Kinder, Gentler Security Scans? 54
klausner asks: "I'm working at a large company that is trying to be more thorough about things like network security scanning. When Security told Operations they were planning to do this, there were immediate screams of anguish, and insistence that scans could only be done in the maintenance window, only with prior notice, and with a bunch of other restrictions. Needless to say, this is less than ideal. Given the size of the network, it would take weeks to do a single scan set. However, it is reasonable to take steps to ensure that the scans do not interrupt business traffic, or cause undesirable side effects like crashing target systems. What sort of limits are the readers out there using to ensure safe scanning? Limiting the bandwidth to a fixed percentage? Limiting the number of simultaneous tests? What other kinds of things can I do to limit the scans effect on network performance?"
For starters you could model your network (Score:4, Informative)
That should give you a clue of who to scan and how often to scan them. Probably more intelligent than scanning your whole network all the time.
Re:For starters you could model your network (Score:2)
Test mechanisms this way. Not organizations.
Re:For starters you could model your network (Score:3, Interesting)
A lot like police work in the real world, they cannot be everywhere at once, but (provided they are honest) they tend to congregate around areas were they have had lots of trouble in the past. This obviously doesn't stop all crime, and it might not even deter all crime in the areas they are patroling. However, given t
Re:For starters you could model your network (Score:1)
Not once have I heard of a major crime occuring in a donut shop parking lot...
Re:For starters you could model your network (Score:2)
Re:For starters you could model your network (Score:2)
Much of this is a paper/whiteboard exercise. You still have to test, at some time.
What are your companies priorities (Score:5, Insightful)
Security is a range, it isn't a switch. If maximum compute power is of upmost important to you - go ahead, turn off all your virus scanners, personal firewalls, etc. . However, if you need security - turn those services on, monitor their compliance, and take the overhead that it requires.
Scanning for security vulnerabilities at night won't do you any good if the PHB takes his laptop home w/ him, or joe user powers off his virus ridden PC every night before heading home. You must scan during the day (again, if that is important to your business).
Re:What are your companies priorities (Score:2)
It's not as black and white as you make it out to be. Of course, running virus scans and the Baseline Security Analyzer can happen during the day. That's not the only issue.
Re:What are your companies priorities (Score:2)
Two things to consider
I never did it again.
I got to do it once, which was plenty to run the tests that I needed to run. My code held up under load, which was what I needed to find ou
Re:What are your companies priorities (Score:2)
On the other hand, there's got to be a point at which management does need to take security seriously. This includes allowing scanning of systems during production hours. I'd suggest doing some preliminary (proof-of-non-intrusiveness) scans
Heh, ignore 'em. (Score:3, Interesting)
Re:Heh, ignore 'em. (Score:2)
Scans usually took over an hour. Over an hour where your system was barely usable. Every day.
Re:Heh, ignore 'em. (Score:2)
Re:Heh, ignore 'em. (Score:2)
Now that I think about it, it may have run at normal priority. Still interfered with everything. I asked the guys who set it up if they could knock the priority down a notch but they never did.
Re:Heh, ignore 'em. (Score:2)
Even at lowest priority, a Symantec Antivirus scan will bring any desktop to a screeching halt. The company I work for has daily virus scans, at noon. It is set to lowest priority and programs take roughly 20-40 times as long as usual to load or do other hard disk bound operations. Being partly in charge of that, I've tried to reduce the disruption caused by the scans as much as possible, but my bosses disagree with my opinion that the scans should be rescheduled to either after
Re:Heh, ignore 'em. (Score:2)
Don't piss off the users (Score:1, Interesting)
Re:Don't piss off the users (Score:1)
fun fun (Score:2, Interesting)
Re:fun fun (Score:2, Informative)
Don't tell anyone! (Score:2)
It's guerilla warfare!
Re:Don't tell anyone! (Score:2)
You forgot the parts about eating only ramen, getting your house/car reposessed, losing your girlfriend/wife/family and having no money while you deal with getting your job back through the courts. Too many have played that game and los
Profile your network (Score:4, Informative)
Second look at the least common ports. These will be the oddball services that an administrator tossed up to test, or an engineer was trying to sneak past security with, and are most likely to be overlooked when updates are released.
Third, look at the most common ports. If you have a lot of machines with port 80 open, you should invest some time into researching web vulnerabilities. Same for other protocols. Based on these results you can launch smaller scans within maitnence windows to check for say, open relays on all machines listening on port 25.
Building apon this process and fitting it to your situation would be a good course of action. This obviously isn't as indepth as a good auditing plan should be, but it will get you going in the right direction.
Also realize that yout operations team has a good point, regardless of how concerned about security you are. Don't do like I did and take a off the shelf application (Nessus or Cisco Security Scanner) and blast away at your network. I ended up taking down a dozen mission critical devices because the vendor of the hardware in question didn't account for portscans. The devices ended up hanging because they received a connection with no command in it.
