Essential Computer Security Everyone's Guide To Email, Internet, And Wireless
User Manual: Pdf
Open the PDF directly: View PDF .
Page Count: 321
Download | |
Open PDF In Browser | View PDF |
VISIT US AT Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our solutions@syngress.com Web pages. There you may find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrJme Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can't wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations. Contact us at sales@syngress.com for more information. CUSTOM PUBLISHING Many organizations welcome the ability to combine parts of multiple Syngress books, as well as their own content, into a single volume for their own internal use. Contact us at sales@syngress.com for more information. SYNI RESS This Page Intentionally Left Blank 1 Tony Bradley CISSP-ISSAP, Aboutcorn's Guide for IntetneVNetwork Security Harlan Cat-vey Technical Editor Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively "Makers") of this book ("the Work") do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is sold AS IS and W I T H O U T WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media| Syngress| "Career Advancement Through Skill Enhancement| "Ask the Author UPDATE| and "Hack Proofing| are registered trademarks of Syngress Publishing, Inc. "Syngress: The Definition of a Serious Security Library" TM,"Mission Critical T",'' and "The Only Way to Stop a Hacker is to Think Like OneTM" are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. KEY SERIAL NUMBER 001 002 003 004 OO5 OO6 007 008 009 010 HJIRTCV764 PO9873D5FG 829KM8NJH2 FGT53MMN92 CVPLQ6WQ23 VBP965TST5 HJJJ863WD3E 2987GVTWMK 629MP5SDJT IMWQ295T6T PUBLISHED BY Syngress Publishing, Inc. 800 Hingham Street Rockland, MA 02370 Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security Copyright 9 2006 by Syngress Publishing, Inc. All rights reserved. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. Printed in Canada. 1234567890 ISBN: 1-59749-114-4 Publisher: Andrew Williams Acquisitions Editor: Gary Byrne Technical Editor: Harlan Carvey Cover Designer: Michael Kavish Page Layout and Art: Patricia Lupien Copy Editors: Michelle Melani, Mike McGee Indexer: Richard Carlson Distributed by O'Reilly Media, Inc. in the United States and Canada. For information on rights, translations, and bulk sales, contact Matt Pedersen, Director of Sales and Rights, at Syngress Publishing; email matt@syngress.com or fax to 781-681-3585. Syngress would like to acknowledge the following people for their kindness and support in making this book possible. Syngress books are now distributed in the United States and Canada by O'Reilly Media, Inc. The enthusiasm and work ethic at O'Reilly are incredible, and we would like to thank everyone there for their time and efforts to bring Syngress books to market: Tim O'Reilly, Laura Baldwin, Mark Brokering, Mike Leonard, Donna Selenko, Bonnie Sheehan, Cindy Davis, Grant Kikkert, Opol Matsutaro, Steve Hazelwood, Mark Wilson, Rick Brown, Tim Hinton, Kyle Hart, Sara Winge, Peter Pardo, Leslie Crandell, Regina Aggio Wilkinson, Pascal Honscher, Preston Paull, Susan Thompson, Bruce Stewart, Laura Schmier, Sue Willing, Mark Jacobsen, Betsy Waliszewski, Kathryn Barrett, John Chodacki, Rob Bullington, Kerry Beck, Karen Montgomery, and Patrick Dirden. The incredibly hardworking team at Elsevier Science, including Jonathan Bunkell, Ian Seager, Duncan Enright, David Burton, Rosanna Ramacciotti, Robert Fairbrother, Miguel Sanchez, Klaus Beran, Emma Wyatt, Krista Leppiko, Marcel Koppes, Judy Chappell, Radek Janousek, Rosie Moss, David Lockley, Nicola Haden, Bill Kennedy, Martina Morris, Kai Wuerfl-Davidek, Christiane Leipersberger, Yvonne Grueneklee, Nadia Balavoine, and Chris Reinders for making certain that our vision remains worldwide in scope. David Buckland, Marie Chieng, Lucy Chong, Leslie Lim, Audrey Gan, Pang Ai Hua, Joseph Chan, June Lim, and Siti Zuraidah Ahmad of Pansing Distributors for the enthusiasm with which they receive our books. David Scott, Tricia Wilden, Marilla Burgess, Annette Scott, Andrew Swaffer, Stephen O'Donoghue, Bec Lowe, Mark Langley, and Anyo Geddes of Woodslane for distributing our books throughout Australia, New Zealand, Papua New Guinea, Fiji, Tonga, Solomon Islands, and the Cook Islands. I want to thank my kids for giving me the motivation to create this book. Jordan, Dalton, Paige, Teegan, Ethan, and Noah are all wonderful, fabulous k i d s ~ e a c h in his or her own w a y - - a n d I am lucky to be their Dad. I also want to welcome Addison, the newest addition to the Bradley family. I can't say enough to thank my wife. It may be sappy for a dedication in a technical book, but Nicki is my Sunshine. She is more giving, loving, thoughtful, and devoted than anyone else I have ever known. She brings joy to my world and inspires me to be better than I am. I can only hope that I give her even a fraction of what she gives me. "Far away there in the Sunshine are my highest aspirations. I may not reach them, but l can look up and see their beauty, believe in them, and try to follow where they lead." ~Louisa May Alcott thor Acknowledgments I need to express my deepest appreciation to Syngress Publishing for helping me get this book published. This project began a couple years ago and got sidelined. Syngress believed in the purpose of the book and worked with me to make it happen. I want to extend my personal thanks to Gary Byrne, Amy Pedersen, and Andrew Williams. Each of them has worked as hard as I have--maybe h a r d e r ~ to make sure this book got to you. It isn't easy keeping me on schedule, but they were relentless...in a good way. I also want to thank Harlan Carvey for providing his technical expertise as the technical editor for the book, and Paul Summit and Larry Chaffin for their zero-hour contributions to help us make our deadlines. vi Tony Bradley (CISSP-ISSAP) is the Guide for the Internet/Network Security site on About.corn, a part of The New York Times Company. He has written for a variety of other Web sites and publications, including PC World, SearchSecurity.com, WindowsNetworking.com, Smart Computing magazine, and Information Security magazine. Currently a security architect and consultant for a Fortune 100 company, Tony has driven security policies and technologies for antivirus and incident response for Fortune 500 companies, and he has been network administrator and technical support for smaller companies. Tony is a CISSP (Certified Information Systems Security Professional) and ISSAP (Information Systems Security Architecture Professional). He is Microsoft Certified as an MCSE (Microsoft Certified Systems Engineer) and MCSA (Microsoft Certified Systems Administrator) in Windows 2000 and an MCP (Microsoft Certified Professional) in Windows NT. Tony is recognized by Microsoft as an MVP (Most Valuable Professional) in Windows security. On his About.corn site, Tony has on average over 600,000 page views per month and 25,000 subscribers to his weekly newsletter. He created a 10-part Computer Security 101 Class that has had thousands of participants since its creation and continues to gain popularity through word of mouth. Aside from his Web site and magazine contributions, Tony is also coauthor of Hacker's Challenge 3 (ISBN: 0072263040) and a contributing author to Winternals: De_fragmentation, Recovery, and Administration Field Guide (ISBN: 1597490792) and Combating Spyware in the Enterprise (ISBN: 1597490644). vii Larry Chaffin is the CEO/Chairman of Pluto Networks, a worldwide network consulting company specializing in VoIE WLAN, and Security. He is an accomplished author. He was a coauthor on Managing Cisco Secure Networks (ISBN: 1931836566) and contributed to Skype Me (ISBN: 1597490326), Practical VolP Security (ISBN: 1597490601), and Configuring Check Point N G X VPN- 1/Firewall- 1 (ISBN: 1597490318). He also wrote Building a VolP Network with Nortel's MS5100 (ISBN: 1597490784) and coauthored/ghostwrote 11 other technology books for VolP, WLAN, security, and optical technologies. Larry has more than 29 vendor certifications from companies such as Avaya, Cisco, HP, IBM, isc2, Juniper, Microsoft, Nortel, PMI, and VMware. Larry has been a principal architect in 22 countries for many Fortune 100 companies designing Vole security, WLAN, and optical networks; he is viewed by his peers as one of the most well-respected experts in the field of VolP and security in the world. Larry has spent countless hours teaching and conducting seminars/workshops around the world in the field of Voice/VolP, security, and wireless networks. Larry is currently working on a follow-up to Building a VolP Network with Nortel's Multimedia Communication Server 5100 as well as new books on Cisco VolP networks, practical VolP case studies, and wasted taxpayer money in a state-run network. Larry cowrote Chapter 5. Jennifer Davis is a senior system administrator with Decru, a Network Appliance company. Decru develops storage security solutions that help system administrators protect data. Jennifer specializes in scripting, systems automation, integration and troubleshooting, and security administration. Jennifer is a member of USENIX, SAGE, LoPSA, and BayLISA. She is based in Silicon Valley, California. Jennifer wrote Appendix B. viii Paul S u m m i t t (MCSE, CCNA, M C P + I , MCP) holds a master's degree in mass communication. Paul has served as a network, an Exchange, and a database administrator, as well as a Web and application developer. Paul has written on virtual reality and Web development and has served as technical editor for several books on Microsoft technologies. Paul lives in Columbia, MO, with his life and writing partner, Mary. Paul cowrote Chapter 7. H a r l a n C a r v e y (CISSP) is a computer forensics engineer with ISS/IBM. He is based out of the Northern Virginia area and provides emergency response services to ISS clients. His background includes vulnerability assessments and penetration testing, as well as incident response and computer forensics for clients in the federal government and commercial sectors. Harlan also has a great deal of experience developing and conducting hands-on functional incident response training for commercial and government clients. Harlan holds a BSEE degree from the Virginia Military Institute and an MSEE degree from the Naval Postgraduate School. Harlan has presented at Usenix, BlackHat, DefCon, and H T C I A conferences. In addition, he is a prolific writer, and his articles have been published in journals and on Web sites. He is the author of Windows Forensics and Incident Recover?/. ix This Page Intentionally Left Blank Contents Foreword .................................... xix Intro ........................................ xxi Part I" B a r e E s s e n t i a l s . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 3 1 Basic W i n d o w s Introduction Security ................. ..................................... 4 W h y D o Y o u N e e d to B e S e c u r e ? . . . . . . . . . . . . . . . . . . . . . 4 W h y A r e Y o u at R i s k ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Malware ..................................... W e a k Passwords 5 ............................... 6 Physical S e c u r i t y . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Network "Neighbors" L o g g i n g In . .......................... User Accounts 7 ................................ Limiting the N u m b e r of Accounts Disabling the Guest A c c o u n t Renaming 6 ................................... 7 ............... ................... the Administrator A c c o u n t ............ Creating a Dummy Administrator Account Security Groups 9 11 ........ .............................. 12 13 13 W i n d o w s X P H o m e A c c o u n t Types . . . . . . . . . . . . . . . . 15 F A T 3 2 versus N T F S 16 ........................... File a n d F o l d e r S e c u r i t y ........................ K e e p i n g It S i m p l e . . . . . . . . . . . . . . . . . . . . . . . . . . . Sharing and Security Windows ........................ Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H i d d e n File E x t e n s i o n s ......................... S c r e e n Saver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary ...................................... Additional Resources ............................. 16 17 18 21 24 25 28 28 xii Contents Chapter 2 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Introduction .................................... 30 Password P o w e r 30 ................................. T h e Keys to Y o u r D a t a ......................... 32 Selecting S t r o n g Passwords . . . . . . . . . . . . . . . . . . . . . . . Password C r a c k i n g 33 ............................... S t o r i n g Y o u r Passwords 35 ............................ 36 O n e S u p e r - P o w e r f u l Password . . . . . . . . . . . . . . . . . . . . . . . Summary 37 ...................................... Additional Resources 39 ............................. 39 C h a p t e r 3 Viruses, Worms, and Other M a l w a r e . . . . . . Introduction .................................... 41 42 M a l w a r e Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 The History of Malware 43 ........................... P r o t e c t Y o u r s e l f w i t h A n t i v i r u s Software . . . . . . . . . . . . . 44 K e e p Y o u r A n t i v i r u s Software U p d a t e d . . . . . . . . . . . . . . 47 H o w N o t to G e t I n f e c t e d 49 ....................... D o You T h i n k You're Infected? . . . . . . . . . . . . . . . . . . . . Summary 49 ...................................... Additional Resources 52 ............................. 52 C h a p t e r 4 Patching . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Introduction .................................... 54 Patch Terminology 54 ............................... W h y S h o u l d I Patch? ............................. H o w D o I K n o w W h a t to Patch? 55 .................... 56 Patching Precautions . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary 60 ...................................... Additional Resources 64 ............................. 64 Part I1: M o r e Essential Security . . . . . . . . . . . . . . . . . . . 65 Chapter 5 Perimeter Security . . . . . . . . . . . . . . . . . . . . . 67 Introduction .................................... F r o m M o a t s and B r i d g e s to Firewalls and Filters Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . N e t w o r k Traffic F l o w .......................... R o u t e r s a n d Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 ......... 68 69 70 71 Contents Packet Routing and Filtering Stateful I n s p e c t i o n .................. .......................... A p p l i c a t i o n G a t e w a y s a n d A p p l i c a t i o n P r o x y Firewalls Personal and Cable/DSL Router Firewalls ........... Intrusion Detection and Prevention ................... Summary ...................................... Additional Resources .................................... The Evolution orE-mail . .74 74 80 84 ............................. Chapter 6 E-mail Safety . . . . . . . . . . . . . . . . . . . . . . . . . Introduction 72 73 84 85 86 ........................... 86 E-mail Security Concerns .......................... 86 Opening Attachments .......................... 87 W e b - B a s e d versus P O P 3 E - m a i l .................. 91 Spoofed Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Spam ...................................... 93 Hoaxes and Phishing ........................... 97 Summary ..................................... Additional Resources 102 ............................ Chapter 7 Web Surfing Privacy and Safety . . . . . . . . . Introduction ................................... The Revolutionary World Wide Web Web Security Concerns Cookies ................ ................................... G e t t i n g in t h e Z o n e Surfing 103 104 .......................... Privacy and Anonymous 102 104 106 106 ................. .......................... 109 112 S h o p p i n g Safely: SSL a n d C e r t i f i c a t e s . . . . . . . . . . . . . . 116 Financial Transactions 117 ......................... Content Filtering and Childproofing Summary .............. ..................................... Additional Resources ............................ Chapter 8 Wireless Network Security . . . . . . . . . . . . . Introduction ................................... T h e Basics o f W i r e l e s s N e t w o r k s 802.1 l b .................... ................................... 119 121 121 123 124 124 126 802.11a .................................... 127 802.11g 127 ................................... xiii xiv Contents N e x t - G e n e r a t i o n Protocols ..................... Basic Wireless N e t w o r k S e c u r i t y Measures . . . . . . . . . . . . . Secure Y o u r H o m e Wireless N e t w o r k . . . . . . . . . . . . . . C h a n g e the SSID .......................... 127 128 128 129 C o n f i g u r e Y o u r H o m e Wireless N e t w o r k . . . . . . . . . 130 R e s t r i c t Access to Y o u r H o m e Wireless N e t w o r k . . . 130 U s e E n c r y p t i o n in Y o u r H o m e Wireless N e t w o r k R e v i e w Y o u r Logs . . . . . . . . . . . . . . . . . . . . . . . . . . 132 U s e Public Wireless N e t w o r k s Safely . . . . . . . . . . . . . . Install U p - t o - D a t e A n t i v i r u s Software Install a Personal Firewall ........... .................... A d d i t i o n a l H o t s p o t S e c u r i t y Measures . . . . . . . . . . . . . . . . Verify Y o u r H o t s p o t C o n n e c t i o n ................. Watch Your Back . . . . . . . . . . . . . . . . . . . . . . . . . . . . . U s e E n c r y p t i o n and Password P r o t e c t i o n D o n ' t Linger Use a V P N Summary ........... ............................... ........................ ..................................... Additional Resources 133 133 133 134 134 135 ................................. Use Web-Based E-mail . . 131 ............................ C h a p t e r 9 Spyware and A d w a r e . . . . . . . . . . . . . . . . . 135 136 136 136 137 137 139 Introduction ................................... 140 W h a t Is A d w a r e ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 W h a t Is Spyware? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Getting R i d of Spyware 145 Summary .......................... ..................................... Additional Resources ............................ Part II1" Testing and M a i n t e n a n c e 150 150 ................ 151 Chapter 10 Keeping Things Secure . . . . . . . . . . . . . . . 153 Introduction ................................... General PC Maintenance Disk C l e a n u p ......................... ............................... 154 154 155 Erase the PageFile . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Disk Defragmenter 158 ........................... S c h e d u l e d Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Patches a n d U p d a t e s ............................. Windows XP Security Center ...................... 159 161 162 Contents Summary ..................................... Additional Resources 164 ............................ Chapter 11 When Disaster Strikes . . . . . . . . . . . . . . . . Introduction ................................... 164 165 166 C h e c k the E v e n t Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Enable Security Auditing .......................... 167 R e v i e w Y o u r Firewall Logs 170 Scan Y o u r C o m p u t e r ........................ ............................. 171 Restore Your System ............................. 173 Start f r o m S cratch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Restore Your Data ............................... 175 Call In the Pros 175 Summary ................................ ..................................... Additional Resources 176 ............................ Chapter 12 Microsoft Alternatives: Inside the Linux Desktop . . . . . . . . . . . . . . . . . . . . . . Introduction Common ................................... Desktop Environments Gnome ................... 180 181 KDE ...................................... 183 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . Install B o t h , M a k e O n e the D e f a u l t 179 180 .................................... Common 177 ............... Alternative Window Managers ................... T h e X W i n d o w System and W i n d o w Managers . . . . . . . . . X W i n d o w Servers versus W i n d o w M a n a g e r s . . . . . . . . 184 185 185 185 186 W i n d o w M a n a g e r s as Alternative Desktop Environments ................ E-mail and Personal I n f o r m a t i o n M a n a g e m e n t Clients . . . . Evolution .................................. 188 190 190 Evolution, Microsoft Exchange, Novell GroupWise, and O p e n E x c h a n g e KDE Suite/KMail ............................ Kontact ................................. . . 192 192 192 Aethera .................................... 193 Mozilla Mail/Thunderbird 194 ...................... Thunderbird .............................. 195 xv xvi Contents Sylpheed ................................... Essential I n f o r m a t i o n .......................... E-mail and PIM Software Migrating Mail 195 196 .............................. Migrating from Outlook 197 or Outlook Express ...... Importing Outlook Mail into Mozilla LibPST 196 ...................... ........... ................................. ......... Standards ........................ The Hard Way 199 201 ............................ 201 Web Browsers .................................. 202 Mozilla .................................... Mozilla and Microsoft CHAP 198 199 Importing Outlook Mail into Evolution Document 197 202 ................. 203 Firefox .................................... 203 Galeon .................................... 204 Konqueror Opera ................................. 205 ..................................... Migrating Bookmarks 205 ......................... 206 Browser Plug-Ins ............................. Macromedia RealPlayer 206 Flash a n d S h o c k w a v e / D i r e c t o r ....... ............................... Adobe Acrobat Reader 207 ...................... O f f i c e A p p l i c a t i o n Suites . . . . . . . . . . . . . . . . . . . . . . . . . . OpenOffice.org 206 .............................. 208 209 209 L i m i t a t i o n s : M a c r o s a n d P D F Files . . . . . . . . . . . . . . 212 F u t u r e Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 StarOffice .................................. 213 KOffice .................................... Hancom Running 213 Office .............................. Windows Applications on Linux 214 ............. Compatibility Layer Software .................... Wine ................................... Code Weavers' CrossOver Office ............... Summary ..................................... Additional Resources ............................ 214 215 216 216 218 218 Contents Part IV: Security Resources . . . . . . . . . . . . . . . . . . . . . . 219 Appendix A Essential Network Communications . . . . 221 Introduction ................................... 222 C o m p u t e r Protocols 222 ............................. C o m m u n i c a t i o n Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 T C P and U D P Protocols 223 ......................... U n d e r s t a n d i n g IP Addresses and D N S M a n a g i n g IP Addresses ................ ........................... 224 226 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Appendix B Case Study: SOHO (Five Computers, Printer, Servers, etc.) . . . . . . . . . . . . Introduction ................................... 229 230 U s i n g netstat to D e t e r m i n e O p e n Ports on a System . .230 D e t e r m i n i n g M o r e I n f o r m a t i o n w i t h lsof . . . . . . . . . . . 235 U s i n g netstat on W i n d o w s X P . . . . . . . . . . . . . . . . . . . 236 E m p l o y i n g a Firewall in a S O H O Environment H o s t - B a s e d Firewall Solutions I n t r o d u c i n g the S O H O ......... ................... Firewall Case Study ........... Assessing N e e d s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D e f i n i n g the Scope o f the Case Study D e s i g n i n g the S O H O Firewall 239 239 240 240 ............. ..................... 241 241 D e t e r m i n i n g the F u n c t i o n a l R e q u i r e m e n t s . . . . . . . . . . 242 D e t e r m i n i n g the N e e d s o f the Family . . . . . . . . . . . 242 Talking to Local U s e r G r o u p s ................. C r e a t i n g a Site Survey o f the H o m e . . . . . . . . . . . . . . . 242 243 Identifying C u r r e n t T e c h n o l o g y O p t i o n s and Constraints ....................... 244 I m p l e m e n t i n g the S O H O Firewall . . . . . . . . . . . . . . . . 245 Assembling the C o m p o n e n t s . . . . . . Installing the C o m p o n e n t s Installing the Wireless Cards ............ ................... .................. 245 245 246 Testing the C o n f i g u r a t i o n f r o m Various Access Points Summary ................... ..................................... Solutions Fast Track ............................. F r e q u e n t l y Asked Q u e s t i o n s ....................... 249 250 251 252 xvii xviii Contents Appendix C Glossary of Technology and Terminology 253 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Foreword There's no d e w i n g that the personal computer revolution has changed the way we as a society communicate. It's now more c o m m o n to receive an e-mail message than a postal letter. In fact, computer networks have become an indispensable part of the corporate landscape.With the proliferation of the Internet, both individuals and businesses are realizing more than ever the importance of being able to access the Web and all it has to offer. Every aspect of our existence is or can be touched by the Internet. We can use the Internet to shop for all manner of items; tend to our banking; plan and book excursions and stays; seek advice and reviews; and converse with other users at any time of our choosing and virtually from anywhere. Such convenience, however, does not come without its own set of risks; namely, the hackers and viruses with which we've become all too familiar.You will find this book a reliable resource for the most critical aspects of computer security. To the newcomer, the Internet may be as alluring and exciting as the Wild West was to many Americans during the mid-1800s. The untapped resources of the West left people open to new discoveries and opportunities. However, like the Wild West, the Internet is largely unregulated; it lacks proper, effective laws for maintaining security and often is full of unpleasant surprises. All individuals and organizations that connect to the Internet are under the risk of an online attack every day, and they need to make and maintain their o w n security. Although the Internet has become ubiquitous as a communication and research tool, it is important to remember that the Internet is a two-way s t r e e t ~ y o u r computer connects to it, and vice versa. The good news is that securing your computer is largely a matter of understanding where you are vulnerable and what tools and techniques are required for security. Luckily, basic xix xx Foreword computer security is not beyond a nontechnical person's ability to understand. Whether you are using a stand-alone computer or a whole computer network, Tony Bradley will arm you with the knowledge you need to make and keep things secure. Security is a process, not a product, and computer security is everyone's responsibility.You wouldn't leave the backdoor of your home or business open to intruders, and your computer merits the same prudence. Even Dodge City had a Wyatt Earp to keep order if things got out of hand. In the wild world of the Internet, there is no sheriff. With Essential Computer Security you can act as your own deputy by arming yourself with fundamental knowledge of the important aspects of computer security. ~Douglas Schweitzer, Sc.D. Security Expert and Author of Securing the Network from Malicious Code www.syngress.com Introduction W h e n you purchase most home appliances, they come with an owner's manual. The owner's manual is the bible of information for that appliance. It tells you what each button does and how to set up and configure your new appliance to get it ready for operation. The owner's manual also includes the actual steps to operate the appliance, and it often contains information on how and where to obtain service and parts, basic troubleshooting tips, and precautions you should be aware of before using the appliance. This is true for VCRs, microwaves, toasters and vacuum cleaners. All these appliances are commonly found in an average home, and each has an assigned task. W h e n you buy these items you buy them with their specific tasks in mind, and the owner's manual provides all the information you need to accomplish the goal. Most home users treat their personal computers as an appliance as well. For some users, the PC is a fancy calculator that lets them track and manage their finances. For others, it's a means of communication that lets them send e-mail to their friends and family. For others, it's a high-end game console that lets them play the latest action games. The list goes on and on. The bottom line is that the computer is an "appliance" that has a variety of functions, and it can be different things to different p e o p l e ~ s o m e t i m e s even different things to the same p e r s o n ~ d e p e n d i n g on what the user wants the computer to do at that moment. So you would expect the computer to come with a very large owner's manual to encompass every possible task you might use it for, right? Unfortunately, it doesn't. The reality is that the owner's manual for the computer itself is generally quite sparse. Usually a new computer will come with xxi xxii Introduction some simple instructions that let you know which cable gets plugged into which hole so that you can set the computer up. It may also provide technical details about the motherboard, the main board on which the processor, memory, and other components are found, or information about configuring the BIOS (basic input/output system, the "brain" that configures and operates the motherboard). However, most computer owner's manuals stop there. You can't really blame the computer manufacturers, though. Unlike a V C R that is predetermined to record and watch videotapes or a toaster that is designed only to toast bread, the computer has too many potential uses to be comprehensively covered in one owner's manual. This book is written to give you a manual that covers the system as a whole and teaches you what you need to know to secure it.When you plug your V C R into the wall, nothing special occurs. There is no increased risk of someone getting your personal financial data when you plug your toaster in. Malicious attackers won't be using your vacuum cleaner to launch attacks against other vacuum cleaners throughout the world. But when you connect your computer to the Internet, you become part of a system of millions of computers and devices that all interact with and possibly affect each other. The computer is unique because it is a household "appliance" with security concerns and implications that go well beyond your home. You probably know as much about your computer as you do about your V C R or microwave.You know how to use it.You know how to turn it on, log on, surf the Web, send an e-mail, and so on. But you probably can't tell me what speed your processor is, how many megabytes of R A M you have, or whether TCP port 80 is open to external access.You simply don't need to know that stuff to use the computer. You may not want to be a computer guru or security expert.You may not care how big the hard drive is or how fast your processor is.You just want the computer to do its job with minimal effort on your part. But for you to use the computer safely when sharing the Internet and World Wide Web with others, it's important that you understand the risks involved, how to avoid those risks, and how to protect your computer from malicious threats, such as viruses, worms, and spyware. The problem with most books about computers and network security is that they are written for people who already understand computer and network security. The average computer user doesn't know enough about network secu- Introduction xxiii rity to even know where to begin. This book is written to provide average computer users or those just getting started in computer or network security with an introductory guide to the different threats and ways to protect your computer from them. I am neither setting out to teach you everything there is to know nor expecting you to be an expert when all is said and done. I simply hope that reading this book and taking the precautions~or even s o m e of the precautions~discussed enables you to have a safer, more enjoyable Internet-surfing experience and ensures that your lack of computer security doesn't affect the rest of us who share the Internet with you. I want this book to be your Internet user's owner's manual that helps you understand the risks you will be exposed to and explains the precautions you should take so that you can get your "appliance" to perform the task(s) you bought it for safely with minimal effort and frustration. Why This Book? This book is not intended to be comprehensive. There are hundreds of books on the shelf covering all areas of computer and network security.You can find many books that cover general information security in a much deeper and technical sense than this book will. There are also books that cover specific areas of security, such as encryption, firewalls, backup and recovery, and so on, in much more depth and detail than this book. This book was written to give security neophytes the information and advice they need to operate this "appliance" securely, both for their own protection and for the protection of the rest of us who share the Internet with them. I have written it in simple terms without too much technical jargon, but if you do come across any acronyms or unfamiliar terms, you can look them up in the glossary in Appendix C. The goal of this book is to teach you enough about computer and network security for you to understand the potential threats and protect your computer from them. At the end of each chapter you will find a short summary of the key points from the chapter. This book is focused on security, and the majority of the content will apply to any computer system, but the examples and illustrations will come primarily from Microsoft Windows XP. Details about subjects like firewalls, passwords, and wireless network security go beyond the operating system and can be applied www.syngress.com xxiv Introduction to any system. Don't be concerned if you are not using Windows XP; the fundamental concepts of computer security go beyond the operating system and apply to any platform. Organization of This Book This book is divided into four main sections: The "Bare Essentials" section provides information about the security concerns that should be addressed immediately. The computer should not be connected to another computer or to the Internet until these areas are taken care of. If you follow the advice in this section you can connect to the Internet with a relative sense of security. The section titled "More Essential Security" goes deeper into different security technologies and how to use the computer for e-mail or Web surfing and other activities securely. The "Testing and Maintenance" section describes some ways you can test how secure your computer or network is and the different areas you need to monitor and update to maintain your security. The "Security Resources" section provides reference material as well as a short primer on the basic concepts of computer networking and the Internet for the readers who want to dig a little deeper. Chapter Descriptions In this section I have listed a brief description of the chapters in this book: 9 C h a p t e r 1- Basic W i n d o w s S e c u r i t y This chapter introduces you to basic computer security in the Windows operating system, such as creating and managing user accounts on your computer or network as well as setting permissions on files and folders to secure your data. 9 C h a p t e r 2" P a s s w o r d s Passwords are the keys to the gate of your computer. It is essential that you take the time to select passwords that are not easily guessed or cracked and that you treat them with the confidentiality they deserve. www.syngress.com Introduction xxv C h a p t e r 3"Viruses, W o r m s , a n d O t h e r Malware This chapter discusses how antivirus software works and what sorts of threats it can protect you from. It also covers updating and maintaining your antivirus software to ensure you remain protected. C h a p t e r 4: P a t c h i n g This chapter discusses the importance of keeping your computer updated and patched to protect it from having known vulnerabilities exploited. It also includes some steps you can take to protect a freshly installed operating system while you apply the necessary patches. C h a p t e r 5: P e r i m e t e r S e c u r i t y This chapter provides an overview of security technology you can use to build a wall around your computer or n e t w o r k ~ o r protect your perimeter~including firewalls and intrusion detection systems (IDSes). C h a p t e r 6: E - m a i l Safety E-mail can be a wonderful tool for communication and increased p r o d u c t i v i t y ~ i f y o u can get past the spam, hoaxes, and virus-infected file attachments. This chapter is dedicated to helping you eliminate as much of the junk as possible so that you can focus on the e-mail you want to read. C h a p t e r 7: Web Surfing P r i v a c y a n d Safety A look at the potential threats and exploits that await you on the Web and what you can do to get the most from your Web-surfing experience while protecting your computer, your network, and your identity. C h a p t e r 8: Wireless N e t w o r k S e c u r i t y Wireless networks make connecting to the Internet and other devices easy and convenient. The freedom they provide is very liberating, but that freedom comes at a price when it comes to security, and you need to take extra precautions to keep your wireless data secure. C h a p t e r 9: S p y w a r e a n d A d w a r e As you install software and surf the Web, different little programs called spyware or adware might be installed on your computer. Some are legitimate; however, many are not. All are designed to somehow monitor your computer activity and report back to the company or user that planted them. This chapter will help you to guard your machine against spyware/adware and clean it up if it gets on your system. www.syngress.com h,~ xxvi Introduction Chapter 10: Keeping Things Secure You have gone through all of the trouble of installing security products like antivirus and firewall programs and reconfigured your system to make it as secure as possible. Security is a process, though, not a product. There are certain things that you must update and maintain to sustain that security. Chapter 11: When Disaster Strikes No matter how secure you are, something may eventually happen to your data. It is important to perform regular backups of important data and have a plan in place for how to address security incidents when they arise. Chapter 12: Microsoft Alternatives: Inside the Linux Desktop Much of the focus of this book is on the Microsoft Windows platform and the built-in Microsoft products, such as Outlook Express and Internet Explorer. This chapter addresses the use of alternative products from other vendors to improve the security of your system. Appendix A: Essential Network Communications This appendix provides a fair amount of detail about networking and the Internet in general. The scope of this book is simply to provide the essentials of security and not to attempt to teach you everything, but for those who may want some more information, this appendix will help you get a basic grasp of how these things work. Appendix B: Case Study: SOHO (Five Computers Printer, Server, etc.) Security for the home isn't as well developed as in a corporate environment. Users often do not have the time to become experts while maintaining their businesses or working remotely. This appendix discusses using netstat to determine open ports on a system, explains how to use lsof to inspect open ports, and includes a case study that shows how a home user designed a S O H O firewall without much hands-on systems or security experience. Appendix C: Glossary Appendix C provides a glossary of security terms and acronyms that you can use as a resource to refer to when you need to decipher the many foreign terms you may encounter. www.syngress.com This Page Intentionally Left Blank Chapter 1 3 4 Chapter 1 9Basic Windows Security Introduction The majority of home computers use some version of Microsoft Windows as the operating system. Most of those users, either by purchasing a new computer system in the past couple of years or by upgrading, rely on a version of Windows XE Before we go on to the rest of this book and explore how to use different applications securely, such as Web browsers or e-mail clients, you need to understand the fundamental security of the operating system itself. This chapter will explain the following: 9 Basic risks of computer use 9 Accessing Windows 9 User accounts and Security Groups 9 File and folder security 9 Protecting Windows services 9 Dangers of hidden file extensions 9 Screen savers as security tools Why Do You Need to Be Secure? Do you want your computer to be absolutely, positively, 100-percent secure against all vulnerabilities and exploits, not only those known now, but those yet to be discovered? It's simple: leave your computer in the box, because once you turn the computer on, you begin to walk a tightrope between functionality (or convenience) and security. Unfortunately, many of the features that make your computer easier to use also create various security issues as well. Some people appreciate that their printer is able to communicate with the computer and alert them with messages when the ink is running low or the paper tray is empty. However, leaving the Windows Messenger S e r v i c e ~ t h e service used for such communication between your printer and your c o m p u t e r ~ e n a b l e d may also leave your computer open to being inundated with unsolicited spam pop-up messages. One of the points of setting up a network in the first place is to share resources such as data and printers.You may want to share out files or folders so they can be accessed from other computers on the network. Unfortunately, many viruses and worms use these same connections to j u m p from one computer to the next and infect the whole network. www.syngress.com Basic Windows Security 9Chapter 