Information Security Systems Performance Assessment
Total Page:16
File Type:pdf, Size:1020Kb
Information Security Systems Performance assessment Sumit Chhuttani B.tech 2 nd year Department of Computer Science and Engineering Indian Institute of Technology (IIT), Hyderabad - [email protected] Project guide: Dr. B.M. Mehtre Associate professor Institute of Development and Research in Banking Technology (IDRBT) Road No. 1, Castle Hills, Masab Tank, Hyderabad – 500 057 http://www.idrbt.ac.in/ June 2, 2012 1 CONTENTS Certificate Declaration Acknowledgement Abstract 1. Introduction . 7 2. Process and methodology. 8 2.1 Planning and Preparation . 8 2.2 Information Gathering and Analysis . 8 2.3 Enumeration and Fingerprinting . 8 2.4 Vulnerability detection . 9 2.5 Penetration Attempt . 9 2.6 Analysis and Reporting . 9 2.7 Cleaning up . .10 3. Security Assessment Tool-Kit . 10 3.1 Categories of scanning tools . 11 4. My Handy Tool-Kit . 12 4.1 Nmap . 12 (i) Results . 13 4.2 Wireshark . .. 16 (i) What Wireshark is not? . .16 (ii) Capturing features . 17 (iii) Filters . 17 (iv) Application. 18 (v) Wireshark as a traffic analysis . 18 4.3 Tor . 18 (i) Functionality . 19 (ii) Features . 20 (iii) Disadvantages . 20 (iv) Application. 20 4.4 Nessus . 21 2 (i) Results . 21 (ii) Major vulnerabilities . 23 4.5 w3af . 27 (i) Plugins . 27 (ii) Test results . 27 (iii) Vulnerabilities in IDRBT website . 28 5. Conclusion . 32 6. Reference . 33 3 CERTIFICATE This is to certify that project report titled “Information Security Systems: Performance Assessment” submitted by Sumit Chhuttani of B.tech. 2 nd year, dept. of Computer Science and Engineering, IIT Hyderabad is record of a bonafide work carried out by him under my guidance during the period 4 th may 2012 to 4 th July 2012 at Institute of Development and Research in Banking Technology, Hyderabad. The project work is a research study, which has been successfully completed as per the set objectives. Dr. B.M. Mehtre Associate Professor IDRBT,Hyderabad 4 DECLARATION I declare that the summer internship project report titled “Information Security Systems: Performance Assessment” is my own work conducted under the supervision of Prof. B.M. Mehtre at the Institute of Development and Research in Banking Technology, Hyderabad. I have put in 61 days of my attendance with my supervisor at IDRBT and have been awarded project fellowship. I further declare that to the best of my knowledge, the report does not contain any part of any work which has been submitted for the award of any degree either in this institute or any other institute without proper citation. Sumit Chhuttani B.tech 2nd year Dept. of Computer Science and Engineering IIT Hyderabad 5 Information Security Systems Performance assessment Abstract This report is about preparing a professional security consultant’s toolkit for performing tasks such as reconnaissance, network scanning, and exploiting the vulnerabilities. Literally thousands of tools—both commercial and open source—are available to professionals who need to assess their network's security. The trick is having the right tool for the job when you need it and being able to trust it. Nowadays everyone is moving towards e-banking and all the information is flowing through the network.The account number, expiration date and possibly the cardholder's name are sent from the point of payment to a processor, which is then sent to the card issuer — often a bank — which ultimately authorizes the transaction. The actual transfer of money occurs later. Processing companies, which perform millions of authorizations each day, are supposed to encrypt card information. But a breach could occur if someone gains access to the system and identifies a gap in the encryption. So, to stop these kinds of breaches, it is necessary for an enterprise to ensure end-to-end security. Many people mistakenly think that network security means installing a firewall and forgetting about it. But security is an on-going, everyday practice of perseverance and diligence. Sure, you need a firewall, but you also need to develop good habits, which include routine checks and analysis. This practice requires some specialized tools to get the job done quickly and easily, and I can recommend a few basic tools that you need in your toolkit and explain how to use them.This document explores the usage of some vulnerability tools, namely Nmap, Wireshark, Nessus, w3af etc. To explore the usage of the given tools, various tests were made with them to penetrate the given system and the results are presented in this report. 