Q: Exploit Hardening Made Easy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Hardening Linux
eBooks-IT.org 4444_FM_final.qxd 1/5/05 12:39 AM Page i eBooks-IT.org Hardening Linux JAMES TURNBULL 4444_FM_final.qxd 1/5/05 12:39 AM Page ii eBooks-IT.org Hardening Linux Copyright © 2005 by James Turnbull All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. ISBN (pbk): 1-59059-444-4 Printed and bound in the United States of America 987654321 Trademarked names may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, we use the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Lead Editor: Jim Sumser Technical Reviewer: Judith Myerson Editorial Board: Steve Anglin, Dan Appleman, Ewan Buckingham, Gary Cornell, Tony Davis, Jason Gilmore, Chris Mills, Dominic Shakeshaft, Jim Sumser Project Manager: Kylie Johnston Copy Edit Manager: Nicole LeClerc Copy Editor: Kim Wimpsett Production Manager: Kari Brooks-Copony Production Editor: Kelly Winquist Compositor: Linda Weidemann Proofreader: Lori Bring Indexer: Kevin Broccoli Artist: Kinetic Publishing Services, LLC Cover Designer: Kurt Krames Manufacturing Manager: Tom Debolski Distributed to the book trade in the United States by Springer-Verlag New York, Inc., 233 Spring Street, 6th Floor, New York, NY 10013, and outside the United States by Springer-Verlag GmbH & Co. KG, Tiergartenstr. 17, 69112 Heidelberg, Germany. In the United States: phone 1-800-SPRINGER, fax 201-348-4505, e-mail [email protected], or visit http://www.springer-ny.com. -
Operating Systems & Virtualisation Security Knowledge Area
Operating Systems & Virtualisation Security Knowledge Area Issue 1.0 Herbert Bos Vrije Universiteit Amsterdam EDITOR Andrew Martin Oxford University REVIEWERS Chris Dalton Hewlett Packard David Lie University of Toronto Gernot Heiser University of New South Wales Mathias Payer École Polytechnique Fédérale de Lausanne The Cyber Security Body Of Knowledge www.cybok.org COPYRIGHT © Crown Copyright, The National Cyber Security Centre 2019. This information is licensed under the Open Government Licence v3.0. To view this licence, visit: http://www.nationalarchives.gov.uk/doc/open-government-licence/ When you use this information under the Open Government Licence, you should include the following attribution: CyBOK © Crown Copyright, The National Cyber Security Centre 2018, li- censed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/open- government-licence/. The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of education, training, course development, professional development etc. to contact it at con- [email protected] to let the project know how they are using CyBOK. Issue 1.0 is a stable public release of the Operating Systems & Virtualisation Security Knowl- edge Area. However, it should be noted that a fully-collated CyBOK document which includes all of the Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas KA Operating Systems & Virtualisation Security j October 2019 Page 1 The Cyber Security Body Of Knowledge www.cybok.org INTRODUCTION In this Knowledge Area, we introduce the principles, primitives and practices for ensuring se- curity at the operating system and hypervisor levels. -
NIST SP 800-123, Guide to General Server Security
Special Publication 800-123 Guide to General Server Security Recommendations of the National Institute of Standards and Technology Karen Scarfone Wayne Jansen Miles Tracy NIST Special Publication 800-123 Guide to General Server Security Recommendations of the National Institute of Standards and Technology Karen Scarfone Wayne Jansen Miles Tracy C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 July 2008 U.S. Department of Commerce Carlos M. Gutierrez, Secretary National Institute of Standards and Technology James M. Turner, Deputy Director GUIDE TO GENERAL SERVER SECURITY Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-123 Natl. Inst. Stand. Technol. Spec. Publ. 800-123, 53 pages (Jul. 2008) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. -
Secure Operating Systems Christopher A
1 Secure Operating Systems Christopher A. Wood Department of Computer Science Rochester Institute of Technology [email protected] Abstract—Operating system development is a very diverse task, There has been substantial research in operating system usually drawing from various applications of Computer Science, design for security, and there are many different flavors of Software Engineering, Computer Engineering, and Information these designs available for use. An analysis of these different Technology. As such, the complexity of most usable systems is significantly higher than traditional software projects. This fact implementation shows that each operating system is unique in presents a problem when implementing security features and how it handles security, and the only way to learn