1 I assume by reading this book that you do not intend to leave your computer disconnected and sealed in the box. I c o m m e n d you. There is a vast world of information and productivity awaiting as long as you invest just a little time to do so securely. A little bit of knowledge applied with a little bit of c o m m o n sense is enough to protect you from most computer threats. Microsoft has made vast improvements in the security of their operating systems and applications in the last couple of years. Windows XP Service Pack 2 made some dramatic changes aimed at making the operating system even more secure. Sadly though, the operating systems intended for home users, a market that arguably needs the security features the most, are more insecure. Many users view security from the perspective of"I don't have anything of value worth protecting, so why should I care?" First of all, there is a lot more of value on your computer than you may be aware of. Have you done your own income taxes on your computer and saved the files? Are there any files or documents that contain your full name? Birth date? Social Security Number? All of this information has value to someone that may want to access your financial information or steal your identity. The other reason to operate your computer securely is "to protect the rest of us," which is a different concept. If you leave your house unlocked and you get robbed, it really only affects you. If you leave your car unlocked and your CD stereo gets stolen, it really only affects you. But, if you leave your computer "unlocked" and it gets "stolen," it can impact other computer systems on the network or the Internet. Why Are You at Risk? It has become so c o m m o n to hear about viruses, worms, identity theft, phishing scams, and other computer attacks that you may actually be wondering "where isn't there a threat?" Understanding the importance of computer security is easier, though, if you have some idea of the threats you are defending against. Malware Malware is a general term used to refer to a wide variety of malicious programs. It includes threats such as viruses, worms, Trojan horses, spyware, and any other malicious programs. Even if you believe you have nothing of value to protect on your computer system, leaving it unprotected can leave you vulnerable to hundreds of different malware programs floating around the Internet which could arrive in your e-mail inbox 5 6 Chapter 1 9Basic Windows Security daily. These programs can accomplish a wide variety of malicious activities, including possibly capturing your passwords and credit card numbers, sending out malware to other computers or to e-mail addresses of people you know, using your computer in a denial-of-service attack against a Web site, and more. Weak Passwords Passwords are the primary method most users are familiar with for gaining access to a computer system or program. If you have a weak password and an attacker manages to guess or crack it, he or she can access your private information, steal your identity, install and execute programs using your account, and more. Even worse, some of this can be done without ever knowing your password~by using remote threats. Physical Security Physical security is admittedly less of an issue in a home environment. Generally, you aren't concerned with someone in your home sitting down at your computer and hacking into it. Nevertheless, your c o m p u t e r could still be stolen or lost. The bottom line when it comes to physical security is that once someone has physical access to your computer, the gloves are off. There are ways that an attacker sitting at your computer and using your keyboard and disk drives can bypass the various security measures you have put in place to gain access to your data. Network "Neigh bors" Computers that are connected to the same network as yours or within the same range of IP addresses are able to communicate with your computer more freely and gather information easier than other computers. If you are using a cable m o d e m to access the Internet, you are sharing the network with the other subscribers in your area. That means it is possible for other cable m o d e m users in your area to view and access your drives and data if you aren't careful about how you share them out and what security measures you implement. These are just a few of the ways your computer and the data it contains are at risk. The following sections will walk you through securing your computer, limiting the power of users, controlling access to files and folders, and other security measures you should put in place before you start networking with other computers around you or connecting your computer to the Internet. Basic Windows Security 9Chapter 1 Logging In Windows XP has a slick feature called the Welcome screen. The first time the system boots up you will be greeted with the Welcome screen like the one shown in Figure 1.1. Figure 1.1 The Windows XP Welcome Screen Is Displayed by Default When a Windows XP System Is First Booted Initially, you will be able to access the system, as an Administrator, simply by clicking the picture next to the username. If you assign a password to a user account, clicking the picture will open a box for you to enter the password before logging in to the system. O n Windows XP Professional machines connected to a domain network, the Welcome screen is replaced with a login screen like Windows 2000. The user is required to press the Ctrl, Alt, and Delete keys simultaneously and then a w i n d o w appears where you must enter a valid username and password to log in to the system. User Accounts A User Account is one of the primary means of controlling access to your data and resources as well as customizing Windows to look and act the way you want it to. www.syngress.com 7 8 Chapter 1 9Basic Windows Security Older versions of Windows, like Windows 95 and Windows 98, have User Profiles which allow each user to customize the look and feel of Windows, but the User Profiles offer no security whatsoever. They give an illusion of security because they are associated with a password, but anyone can simply hit the Esc key and log in to the system with the default user profile. The goal of this book is not necessarily to teach you every detail of User Accounts, but to show you in simple language how to set up your User Accounts in a secure fashion. The bad guys know a thing or two about the User Accounts that are installed by default. By following the advice in this section you can throw most novice hackers off the trail and thwart their attacks. W h e n Windows XP is first installed, it forces you to create at least one User Account and allows you to create as many as five (see Figure 1.2). Any accounts created at this point are automatically added to the Administrators group for the machine and are created with a blank password. For these reasons, I recommend that you add only one account at this point and add other accounts later when you can control what level of access to grant and assign appropriate passwords. Figure 1.2 Creating User Accounts with Windows XP If you are upgrading from a previous Windows version, any existing users will also be automatically added to the Administrators group with a blank password w h e n installing Windows XR O n e exception is that if you are installing Windows XP Professional on a system connected to a network domain rather than in a www.syngress.com Basic Windows Security 9Chapter 1 workgroup or as a stand-alone system, the installation will offer you the opportunity to create a password. A quick note before we move on. Most of the advice will require that you log in as the Administrator or that your account is a member of the Administrators group. Based on what I described earlier, that may very well be the case for any accounts that were created during a Windows XP installation. But, if you run into any problems or receive any messages stating that you don't have permission or authority to complete the action, you should check into this and make sure the account you are using to make these changes is a member of the Administrators group. Limiting the Number of Accounts In order for different users to have their own customized and personalized configurations of Windows and their own My Documents folder (among other things), they need to have their own User Accounts. Continued 9 10 Chapter 1 9Basic Windows Security However, the more User Accounts there are, the more targets there are for a potential attacker. Therefore, it is important to limit the number of User Accounts on the system. In a home environment, you may choose to have separate accounts for the adults, but have a single "Kids" account that they share.You definitely want to make sure you remove any duplicate or unused User Accounts. You can view the User Accounts by clicking User A c c o u n t s in the C o n t r o l Panel. However, this view only shows you the accounts that are allowed to log in to the computer system locally. There are other hidden accounts used by the operating system or applications. To see the complete list you should view them in the Computer Management module. Unfortunately, in Windows XP Home you can't view the User Accounts in this way. Short of jumping through a ring of fire upside down while chanting Bill Gates (or some risky registry hacking), there isn't much you can do to make some of these changes. Windows XP Home users will have to .just stick with making changes through the User Accounts button in the Control Panel. You can get to the Computer Management module a variety of ways: 9 Right-click My C o m p u t e r on the desktop if you have it available and select Manage. 9 Right-click My C o m p u t e r in the left-hand navigation pane of a Windows Explorer window and select Manage. 9 Click Start I All P r o g r a m s I Administrative Tools, if you have it available, and select C o m p u t e r M a n a g e m e n t . 9 Click Start I R u n and enter c o m p m g m t . m s c to open the Computer Management module. Using any of these methods will open the Computer Management window (see Figure 1.3). To view the User Accounts, simply click the plus sign next to Local Users and Groups and then click Users.You will see a window similar to the one in Figure 1.3 that lists all of the User Accounts on the system. Currently disabled accounts will have a red X on them. Basic Windows Security 9Chapter 1 Figure 1.3 The Windows XP Computer Management Console Allows You to Manage a Variety of Administrative Tasks You can right-click any of the User Accounts to rename them, delete them, or change their passwords.You can also select Properties to perform other tasks such as disabling the account, setting the password so that it must be changed at the next login, configuring the password so it can never be changed, and more. Disabling the Guest Account Disabling the Guest account has been recommended by security experts since the Guest account was first created. Under previous Windows versions, the Guest account had virtually no real-world purpose and served simply as another means for an attacker to gain access to a system, especially because the Guest account also has no password by default. In Windows XP, it is another story. The Guest account can still be an easy target for attackers, but in Windows XP H o m e and in Windows XP Professional systems that are not connected to a network domain, the Guest account is an integral part of sharing resources with other computers on the network. In fact, in Windows XP Home, it is not possible (at least not without the prerequisite jumping through the ring of fire upside down while chanting Bill Gates... you get the idea) to truly delete the Guest account. By clicking C o n t r o l P a n e l and going into User Accounts to turn off the Guest account in Windows XP Home, all you've really done is disable the Guest account 11 12 Chapter1 9BasicWindows Security for local logon. The account won't appear on the Welcome screen and nobody will be able to walk up and log on to the computer using the Guest account; however, the actual credentials and password are still active behind the scenes. Simply put, Windows XP H o m e relies on the Guest account for its network file and resource sharing.Your best bet to secure the Guest account on a Windows XP H o m e system is to assign a strong password~a password that is difficult to guess or crack--to the Guest account. For more information about passwords and creating strong passwords, see Chapter 2. See also Perfect Passwords: Selection, Protection, Authentication (Syngress Publishing, 2006, ISBN: 1-59749-041-5). Creating a password for the Guest account is also not an easy task in Windows XP Home. W h e n you open the User Accounts console from the Control Panel in Windows XP H o m e and select the Guest account, Create a Password is not one of the available options. To create a password for the Guest account, you will need to open a commandline window (click Start I All Programs I Accessories I C o m m a n d P r o m p t ) . Enter the following: net user guest. Leave off the brackets and simply type the password you want to assign at the end of the command line and press E n t e r . Oddly, now that you have created a password for the Guest account, the options for changing or removing the password will now appear in the User Accounts console. Renaming the Administrator Account In order for an attacker to gain access to your system, they really only need two things: a valid username and its associated password. It's easy for an attacker to learn what operating system and application vendors do by default when their product is installed. Therefore, everyone knows that Windows sets up a User Account called Administrator, which by default is a member of the Administrators group, and that Windows XP creates these accounts with blank passwords during installation. With this information, an attacker has the keys to the kingdom so to speak. While there are ways that an attacker can tell which account is truly the Administrator account, it is recommended that you rename the Administrator Basic Windows Security 9Chapter 1 account to make it harder to find. This way, you will at least protect your system from novice or casual hackers. You should select a name which means something to you, but that doesn't make it obvious it's an Administrator a c c o u n t ~ i n other words, calling it H o m e or Family or even some variation of your own name (for instance " C h u c k " if your name is Charlie, or "Mike" if your name is Michael). If you rename it to Admin or LocalAdmin or anything else, it will still look like an administrative account and you won't be able to throw off an attacker for long. You can rename the Administrator account by following the steps listed earlier to open the C o m p u t e r Management console and clicking the plus sign next to Local Users and Groups, and then clicking Users.You can then right-click the Administrator account and select R e n a m e . Y o u will have to use a different account with C o m p u t e r Administrator privileges to make the change, however, because you can't rename the account you're currently logged in under. Windows XP H o m e does not create an "Administrator" account per se (it does exist as a hidden account that is only visible if you log in using SafeMode), but you should follow similar logic in deciding what to name accounts given C o m p u t e r Administrator privileges. Creating a Dummy Administrator Account Hand in hand with the preceding advice, you should also create a " d u m m y " Administrator account. Most users with enough knowledge to try to hack or attack your computer know that Windows 2000 and Windows XP Professional will create an Administrator account by default. If they manage to access your system and see that no Administrator account exists, that will tip them off that one of the other existing accounts must be the "real" Administrator. Again, there are more sophisticated ways for an advanced hacker to determine which account is truly the Administrator, but that is still no reason to make it easy for the novices. Once you rename the Administrator account by following the previous steps, you should create a new account named Administrator and assign it to the Limited account type. Secu rity G rou ps Just like User Accounts, Security Groups help you control access to your data and resources. Where User Accounts allow you to define permissions and grant access on an individual basis, a Security Group allows you to define permissions and grant access on a group basis. www.syngress.com 13 14 Chapter 1 9Basic Windows Security This is more useful in a business network where there are typically more people involved and there is more data that may need to be accessible by one group of employees and inaccessible by others. That is probably why Microsoft only includes the ability to use Security Groups in Windows XP Professional and not in Windows XP Home. If you are using Windows XP Professional on a home network, this information may be helpful, but if you are focused only on Windows XP Home systems, you can safely skip this section. Using Security Groups can help to make assigning permissions and access privileges more manageable. In situations where a number of users will access a resource, it is much simpler to assign one set of permissions for the parents or managers and a more restrictive set of permissions for the children or regular users. Using Security Groups rather than individual User Accounts will make administering the permissions as users come and go an easier task. You can use the same steps illustrated earlier under User Accounts to open the Computer Management module, and then just select Groups, instead of Users, from the left pane. Windows comes with certain Security Groups predefined. Table 1.1 lists the various built-in Security Groups by operating system and includes a brief description of each. Table 1.1 Windows 2000 and Windows XP Pro Built-in Security Groups Security Group Windows 2000 Windows XP Pro Administrators X X Users X X Guests X X HelpServices www.syngress.com X Description Most powerful Security Group. Members of this group have the power to do just about anything on the computer. This group has the ability to use most parts of the system, but has very limited ability to install or change any part of the computer. Guests have very limited access and ability to do anything on the system. In Windows XP, however, the Guest account is integral to the Simple File Sharing system. This group is new in Windows XP and allows support technicians to connect to your computer. Continued Basic Windows Security 9Chapter 1 Table 1.1 continued Windows 2000 and Windows XP Pro Built-in Security Groups Security Group Windows 2000 Windows XP Pro Power Users' X X Backup Operators X Replicator X X Network Configuration Operators Remote Desktop Users X Description In between Users and Administrators, this group grants users more power and ability to install and configure the system without making them full Administrators. A special group designed to give its members the ability to back up and restore files and folders that they might otherwise not have access to. Pertinent only in domain-based networks, this group has the ability to manage file replication. This group grants its members the ability to add, change, or delete network connections, and to change TCP/IP settings. Members of this group are able to connect to remote computers using the Remote Desktop Connection feature. If none of these are appropriate for your purposes, you can also create your own custom Security Groups to use in defining access and granting permission to files, folders, or other network resources such as printers. Windows 2000 and Windows XP Professional users can view these Security Groups and add or remove members from them using Local Users and Groups in the Computer Management console. Windows XP Home Account Types The extent of your ability to easily select a Security Group in Windows XP H o m e is based on what Account Type you select in the User Accounts screen in the Control Panel.You have two choices: Computer Administrator or Limited. 