Download pptx - NDSU IT Security

Transcript
Page 1: NDSU IT Security
Page 2: NDSU IT Security
Page 3: NDSU IT Security
Page 4: NDSU IT Security

NDSU IT Security

• Theresa SemmensChief Information Technology Security Officer

• Jeff GimbelSenior Security Analyst

Page 5: NDSU IT Security

NDSU Physical Infrastructure• Open Network

– External facing network• 79 subnets• Open to Internet

– Internal facing network • 79 subnets• Open to the University System and some statewide entities

– Firewalled network• Used by some departments for regulatory compliance

– Server room network• Used for server to server communication (i.e., backup)

Page 6: NDSU IT Security

NDSU IT Infrastructure

Supported Departments

Distributed IT

Independent Departments

Page 7: NDSU IT Security

A Little History– 2004, ND Information Technology Department

• SNMP Scan – Found a majority of printers on the University System network that had SNMP set to public

– 2008, Foundstone• 175 insecure devices recognized

as printers

Page 8: NDSU IT Security

How did the printer problem really come to light?

• Nessus scan– Removed the safe scan

• See how much paper would be wasted– LaserJet M 602

• 3 sheets– Nessus findings

• FTP open• Telnet open• Web page default username and password• SNMP community name set to public

Page 9: NDSU IT Security

How did the printer problem really come to light? (continued)

• Brought to the attention of IT leadership– Nessus set to “scan the entire network”– Work out alternative solution

Page 10: NDSU IT Security

Is this really a problem?

• 2008 - NDSU dropped support for printers as cost-savings initiative

• Currently, departments request DNS name for purchased printers– Name is granted within our naming scheme– Name is added to an install script

• Printer plugged into the network

Page 11: NDSU IT Security

Is this really a problem?

Page 12: NDSU IT Security

Is this really a problem?

Page 13: NDSU IT Security

Is this really a problem?

Page 14: NDSU IT Security

Methodology1. Tools – What are we going to use?2. Locating devices – How widespread is the problem?3. Policies and procedures – Shouldn’t we have covered

this somewhere?4. Identification and notification – How do we let

stakeholders know their printers are not secure?5. Reactions – How could we have been so wrong about

how stakeholders would react?6. Interesting problems – It did WHAT?7. First follow-up scan – Is it working?

Page 15: NDSU IT Security

Tools Used

• Angry IP scanner (GPLv2)

• Putty (GNU GPL)

• WinSCP (GNU GPL)

• Microsoft Excel (campus agreement)

• Student Employee

Amber Rasche
I undertsand what you mean, but I would advise against using "slave" to describe your student employee, as it has a very loaded connotation that could be misinterpreted by audience.
Page 16: NDSU IT Security

Locating Devices

• Finding what is on the network• Angry IP Scanner

– http://angryip.org/w/Home

Page 17: NDSU IT Security

Locating Devices (continued)

Page 18: NDSU IT Security

Findings

• External network – Outward facing– 3,526 active hosts (June 7)– 67 recognizable printers

• Internal network – Not routable to the Internet– 1885 active hosts (June 6)– 509 recognizable printers

Page 19: NDSU IT Security

How bad is it?

• Human solution for finding the vulnerabilities in the printers– Didn’t want to be responsible for:

• Crashing printers• Reams of wasted paper• Default usernames and passwords

Page 20: NDSU IT Security

Methodology

• What did the student employee do?– Opened a browser to IP and hostname

• Tried to log in using defaults– Used Putty to Telnet into IP or hostname

• Port 23– Tried anonymous FTP connection with

WinSCP• Port 21• Anonymous login selected

Amber Rasche
Who is "he"?
Amber Rasche
More descriptive title? Remediation?
Page 21: NDSU IT Security

Findings (continued)

• External network – 67 printers– 20 with anonymous FTP logins (30%)– 20 default user/admin accounts (30%)– 9 Telnet logins (13%)

Page 22: NDSU IT Security

Findings (continued)

• Internal network – 509 printers– 177 with anonymous FTP logins (35%)– 219 default user/admin accounts (43%)– 156 Telnet logins (31%)

Page 23: NDSU IT Security

Policies and Procedures

• Reviewed existing policies and procedures– Did we have any?– Why were they not being followed?– Should we create new ones?– How do we enforce new

policies and procedures?

Page 24: NDSU IT Security

Review of Policies, Procedures• Vague policies

– N.D. University System 1901.2– NDSU 158

• No documented procedures– No procedures meant few people knew what

should have been done• Started new procedures right away

– Isn’t getting client buy-in the most difficult task anyway?

Amber Rasche
More descriptive title?
Page 25: NDSU IT Security

Vendors• Mind tricks, (policies

or procedures) do not work on them, only money

• Need to make sure departments consult withcentral IT unit before making purchases of devices that will be placed on the network

Page 26: NDSU IT Security

Identification and Notification

• DNS names include department name, for the most part

• For others, impossible to know to which department they belonged

Page 27: NDSU IT Security

Methodology

• Sent emails to identified groups– IP address– DNS name– Vulnerabilities found– Directions for cleanup

• Worked with communications coordinator and IT Help Desk

Page 28: NDSU IT Security

Methodology

Sent out the emails and we waited

Page 29: NDSU IT Security

Reactions

• Calm and collected• Were able to

configure devices with no problems

• Glad to help

• Panicked when contacted by security office

• Needed help with securing process

• Grateful for help

Page 30: NDSU IT Security

It did WHAT?!?!

Page 31: NDSU IT Security

Interesting Problems

• Printers no longer printing– Disabled port 9100 – Disabled SNMP– Client needed reconfiguration

1. Stop the print spooler

2. Delete all jobs in C:\Windows\system32\spool

3. Restart spooler4. Delete all IP ports5. Delete all printers6. Restart computer7. Setup printers

Page 32: NDSU IT Security

Problems (continued)

• Older printers did not have a Web-based configuration– Older Java

• Did not have any of the sections needed to configure

– Configuration through Telnet• set-password – Changes default password• ftp-config:0 – Disables FTP• set-cmnty-name: <newname> - Changes default SNMP • Idle-timeout: 5 – Sets short timeout for Telnet

Page 33: NDSU IT Security

Follow-Up Scan

• External network– Initially 67 printers

• 20 with anonymous FTP logins (30%)• 20 default user/admin accounts (30%)• Telnet logins (13%)

– First follow-up scan found 67 Printers• 16 with anonymous FTP logins (24%)• 17 default user/admin accounts (25%)• 7 Telnet logins (10%)

Page 34: NDSU IT Security

Follow-Up Scan

• Internal network– Initially 509 printers

• 177 with anonymous FTP logins (35%)• 219 default user/admin accounts (43%)• 156 Telnet logins (31%)

– First follow-up scan found 509 Printers• 129 with anonymous FTP logins (25%)• 182 default user/admin accounts (36%)• 118 Telnet logins (23%)

Page 35: NDSU IT Security

What’s Next?

Page 36: NDSU IT Security

Questions?


Recommended