about these policies for existing systems. Often times it is already too late systems is to analyze them one by one. in the development process to make any substantial headway, Therefore, the work of this project and paper is as follows. and any gain from newly added features will likely not be good Firstly, program errors and flaws and software engineering enough to deter determined attackers. Therefore, security needs to be involved in the development process and system design practices used to prevent such errors are explored as the from the very beginning in order to be effective. influence for all operating system security designs. Second, This work explores operating system security concepts that common operating system security concepts are discussed to should be at the foundation of any usable system. Specifically, give a foundation for the case studies analyzed. Thirdly, dif- it covers program and operating system security concepts that ferent operating system implementations are examined from a are present in modern systems. -
OS Hardening Making Systems More Secure
OS Hardening Making systems more secure Seminar paper Ausgew¨ahlte Kapitel der IT-Security Author: John Ostrowski Student identification number: 1710475050 Date: 28.1.2020 Contents 1 Introduction 1 2 Security Requirements 2 2.1 Security Requirements . .2 2.2 Operating System Security Evaluation . .3 2.3 Common Threats . .4 3 OS Hardening 8 3.1 Safe Environments . .8 3.2 Access Control . 11 3.3 Reducing the Attack Surface . 14 4 Conclusion 15 Bibliography 16 i Chapter 1 Introduction The operating system (OS) serves as the intermediary between the computer's hard- ware and the application programs. It assists the user in performing operations on the underlying physical components and manages the interactions between different devices connected to a computer system. The two main activities are processing and the coordination of the input/output (I/O) devices connected to the computer system. Processing includes the management and scheduling of different user programs run- ning simultaneously as well as the definition, management and preservation of data in memory. Since multiple internal and external users and programs can interact with one com- puter system at the same time, the OS has to ensure that they only can read and write to files and devices where they have permission to. Otherwise, data can be stolen and used maliciously. [SGG13] To reduce the attack surface of an operating system different procedures and poli- cies need to be enforced to allow for a secure operation of a system. This process is called \operating system hardening"[PP09] In this paper the term security is explored and applied to the security requirements of an operating system. -
Hardening Linux and Introducing Securix GNU/Linux Hardening Basics
Hardening Linux and introducing Securix GNU/Linux Hardening basics From lowest to highest level Tune every part of system and applications Follow standards and security policies Regularly check system health Install security patches when possible Log and audit every action secured linux by default | www.securix.org Physical security Locked rack BIOS setup password Console in different rack // How it helps? Avoid unauthorized access where somebody can: - shutdown server - reboot server into single-user mode and change password - boot live CD and access data - sniff data on ethernet cable - steal hard disks Encrypting partitions its essential to have encrypted all partitions except /boot and swap ( / , usr, home, var, opt, tmp) no impact on resources where is HW acceleration possible my recommendation is LUKS cryptsetup -c aes-xts-plain -y -s 512 -h whirlpool luksFormat /dev/xyz // How it helps? data stored are unreadable for attacker passwords can’t be changed during boot from live CD secured linux by default | www.securix.org Securing Grub protect grub using password password --md5 $1$Ul0TR0$fK/7jE2gCbkBAnzBQWWYf/ generate hash using grub-md5-crypt protect single-user boot via password as well setup fallback option // How it helps? avoid unauthorized single-user mode boot fallback in case of problems with new kernel secured linux by default | www.securix.org Kernel configuration enabled only options which are really needed - smaller/faster kernel - secure - big piece of code isn't really needed enabled PaX and Grsecurity - no LSM - robust multi-level security system Securix have minimalistic predefined kernel setup which should boot on many systems by default secured linux by default | www.securix.org /etc/securetty limit root access to console and serial port only # file: /etc/securetty # limit root access console vc/1 tty1 tty2 # serial console access ttyS0 ttyS1 .. -
Detecting Malicious Behavior in Openwrt with QEMU Tracing
Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2019 Detecting Malicious Behavior in OpenWrt with QEMU Tracing Jeremy Porter Wright State University Follow this and additional works at: https://corescholar.libraries.wright.edu/etd_all Part of the Computer Engineering Commons, and the Computer Sciences Commons Repository Citation Porter, Jeremy, "Detecting Malicious Behavior in OpenWrt with QEMU Tracing" (2019). Browse all Theses and Dissertations. 2118. https://corescholar.libraries.wright.edu/etd_all/2118 This Thesis is brought to you for free and open access by the Theses and Dissertations at CORE Scholar. It has been accepted for inclusion in Browse all Theses and Dissertations by an authorized administrator of CORE Scholar. For more information, please contact [email protected]. Detecting Malicious Behavior in OpenWrt with QEMU Tracing A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Cyber Security by JEREMY PORTER B.S., The Ohio State University, 1999 2019 Wright State University WRIGHT STATE UNIVERSITY GRADUATE SCHOOL July 19, 2019 I HEREBY RECOMMEND THAT THE THESIS PREPARED UNDER MY SUPER- VISION BY Jeremy Porter ENTITLED Detecting Malicious Behavior in OpenWrt with QEMU Tracing BE ACCEPTED IN PARTIAL FULFILLMENT OF THE REQUIRE- MENTS FOR THE DEGREE OF Master of Science in Cyber Security. Junjie Zhang, Ph.D. Thesis Director Mateen Rizki, Ph.D. Chair, Department of Computer Science and Engineering Committee on Final Examination Junjie Zhang, Ph.D. Krishnaprasad Thirunarayan, Ph.D. Meilin Liu, Ph.D. Barry Milligan, Ph.D. Interim Dean of the Graduate School ABSTRACT Porter, Jeremy. -
Understanding and Hardening Linux Containers June 29, 2016 – Version 1.1
NCC Group Whitepaper Understanding and Hardening Linux Containers June 29, 2016 – Version 1.1 Prepared by Aaron Grattafiori – Technical Director Abstract Operating System virtualization is an attractive feature for efficiency, speed and mod- ern application deployment, amid questionable security. Recent advancements of the Linux kernel have coalesced for simple yet powerful OS virtualization via Linux Containers, as implemented by LXC, Docker, and CoreOS Rkt among others. Recent container focused start-ups such as Docker have helped push containers into the limelight. Linux containers offer native OS virtualization, segmented by kernel names- paces, limited through process cgroups and restricted through reduced root capa- bilities, Mandatory Access Control and user namespaces. This paper discusses these container features, as well as exploring various security mechanisms. Also included is an examination of attack surfaces, threats, and related hardening features in order to properly evaluate container security. Finally, this paper contrasts different container defaults and enumerates strong security recommendations to counter deployment weaknesses– helping support and explain methods for building high-security Linux containers. Are Linux containers the future or merely a fad or fantasy? This paper attempts to answer that question. Table of Contents 1 Introduction ................................................................................ 5 1.1 Motivation ........................................................................... 6 -
University of Piraeus Department of Digital Systems Systems Security Laboratory
University of Piraeus Department of Digital Systems Systems Security Laboratory M.Sc. in “Techno-economic Management & Security of Digital Systems” Master Thesis Development of a Secure Linux Distribution Panagiotis Tsesmetzis February, 2014 Supervisor Professor Sokratis K. Katsikas, University of Piraeus 3 Examination Board Professor Sokratis K. Katsikas, University of Piraeus Associate Professor Konstantinos Lambrinoudakis, University of Piraeus Assistant Professor Christos Xenakis, University of Piraeus 4 Contents CONTENTS ACKNOWLEDGEMENTS ........................................................................................................ 7 ABSTRACT ........................................................................................................................... 8 1. INTRODUCTION............................................................................................................ 9 1.1 Problem Definition ....................................................................................................... 9 1.2 Thesis Structure ......................................................................................................... 10 1.3 Contribution ............................................................................................................... 10 2. CREATING A NEW OPERATING SYSTEM ....................................................................... 11 2.1 Introduction ............................................................................................................... 11 2.2 Benefits