Network Hardening of Multilayer Switch
Total Page:16
File Type:pdf, Size:1020Kb
M¨alardalenUniversity School of Innovation Design and Engineering V¨aster˚as,Sweden Thesis for the Degree of Bachelor of Science in Engineering - Computer Network Engineering 15.0 hp NETWORK HARDENING OF MULTILAYER SWITCH David S¨oderman [email protected] Peter Pekkanen [email protected] Examiner: Johan Akerberg˚ M¨alardalenUniversity, V¨aster˚as,Sweden Supervisors: Shunmuga Priyan Selvaraju M¨alardalenUniversity, V¨aster˚as,Sweden Company supervisor: Patrik Lundgren, Westermo Network Technologies, V¨aster˚as May 26, 2021 D S¨odermanP Pekkanen Network Hardening of Multilayer Switch Abstract In today's computer networking and industrial networking, security holds a significant role in keep- ing the entire network safe from malicious users or attackers from remote locations. Using vulner- ability scanners and a port scanner it is possible to detect vulnerabilities on the network equipment before an attacker finds the vulnerability and exploits it. In this thesis network hardening has been conducted through a case study on a multilayer switch, with the intent to discover vulnerabilities related to gaining unauthorized access to the device during operation. The tools included in this process involves vulnerability scanner Nessus, Metasploit project and Nmap to cover a wide scope of known vulnerabilities detectable with these tools. The results gathered from the vulnerability scans detects vulnerabilities on the device of various types that could assist an attacker, as they tried to breach the device, this method to approach network hardening shows that different types of vulnerabilities can be detected on the device. To be able to detect more in-depths vulnerabilities and being able to track distinct attacks such as Denial of Service (DoS) additional tools needs to be added to cover a wider scope of attack vectors on the device. With further enhancements to the set of tools to detect vulnerabilities, it will be able to cover a much larger scope of different attack vectors and contribute more towards finding vulnerabilities. i D S¨odermanP Pekkanen Network Hardening of Multilayer Switch Table of Contents 1. Introduction 1 2. Background 2 2.1. Lynx 5512-E-F4G-T8G-LV...............................2 2.2. Westermo Operating System (WeOS).........................2 2.3. IEC 62443-4-2 draft...................................2 2.4. Metasploit project....................................2 2.5. Nmap...........................................2 2.6. Nessus...........................................3 2.7. Wireshark.........................................3 3. Related Work 3 3.1. The HAVECA-model: a method for continuously securing the internal network against a trusted third party..............................3 3.2. Network Hardening An Automated Approach To Improving Network Security...3 3.3. Penetration Testing: Concepts, Attack Methods, And Defense Strategies.....4 3.4. Protection Against Penetration Attacks Using Metasploit..............4 4. Problem Formulation4 5. Method 6 6. Ethical and Societal Considerations7 7. Vulnerability Testing8 7.1. Typology Mapping....................................8 7.2. Selection Of Exploits...................................8 7.3. Metasploit Exploits....................................9 7.3..1 Setup Process Metasploit............................9 7.4. Nesssus Plugins...................................... 10 8. Results 11 8.1. Metasploit Implementation............................... 11 8.2. Nessus Implementation.................................. 11 8.3. Vulnerabilities....................................... 12 9. Discussion 14 10.Conclusion 15 References 16 A Appendix Metasploit 16 B Appendix Nessus 16 List of Figures 1 Workflow Chart......................................6 2 Topology.........................................8 3 Metasploit Testing Result................................ 11 4 Nessus Testing Results.................................. 12 ii D S¨odermanP Pekkanen Network Hardening of Multilayer Switch 1. Introduction Network hardening is the process that involves securing a network through reducing the possible attack vectors. For example, in a traditional network private active management interface on a router could be exposed to a public network due to misconfiguration of the router. This exposes a major vulnerability for the network device that allows for anyone to connect themselves to the interface and access the management network. Through network hardening, vulnerabilities such as the forementioned vulnerability or other similar vulnerabilities in the system can be detected and resolved before a hacker finds the vulnerability and exploits it. For this thesis, we are performing network hardening on a Lynx-5512-E-F4G-T8G-LV multilayer switch