                                range     FDB5 DE3D
                                                       or ranges to scanF8B5 06E4 A169 4E46
               4. Scan the target IP addresses
               5. Verify your results against your security policy (the tools demonstrated would show if
                  shares exist, but you will need to confirm whether or not they are properly secured)

© SANS Institute 2000 - 2002              As part of GIAC practical repository.                 Author retains full rights.
6. Report your findings to the appropriate system admin personnel or to management
                  (unless you are directly responsible for closing any vulnerabilities found)
               7. Get an expected closure date for any vulnerabilities found (unless you are directly
                  responsible for closing any vulnerabilities found)
               8. Close any vulnerabilities found by disabling file sharing, adding passwords or other

                                                                                              s.
                  access controls

                                                                                           ht
               9. Rescan to ensure that the vulnerabilities have been closed

                                                                                       rig
                                                                                   ull
           Other tools

                                                                                    f
                                                                                 ns
           Symantec    NetRecon
               Key fingerprint    information
                               = AF19         at: 998D FDB5 DE3D F8B5 06E4 A169 4E46
                                        FA27 2F94

                                                                              tai
           http://enterprisesecurity.symantec.com/products/products.cfm?ProductID=46&PID=6277422

                                                                           re
           PGP CyberCop ASaP available at:

                                                                       or
           http://www.mcafeeasap.com/content/cybercop_asap/default.asp

                                                                    th
           SMB Scanner Pro available at: http://www.tzsoftware.com/software/smbscanpro/index.shtml
                                                                Au
           DumpSec (formerly known as DumpAcl) available at: http://www.somarsoft.com/
                                                             2,
                                                         00
                                                      -2

           References
                                                  00

           (3) Avolio, Frederick M. “Best Practices in Network Security”. Network Computing. March 20,
                                               20

           2000.
           URL: http://www.nwc.com/1105/1105f2.html
                                           te
                                        tu

           Daviel, Andrew. “Network Security”
           URL: http://vancouver-webpages.com/security/index.html
                                      sti
                                   In

           “File And Printer Sharing And The Internet”
           URL: http://lockdown.batcave.net/issues/index.html
                               NS

           (2) Fisher, Dennis. “Insiders are main computer security threat”. eWeek. June 20, 2001.
                           SA

           URL: http://www.zdnet.com/eweek/stories/general/0,11011,2777325,00.html
                         ©

           Greenberg, Binyamin. “Implementing a Secure Network”. Nightfall Security Solutions, LLC.
           URL: http://nightfallsecurity.com/whitepapers/securenetwork.html

           (6) kM. “Lesson 3”. www.hackersclub.com
           URL:  http://www.hackersclub.com/km/newbies/lesson3/index2.html
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

           Kossuth, Joanne. “A Review of Peer-to-Peer Network Insecurities in Business Applications:
           Should you take the Risk”. February 17, 2001.

© SANS Institute 2000 - 2002               As part of GIAC practical repository.                Author retains full rights.
URL: http://www.sans.org/infosecFAQ/win/review.htm

           (1) McAfee. Virus Information Library Profile.
           URL: http://vil.nai.com/vil/virusChar.asp?virus_k=10419

                                                                                            s.
           (5) McClure, Stuart, Joel Scambray and George Kurtz. Hacking Exposed: Network Security

                                                                                         ht
           Secrets & Solutions. Berkeley: Osborne/McGraw-Hill, 1999. 63.

                                                                                     rig
           (4) Translated version of http://hispahack/ccc/de/smb.htm. Google.