15 16 Chapter 1 9Basic Windows Security C o m p u t e r Administrator is equivalent to Administrator with all-powerful access to the whole computer, while the Limited Account Type is more equivalent to the Users Security Group shown earlier. Users assigned to the Limited Account Type will be unable to install or alter programs or computer configurations. FAT32 versus NTFS You may never have heard of the terms FAT32 and NTFS, or at least never cared enough to find out what they are, but they are file systems. W h e n you format your hard drive, you can choose whether to format it using FAT32 or NTFS. They both have pros and cons, but from a security perspective, you should choose NTFS. FAT32 does not offer any sort of file or folder security. NTFS, on the other hand, allows you to secure files at an individual level and specify which users are authorized to access them.You must also use NTFS if you want to use EFS (Encrypting File System) to further secure your data. W h e n it comes to sharing files and folders with other computers on your network, the underlying file system does not matter. Other computers on your network, whether running Windows XP, Windows NT, Linux or some other operating system, will be able to access the shared data. If you share out files on a drive using FAT32, though, you will be unable to provide security at a file level. Thus, anyone w h o can access the share will have access to everything in the shared drive or folder. As a final note, N T F S also offers support for larger file sizes and drive partitions and provides better data compression and less file fragmentation than the FAT32 file systems. File and Folder Security O n e way to secure your data is to set permissions and access restrictions to identify which users or Security Groups are allowed to view, add, change, or delete files. If you set your files up so that only you can access them and a different user on the machine becomes c o m p r o m i s e d ~ e i t h e r through a virus or worm, or by a hacker or some other m e a n s ~ t h a t user's compromised account will not be able to wreak any havoc on your protected data. To configure the security and permissions for a file or folder, simply right-click it and select the Sharing and Security or Properties options. Once it opens, you can then select the Sharing tab in Windows XP H o m e or the S e c u r i t y tab for Windows 2000 or Windows XP Professional using the classic file and folder security model. Basic Windows Security 9Chapter 1 Keeping It Simple Windows XP H o m e uses a sharing model called Simple File Sharing. In Windows XP Professional machines that are not connected to a network, Simple File Sharing is an option. Like many "features" designed to make things easier for the user, it also is less configurable and provides less security than the file and folder sharing in Windows XP Professional or Windows 2000. Simple File Sharing is some sort of Dr. Frankenstein combination of the power inherent in Windows XP combined with the security model (or lack thereof) in Windows 98. With Simple File Sharing, you can choose to share a folder or not to share that folder, but even if you use NTFS, you don't get to take advantage of filelevel access or permissions. Essentially, once the folder is shared, anyone on the network will be able to access anything on the share. Windows XP Home users are stuck with Simple File Sharing. Users of Windows XP Professional, however, can enable or disable it by clicking Tools I Folder Options on the toolbar from within Windows Explorer. Click the View tab and then scroll to the bottom of the Advanced Settings to find the Simple File Sharing setting. This is also a big concern for Windows XP H o m e users on the Internet. If certain precautions (like blocking the ports Windows uses for file and folder sharing at your firewall) aren't taken, anyone who can see your computer from the Internet will also be able to access the files on the shared folder. If you assigned a strong password to the Guest account, as described earlier in this chapter, the risk of this is even lower. Windows XP H o m e and Windows XP Professional systems using Simple File Sharing also offer the opposite end of the s p e c t r u m ~ t h e option to make a folder "private." W h e n you mark a folder private, the file permissions are set so that only you have the ability to open or view the data they contain (see Figure 1.4). 17 18 Chapter 1 9Basic Windows Security Figure 1.4 Right-Click a Folder in Windows Explorer and Choose Sharing and Security to Configure Access to the Folder Sharing and Security If you are using Windows XP Professional, I would advise that you turn off Simple File Sharing and use the standard file and folder security. To turn off Simple File Sharing, open My C o m p u t e r or a W i n d o w s E x p l o r e r window and select Tools ] Folder Options. Then click the View tab and scroll all the way to the bottom of the A d v a n c e d Settings options and make sure there is no checkmark in the checkbox next to Use Simple File Sharing. www.syngress.com Basic Windows Security 9Chapter 1 W h e n using the classic file and folder sharing of Windows 2000 or Windows XP Professional with Simple File Sharing disabled, you have a lot of control over the access privileges different users have to your data. You can add or remove the User Accounts and Security Groups defined for the file or folder you are configuring (remember, it's easier to track and administer permissions using Security Groups if you are dealing with more than just two or three users). For each User Account or Security Group, you can select either Allow or Deny for a variety of actions to customize the level of access granted. You can choose to Allow or Deny Full Control which would give that User Account or Security Group the ability to do anything they want with the data, including modifying or deleting it entirely or even changing the permissions for other users. If you don't grant Full Control, you can choose to Allow or Deny the ability to Modify, Read & Execute, List Folder Contents, Read, or Write. Table 1.2 includes a brief summary of each of these access levels. Table 1.2 Access Levels for Windows 2000 or Windows XP Professional File and Folder Permission Grants the Ability to Full Control Change or configure permissions for other User Accounts and Security Groups, take ownership of the file or folder, delete the folder or any subfolders in the case of Folder permissions, or delete the file in the case of File permissions. Full Control also grants the ability to perform all of the functions of the other file and folder permissions. This permission allows users to delete the folder in the case of Folder permissions as well as perform any of the actions permitted by the Write permission and the Read & Execute permission. Modify Read & Execute Allows users to read the contents of the folder or file, including viewing the file attributes and permissions. This permission also allows users to execute files or run executable files contained in the folder. Continued www.syngress.com 19 20 Chapter1 9 BasicWindows Security Table 1.2 c o n t i n u e d Access Levels for Windows 2000 or Windows XP Professional File and Folder Permission Grants the Ability to List Folder Contents Unique to Folder permissions, this permission allows users to display the directory of names of files and subfolders in the folder. This permission allows users to view the files and subfolders in a folder in the case of Folder permissions. For file permissions, it grants the ability to read the file in question. Users can also view attributes of the file or folder including ownership, permissions, and attributes (such as Read-only, Hidden, Archive, and System). Read Write The Write permission allows users to add new files to a folder or modify a file or document as the case may be. The Folder permission allows users to also add subfolders to the folder, alter attributes and view folder ownership and permissions. The File permission allows users to perform similar actions on Files, including overwriting the file, altering the file attributes, and viewing file ownership and permissions. There are two items to note when you are setting permissions. First, permissions can be inherited from parent directories. If you see checkmarks in the boxes but they are grayed out, meaning you can not change them, that is because they are inherited from somewhere else. If you click the A d v a n c e d button under the P e r m i s s i o n s settings box, you can view or change the current setup and turn off the inheritance of permissions from parent folders. On the Permissions tab of the Advanced box, you will see each of the User Accounts and Security Groups with permissions on the object. Next to each it will display their Permission level, where it was inherited from, and what that permission level applies to. At the bottom of this tab are two checkboxes. One is to select whether or not you wish to allow permissions from other directories to be inherited Basic Windows Security 9Chapter 1 by this object. The second is whether or not you want the permissions from this object to be applied to the files and folders underneath it. The second item of note is in regards to selecting Deny for any of the permission settings and what the result would be for a user. Deny overrides all other options. So, for example, let's assume Bob is a m e m b e r of both the Administrators and Users groups. If the Administrators group has Full Control permission, while the Users group only has R e a d permission, Bob would have Full Control because he would get the cumulative total for both permissions. However, if you also add Bob's individual User Account and select Deny for Full Control, that selection will override his membership in the Administrators and the Users groups and Bob will be unable to access or perform any actions on that object. In the Advanced options discussed previously, there is also a tab called Effective Permissions. This handy tool will let you enter any User Account or Security Group and it will display for you what the net permissions are for that account on this particular object. This way you can see the effect of different permissions and what level of access the user or group actually has. You should try to use a designated folder or folders to house your personal and confidential files so that you can easily protect (and back up) that information rather than having to search all over your computer or protect individual files scattered about the hard drive. Any drive or partition that you format using the FAT32 file system will not be able to provide file or folder security. In order to secure your data and apply file and folder permissions as we have discussed here, you must use the NTFS file system. Windows Services A Windows "service" is a program that runs in the background on Windows. They aren't programs that will show up on the Start Bar at the b o t t o m of the screen or programs in the sense that you would directly access or interact with them. Windows services generally provide some functionality for the operating system or process actions and requests from other programs. To see a list of the services installed on your computer and whether or not they are currently enabled, you need to go into the Services Console.You can accomplish www.syngress.com 21 22 Chapter1 9 BasicWindows Security this by going into the C o n t r o l P a n e l / A d m i n i s t r a t i v e Tools folder and selecting Services. You will see a number of services listed along with a brief description of what the service does, its current status, its startup configuration, and what access level it logs in under (see Figure 1.5). Figure 1.5 Select Services from the Administrative Tools Group to Open the Windows Services Console Many of these services are unnecessary or rarely used. Sites such as LabMice.net (http://labmice.techtarget.com/) or TheElderGeek.com (www.theeldergeek.com/ services_guide.htm) provide checklists and recommendations for how to configure each of the standard Windows services. For our purposes, we will just talk about the services that directly affect the security of your system. In general, any service you don't have a need for should be disabled because they simply offer opportunities for someone to possibly exploit a vulnerability or security weakness in that service to gain access to your system. The following is a list of Windows services that you should disable because they provide an avenue for an attacker to compromise your system while not providing any useful functionality for most users: S S D P D i s c o v e r y S e r v i c e Enables discovery of UPnP (Universal Plug and Play) devices on your home network. This service provides half of the Basic Windows Security 9Chapter 1 U P n P functionality which has no real-world purpose but has been proven vulnerable to attack. This service does not affect Windows 2000. 9 U n i v e r s a l P l u g a n d Play Device Host Provides support to host Universal Plug and Play devices. This is the other half of the U P n P functionality. This service does not affect Windows 2000. 9 NetMeeting R e m o t e Desktop Sharing Enables an authorized user to access the local computer remotely using the NetMeeting program. Unless you intend to use NetMeeting on a regular basis, leaving this on simply provides a possible way for an attacker to gain access to your system. 9 R e m o t e Registry Enables remote users to modify Registry settings on the local computer. With rare exception there is no reason that you would want someone to be able to alter your Registry settings remotely. If you leave this service on, you run the risk that an unauthorized user may change your Registry settings remotely. 9 M e s s e n g e r Transmits Net Send and Alerter service messages between clients and servers. This service is a security concern from the standpoint that spare pushers have discovered they can use Net Send to transmit spare messages directly to your desktop rather than sending them through your e-mail. 9 Internet Information Services Internet Information Services (IIS) should not be installed by default on any of these operating systems, but as long as you are in the Services Console you should take a look to make sure the Internet Information Services are not enabled unless you are actually using IIS to host web sites or FTP on your local computer. IIS is prone to vulnerabilities which have allowed viruses such as C o d e R e d and Nimda to propagate. If you right-click any of the services in the Services Console, you can start and stop the service. However, stopping a service using this technique will only stop it temporarily. The next time you reboot the computer, or the next time another service tries to call or interact with the service, it will restart. To disable a service so that it will not start again, right-click the service in the Services Console and select P r o p e r t i e s . In the middle of the screen under the General tab is a drop-down box titled Startup Type. The drop-down box offers three choices: Automatic, Manual, and Disabled (see Figure 1.6). www.syngress.com 23 24 Chapter1 9BasicWindows Security Figure 1.6 You Can Disable a Windows Service by Right-Clicking the Service in the Windows Services Console and Selecting Properties Services configured for Automatic startup will be started each time you boot up the computer and the Windows operating system begins. Services that are configured for Manual startup will only start w h e n another program or service activates them or if you right-click the service and manually start it. Services that are disabled will be unable to start at all. To secure your operating system and protect it from easy access by hackers, I recommend that you disable all of the services mentioned previously, if they are not already disabled. Hidden File Extensions Microsoft created the ability to hide known file extensions so that everyday users would not need to be bothered with too much technical stuff. The icon associated with the file type would show you what sort of file it was so there was no need to inundate users with technical jargon like EXE or VBS or D O C or H T M . It didn't take long for virus writers and developers of other malware to figure out that you can add more than one extension at the end of the file name and that the last one will be hidden. So a file like mynotes.txt could be replaced with a malicious executable program called mynotes.txt.vbs, and with the file extensions being hidden it would still appear as mynotes.txt. Basic Windows Security 9Chapter 1 There are two things to note here. One, an observant user might detect the fact that only the malicious file shows any file extension at all. Using the double file extension hides the true file extension, but it still shows a file extension which gives away the fact that something is different. Two, the hidden file extensions only work in Windows Explorer. If you view the files using the dir c o m m a n d at a command prompt window, it will show the complete file name, including both file extensions. Even with those caveats in mind, though, it is best to simply disable this feature so that any and all file extensions are readily visible. To disable the hiding of file extensions, go into Windows Explorer (Start ]All Programs ]Accessories [ Windows Explorer) and select Tools, and then Folder Options. Click the View tab and uncheck the box titled Hide extensions for k n o w n file types (see Figure 1.7).All that was hidden shall now be revealed unto you, or at least the file extensions of the files on your computer system. Figure 1.7 Click Tools on the Menu Bar in Windows Explorer and Choose Folder Options to Disable the Hiding of File Extensions in Windows Screen Saver Screen savers started off as a measure to protect your monitor. The technology used in older monitors was subject to having the image burned into the phosphorous permanently if the same image stayed on the screen for too long. The result of 25 26 Chapter 1 9Basic Windows Security walking away to go to lunch and coming back an hour later might be that the spreadsheet data you were working with would be a permanent ghostly image on your monitor. Companies sprang up for the sole purpose of developing new and creative screen savers to keep this from happening. Basically, the screen saver program monitors computer activity and if there is no activity for a predefined period of time, the screen saver kicks off sending swirling shapes, flying toasters, swimming fish, or just about anything you can imagine randomly bouncing around the screen so that no single image is left in one place long enough to burn the monitor. Meanwhile, all of your programs and files are kept running in the background just as you left them. Over time, monitor technology has improved to the point that the screen saver is no longer truly needed to protect the monitor. However, screen savers have taken on a new, arguably more important role. N o w when you walk away to go to lunch for an hour the concern is not that your spreadsheet data will be burned into the phosphorous, but that anyone walking by would be able to see your spreadsheet data. Worse yet, anyone walking by could sit at your computer and access any of your files, or files on other computers you have access to, or send e-mail on your behalf, or any number of other things. The bottom line is that walking away from your computer is a huge security risk. Thankfully, Windows offers an option to require a password to unlock the computer once the screen saver is started. If the user account being used does not have a password assigned, you will still see a message box stating that the system has been locked and that a password is needed. However, anyone can still get into the system by just hitting E n t e r if there is no password in place. To configure your screen saver in Windows, you can right-click anywhere on the desktop and select P r o p e r t i e s . Click the S c r e e n Saver tab and check the box that says O n r e s u m e , p a s s w o r d p r o t e c t . You can also set the amount of time you want the system to wait before automatically starting the screen saver.You should set it for a short enough time to provide protection for your computer and your data should you leave your computer system, but long enough that the screen saver won't automatically start while you're trying to read your e-mail and become more of an annoyance than a benefit (see Figure 1.8). www.syngress.com Basic Windows Security 9Chapter 1 Figure 1.8 You Can Open the Windows Display Properties by Right-Clicking the Desktop and Selecting Properties www.syngress.com 27 28 Chapter 1 9Basic Windows Security Summary This chapter provided some fundamental knowledge about how to use and configure the basic Windows XP security features.You learned about how Windows controls access to the system, and how User Accounts and Security Groups can be used, together with file and folder security, to restrict access and protect your system. You also gained some knowledge about Windows services and how to disable those you aren't using, as well as the danger of hidden file extensions and how they can be used against you. Lastly, you learned that the screensaver is more than a frivolous toy to fill your screen while you're away. It can also be used as a security system for your computer. Armed with this basic knowledge of how to protect and secure the Windows XP operating system, you can proceed through the book and learn how to use other applications more securely. Additional Resources The following resources provide more information on Windows security: Description of the Guest Account in Windows XP. Microsoft's Help and Support Web Page (http://support.microsoft.com/kb/300489/en-us). How to Configure File Sharing in Windows XP. Microsoft's Help and Support Web Page (http://support.microsoft.com/kb/304040/en-us). How to Create and Configure User Accounts in Windows XP. Microsoft's Help and Support Web Page (http://support.microsoft.com/kb/279783/en-us). How to Use Convert.exe to Convert a Partition to the N T F S File System. Microsoft's Help and Support Web Page (http: //support.microsoft. com/kb / 314097 / en-us). Limitations of the FAT32 File System in Windows XP. Microsoft's Help and Support Web Page (http://support.microsoft.com/kb/314463/en-us). User Accounts That You Create During Setup Are Administrator Account Types. Microsoft's Help and Support Web Page (http: //support.microsoft. c om/kb / 293834 / en-us). Chapter 2 29 30 Chapter 2 9Passwords Introduction Passwords are the primary means of security for most home computer users. People have passwords to access their bank account, pay utility bills online, check their investments, and even to log on to their MySpace.com accounts. It is important that passwords be complex, or strong enough to provide adequate protection, and that they are managed properly. In this chapter you will learn about the basics of passwords. After reading this chapter, you'll know how to choose strong passwords, how to create passwords from phrases, how to crack passwords, and how to set passwords in a BIOS. Password Power A password is just a shared secret code or word that proves to the computer or application that you are authorized access. Just as with Ali Baba's "Open, Sesame" or the secret knock children use to gain access to the neighborhood clubhouse, computer passwords enable users to "prove" that they are allowed to use a particular computer, a Web site, or their own bank account. Your passwords can be quite powerful. Consider what could happen if someone stole them from you. They might be able to do any of the following: 9 Access your personal files including e-mail and financial data 9 Impersonate you and send e-mail that appears to be from you 9 Access your bank account and initiate transactions 9 Gain access to information that may provide them with other confidential data, such as other log-on information and passwords Continued Passwords 9Chapter 2 Passwords are used for a wide variety of access controls, including the computer operating system, different software programs, company networks, Web sites and more. There are also different types of passwords used in other areas of your life such as PIN numbers for your bank ATM card, access codes to check your voicemail, and the code to open your garage door, to name a few. These are all different forms of passwords and it is important that you create passwords that are difficult for others to guess and that you keep them secret. The trick is to make each password unique and original enough that unauthorized parties won't be able to guess it or figure out what it is, while making it something that you can remember. If you can't remember your own password it won't do you much good. RSA Security, provider of various authentication and identification technologies, conducted a survey of users in late 2005 that shows how insecure passwords can be. Here are some of the key results from this survey: 9 The Survey found that 58% of users have more than six passwords. Almost half of those have more than 13 passwords to manage. 