Re:Profile your network (Score:2)
Sounds like your security scan on those devices was successful.
Re:Profile your network (Score:1)
Restrictions (Score:4, Funny)
Just make sure Operations let the crackers know about these restrictions as well, and you'll be fine.
Memo: (Score:3, Funny)
To: Network Operations
In accordance with your policy on security related network traffic, please be advised that I will attempt to DDOS the web server located at IP XXX.XXX.XXX.XXX and compromise the database server located at IP XXX.XXX.XXX.XXX, starting shortly after the start of the maintainence window at 8:00 UTC. If all goes successfully, the database will be corrupted by 9:00 UTC and the DDOS will cease shortly thereafter. All due efforts will be taken to minimize effects on connectivity for other networks users, and network traffic for this sequrity breach will be limited to the two above mentioned IP addresses.
I appologize for any inconvieniece this may cause you, but it is nessasary to "ownerz" your system.
Thank You,
Jack Cracker
Vice Prezident of Black Hats P.S. I would appreciate it if you would facilitate my exploit by reverting to an unpatched version of IIS on the database server.
Experiences (Score:4, Insightful)
If your company want's you to do scheduled scans during maintenance windows, that is rather simple however. You can implement this with Nessus in command-line mode, called from crontab. Just be certain that when you are configuring your scan, that you do not perform any potential denial of service scans.
But to be honest, I've been blase' a few times and on a whim pointed my Nessus box at our internal exchange server and highly expensive monitoring cluster and scanned away - nothing horrible has come of it - apart from discovering about 10 remote root vulnerabilities on each. That is the main concern from these people I believe, that the security scans will highlight something they know they're slack in - regular patching.
If you run into any departments who point at a particular system and say "don't scan that - it's mission critical", get the highest manager responsible for that system and get him to personally sign off that he's unwilling to allow a scan. Then remind him of recent privacy laws that have come into force. If that mission critical server is holding customer data, and it gets cracked, he or the company may be liable for failing to perform due diligence with regards to securing their data. And you'll have their signoff on paper.
Get a Good Scanner First (Score:2, Informative)
question... (Score:2)
(i.e. how much of it is due to the fact that the machine might be unavailable to regular users during the test, because a service might crash, and not the impact of testing itself?)
It's a pretty well known anecdote that there are some network vulnerability tests that will find "vulnerable" machines... Those vulnerable machines b
Scan anyway (Score:1)
If the apps folks are so nervous about things, just remark that if their systems are well built, they will handle a scan with no problems.
A tip (Score:2)
For one, automated scans probably won't catch half of your problems. And two, anything that disruptive to your business probably costs money than it'll bring in. In any worthwhile business venture, the benefits must outweigh the cost. Look at your setup and try to identify your top risks. By prioritizing your risks based on your guess of the damage*frequency/costToPrevent of each, you should be able to achieve a greater level of security much faster and cheaper than wi
just go slow, and let them get used to it. (Score:3, Insightful)
They should be scheduled, so that if something does go wrong they can at least ask you to scan again and reproduce the problem, or eliminate your work from the list of suspects. If you do it without telling them and it causes problems that they spend hours or days figuring out, you can bet you will be confined to 3am forever thereafter.
Screw operations. (Score:4, Informative)
Is security in charge of making sure everything is patched also, or is operations in charge and they are trying to cover their ass by making you forewarn them of your scan?
Your production network should be segmented from the general network, and critical portions of the general network (say, helpdesk, hr, etc) should be on their own segments. This allows you to scan one entity at a time and if something does break, you have a defined area for your desktop support team to work in.
Regardless of if you must wait for a maintenance window for production equipment, who will get the blame if something breaks? Do the scan on the weekend, on test servers, whatever you can do the easiest first. You should have a standard build for servers, desktops, etc... and be able to test those systems and see the effects.
The release time between an exploit being found and being exploited is growing shorter all the time. What was the leadtime for sasser? Two, three weeks? The netops people here are shutting off the ports of systems that are not patched at the switch level already. The network comes to a crawl while they are doing the scans. And guess what? They do them during the day. Why? Because that is when people are at work! A maintenance window is useless if you cannot guarantee what percentage of your population you are going to hit. So if your window is 1am to 3am, you better be scanning a network full of Indian helpdesk agents.
If you are responsible for security... (Score:3, Interesting)
(1) Insuring that your network is as resistant to attacks of any sort as possible.
(2) Identifying any attacks and investigating the cause thereof.
(3) Mitigating the effects of attacks while they are being done.
With this setup, you should have one more clause: That security specialists should be allowed to do whatever is necessary to fulfill the above three items, even using unconventional methods, provided that:
(1) They receive (written) permission from the person in charge of all security before implementing a new method.