                                                                                 ull
           URL:
           http://translate.google.com/translate?hl=en&sl=es&u=http://hispahack.ccc.de/smb.htm&prev=/se

                                                                                  f
           arch%3Fq%3Dsmb%2Bscanner%26hl%3Den%26safe%3Doff

                                                                               ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                            tai
                                                                         re
                                                                     or
                                                                  th
                                                              Au
                                                           2,
                                                       00
                                                    -2
                                                00
                                             20
                                          te
                                       tu
                                    sti
                                  In
                               NS
                           SA
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002             As part of GIAC practical repository.              Author retains full rights.
Last Updated: January 6th, 2021

       Upcoming Training

SANS Security East 2021                            ,                       Jan 11, 2021 - Jan 16, 2021   CyberCon

SANS Security Fundamentals 2021                    , Netherlands           Jan 18, 2021 - Jan 29, 2021   CyberCon

Cyber Threat Intelligence Summit & Training 2021   Virtual - US Eastern,   Jan 21, 2021 - Feb 01, 2021   CyberCon

SANS Cyber Security West: Feb 2021                 ,                       Feb 01, 2021 - Feb 06, 2021   CyberCon

Open-Source Intelligence Summit & Training 2021    Virtual - US Eastern,   Feb 08, 2021 - Feb 23, 2021   CyberCon

SANS Essentials Australia 2021 - Live Online       , Australia             Feb 15, 2021 - Feb 20, 2021   CyberCon

SANS Essentials Australia 2021                     Melbourne, Australia    Feb 15, 2021 - Feb 20, 2021   Live Event

SANS London February 2021                          , United Kingdom        Feb 22, 2021 - Feb 27, 2021   CyberCon

SANS Secure Japan 2021                             , Japan                 Feb 22, 2021 - Mar 13, 2021   CyberCon

SANS Scottsdale: Virtual Edition 2021              ,                       Feb 22, 2021 - Feb 27, 2021   CyberCon

SANS Cyber Security East: March 2021               ,                       Mar 01, 2021 - Mar 06, 2021   CyberCon

SANS Secure Asia Pacific 2021                      Singapore, Singapore    Mar 08, 2021 - Mar 20, 2021   Live Event

SANS Secure Asia Pacific 2021                      , Singapore             Mar 08, 2021 - Mar 20, 2021   CyberCon

SANS Cyber Security West: March 2021               ,                       Mar 15, 2021 - Mar 20, 2021   CyberCon

SANS Riyadh March 2021                             , Kingdom Of Saudi      Mar 20, 2021 - Apr 01, 2021   CyberCon
                                                   Arabia
SANS Secure Australia 2021                         Canberra, Australia     Mar 22, 2021 - Mar 27, 2021   Live Event

SANS Secure Australia 2021 Live Online             , Australia             Mar 22, 2021 - Mar 27, 2021   CyberCon

SANS 2021                                          ,                       Mar 22, 2021 - Mar 27, 2021   CyberCon

SANS Munich March 2021                             , Germany               Mar 22, 2021 - Mar 27, 2021   CyberCon

SANS Cyber Security Mountain: April 2021           ,                       Apr 05, 2021 - Apr 10, 2021   CyberCon

SANS Cyber Security East: April 2021               ,                       Apr 12, 2021 - Apr 17, 2021   CyberCon

SANS London April 2021                             , United Kingdom        Apr 12, 2021 - Apr 17, 2021   CyberCon

SANS Autumn Australia 2021                         Sydney, Australia       Apr 12, 2021 - Apr 17, 2021   Live Event

SANS Autumn Australia 2021 - Live Online           , Australia             Apr 12, 2021 - Apr 17, 2021   CyberCon

SANS SEC401 (In Spanish) April 2021                , Spain                 Apr 12, 2021 - Apr 23, 2021   CyberCon

SANS Secure India 2021                             , Singapore             Apr 19, 2021 - Apr 24, 2021   CyberCon

SANS Baltimore Spring: Virtual Edition 2021        ,                       Apr 26, 2021 - May 01, 2021   CyberCon

SANS Cyber Security Central: May 2021              ,                       May 03, 2021 - May 08, 2021   CyberCon

SANS Security West 2021                            ,                       May 10, 2021 - May 15, 2021   CyberCon

SANS Cyber Security East: May 2021                 ,                       May 17, 2021 - May 22, 2021   CyberCon

SANS In French May 2021                            , France                May 31, 2021 - Jun 05, 2021   CyberCon
You can also read