19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 8: Network Infrastructure<br />

Countermeasures against firewall rulebase vulnerabilities<br />

The following countermeasures can prevent a hacker from testing your firewall:<br />

✓ Perform a firewall rulebase audit. I’m always saying that you cannot<br />

secure what you don’t acknowledge. There’s no better example of this<br />

than your firewall rulebases. No matter how seemingly simplistic your<br />

rulebase is, it never hurts to verify your work using an automated tool.<br />

✓ Limit traffic to what’s needed.<br />

Set rules on your firewall (and router, if needed) that passes only traffic<br />

that absolutely must pass. For example, have rules in place that allow<br />

HTTP inbound traffic to an internal web server, SMTP inbound traffic to<br />

an e-mail server, and HTTP outbound traffic for external web access.<br />

This is the best defense against someone poking at your firewall.<br />

✓ Block ICMP to help prevent an external attacker from poking and<br />

prodding your network to see which hosts are alive.<br />

✓ Enable stateful packet inspection on the firewall to block unsolicited<br />

requests.<br />

Analyzing network data<br />

A network analyzer is a tool that allows you to look into a network and analyze<br />

data going across the wire for network optimization, security, and/or<br />

troubleshooting purposes. Like a microscope for a lab scientist, a network<br />

analyzer is a must-have tool for any security professional.<br />

Network analyzers are often generically referred to as sniffers, though<br />

that’s actually the name and trademark of a specific product from Network<br />

Associates’ original Sniffer network analysis tool.<br />

A network analyzer is handy for sniffing packets on the wire. A network analyzer<br />

is simply software running on a computer with a network card. It works<br />

by placing the network card in promiscuous mode, which enables the card to<br />

see all the traffic on the network, even traffic not destined for the network<br />

analyzer’s host. The network analyzer performs the following functions:<br />

✓ Captures all network traffic<br />

✓ Interprets or decodes what is found into a human-readable format<br />

✓ Displays the content in chronological order (or however you choose to<br />

see it)<br />

139

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!