running a Linux kernel as its core, developed by Westermo Network Technologies [1]. he device is a gigabyte multilayer switch, supporting ethernet in layer 2 (Data Link Layer) and IP (Internet Protocol) in layer 3 (Network Layer) according to the OSI-model [2]. The goal is to discover vulnerabilities related to gaining unauthorized access on the device. To achieve our goals, we will study related works in network hardening. This will inform us how previous studies has been performed in network hardening. Once we obtain enough information how its performed, we will adjust the method used in related works and applying the method towards the research questions of this thesis. We will work directly with the device to perform a case study using two vulnerability scanners in various active configurations of the device. These scans are meant to yield data showing possible vulnerabilities on the active configuration of the device. After our case study, we will construct an attack graph, giving us an overview of the detected vulnerabilities. Working with the attack graph, we will systematically analyse the vulnerabilities and propose solutions how each vulnerability can be resolved. Previous works have not been related to this specific device. This leaves an opportu- nity for a study to be conducted in network hardening for this specific device as expected by the industrial case provider. Yielding interesting data on how to approach hardening on a network device running a Linux kernel as its core, that is not as widely known for the public. The method of testing our network device will also apply to other Linux systems that performs networking on both layer 2 and layer 3 following the OSI-model [2]. The results of the thesis will also assist the company to certify the device according to the IEC 62443-4-2 cybersecurity standard, and further improvement of the security on the device. The thesis is organized as follows: Section 2 introduces the device to perform the network harden- ing on, the IEC 62443-4-2 standard and the tools used to perform the vulnerability scans. Section 3 analyses previous works related to network hardening. Section 4 explains the purpose of the thesis and introduces the research questions to answer and the limitations. Section 5 describes the method of choice for the thesis. Section 6 explains the ethical and societal considerations. Section 7 presents the topology and how the vulnerability scans are performed on the network device. Section 8 presents the results and implications of each vulnerability discovered. Section 9 discusses the work that has been performed and the challenges faced throughout the thesis. Section 10 concludes the thesis and presents future directions. 1 D S¨odermanP Pekkanen Network Hardening of Multilayer Switch 2. Background This section will describe the device to perform network hardening on, the IEC standard and the tools used in this thesis to perform hardening on the device. 2.1. Lynx 5512-E-F4G-T8G-LV Lynx 5512-E-F4G-T8G-LV [1] is a high-performance industrial gigabit multilayer switch developed by Westermo Network Technologies. Ideal implementations of this device are within an industrial network, to handle big data and to accomplish high bandwidth requirements within the industrial network. The device is designed to withstand temperatures between -40°C and 70°C, making it ideal to withstand harsh environments within various industrial networks. The device runs the operating system (OS) Westermo Operating System 5 (WeOS5) [3]. 2.2. Westermo Operating System (WeOS) The OS on the Lynx is developed with a Linux kernel as its core. The OS is developed towards being simple to configure and support both new and legacy networking protocols. The OS is capable of handling both layer 2 and layer 3 functionality within a computer network according to the OSI-model [2]. Within layer 2 the device offers various types of services common within a computer network, such as layer 2 switching, Quality of Service (QoS), Internet Protocol (IP) host services and network services. Layer 3 functionality of the device is developed to support IP Routing. Regarding layer 3 security on the device, it supports Secure Sockets Layer (SSL), Virtual Private Network (VPN), specifically OpenVPN and Generic Routing Encapsulation (GRE). 2.3. IEC 62443-4-2 draft For this thesis, the access to the standard IEC 62443-4-2 [4] is restricted. This restriction causes the problem of only getting access to a draft of the standard from July 2015. Moving on with this thesis it will be based on the draft. IEC 62443-4-2 is a standard for security for industrial automation and control systems. The standard provides a series of detailed technical control system requirements necessary to secure an industrial system. Using the information within the standard,