(2) Their methods do not interefere with normal business unless required by (3) above (eg, shutting down mail access in the case of a mail storm.)
With those goals outlined, the security team should be able to use pretty much whatever methods they chose to do their job.
Re:If you are responsible for security... (Score:3)
Every responsible security professional I know has a long, detailed contract detailing every possible test they may carry out, times, locations, and goals. Most make sure that both the CIO and the head of the legal department sign the document in person. The original of the document is then kept off-site, in their possession.
Even when you are a full time employee, make sure the job description on file with the HR department states clearly it
Re:If you are responsible for security... (Score:2)
Had a company that had just started doing retail sales via the net. Contacted me about doing a security review of their site. "We would like to know if it can be broken."
I asked them if I should attempt:
To make accessing the site difficult or impossible?
To modify the site?
To obtain merchandise via the site without paying?
To obtain customer info from their site.
To attack or coopt networking infrastructure at their site?
To attack or coopt infrastructure upstream
Before sending a single packet (Score:3, Insightful)
Before starting, make sure your tools can be configured to avoid scans of sensitive equipment during work hours. You should know exactly where each server and router is on your network, and run scans against them during maintenance windows, when a crash will not impact the company and the admins are available to bring the systems back up.
For lesser important servers, scans should be run only once in a great while. For the vast majority of your IP space, where luser PCs lie, then security scans should be run during the time they will most likely be on, which is during normal work hours.
When you can categorize all of the IP space into levels of importance to corporate revenue, then you need to tune your tools to have as little impact as possible on important systems. This means turning off nasty parts of Nessus, and addressing those threats via other means (mandatory patch rollouts, system level reports). You should not be trying to make anything crash, because that is counter to good security practices. A DoS from the security group is just as effective as a DoS from some blackhats.
If the network is large enough, there should be a budget for multiple scanning machines. Since it can take 20 to 40 minutes to politely scan a single machine, you will need to have machines local to each segment of your network and scan in parallel. There are a number of commercial scanners which will consolodate the reports to a central server.
Automated scans against PCs should run during the day. Some automated scans need to run against infrastructure machines, but since those machines are on 24x7, the scans can be run at night. Manually scan important machines when the admins who can fix them are on hand to see and patch any problems found.
the AC
Re:Before sending a single packet (Score:2)
I disagree. Crackers will not do you the favor of waiting until convenient times to stress your network. If a security scan brings down a server in the middle of the da
Skybox (Score:2)
As far as I can see, it scans your network for the versions of software in use on each host to create a model, then performs simulated scans on that model.
I'm skeptical, but it might be worth looking into.
No, it's not Free (or even gratis).
--
Amanda go boom (Score:2)
I don't think he ever got the point.
Security is not and never will be a throw of a switch. It covers territories that include the physical, social, and electronic realms. It's constantly evolving and mutating, proactively in hope of avoiding attacks as well as in response to identified threats. Security is a constant battle agai
scanning without creating a DOS (Score:1)
Scan after hours/on the weekend
Consider using a passive vulnerability scanners (e.g. http://www.tenablesecurity.com/nevo.html )
Do a distributed scan
Use unaggressive settings
*******
One of the foremost security gurus of TCP/IP like Dan Kaminsky of Paketto Keiretsu/blackhat/defcon fame has some novel ways of performing network scans too. You might want to consider reading over his material at http://www.doxpara.com/
Re:scanning without creating a DOS (Score:1)
Well. (Score:2)
Step one: Make it abundantly clear to everybody involved, and get management/executive signoff, that you're looking to 'improve security.' You're not looking to expose incompetence, to find people to be fired, and so on. It's like bringing in outside auditors to go over the books every once in a while; it's not that your own beancounters are screw-ups, it's that you don't take chances with this kind of shit.
Step two: Compromise; arrange for a military style 'wargame.' No, not that kind of wargame. Sta
Re:Well. (Score:1)
If the purpose is to place blame, it can only lead to anxiety, fear, and non-cooperation. If the purpose really is to help, without any blame, then everyone can relax and cooperate.
There is a huge difference between: "We intend to fire the person whose machine is vulnerable." and "We need to find the machines that are broken, so we can fix them before there is a serious problem."
what are they afraid of? (Score:1)
Why are the ops guys so nervous? Could it be that a security scan would show how careless they've been with their systems?
Re:what are they afraid of? (Score:1)
Re:what are they afraid of? (Score:1)
Disappointing Replies (Score:1)
This isn't about workstations. I should have been more clear. This about money generating production machines. Operations doesn't care about workstations. That's an IT/Helpdesk issue. This is about thousands of servers and network devices. As I said, this is a LARGE company.
This isn't about what's in a job