Courseproject Websecurity Final Leviwelshans
Courseproject Websecurity Final Leviwelshans
Courseproject Websecurity Final Leviwelshans
COM
NETWORK SECURITY
Introduction
This report provides detailed reconnaissance and recommendations pertaining to the requests
submitted by A2Z Designs. This report features a security analysis of the network currently utilized by
XYZ Invitation Printing. The analysis will discuss easily accessible information that could be used in
attacking the network, strength of the systems passwords, and provide a recommended architecture
redesign of the XYZ Invitation Printing network. Lastly, this report will discuss techniques that could be
implemented to harden the servers used within the XYZ network as well as recommended security
policies to ensure that the network used by A2Z Designs will continue to stay secure.
Public Information
There are many tools that can be used to find seemingly unimportant information on a company,
but this information is actually used as the first step for attackers to choose who to attack and how they
will go about doing so. The information listed below was acquired using free web tools and the main
company website.
Location
According to Venmo.com they have offices in San Francisco and New York City.
Venmo, Inc
159 W. 25th. St. Fl 9
New York, Ne 10001
URL
https://venmo.com
Staff
Venmo.com lists what appears to be their entire staff on their webpage - https://venmo.com/team/
WELSHANS 2 | P a g e
NETWORK SECURITY
WELSHANS 3 | P a g e
NETWORK SECURITY
Table A
IP Address
Server Name
Ports Open
State
Vulnerability
192.168.0.1
DomainController
Filtered
Secure
192.168.0.2
InviteDesign
Filtered
Secure
192.168.0.3
Acct
Filtered
Secure
192.168.0.4
Printing
Filtered
Secure
192.168.0.5
Websrv
Filtered
Secure
192.168.0.6
Chat
Closed
Potential Attack
Server XYZChat returned a closed state. This could suggest that server XYZChat does not reside
behind the firewall, and this would seem logical since XYZChat is not shown in the network diagram.
Closed ports are not the issue though. The closed port state signifies that the XYZChat server is not
filtered, and if one of the ports on XYZChat were to be opened this could potentially lead to an accessible
point on the server. It is recommended that all six of the servers used on the XYZ network reside behind
the firewall.
MD5/NTLM
Password strength plays an important role in defense measures. For this purpose an MD5 and
NTLM process was used to decrypt the password hashes obtained from the XYZ servers. Table B shows
the password hash, the decrypted value, process used, and security rating. This is followed by screen
shots for assurance purposes.
Table B
WELSHANS 4 | P a g e
NETWORK SECURITY
Password Hash
Value
Process
Rating
5f4dcc3b5aa765d61d8327deb882cf99
password
MD5
Weak
200ceb26807d6bf99fd6f4f0d1ca54d4
administrator
MD5
Weak
391d878fd5822858f49ddc3e891ad4b9
devry
NTLM
Weak
a2345375a47a92754e2505132aca194b
windows
NTLM
Weak
The passwords shown would not pass standard password strength testing. It is recommended that
the passwords used contain both upper and lowercase letters, and at least one number and one symbol,
and must not be shorter than eight characters. Password policy should be considered for the purpose of
constructing a more secure network.
Network Configuration Analysis
The current network for as pictured in Image 1a features a single router source behind a firewall.
The placement of the servers and workstations is logical, but the current design could be enhanced and
provide more security and better productivity with some simple additions. The redesign of the XYZ
network featured in Image 1b features an external Cisco router with strong firewall and hardware
encryption as well as Virtual Private Network capabilities. It also features a second Cisco router with
firewall capabilities to separate the servers and the IT departments functions. Last, it features the
addition of a Gigabit switch and multiple 24 port switches for the workstations to better direct data flow
as well as increase network performance.
Image 1a
WELSHANS 5 | P a g e
NETWORK SECURITY
Image 1b
WELSHANS 6 | P a g e
NETWORK SECURITY
Disable any and all unnecessary services that are not used
Run ISLockdown and configure URLscan
Services that are running should have the least privileged settings
Do not install or connect a printer
Ensure strong passwords for accounts
Disable and remove unused accounts
Do not allow remote logons to the server
Ensure updates and analysis regularly
WELSHANS 7 | P a g e
NETWORK SECURITY
Malware is software that is created with malicious intent. Malware is an umbrella term that
contains various forms of malicious software such as Worms, Adware, Trojan Horses and Hijackers as
well as including Spyware and Viruses. The main purpose of Malware is to disrupt function and to cause
damage. This may mean changing access functions or toolbar settings, slowing down service through pop
ups, and deleting or damaging important directory files which can cause complete disruption.
Spyware
The intent of Spyware is to lay hidden within the users system while collecting sensitive data.
This could be data that is sent or received, user activity along with the users private data, and system
access information.
Viruses
There are many forms of Viruses. Viruses self replicate, and this means it can continue to grow
within the system by spreading itself to other programs and workstations connected to the system.
Viruses are often initiated through the use of a trigger, and this is generally though user interaction by
running specific downloaded programs, opening files, or selecting email attachments. (NIST, 2005)
NETWORK SECURITY
behavior that seems suspicious or different. Awareness training is fundamental to ensuring proper use and
should be available to users in regular sessions that discuss topics of proper use and signs of malicious
attacks.
Being aware of what is entering the system or being added to the users workstation is vital in
stopping Malware threats. This includes;
o
o
o
o
Never opening or downloading emails and attachments from unknown users or persons
Never changing or deleting security settings for any software used.
Never sending private data such as passwords or access codes in response to requests.
Never clicking pop ups or banners.
Any external devices that connect to the network must be approved. This includes and external
drive based devices such as mobile phones, hard drives, and flash drives.
Any software or user applications must be given approval before being downloaded. This
includes any add-ons, toolbars, social media, games, or software from unknown sources.
Never block or deny updates for software. Most of the time updates should be pushed out by the
IT department during a schedule based around non business hours, but in the event that an update
Antivirus Policy
WELSHANS 9 | P a g e
NETWORK SECURITY
Antivirus policy ensures that all of the devices and user are protected from possible virus attacks. It
is important that Antivirus policy is continually evaluated and made flexible for any changes to the
system and its users.
o
o
o
o
Any device connected to the network will be required to have the specified antivirus software.
The virus definitions catalog will be scheduled to update automatically.
If any device is found to contain a virus it will be immediately removed from the network.
Any infected device will not be connected to the network until it is verified clear of the virus.
Policy Template
For the purpose of future policy creation the following steps are recommended.
o
o
o
o
Reference
Bradley, T. (2015). Profile: Nmap Scanner. Retrieved February 23, 2015, from
http://netsecurity.about.com/od/securitytoolprofiles/p/aaprnmap.htm
Cobb, M. (2007, June). Windows IIS server hardening checklist. Retrieved February 23, 2015, from
http://searchsecurity.techtarget.com/feature/Windows-IIS-server-hardening-checklist
Gulati, D. (2014, June). 7 Tips to Harden Your Apache Installation on Linux. Retrieved February 23,
2015, from www.iit-inc.com/blog/-7-tips-to-harden-your-apache-installation-on-linux
WELSHANS 10 | P a g e
NETWORK SECURITY
Microsoft Library. (2009, September). Creating a Strong Password Policy: Logon and Authentication.
Retrieved February 23, 2015, from https://technet.microsoft.com/enus/library/cc736605%28v=ws.10%29.aspx
NMap. (n.d.). Port Scanning Basics. Retrieved February 23, 2015, from http://nmap.org/book/man-portscanning-basics.html
WELSHANS 11 | P a g e