9 Many users keep track of their passwords using insecure methods such as storing them on a PDA or other handheld device (22%) or writing them down on paper stored in their desk (15%). 9 Asked about having a single, master password that would unlock all their systems and applications, 98% of respondents stated that an extra layer of protection would then be required for security. This survey highlights some of the issues that still plague computer security. Users are inundated with usernames and passwords and many of them choose passwords that are easy to determine or guess because they are trying to select passwords that will also be easy for them to remember. Many users will also resort to recording their usernames and passwords somew h e r e ~ e i t h e r on sticky notes on their monitor or on a scratch pad in their desk drawer or in a planner that they carry with them. Recording the passwords in a place that they can refer to might make it easier on the user, but it will also make it that much easier on any would-be attacker who might come into possession of this list. 31 32 Chapter 2 9Passwords The Keys to Your Data If you think about the password as the key to your computer or data you can better understand why simple passwords are less secure than complex passwords and why any password, no matter how complex, may eventually be cracked. Although your life might be easier if the lock on your house, the lock on your car, the lock on your desk at work, and the lock on your locker at the gym could all be opened with the same key, if that one key fell into the wrong hands they would be able to open all of those locks as well. The same is true for your passwords. The online store where you purchased new ink cartridges for your printer may not guard their customer database with quite the same level of protection that your bank will. Some applications or Web sites may be less secure than others and you never know if your password is being stored in an encrypted form in a secure location or if it is just saved as plain text in an Excel spreadsheet somewhere. If an attacker manages to get your password from hacking into the ink cartridge merchant's customer database, they can view your profile on the site and probably your purchase history.Your purchase history might reveal your bank name. The attacker might go to the bank Web site on a w h i m and try to log on using the same password. N o w they have access to all your money. They can also view your recent www.syngress.com Passwords 9 Chapter 2 transactions, which might provide them clues as to who your Internet service provider is or who your cell phone provider is or which brokerage manages your investment funds. If you use the same password at all these sites and locations, an attacker gaining access to your password at one location would hold the key to the entire kingdom. You can use some discretion when it comes to password diversity.You might have one password that you use for all sites and applications that have no confidential or sensitive information such as your bank account number or credit card number or social security number.Your account on an online recipe site or the one you use to access message boards about golfing probably don't need to have exceptionally strong passwords nor would it be the end of the world if one password could get into all of those sites and applications. However, any site where your personal, confidential, or financial information may be stored in your profile or in a database should receive more attention on your part to take the extra time to give them unique passwords. Selecting Strong Passwords So what's a person to do? You can't even remember what you had for dinner last night or what time your son's soccer practice is. H o w are you going to remember what your password is? The first thing that most users try is to simply use a word that is familiar to them. Many users will choose things like their own name, their children's names, or the name of a pet. Going back to the key a n a l o g y ~ i f your password is like your key to unlock your computer, then choosing a password based on easily obtainable personal facts is like locking your door and placing the key under the doormat. It is better than nothing, but not by much. Through simple research or just conversation over coffee, an attacker can pick up personal information about you such as your spouse's name, children's names, birth dates, and more. It is important that you choose a strong password. What makes a password strong? Length is one factor. Another is to use a variety of character types. Passwords are generally case sensitive, so "password" is different from "Password." O f course, capitalizing the first letter might be the first thing someone would try if they were guessing, so using something like "pasSword" or "pasSwoRd" would be even stronger. W h e n you create a password in Windows XP, you are also asked to enter a word or phrase (see Figure 2.1) to act as a password hint. If you have issues remembering your password, Windows XP can display the hint to try to trigger your memory so 33 34 Chapter 2 9Passwords you can recall it. Click Control Panel I User Accounts I Change an Account, and then select a user and click Change Password to create a new password in Windows XP (see Figure 2.1). Figure 2.1 Creating a new password in Windows XP Aside from avoiding the use of personal data or information as your password, you should also avoid all dictionary words. One trick is to substitute numbers or special characters that look similar to letters. This is c o m m o n in hacker lingo where "elite" becomes "133t" and "hacker" becomes "h4x0r". Using this method it is possible to still choose a password that might be easy for you to remember, but writing it in a creative way using a variety of character types that will make it harder to guess or crack. You can also take a phrase or sentence and boil it down to an acronym of sorts. For instance, you might find it easy to remember the phrase, "My birthday is on June 16." However, instead of typing the whole thing, you could use "mbioj16" as your password or scramble it a bit more with alternative characters as discussed above so that it becomes something like "mbi0j 16."The net result is that you end up with a password that is more secure and harder to guess or break, but one that is easier for you to remember than just selecting a random grouping of various character types. Passwords 9Chapter 2 If you aren't sure how to transpose the normal characters in a word to alternate characters that look similar, you can use a tool like L33t-5p34K G3n3r@tOravailable from a number of sites if you simply search for it on Google.You can also visit www.transl8it.com, but the translations are not as consistently good as those created with L33t-5p34K G3n3r@t0r. If you can't come up with a good phrase or password on your own, you can use a tool like the Secure Password Generator on the winguides.com Web site (www.winguides.com/security/password.php).The Secure Password Generator (see Figure 2.2) has check boxes to let you select the number of characters in your password, whether to use uppercase letters, numbers, or punctuation, and whether to allow a character to repeat.You can also tell it to create up to 50 passwords at one time and then select the one you prefer from the list in case you are concerned that winguides.com will know your password. F i g u r e 2.2 The Secure Password Generator Password Cracking Password-cracking utilities use three methods for attempting to break a password. The simplest and the fastest~assuming that your password is a word that might be found in a dictionary~is called the Dictionary Attack. The Dictionary Attack tries every word in the dictionary until it finds the right one for the username trying to be accessed. www.syngress.com 35 36 Chapter 2 9Passwords The second method used to break passwords is called a Brute Force Attack. The Brute Force Attack will try literally every possible combination sequentially until it finds the right combination to authenticate the username trying to be accessed. The Brute Force Attack will attempt to use lowercase letters, uppercase letters, numbers, and special characters until it eventually stumbles onto the correct password. The third method is called a Hybrid Attack. The Hybrid Attack combines the Dictionary Attack and the Brute Force Attack. Many users will choose a password that is in fact a dictionary word, but add a special character or number at the end. For instance, they might use "password1" instead of"password." A Dictionary Attack would fail because "password1" isn't in the dictionary, but a Brute Force Attack might take days depending on the processing power of the computer being used. By combining a Dictionary Attack with a Brute Force Attack, the Hybrid Attack would be able to crack this password much faster. Given enough time and resources, no password is 100% unbreakable. Some password-recovery utilities may have success where others fail, and a lot depends on the processing horsepower of the machine attempting to crack the password (see the sidebar on p. 38). Just like the lock on your home or car d o o r ~ t h e idea is to make it difficult to get in, not impossible. A professional thief can probably still pick your lock in under a couple minutes, but the average person will be deterred by a lock and even thieves of moderate skill may be dissuaded by more complex or intricate lock systems. The goal isn't to come up with a password that is unbreakable~although that would be nice as well. The goal is to create a password that you can remember but that the average person won't be able to guess based on knowing a few details about your life and that would take so long to crack using a password-recovery utility that a hacker of moderate skill would be dissuaded. In the end, someone skilled or dedicated enough could still find a way to break or go around your password, which is one of the reasons this is not the only defense mechanism you will use. Aside from coming up with strong passwords, it is also important to change your passwords on a regular basis. Even if you have done everything possible to protect your passwords, it is still possible that through a security breach on a server or by an attacker intercepting network traffic, that your password could be intercepted or cracked. I would recommend that you change your passwords every 30 days at a minimum. Storing Your Passwords Obviously, having 70, 20, or even 5 different passwords at a given time can be difficult to keep track of. It becomes more complex when different Web sites or pro- www.syngress.com Passwords 9Chapter 2 grams restrict the number and types of characters that you can use for your passwords, or require that you change your password very frequently. These are some of the reasons why so many people resort to tracking their usernames and passwords in a text file (.txt) using Notepad or a small spreadsheet file (.xls) using Excel. In spite of the energy that security experts expend to convince people not to write down their passwords or store them in files on their computer, their advice goes largely unheeded. So, if you find that you're not going to be able to remember all the passwords you create, at least try to store them as securely as possible. To that end, I recommend using a free software package such as Password Safe (http://passwordsafe.sourceforge.net/) or P,,oboform (www.roboform.com/), to help you maintain your passwords more securely. Password Safe, an open-source password-management utility (shown in Figure 2.3), is available for free from Sourceforge.net. Figure 2.3 Store Passwords Securely in Password Safe One Super-Powerful Password Do you want to prevent people from even starting up your computer? You can password protect your entire computer by setting a password in the BIOS. What is the BIOS? The operating system, such as Windows XR enables your different programs www.syngress.com 37 38 Chapter 2 9Passwords and applications to work on the computer.The BIOS, or Basic Input/Output System, is the brain of the motherboard that controls the inner workings of the computer.The BIOS is typically contained in a chip on the motherboard. Table 2.1 Results of a Password Search Using Cain & Abel Version 2.5 Password Attack Time john john4376 Dictionary Dictionary Brute Dictionary Brute < 1 minute attack failed > 12 hours attack failed attack failed j0hN4376%$ $ Once you set a BIOS password, the computer will be completely useless to anyone who does not first enter the correct password. They won't even be able to begin trying to guess or crack your operating system or file passwords, because without the BIOS the computer cannot even start loading the operating system. To configure the BIOS you typically press the F1 or DEL keys while the computer is booting up. The exact key to press varies from computer to computer.You should see a message when the computer first begins to boot, letting you know which key to press to enter the "Setup" screen. For details about accessing the BIOS and how to configure it, check your computer owner's manual. www.syngress.com Passwords 9Chapter 2 Summary Passwords are one of the most essential tools for protecting your data. In this chapter you learned about the important role that passwords play and some of the adverse affects that can occur if someone obtains your password. To prevent an attacker from being able to guess or crack your passwords, you learned how to create stronger, more complex passwords, and how to use passphrases to generate even more complex passwords that you can still remember. Lastly, this chapter covered some tools that you can use to securely store and track your passwords when remembering them all just seems too difficult, and how to lock access to your computer entirely by using a BIOS password. Additional Resources The following resources provide more information on passwords and password management: 9 Bradley, Tony. Creating Secure Passwords. About.com (http://netsecurity.about.com/cs/generalsecurity/a/aa112103b.htm ). 9 Creating Strong Passwords. Microsoft Windows XP Professional Product Documentation (www.microsoft.com/resources/documentation/windows / xp / all/pro ddo cs / en-us/windows_p assword_tip s. mspx? mfr = true). 9 R S A Security Survey Reveals Multiple Passwords Creating Security Risks and End User Frustration. P,,SA Security, Inc. Press Release. September 27, 2005 (www.rsasecurity.com/press_release.asp?doc_id=6095). 9 Strong Passwords. Microsoft Windows Server TechCenter. January 21, 2005 (http: / / te chnet2, microsoft, c om/Windows Server/en/Library / d406b 824857c-4c2a-8de2-9b7ecbfa6e511033.mspx?mfr= true). 9 To Manage Passwords Stored on the Computer Microsoft Windows XP Professional Product Documentation (www.microsoft.com/resources/documentation/windows/xp / all/pro ddo cs / enus/usercpl_manage_passwords.mspx?mfr=true). PV27 39 This Page Intentionally Left Blank Chapter 3 41 42 Chapter 3 9Viruses, Worms, and Other Malware Introduction There are more than 200,000 reasons for you to learn the information in this chapter. McAfee, maker of security and antivirus software, recently announced that it has identified and created protection for its 200,000th threat. It took almost 18 years to reach the 100,000 mark, but that number doubled in only two years. Fortunately for computer users, McAfee's growth rate for identifying threats has slowed now. Viruses rank with spam as one of the most well-known threats to computer security. Notorious threats~such as Slammer, Nimda, and M y D o o m ~ e v e n make headline news. Just about everyone knows that a computer virus is something to be actively avoided. This chapter will show you how to do that, by teaching you: 9 C o m m o n malware terms 9 The threat of malware 9 H o w to install and configure antivirus software 9 H o w to keep your antivirus software up-to-date H o w not to get infected What to do if you think you're infected Malware Terms Viruses and worms are two well-known types of malicious software. Many threats combine elements from different types of malicious software together, These blended threats don't fit into any one class, so the term malware, short for malicious software, is used as a catch-all term to describe a number of malicious threats, including viruses, worms, and more. Malware presents arguably the largest security threat to computer users. It can be confusing to understand what the difference is between a virus and a Trojan, but these explanations should help: 9 Virus A virus is malicious code that replicates itself. N e w viruses are discovered daily. Some exist simply to replicate themselves. Others can do serious damage such as erasing files or even rendering the computer itself inoperable. 9 W o r m A worm is similar to a virus. They replicate themselves like viruses, but do not alter files like viruses do. The main difference is that worms reside in memory and usually remain unnoticed until the rate of replication reduces system resources to the point that it becomes noticeable. Viruses, Worms, and Other Malware 9Chapter 3 Trojan A Trojan horse got its name from the story of the Trojan horse in Greek legend. It is a malicious program disguised as a normal application. Trojan horse programs do not replicate themselves like a virus, but they can be propagated as attachments to a virus. Rootkit A rootkit is a set of tools and utilities that a hacker can use to maintain access once they have hacked a system. The rootkit tools allow them to seek out usernames and passwords, launch attacks against remote systems, and conceal their actions by hiding their files and processes and erasing their activity from system logs and a plethora of other malicious stealth tools. B o t / Z o m b i e A bot is a type of malware which allows an attacker to gain complete control over the affected computer. Computers that are infected with a bot are generally referred to as zombies. The History of Malware Every year seems to mark a new record for the most new malware introduced, as well as the most systems impacted by malware. The year 2003 was not only a recordsetting year for malware but also the 20th anniversary of computer viruses. In 1983, graduate student Fred Cohen first used the term virus in a paper describing a program that can spread by infecting other computers with copies of itself. There were a handful of viruses discovered over the next 15 years, but it wasn't until 1999, when the Melissa virus stormed the Internet, that viruses became c o m m o n knowledge. Since then, there have been a number of high-profile viruses and worms which have spread rapidly around the world. Code Red, Nimda, Slammer, and M y D o o m are virtually household words today. The number of new malware threats and the speed at which the threats spread across the Internet has grown each year. The Brain virus was the first virus designed to infect personal computer systems. It was introduced in 1986, at a time when the general public didn't know what the Internet was and the World Wide Web had not even been created. It could only spread to other computers by infecting floppy disks that were passed between users and therefore had much less impact. Compare that with more recent threats such as SQL Slammer which, by spreading through the Internet to the millions of computers now connected to it, was able to infect hundreds of thousands of computers and cripple the Internet in less than 30 minutes. 