6 1. Introduction Recently as a consequence of growing hacker's activity, periodically occurring technical faults and compliance issues, information security have become tasks of the highest concern for most of organizations. Security systems aim for control of access to a computer system's resources, specially its data and operating system files. The three pillars of security are: Confidentiality, Integrity and Availability (CIA). Security in its most basic meaning is the protection of asset from or absence of danger. The motive behind using security system performance assessment model is to ensure that necessary security controls are integrated into the design and implementation of system. Vulnerabilities and exposures in most environments are due to poor system management, patches not installed in a timely fashion, weak password policy, poor access control, etc. Therefore, the principal reason and objective behind penetration testing should be to identify and correct the underlying systems management process failures that produced the vulnerability detected by the test. Our Aim is to evaluate the security of the information system or network set up by an organisation by simulating the attack from a malicious hacker. • It involves gathering the information about the system, such as its IP Address, Operating System, status of the ports etc. • It also involves identification of the vulnerabilities present in the system due to the various reasons Security assessment consists of four fundamental phases: Reconnaissance , Enumeration , Assessment and Exploitation. The reconnaissance phase involves discovery of the network devices through alive scanning via Internet Control Message Protocol (ICMP) or TCP.During the enumeration and assessment phases, the security assessor determines whether a service or application is running on a particular host and assesses it for potential vulnerabilities. In the exploitation phase, the assessor leverages one or more vulnerabilities to gain some level of privileged access to the host and uses this access to further exploit the host or to escalate privilege on that host or throughout the network or domain. Process and Methodology for Security assessment is explained in Section 2 in detail. 7 2. Process and Methodology 2.1 Planning and Preparation For carrying out a penetration test for an organisation, lots of preparation is needed. Before starting, ideally there should be a meeting between the officials and the penetration testers. In this meeting, they should decide the scope, extent and the aim of the penetration test. Generally, the aim of the Penetration Test is to demonstrate the presence of weakness in the network infrastructure which might compromise it.The scoping of the penetration test is done by identifying the machines, systems and network, operational requirements and the staff involved. Also, agreement must be there on the form of the output result. Another important aspect on which planning is required is the duration and the timing of the test. The test should be carried out in such a way that it has a minimal effect on the normal work and everyday processes. A tester may have to decide on some particular interval during the day in which he wants to carry out the test. Testing during the intervals of heavy and critical use should be avoided. There is a possibility that the test might crash the system due to the unusual network traffic created by it. So, possible measures should be taken to deal with any future system failure and if such a risk cannot be tolerated, then such system should be excluded from the test 2.2 Information Gathering and Analysis After the planning and preparation, the next step is to gather as much information as we can about the target system. For this purpose, there are plenty of tools available online which allow you to do network survey. A network survey is an introduction to the system. It allows us to find the reachable hosts in the system. Through a network survey, we get information about the following fields: • Domain names • Server names • Internet Service Provider • IP addresses of hosts • Network map After completing a network survey, the next task to be done is a port scan. There are basically about 65,000 possible TCP and UDP ports. The basic results obtained from a port scan are a list of open ports on a particular IP addresses. At this point system information like the operating system should also be associated with the IP address. 2.3 Enumeration and Fingerprinting Target network enumeration and host fingerprinting are crucial parts of both legitimate penetration testing and a hacking attack. You cannot go on the offensive without detailed terrain mapping and target reconnaissance. A great deal of enumeration and fingerprinting tools such as ping, trace route, whois, dig, host, and various port scanners (especially Fyodor's Nmap) are already available on internet and elsewhere. Specific targets are determined in this phase. Various services and open ports are determined. Operating system enumeration is also done. The methods used for the same can be: • Banner grabbing 8 • Responses to various protocol (ICMP &TCP) commands • Port / Service Scans – TCP Connect, TCP SYN, TCP FIN, etc . 2.4 Vulnerability Detection The next step after gathering of relevant information is to determine the vulnerability that exists in each of the systems in the network. The Tester needs to have a collection of exploits and vulnerabilities for this purpose.