23
Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle Logic, LLC [email protected] www.principlelogic.com Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Embed Size (px)

Citation preview

Page 1: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank

Kevin Beaver, CISSPFounder and Principal ConsultantPrinciple Logic, [email protected]

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 2: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Kevin Beaver Information security consultant, author and trainer with

16 + years IT experience

Areas of expertise: Security assessments, network and messaging security, and security incident response and forensics

Author of: Hacking for Dummies by John Wiley and SonsandThe Definitive Guide to E-mail Management and Security by Realtimepublishers.com

Co-author of: The Practical Guide to HIPAA Privacy and Security Compliance by Auerbach Publications

Columnist and information security advisor for SearchSecurity.com, SearchMobileComputing.com, ITSecurity.com, and HCPro’s Briefings on HIPAA newsletter

Holds CISSP, MCSE, MCNE, and IT Project+ certifications

Page 3: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

What We’ll Cover

Common messaging system vulnerabilities

Practical (simple and often free) countermeasures you can implement now

We’ll look at mostly e-mail vulnerabilities and end with a few IM issues to consider

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 4: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Do you believe your messaging systems are secure?

A. Solid as a rock

B. Mostly secure

C. Somewhat secure

D. Not really sure

Page 5: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Mistakes

Take security of messaging systems for granted

Haven’t realized the level of confidential information that flows through these systems

Believe that malware protection and encryption are all that’s needed

Trust all employees to do the right thing

Ignore – or just can’t keep up with – all the new vulnerabilities and patches

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 6: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Why highlight messaging systems?

Technology is not very sexy

Everyone’s doing it. . . and have been for a long time

Mostly widely used business application

It’s not just for sending messages any more

One of the most commonly exploited systems

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 7: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Why are messaging systems insecure?

Old protocols designed without security in mind

Convenience and usability far outweigh the demand for security

Underlying OS/network issues often forgotten

Applications allow too much end-user control• See 2nd bullet above

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 8: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

How Messaging Attacks are Carried OutMalware taking systems down, deleting data

and even extracting confidential info

Gathering information via rogue use of content filtering and monitoring systems

Exploiting OS and other vulnerabilities to obtain remote control and more

Cracking into unencrypted message stores and log files

Capturing data in transit and viewing it in clear text

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 9: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #1– DoS Attacks

E-mail bombs

Attachment overloads

Auto-responder attacks

Some Solutions

Throttle connections

Limit/filter file attachments

Don’t allow out of office replies

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 10: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #2 – Banner GrabbingDiscloses important version information

General lack of banner warning information• “Come on in!”

Even if you do, changing banners isn’t foolproof

Some Solutions

Change defaults

Keep systems hardened patched

Use an e-mail firewall or proxy

Use warning bannersCopyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 11: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #3 – SMTP AttacksAccount enumeration via EXPN and VRFY

commands

E-mail header disclosures

Open relays

Some Solutions

Disable/limit EXPN and VRFY commands

Check headers and re-write them if necessary

Enforce SMTP authentication

Close open relays!Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 12: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #4 – Clear Text MessagesMost e-mail goes across the wire/air in clear text

Can disclose IP and provide ways to hack other hosts

Message stores and log files are even more vulnerable

Some Solutions

Use switches (not foolproof!) and IDS/IDP

Encrypt – preferably at the server/perimeter

Use a system that encrypts message store

Disable/limit logging if you don’t use itCopyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 13: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #5 – MalwareMessaging is the preferred method of travel

Virus signatures and engines out of date

Services running that aren’t needed are often compromised

Relying on protection at the desktop only is not good!

Some Solutions

Centralized malware protection

Consider behavioral protection

Use multiple layers and enginesCopyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 14: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #6 – Storage IssuesRunning out of storage space • Perhaps the best way to create messaging availability

issues

Lack of fault-tolerance

Retention often overlooked but becoming more of a concern

Some Solutions

Limit storage space . . . just beware!• At least implement storage space monitoring policy/procedure

Implement failover systems

Understand the regulations mandating how long to keep e-mails

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 15: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Do you believe spam is a security issue?

A. Yes, definitely

B. Yes, somewhat

C. No

D. Have been sorting through too much spam and haven’t had a chance to think about it

Page 16: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #7 – SpamEats up bandwidth and storage space • DoS anyone?

Potential for malware attachments

Chance of your own systems being blacklisted

Diverts security resources from more important issues

Some Solutions

Use a mix of various filtering methods

Filter at the server/perimeter mostly

Resort to whitelists or stop using e-mail?Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 17: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #8 – Weak Admin. ProcessesBreakdown in communication among HR,

managers and IT/security• Accounts are staying enabled

Rogue e-mail admins. – one is all it takes to compromise the entire system• Who’s watching the watcher?

Patch management

Some Solutions

Policy for adding/removing users

Separate e-mail/network/security duties

Implement a patch managementapplication

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 18: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #9 – Vulnerable HostsMust allow both inbound and outbound traffic

Firewalls offer limited protection

Other applications running on hosts can open new holes and create stability issues

Web servers for Web access

Some Solutions

Make this one of your most hardened servers

E-mail firewalls help, but don’t bypass host security because of it

Use dedicated serversCopyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 19: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Common Issue #10 – Instant MessagingUsers can easily share any drive

New channel for malware

Some vulnerabilities have enabled remote control

Serious log file issues – especially if a host is compromised or stolen

Some Solutions

Don’t give users control!

Use a more robust IM solution

Use IM content filtering and firewallsCopyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 20: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Countermeasures You Can’t Forget

Implement technical security measures as close to the network perimeter and as far away from users as possible

Use PGP or S/MIME for standalone encryption if practical e-mail firewalls work great• Consider IM protection as well

Implement a corporate IM solution

Don’t rely on technical security measures alone!

Don’t forget about who’s running your messaging systems

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 21: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Closing Thoughts

Messaging systems must remain on your security shortlist • Test them as you would web servers, file servers, OSs, &

other critical systems

Your network is only as secure as your weakest system – don’t let e-mail be the point of entry• Vice versa

A pound of prevention is worth a ton of cure

Keep It Simple, Somebody!

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 22: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

ResourcesPolicies E-mail-Policy.com

• www.email-policy.com

Webcasts and articles on SearchSecurity.com and SearchMobileComputing.com

System Hardening NSA Configuration Guides

• www.nsa.gov/snac

Guide on disabling open relayswww.mailabuse.org/tsi/ar-fix.html

Tools Test for open relays

• www.abuse.net/relay.html

E-mail security test• www.gfi.com/emailsecuritytest

SMTPScan to see what the bad guys can see• www.greyhats.org/outils/smtpscan

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

Page 23: Top 10 Messaging Vulnerabilities and How You Can Protect Against Them Without Breaking the Bank Kevin Beaver, CISSP Founder and Principal Consultant Principle

Copyright © 2004, Principle Logic, LLC, All Rights Reserved.

THANKS!THANKS!