43 44 Chapter 3 9 Viruses, Worms, and Other Malware Gone are the days w h e n new threats were few and far between and had no simple means of propagating from system to system. The explosion of the Internet and the advent of broadband Internet service mean that there are millions of computers with high-speed connections linked to the Internet at any given moment. With millions of potential targets, it is almost a guarantee that at least a few thousand will fall victim to a new threat. As we discussed earlier in the book, when you are on the Internet you are a part of a worldwide network of computers.You have a responsibility to the rest of us sharing the network with you to make sure your computer system is not infected and spreading malware to everyone else. It is much less of a headache and a lot easier in the long run to proactively make sure your system is secure and to protect yourself by installing antivirus software to detect and remove threats such as these before they infect your computer system. Protect Yourself with Antivirus Software The term antivirus is a misnomer of sorts. Antivirus software has evolved to include many other security components. Depending on the vendor, the antivirus software may also contain anti-spyware tools, anti-spam filtering, a personal firewall, and more. In fact, recently the major security vendors such as McAfee and Trend Micro www.syngress.com Viruses, Worms, and Other Malware 9Chapter 3 have moved to marketing their products as a security suite, rather than simply antivirus software. Typically, antivirus software will detect and protect you from viruses, worms, Trojan horse programs, and backdoors, as well as blended threats which combine aspects of different threats. Some antivirus programs will also help block well-known joke or hoax e-mail messages, spyware programs, and program exploits. As you can see in Figure 3.1, the Trend Micro PC-cillin software includes scanning for a variety of threats.You should take the time to understand what your security software does and does not protect your computer against. Figure 3.1 Trend Micro PC-cillin Internet Security Software Most antivirus software includes three basic types of scanning: real-time, manual, and heuristic. Real-time scanning is the main line of defense that will keep your computer system clean as you access the Internet and surf the Web. This is the scanning that is done on-the-fly while you are using the computer. Antivirus software real-time scanning typically scans all inbound Web traffic for signs of malicious code, as well as inspects all incoming e-mail and e-mail file attachments. Antivirus products like McAfee VirusScan (see Figure 3.2) also include the ability to scan instant messaging or chat sessions and file attachments from those applications. Often, you can also enable outbound scanning to try and catch any malicious code which might be coming from your computer. 45 46 Chapter 3 9Viruses, Worms, and Other Malware Figure 3.2 McAfee VirusScan Options T h e manual scan is a scan run on your c o m p u t e r to check the files that are already on it and make sure none of t h e m are infected. These scans can be initiated by you if something suspicious seems to be going on, but they should also be run periodically to make sure that no malware got past the real-time scanners. It is also possible that an infected file may make its way onto your c o m p u t e r before your antivirus software vendor updated their software to detect it. Performing a periodic manual scan can help identify and remove these threats. Products like Trend Micro's PC-cillin Internet Security Suite lets you choose just h o w aggressive you want to scan your system (see Figure 3.3).You can choose to scan all files, or only those r e c o m m e n d e d by Trend Micro, w h i c h limits the scan to only the file types more likely to contain malware.You can also configure h o w you want the software to handle cleaning or removing any threats it finds. Most antivirus products allow you to set up a schedule to run the scan automatically.You should configure the scan to run at least once a week, preferably late at night or at some other time w h e n you won't be using your computer. Scanning your entire c o m p u t e r system usually hogs a lot of the computer's processing power and makes using it difficult while the scan is running. www.syngress.com Viruses, Worms, and Other Malware 9Chapter 3 Figure 3.3 Manual Scan Configuration for Trend Micro PC-cillin Internet Security 2006 The third form of detection included in most antivirus software is called heuristic detection. The standard malware scanning relies on signatures or pattern files used to identify known threats. However, until a threat is discovered and researchers identify its unique traits that they can use to detect it, your standard malware scanning won't detect the new threat. Heuristic detection doesn't look for specific malware threats. Heuristic detection uses general characteristics of typical malware to identify suspicious network traffic or e-mail behavior. Based on known traits from past threats, heuristic detection attempts to detect similar traits to identify possible threats. Keep Your Antivirus Software Updated So, after reading all of this you have decided that viruses, worms, and other malware are bad things to have and that it may be worth a few dollars to spring for some antivirus software to install to protect your computer. Great! N o w you can close the book and go back to watching Everybody Loves Raymond reruns, right? Unfortunately, no. 47 48 Chapter 3 9Viruses, Worms, and Other Malware N e w threats are constant. Securing your computer or network requires maintenance to keep pace with the changing attack methods and techniques. In any given week there may be anywhere from five to twenty new malware threats discovered. If you install antivirus software today and do nothing else, your computer will be vulnerable to dozens of new threats within a couple of weeks. It used to be that updating your antivirus software on a weekly basis was sufficient in most cases. But, as you can see from looking at the timeline discussed earlier, there were three years between officially defining a virus and the first virus affecting Microsoft systems. Five years later, Code R e d spread around the world in a day and infected more than 200,000 systems. Two years after that the SQL Slammer w o r m spread around the world in 30 minutes and crippled the Internet. The frequency and potency of new threats seems to increase exponentially from year to year. The more users who adopt high-speed broadband Internet connections and leave their computers connected 24/7, the greater the potential for a new threat to spread. For these reasons, I recommend you update your antivirus software daily.You could try to remember or make a note in your date book reminding you to visit the web site of your antivirus software vendor each day to see if a new update has been released and then download and install it, but I'm sure you have better things to do with your time. Antivirus software can be configured to automatically check with the vendor site for any updates on a scheduled basis. Check your antivirus software instructions for how to configure automatic updates for your application. Keep in www.syngress.com Viruses, Worms, and Other Malware 9Chapter 3 mind that the computer needs to be turned on and connected to the Internet in order for the software to be able to connect and download the updates, so pick a time of day that you know the computer will be connected. How Not to Get Infected R u n n i n g up-to-date antivirus software is great, but there is an even better protection against viruses, worms, and other malware threats. A little c o m m o n sense is the absolute best defense against computer threats of all kinds. W h e n you receive an e-mail titled "re" your mortgage loan" but you don't recognize the sender and you know that you never sent a message titled "your mortgage loan" in the first place, it's guaranteed to be spam, and may even contain some sort of malware. Fight your curiosity. Don't even bother opening it. Just delete it. If you follow our advice in Chapter 1, the User Account you use should not have Administrator privileges. If you're using a User Account that does not have the authority to install software or make configuration changes to the operating system, most malware will be unable to infect the system. You should also avoid suspicious or questionable Web sites. The Web is filled with millions of Web pages, the vast majority of which are just fine. N o matter what you're searching for, there is probably a perfectly reputable site where you can find it. But once you venture into the dark and shady side of the Internet, there is no telling what kind of nasty things you can pick up. Another c o m m o n source of malware is file sharing. Many of the files and programs that can be found on peer-to-peer file sharing networks, such as Bit Torrent, contain Trojans or other malware. Be cautious when executing files from questionable sources.You should always scan these files with your antivirus software before executing them. You can get malware infections by surfing the Web, using your e-mail, sharing network resources, or opening Microsoft Office files. It can be scary to think that just about everything you might want to use your computer for exposes you to threats of one kind or another. However, a little c o m m o n sense and a healthy dose of skepticism should keep you safe. Do You Think You're Infected? Is your computer system acting weird? Have you noticed files where there didn't used to be files, or had files suddenly disappear? Does your system seem like it is running slower than normal, or you notice that the hard drive seems to keep on cranking away even when you aren't doing anything on the computer? Does your system freeze up or crash all of a sudden? www.syngress.com 49 50 Chapter 3 9Viruses, Worms, and Other Malware All of these are potential signs that your computer system might be infected with some sort of malware. If you have suspicions that your computer may be infected, you should run a manual scan using your antivirus software. First, make sure that your software has the most up-to-date virus information available from your antivirus software vendor, and then initiate the manual scan. If the manual scan detects and removes the problem, you're all set. But what if it doesn't? What should you do if your antivirus software detects a threat, but is unable to remove it? Or what if your antivirus software says your computer is clean, but you still suspect it's infected? You can dig a little deeper to make sure. Antivirus and security software vendors often create stand-alone tools that are available for free to help detect and remove some of the more insidious threats (see Figure 3.4). Microsoft, which has recently entered the arena of providing antivirus and other security software products, also offers a Malicious Software Removal Tool which they update monthly to detect and remove some of the more pervasive and tenacious malware threats. Figure 3 . 4 McAfee's Free Tools for Removing Malware Some malware is written to disable or remove antivirus and other security software in order to prevent the ability to detect or remove it. If your computer system is infected by one of these threats, your antivirus software may be useless. You can try to find a stand-alone tool like those mentioned earlier, but an alternative is to scan your system with a different antivirus software. O f course, you probably don't have extra antivirus programs on standby that you can just install on a Viruses, Worms, and Other Malware 9Chapter 3 whim. Thankfully, Trend Micro provides a free Web-based scan called HouseCall (see Figure 3.5). If all else fails, you should be able to get your system cleaned up using this service. F i g u r e 3.5 Trend Micro's HouseCall 51 52 Chapter 3 9Viruses, Worms, and Other Malware Summary This is an important chapter. Viruses, worms and other malware are a constant threat and the source of many problems and tremendous frustration for many users. The subject of malware could fill an entire book by itself. In fact, there are entire books on the subject. The goal of this chapter was not to make antivirus or malware experts out of you, but to arm you with the knowledge that you need to safely use your computer for your day-to-day tasks. This chapter provided you with some explanation of the different types of malware and what makes them different, as well as a brief overview of the history of malware. We then talked about how to protect your computer system using antivirus software and how to make sure it is configured properly and kept up-to-date. You also learned how to exercise some common sense to ensure you don't become a victim of malware, and what to do to clean your system up if you are unfortunate enough to become infected. Additional Resources The following resources contain additional information on viruses, worms, and other malware: 9 Experts worry after worm hits ATMs. MSNBC.com. December 9, 2003 (www. msnb c. msn. corn/id/3675891/). 9 HouseCall. Trend Micro Incorporated's Products Web Page. (http://house- call.trendmicro.com/). 9 Malicious Software Removal Tool. Microsoft's Security Web Page, January 11, 2005 (www.microsoft. com/security/malwareremove/default.mspx). 9 W32/CodeRed.a.worm. McAfee, Inc.'s AVERT Labs Threat Library (http"//vil. nai. com/vil/c o ntent/v_99142, htm). 9 McAfee, Inc.'s AVERT Labs Threat Library (http: //vil. nai. c om/vil/content/v_ 100983. htm). 9 W32/Nimda.gen~M. McAfee, Inc.'s AVERT Labs Threat Library (http: //vil. nai. c o m / v i l / c o n t e n t / v _ 9 9 2 0 9 , htm). 9 W32/SQLSlammer.worm. McAfee, Inc.'s AVERT Labs Threat Library W32/Mydoom@~M. (http: //vil. nai. c om/vil/content/v_99992, htm). 9 Virus Removal Tools. McAfee, Inc.'s Virus Information Web Page (http: / /us. mc afe e. c om/virus Info / default.asp ?id = vrt). www.syngress.com Chapter 4 53 54 Chapter 4 9Patching Introduction W h e n it comes to maintenance and upkeep, your computer is more like your car than your toaster.Your toaster may not need any attention, but the car requires oil changes, new tires, tune-ups, and more, to keep it running properly. This chapter covers the information that you need to know to understand patches and updates and what you need to do to maintain your computer and protect it from vulnerabilities. In this chapter, you will learn: 9 Terms used to describe patches and updates 9 Why you should patch your system 9 H o w to know what patches to install 9 Using Automatic Updates and the Microsoft Update Web site 9 Using System Restore Patch Terminology W h e n I wear a hole in a pair of jeans, I go to the store and buy a new pair. But, I remember when I was growing up that a hole didn't guarantee a new pair of jeans. My mother would just get a patch and apply it to the hole and, presto, jeans were as good as new. Mostly. With computer software it works pretty much the same way. In between releases of major versions of software, software publishers typically release patches to fix what's broken. They don't want to give you that new pair of jeans just yet; they've got the iron-on patches ready to g o - - y o u just have to install them. There are different kinds of patches and it can help to know the difference between them because some are big fixes and others are small. Don't worry about learning this stuff; just use this list as a reference. And be sure to read the description for the fixes you're planning to install. www.syngress.com Patching 9 Chapter 4 Why Should I Patch? Once a month, Microsoft releases their new Security Bulletins identifying new vulnerabilities and providing the links to download the necessary patches. There is typically at least one vulnerability that could result in your computer being controlled remotely by an attacker and enable them to access your personal files and information, or hijack your computer to propagate viruses or mass-distribute spam e-mail. These Security Bulletins are generally rated as Critical by Microsoft because they consider it fairly urgent that you apply the patch to protect your computer system. If your computer seems to be working just fine, you may wonder "Why bother upsetting the apple cart by applying a patch?" Simple:You should apply the patch as a sort of vaccination for your computer to keep it running smooth. Many viruses, worms, and other malware exploit flaws and vulnerabilities in your system in order 55 56 Chapter 4 9 Patching to do their dirty work.Your system may seem fine now, but by not applying a patch you might be opening the door for malware or attackers to come in. For example, the SQL Slammer worm, discussed in Chapter 3, was able to spread around the world in less than 30 minutes and cripple the Internet by exploiting a vulnerability that had a patch available for more than six months. Had users and network administrators been more proactive about applying the patch, SQL Slammer may have fizzled out without being noticed. Some patches may fix a flaw in some particular service or underlying program that only a relative minority of users actually uses in the first place and which may not be urgent enough for you to bother downloading and installing. However, some flaws may expose your computer to remote attacks that enable the attacker to assume full control of your computer system enabling them to install software, delete files, distribute e-mail in your name, view your personal and confidential data, and more. Obviously, a patch for such a vulnerability has a higher urgency than the first one. Patches that repair vulnerabilities that can be exploited remotely, in other words, from some other system, rather than requiring the attacker to physically sit down in front of your computer, are even more urgent when you consider that many viruses and worms take advantage of these flaws to exploit systems and propagate to other vulnerable systems. These vulnerabilities provide a relatively easy method of attack for malware authors, and the time frame between the patch being released and a virus or worm exploiting the vulnerability being released on the Internet is getting shorter and shorter. H o w Do I Know W h a t to Patch? There are often more than 50 new vulnerabilities discovered or announced in a given week. Some of them will affect products you use, but the majority of them will probably affect other products or technologies that don't affect you. How can you keep up with so many vulnerabilities and filter through to find the ones that matter to you? More than that, how can you sift through the vulnerabilities that affect your system and choose which ones don't really matter and which ones are urgent? Patching 9Chapter 4 Any software you use is a potential source of vulnerabilities that could lead to a compromise of security on your system. H o w e v e r , the more commonly used a program is the bigger target it represents and the more likely it is that a vulnerability will be exploited through some sort of automated malware or manual attack. Still, for the more obscure programs you might use you should look into whether or not the vendor offers any sort of mailing list you can join to receive news of updates, patches, or vulnerability alerts. For users of Microsoft Windows operating systems, Microsoft offers a couple of alternatives to stay informed of the latest vulnerabilities and to make sure you have the necessary patches applied. One is passive~automatically checking for and downloading any new p a t c h e s ~ w h i l e the other requires some active participation on the part of the user. 57 58 Chapter 4 9Patching To be precise, it is up to you to choose just how passive you want the Windows Automatic Update feature to be.You can opt to be notified of any existing updates before downloading them; you can configure Automatic Update to automatically download any updates and notify you when they are ready to be installed; or you can configure it to simply download and install the updates on a schedule of your choosing. To enable Automatic Update in Windows XR click System in the C o n t r o l Panel, and then select the A u t o m a t i c Updates tab (in Windows 2000, click A u t o m a t i c U p d a t e s in the Control Panel). The Automatic Updates tab offers four radio buttons to choose how to configure it. If you leave your computer on during the night and opt for automatically downloading and installing the updates, you may want to choose a time while you are sleeping so that any downloading and installing activity won't bog down the computer while you are trying to use it (see Figure 4.1). Patching 9Chapter 4 Figure 4.1 Windows XP Automatic Updates Tab You can also opt to have the updates downloaded to your computer, but not be installed until you manually initiate it, or you can choose to simply receive a notification when new updates are available, but download and install them manually. These configuration options may be helpful for users who don't want their computing interrupted by patches being installed or who have limited Internet connectivity and want more control over when patches are downloaded. In general though, home users should stick with the recommended setting of Automatic. When new patches are available, or have been downloaded and are pending installation on your system, the Windows Security Center shield icon will appear yellow in the Systray. By clicking on the icon you can view the Details of the updates and then choose whether or not you want to install them. If you choose not to install updates that have already been downloaded to your system, the files are deleted from your computer.You can still apply the update at a later time by clicking System in the Control Panel and selecting the A u t o m a t i c Updates tab.At the bottom you will see a link to "Offer updates again that I've previously hidden," which you can click to re-download updates you previously declined. The Automatic Updates feature of Windows is a great way to stay current with critical security patches~or at least aware of new patches when they become available, depending on how you configure it. However, Automatic Update notifies you or downloads patches only for flaws that affect the security of your system. For patches that affect the functionality of Windows or its underlying programs, but do not affect security, you should periodically check the Microsoft Update Web site. 59 60 Chapter4 9Patching To open the Microsoft Update site in Windows XP, select Start I All Programs I W i n d o w s U p d a t e (in Windows 2000, click Start I W i n d o w s U p d a t e at the top of the Start menu). If you click the Express button, a scan of your system will be initiated (see Figure 4.2), and Microsoft Update will identify any high-priority patches that your system is missing. Clicking the C u s t o m b u t t o n performs a more comprehensive scan. After it has completed scanning, you will be notified if there are any new updates available from three different categories: high-priority updates and service packs, optional software updates, and optional hardware updates (such as device drivers). Figure 4.2 Microsoft Update Welcome Page You can view a brief description of each update to learn more about what it does and choose which updates you want to install. After you have selected the updates you want to apply, click Review and Install Updates and click Install U p d a t e s to start the process. Patching Precautions Ideally, the software you are using would be flawless in the first place. But, with millions of lines of code in programs such as Microsoft Windows, often written by diverse groups of people scattered around the globe, it seems almost inevitable that a flaw will be discovered eventually. When a flaw or vulnerability is discovered and a patch is created there are some precautions you should bear in mind before simply applying it. Patching 9Chapter 4 First of all, you should be aware that sometimes the patch introduces new flaws. In their haste to get a patch distributed to users as quickly as possible~especially in the case of a vulnerability with critical security implications~patch code developers may not perform the quality checks and due diligence the patch deserves before they rush it out the door. Even in a best-case scenario, the vendor can only test the patch under so many different configurations or conditions. It is still always possible that your particular collection of software or services may interact poorly with the patch and cause a problem that was unforeseen by the developers. A flawed patch might result in a wide variety of issues ranging from quirky bugs or disabled functionality to random system crashes or could even possibly render the system completely unbootable. Another thing to keep in mind is that a patch may not always fix the flaw it was intended to fix or at least not completely. Sometimes a vendor might discover a flaw and develop a patch that fixes a specific symptom without correcting the underlying flaw that causes the symptom to begin with. For this scenario there isn't much you can do. Simply be aware that a patch is not always a silver bullet that will magically fix everything and remain aware of the fact that your vendor may re-release a patch or release a new patch to replace that one if more flaws or vulnerabilities are discovered. There are a couple of things you can do to protect yourself to some degree. First and foremost, you should always run a backup of your c o m p u t e r ~ o r at least your critical d a t a ~ s o that in the event of a catastrophic failure you can rebuild your system and not lose your data. For more information about backing up or restoring your files, see Chapter 11, "When Disaster Strikes." Windows XP also has a feature designed to let you recover from problems and return your system to a previous state. The Windows System Restore feature automatically saves restore points on a periodic basis so that you can reset your system to that point in time if it becomes necessary (see Figure 4.3). 61 62 Chapter 4 9Patching You should manually create a restore point immediately before applying a patch or doing any other system updates or upgrades so that you will be able to return to the pre-patch system if need be. I recommend that you create a system restore point weekly as a part of general system maintenance as well. Figure 4.3 Windows System Restore Welcome Page To manually set a restore point, click Start I All P r o g r a m s I Accessories I System Tools I System Restore. Select Create a restore point, and click Next. Enter a descriptive tide for your restore point, and then dick Create. In most cases you can also uninstall the patch or update using the Add or Remove Programs function in Control Panel if it causes any problems (see Figure 4.4). It can be a little cryptic, however, to determine which patch to remove after you have applied a number of them. They are listed in Add & Remove Programs by their knowledge base reference~a number which starts with "KB" followed by a six-digit number. Check the Show U p d a t e s box at the top of the A d d or R e m o v e P r o g r a m s console to display Windows patches and updates. Patching 9Chapter 4 Figure 4 . 4 Windows Patches and Updates in the Add or Remove Programs Window You can typically find the associated knowledge base number at the end of the title of the applicable Microsoft Security Bulletin.You can also do a search for the "KB" numbers on the Web using a search engine such as Google to get more details about them. If you are unable to locate the exact patch to remove from Add or R e m o v e Programs or if your system is so unstable or dysfunctional that you can't even get to Add or R e m o v e Programs, you should simply use your latest backup or the Windows System Restore feature to restore your system to the way it was before you applied the patch or update. www.syngress.com 63 64 Chapter 4 9Patching Summary In this chapter you learned that patches or updates for your software may come under a variety of names. We talked about the reasons you should be diligent about applying patches and how you can stay informed and up to date about existing vulnerabilities and the patches available for your operating system and applications. We also discussed how to use the Automatic Updates feature of Microsoft Windows and how to use the Microsoft Update Web site to identify and download any necessary patches. We wrapped up with a discussion of how to use System Restore or Add or Remove Programs to undo patches if something goes wrong and the importance of regular data backups. Additional Resources The following resources provide more information on patching: Microsoft Update (www.windowsupdate.com). SecurityFocus Bugtraq ( w w w . s e c u r i t y f o c u s . c o m / archive/1) . Secunia Advisories (secunia.com/advisories/). www.syngress.com U1 This Page Intentionally Left Blank Chapter 5 67 68 Chapter 5 9Perimeter Security Introduction Generally, when you think of perimeter security, you think of protecting the outer edges of your network. Hence, the term perimeter. H o m e computers and small office/home office (SOHO) networks typically have some form of firewall in place; this could be a cable router, wireless access point, or switch. Some people think that the perimeter security starts with the Windows Firewall or other firewall located on the computer. If you are thinking that can't be a perimeter security measure, you are wrong. Think about a laptop on a wireless broadband card from Verizon. What is the first point of security? The software on the computer is the right answer. In this chapter we will take a look at some different aspects of the perimeter security and how they work. We also discuss some ideas that maybe you would have not thought of for security. From Moats and Bridges to Firewalls and Filters In ancient civilizations, entire towns or villages were surrounded by some form of protection--possibly a tall wall or a deep moat, or b o t h - - t o keep unwanted "guests" from entering. Guards would man the entrances and bark out "who goes there?" If the party entering was known or had the right password or sufficient credentials to gain access, the moat bridge or fortress wall was opened up to allow him or her to enter. If this form of defense were 100 percent effective, there would be no need for any sort of security or law enforcement within the confines of the village or fortress. Ostensibly, you would keep the bad guys outside the walls or moat and everyone inside would behave in a civilized and respectful manner. O f course, this is not typically what happens. W h e t h e r it's a malicious intruder who somehow cons his way through the defenses or bypasses them altogether or an internal malcontent who chooses to break the rules, some form of internal law enforcement is generally needed to maintain the peace inside the walls. Perimeter security in a computer network works in a similar way. A network will generally have a firewall acting as the fortress wall or castle moat for the computer network. If the incoming network traffic doesn't fit the rules defined in the firewall, the traffic is blocked or rejected and does not enter your internal network. Figure 5.1 shows a typical network configuration with an internal firewall and perimeter firewall in place. Perimeter Security 9Chapter 5 F i g u r e 5.1 Perimeter Security If a firewall were 100 percent effective, and if external traffic entering your network was the only attack vector you needed to be concerned with, there would be no need for any other computer or network security on your internal network or the computers inside of your firewall. But since it's not, you still need internal security measures as well. R u n n i n g an intrusion detection system (IDS) or intrusion prevention system (IPS) can help you to detect malicious traffic that either slips past the firewall or originates from inside the network in the first place. Even firewalls and intrusion detection or prevention won't protect you from every possible computer attack, but with one or both of these technologies in place, you can increase your security and greatly reduce your exposure to risk. Firewalls In its original form, a firewall is a structural safety mechanism used in buildings. Put simply, it is a wall designed for the purpose of containing a fire. The concept is that if one section of the building catches fire, the firewall will prevent that fire from spreading to other areas of the building or even other buildings. A network firewall is similar except that rather than surrounding a room or a building, it protects the entry and exit points of your computer network, and rather than trying to contain the fire or keep it inside, the firewall ensures that the "fire" stays outside the network. 69 70 Chapter 5 9Perimeter Security To understand how a firewall works or why you should have one to protect your network or computer, it helps to have a basic knowledge of how the network traffic works in the first place. Network Traffic Flow Network traffic gets from point A to point B based on an address and a port. Every device on the Internet or even on an internal network must have a unique IP address. Picture a computer's IP address as the computer networking equivalent of your street or mailing address. In Figure 5.2 you can see that for 10.10.10.1 to reach its mail server it must know the IP address of the mail server, which is 1.1.1.2. For mail to get to a specific individual, it is first sorted by its ZIP code. The ZIP code enables the postal service to know where that individual is located in a broad sense by narrowing the location down to a particular city and state and possibly even a small portion of the city. After the ZIP code, the postal service can look at the street name to further narrow the destination and then the postal delivery person will ensure that the mail gets to the appropriate building number on the given street. Perimeter Security 9Chapter 5 F i g u r e 5.2 Network IP Flow Routers and Ports Your IP address provides similar information to network routers. The first part of the IP address identifies the network the device is located on and is similar to the ZIP code of a mailing address. This information helps to narrow the destination to a given Internet service provider (ISP) or even a smaller region within the ISP. The second part of the IP address identifies the unique host and is similar to the street address of a mailing address. This portion narrows it to a specific segment of the network and then down to the exact device that owns the given IP address. N e t w o r k communications also use ports. Ports are similar in some ways to TV channels or radio stations. There are roughly 65,000 possible ports for network traffic to use. Many of the ports, particularly those in the range from 0 through 1023, have a specific purpose. However, a vast majority of the ports are available for use for any purpose. For example, if you want to listen to a specific radio station, there is a specific frequency or station you must tune your radio to in order to receive the signal. If you want to watch a particular TV show, there is a particular frequency or channel you must tune your television to in order to receive the signal. In both cases there are also a number of frequencies that are not used for a designated station or channel and could conceivably be used by someone else to broadcast on. Similarly, certain service or types of communications occur on designated network ports. For example, e-mail uses port 25 for SMTP (Simple Mail Transfer Protocol) or port 110 for POP3. Surfing the Web uses port 80 for normal sites and www.syngress.com 71 72 Chapter 5 9Perimeter Security port 443 for secure or encrypted sites. It is possible to use these services on other ports, but these are the default standards that the Internet operates on. Packet Routing and Filtering Another key aspect of network traffic is that it is broken into small pieces. If you wanted to ship a refrigerator to someone in the mail, it would be too large to handle all at once. But you could take the refrigerator apart and ship each piece in an individual box. Some of the packages might go on a truck and some might go on a plane or a train. There is no guarantee that the packages will arrive together or in the correct order. To make it easier to assemble the refrigerator once it arrives at its destination, you might number the packages: 1 of 150, 2 of 150, 3 of 150, and so on. After all 150 packages arrive, they can then be reassembled in their proper sequence. N e t w o r k traffic is handled the same way. It would be too slow or inefficient to try to send a complete 4MB or 5MB file together in one piece. So network traffic is broken into pieces called packets. Different packets may take different routes across the Internet and there is no guarantee that the packets will arrive at the destination together or in the correct order. So, each packet is given a sequence number that lets the destination device know what the proper order is for the packets and tells it w h e n it has received all the packets for a given communication. Each network packet has a header that contains the necessary details, similar to a shipping invoice. The packet header identifies the source IP address and port as well as the destination IP address and port. It is this information that many firewalls use to restrict or allow traffic. W h e n you surf to a Web site, your computer will communicate with the Web server on port 80, but the traffic coming back to your computer may be on some other port and will be handled differently by your firewall than unsolicited incoming traffic. Ideally, your firewall will block all incoming traffic except on the ports that you specifically choose to allow. For most home users it is safe to block all ports for incoming traffic because home users do not generally host services such as an e-mail server. Unless you are hosting a Web site on your computer, you don't need to allow port 80 traffic from the Internet into your computer. If you are not running your own P O P 3 e-mail server, you don't need to allow incoming port 110 traffic. In most cases, the only traffic that needs to come in to your network is a reply to a request your computer has made. There are cases with some online games or peer-to-peer (P2P) networking where your computer does need to act as a server and may need to have certain incoming ports open. Perimeter Security 9Chapter 5 This basic sort of firewall is known as a packet filter.You can use a basic packet filter firewall to deny all traffic from a certain source IP address or to block incoming traffic on certain ports. As we stated earlier in this chapter, the ideal configuration for your firewall is to simply deny all incoming traffic and then create specific rules to allow communications from specific IP addresses or ports as the need arises. Stateful Inspection There is a deeper or more advanced form of packet filtering called stateful inspection. Stateful inspection not only looks at the source and destination ports and addresses but also keeps track of the state of the communications. In other words, rather than letting traffic in simply because it is on the right port, it validates that a computer on the network actually asked to receive the traffic. Stateful inspection also evaluates the context of the communications. If a computer on the network requests a Web page from a Web server, the stateful inspection packet filter will allow the Web page traffic through. However, if the Web site is malicious and also attempts to install some malware, a standard packet filter might allow the traffic because it is in response to a request initiated from your network, but the stateful inspection packet filter will reject it because it is not in the same context as the request. This higher degree of scrutiny for incoming packets helps to protect your network better than a standard packet filter. As you can see in Figure 5.3, stateful inspections used rules or filters to check the dynamic state table to verify that the packet is part of a valid connection. F i g u r e 5.3 Stateful Packet Inspections 73 74 Chapter 5 9Perimeter Security Application Gateways and Application Proxy Firewalls For even better protection you can use an application gateway or application proxy firewall. An application proxy mediates the communications between the two devices, such as a computer and server. Essentially, there are two c o n n e c t i o n s ~ o n e from the client to the application proxy and one from the application proxy to the server. The application proxy receives the request to start a session such as viewing a Web page. It validates that the request is authentic and allowed and then initiates a Web session with the destination on behalf of the client computer. This type of firewall offers a significantly greater level of protection and has the added benefit of hiding the client machine's true identity, since the external c o m m u nications will all appear to originate from the application proxy. The downside is that the application proxy uses a lot more m e m o r y and processing power and may slow down network performance. With recent boosts in processing power and with random access m e m o r y (RAM) being less expensive, this issue is not as significant any longer. Personal and Cable/DSL Router Firewalls There are two different types of firewalls that home or small office users will generally implement: personal firewalls and cable/DSL router firewalls. The two are not mutually exclusive and, in fact, can and should be used in conjunction with each other for added security. In Figure 5.4 you can see that a S O H O firewall sits outside the local switch on which the local computers reside. Figure 5.4 SOHO Firewall Perimeter Security 9Chapter 5 Most home routers designed for use with cable or DSL broadband Internet access come equipped with a basic packet filter firewall, or possibly even a stateful inspection firewall built in. The standard default configuration is generally to Deny All access unless you specifically configure it otherwise, but check the documentation for your router to make sure the firewall is on by default and what the default rule set is. This sort of firewall can help you provide true perimeter security for your home network. N o matter how many computers you connect within your home, all of the network traffic coming from the Internet will have to pass through this device to get in, so all of your computers will be protected. H o m e routers also typically provide Network Address Translation (NAT), which means that the true IP addresses of any machines on your network are hidden and that external systems see only the IP address of the firewall/router. There are a couple of key things to remember when using this type of router. First, you should always change the default password as soon as possible. Second, you should change the default IP address used for the internal network. Default passwords are easy for attackers (most attackers will already have them, as they're posted on any number of Web sites) to discover or guess, and most attackers will be aware that the default subnet used by home routers is 192.168.0 and that the administrative screen for the router itself can be accessed at http://192.168.0.1. One more serious caveat regarding a home router firewall is that they won't provide any protection for users who use a dial-up telephone connection to access the Internet. If you are sharing a single Internet connection, you could conceivably connect other systems on your network through a home router with a firewall, but the actual computer connecting to the Internet over the dial-up connection would still be unprotected. W h e t h e r or not you have a router for your network providing your network with protection through a packet filter or stateful inspection firewall, you can also install a personal firewall application on each individual computer system. Just as the network firewall monitors and restricts the traffic allowed into your network, the personal firewall will monitor and restrict the traffic allowed into your computer. This can be advantageous for a number of reasons. First of all, if one of your computers participates in online gaming or P2P networking, you may be required to open up ports on your network firewall in order for the communications to work. Although that may be an acceptable risk for the machine using those ports, the other machines on your network still don't need any potentially malicious traffic entering on those ports. Individual machines on your network may also want to protect themselves from suspicious or malicious traffic from other computers in your network. 75 76 Chapter 5 9Perimeter Security Windows XP comes with a built-in personal firewall application. The Windows Firewall is a stateful inspection firewall. One advantage of the Windows Firewall over the aforementioned router firewalls is that it can provide security for the computer even on a dial-up connection. In some ways the Windows Firewall is very robust. It has the capability to detect and defend against certain types of denial-of-service (DOS) attacks (a DoS attack occurs when an attacker is able to disable or overwhelm a device to the point that it no longer responds to requests, thereby denying service to legitimate users) by simply dropping the incoming packets. If your Windows Firewall is turned off, and you don't have some other thirdparty firewall running on your computer, the Windows XP Security Center will display a pop-up alert in the systray at the lower right of the screen to let you know your computer may not be secure. To enable the Windows Firewall, click S t a r t I Control Panel I S e c u r i t y C e n t e r . W h e n the Security Center console comes up, click W i n d o w s Firewall at the bottom to open the Windows Firewall configuration screen (see Figure 5.5). Just select O n and click O K to turn the firewall on. Figure 5.5 The Windows Firewall Configuration Screen In Figure 5.6 you can see that the E x c e p t i o n s Tab on the Windows Firewall console is selected. Exceptions allow the user to select certain programs or network www.syngress.com Perimeter Security 9Chapter 5 ports to allow through the firewall. Some programs are added by default by Windows w h e n they are started up and try to access the network. If you need to add a program that is not displayed on the list, you can click A d d P r o g r a m and manually select the application. Programs and ports with checks in the box next to them on the Exceptions tab will not be restricted by normal firewall rules and will be allowed to pass through the firewall as if it were not there. At the bottom of the Exceptions tab is a checkbox to "Display a notification w h e n Windows Firewall blocks a program." This can be very informative or a confusing nuisance depending on how you look at it. If you leave the box checked, you will get a pop-up alert each time a new application tries to communicate through the firewall.You can choose whether to allow the communication or not. Many users do not like to have constant pop-up alerts, though, and generally don't understand what they are about or whether they should approve them.You will probably want to leave this box unchecked, but if you are trying to use a new program and run into issues, always think of the firewall first and remember that without an Exception being added, your program probably cannot communicate freely through the firewall. Figure 5.6 The Windows Firewall Exceptions www.syngress.com 77 78 Chapter 5 9Perimeter Security You can select the A d v a n c e d Tab, to access some settings for more advanced firewall configuration. At the top, it shows the network connections settings (see Figure 5.7), which display a list of all of the network adapters or connections in the computer. The adapters or network connections that have checkmarks in the box next to them have the Windows Firewall protection enabled for them. Those that don't are not protected by the Windows Firewall. The Advanced tab also allows you to turn logging on and off. If you enable logging, a T X T file will be generated that records information about all the connections made to or from the firewall. It collects the source and destination IP address and source and destination port information as well as the network protocol being used. For an average user, this will probably all appear as gibberish. But the information can be useful for troubleshooting problems or trying to find the root cause of an attack or system compromise. At the b o t t o m of the Advanced settings tab, you can reset the Windows Firewall to its default settings. After you have customized and tweaked it and added Exceptions and completely reconfigured it, you might find it hard to figure out which setting to change to make things work again. If you are having serious connectivity problems, you might want to return the Windows Firewall to its original configuration and start over. Figure 5.7 The Advanced Tab of the Windows Firewall Configuration www.syngress.com Perimeter Security 9Chapter 5 The Windows Firewall is a great tool, especially for one that is included in the operating system for free. It also works a little too well (which is better than not well enough) in some cases, making it difficult for your computer to even communicate or share resources with other computers on your own network. For these reasons and more we recommend that you leave the Windows Firewall disabled and instead install a third-party firewall product such as ZoneAlarm (see Figure 5.8) or the personal firewall component of a security suite such as Trend Micro PC-cillin. ZoneAlarm is a popular personal firewall program that is very effective and relatively simple to use. F i g u r e 5 . 8 Zone Alarm Zone Labs offers the basic ZoneAlarm product free for personal use. ZoneAlarm provides a basic firewall without the bells and whistles that are part of the more advanced ZoneAlarm products. Whereas Windows Firewall only filters or blocks incoming traffic, ZoneAlarm will also watch the outbound traffic. This feature can be helpful in alerting you to any Trojans or spyware that might have compromised your machine and that might try to initiate outbound communications to "call home," so to speak. ZoneAlarm can be configured to alert you for different types of suspicious traffic so that you can be aware of potential malicious activity as it is happening. As new 79 80 Chapter 5 9Perimeter Security applications attempt to connect from the computer, ZoneAlarm will ask the user whether or not the connection should be allowed.You can choose whether to allow it for only this occurrence or to allow that program to connect as it needs to. The only problem with these pop-up windows is that the program name might not always be recognizable, and it can be confusing for users to know whether the connection attempt is malicious or benign. No matter which firewall product you choose, we highly recommend that you use a personal firewall application on each computer in addition to using a cable/DSL router-based firewall if possible. We do offer one caution or word of advice, though: once you install a personal firewall product remember to look there first if you start having any connection problems. Very often a firewall might be blocking traffic or connections that you think should be going through, so take a look at the configuration of the firewall before you get frustrated or spend hours trying to troubleshoot the problem. Intrusion Detection and Prevention Having an intrusion detection system (IDS) on your computer or network is like having surveillance cameras or a motion sensor alarm in your home.You hope that the locks on your doors and windows will keep unauthorized intruders out, but should that fail, you want some means of monitoring the intrusion or alerting you that it has occurred. Similarly, you expect that your firewall will keep malicious traffic out of your network, but should something slip past the firewall, your IDS can monitor and alert you. And that really is all an IDS does, monitor and alert. If your home also had some sort of automated lockdown mechanism to trap the intruder in the home until the authorities could arrive, or if you had armed guards who responded immediately to stop the intrusion, it would be more like an IPS. An IDS can be networking based (NIDS, or network-based intrusion detection system) or installed on individual computers (HIDS, or host-based intrusion detection system), similar to a firewall. A NIDS examines actual packets traveling the network in real time to look for suspicious activity. A HIDS examines log files like the Windows Event Logs (System, Applications, and Security Event Logs) and looks for entries that suggest suspicious activity. Figure 5.9 shows the Event Viewer in the Computer Management dialog box. www.syngress.com Perimeter Security 9Chapter 5 Figure 5.9 Computer Management A NIDS has the advantage of detecting attacks in real time. It can also detect even an unsuccessful attack so that you are aware that the attempt occurred and can detect some types of attacks that a HIDS would miss because they can only be identified by looking at the packet headers. Because a HIDS relies on checking the logs on the host system to identify attacks, it validates that an attack was successful. It can also detect attacks that don't travel the network, such as an attacker sitting at the keyboard of the HIDS. HIDS can also detect attempts to access files or change file permissions, or changes to key system files that a NIDS would not detect. Neither is necessarily better than the other, and both can be used in conjunction with the other to alert you to all the different types of attacks that might not be caught by just a NIDS or HIDS. Regardless of which you choose, intrusion detection techniques generally fall under one of two categories or a hybrid of both. Signature-based detection works similar to the way most antivirus software does. It attempts to identify suspicious activity by comparing packet headers and other information with a database of known signatures of exploits, attacks, and malicious code. The downfall of this method is the same as it is with antivirus software; it is reactive. Until a new attack exists, there is no way to develop a signature for it. In essence, someone must get attacked first before the IDS vendors or support groups can develop a signature. Moreover, the time lag between the release of an attack or exploit and receiving a signature you can deploy on your IDS is a time frame during which you won't have protection for that threat. Anomaly-based detection compares network packets and behavior with a known baseline and looks for patterns or actions that are abnormal. For example, if a certain 81 82 Chapter 5 9Perimeter Security computer typically does not use FTR but suddenly tries to initiate an FTP connection with a server, the IDS would detect this as an anomaly and alert you. The downside to anomaly detection is that it can require a lot of intensive "handholding" to define what normal traffic is for your network and establish the baseline. During this initial learning curve, you might get a lot of false-positive alerts or potentially miss malicious activity. Both detection techniques have their pros and cons, but regardless of how suspicious or malicious activity is detected, the job of the IDS is to alert you. This might be done by sending a console message that pops up on your screen via the Windows Messenger Service or the IDS might send an e-mail or even send an alert to a pager in some cases. It is up to you to configure how you will be alerted. More important, however, it is up to you to respond to the alert. Having an IDS that detects and alerts you to the presence of suspected malicious activity is worthless if you don't have a well-defined incident response plan to address the issue. For details on responding to security incidents go to Chapter 11, " W h e n Disaster Strikes." One of the best and most popular IDS programs is Snort (see Figure 5.10). Snort is an open-source network intrusion detection (NIDS) application that is available for free. Because of its popularity and the fact that it is an open-source program, there are a number of support forums and mailing lists you can reference to learn about the program or to acquire updated signatures for new threats. Snort analyzes network packets and can detect a wide range of known attacks and malicious activity. F i g u r e 5 . 1 0 Snort www.syngress.com Perimeter Security 9Chapter 5 A newer technology exists that will handle that initial response for you. An IPS is somewhat like a hybrid between an IDS and a firewall, or it may work in conjunction with your existing firewall. The primary difference between an IDS and an IPS is that an IPS will do something to respond and attempt to stop the intrusion, whereas the IDS will simply let you know it's going on. An IPS monitors the network the same way that an IDS does and still uses the same signature and/or anomaly pattern-matching techniques for identifying potentially malicious activity. However, when an IPS detects that there is suspected malicious traffic, it can alter or create firewall rules to simply block all traffic on the target port or block all incoming traffic from the source IP address or any number of custom responses you might configure. Typically, the IPS will be configured not only to take some immediate action to prevent any further malicious activity but also to alert you like an IDS. Even if your IPS has managed to block the offending traffic, you still need to be made aware of the attack or attempted attack and you might need to respond with a more thorough or long-term solution than the quick-fix measures put in place by the IPS. Sometimes the line between firewall, intrusion detection, and intrusion prevention gets blurred as applications and devices come out that try to provide all-in-one protection. Small business networks might benefit from implementing intrusion detection or prevention, but for a home network, intrusion detection and prevention are probably more security than you need. However, a router-based firewall and personal firewall application are highly recommended to protect the perimeter of your network and ensure the m a x i m u m security for your computer. www.syngress.com 83 84 Chapter 5 9Perimeter Security Summary Although it is very hard to say what is right and what is wrong with all the different perimeter security systems from all the different vendors, there is one main philosophy that is right and that is that you need it. N o matter what kind of system you have, you need some type of security to protect your data. That is what everyone is after, not your computer and not your mouse. It is better to overdo it, than not do it, as we say. So make sure you have your perimeter security turned on and your host security turned on. If you are using a cable modem, invest in a good cable router or wireless network router. Both devices, such as equipment from Linksys or Netgear, have good security settings to be used as your perimeter firewall. Read the instructions, set up the firewall on the router as your first line of defense, and then make sure you either turn on your Windows firewall or use a third-party personal firewall on your computer. This will save you in case you have something get by the perimeter firewall. All users should use this for home or S O H O - t y p e installations. The Windows Firewall is far better than nothing, and the price is right. But most third-party personal firewalls offer more comprehensive protection and provide a more intuitive interface to manage it with. Additional Resources The following resources provide more information on firewalls and other topics related to perimeter security: 9 Amarasinghe, Saman. Host-Based IPS Guards Endpoints. Network World. July 25,2005. (www. n e two rkwo rld. corn/news/tech/2005 / 072505 techup date. html). 9 Bradley, Tony. Host-Based Intrusion Prevention. About.com. (http://netsecuri ty. abo u t. c o m/cs / fi rewallb o o ks / a/aa050804, htm). 9 Home and Small Office Network Topologies. Microsoft.corn.August 2, 2004. (www. mi c ro so ft. corn/technet/p ro dte chnol/winxpp ro / plan/top ology, mspx) 9 Tyson, Jeff. How Firewalls Work. (www.howstuffworks.com/firewall.htm). 9 UnderstandingWindows Firewall. Microsoft.com. August 4, 2004. (www microsoft, com/windowsxp/using/security/internet/sp2_wfintro.mspx). www.syngress.com Chapter 6 85 86 Chapter 6 9E-mail Safety Introduction E-mail is one of the most common tasks performed with a computer. With the capability to deliver messages almost instantly anywhere around the globe, it provides speed and efficiency that can't be matched by regular postal mail service. Unfortunately, as efficient as it is at delivering legitimate messages, electronic mail is also quite efficient at distributing malicious software and filling e-mail inboxes with unsolicited junk mail. The information in this chapter will help you use e-mail productively and safely. In this chapter, you will learn: 9 The history of e-mail 9 Precautions to take with e-mail file attachments 9 H o w to use POP3 vs. Web-based e-mail 9 H o w to avoid and block spam 9 H o w to protect yourself from e-mail hoaxes and phishing attacks The Evolution of E-mail The concept of e-mail goes back much further than most people would suspect. Computer scientists and engineers were using the ARPANET, the precursor of the Internet as we know it, to send communications back and forth starting in the early 1970s. From its origins as a command-line program used by a select few to send a handful of communications back and forth, the concept of e-mail evolved slowly into what we use today. Approximately 20 years passed between the first e-mail communications and the large-scale, mainstream adoption of e-mail as a method of communication. E-mail Security Concerns Today, e-mail is the primary means of business and personal communications for millions of people. Billions of messages are transmitted back and forth across the Internet on a daily basis. Unfortunately, according to the MessageLabs Intelligence 2005 Annual Security Report, almost 70 percent is unsolicited commercial e-mail, commonly referred to as spam, and 1 in every 36 e-mails contains a virus or malware of some sort. E-mail Safety 9Chapter 6 This may not be all that different from your standard postal mailbox. I know that a good portion of the mail I receive is unsolicited commercial advertisements that I generally don't even stop to look at. It may even range between 50 percent and 80 percent just like spam. But, translating the e-mail statistics to your standard mail would mean that if you received ten pieces of mail on a given day, eight of those pieces would be commercial junk mail, one of those pieces would contain anthrax or some other infectious substance, and one would be a legitimate letter from your brother in Kansas with pictures of your niece from her recent dance recital. Spam and malware are most definitely the bane of e-mail communications, but when you look at the statistics in comparison with the amount of unsolicited marketing on the radio, on television, or in your standard postal mailbox, spam doesn't seem like quite as big a deal. However, even though malware accounts for a much smaller percentage of the total e-mail volume, it can have a significant impact should your computer become infected. For details on viruses and other malware, see Chapter 3, "Viruses, Worms, and Other Malware." Handwritten letters are wonderful and have a charm and personal touch that are difficult to mirror in an electronic communication, but the capability to communicate virtually instantaneously to anyone around the world makes e-mail perfect for many types of communications. Unfortunately, because of its speed and widespread use it has also become the attack vector of choice for spreading malware. Anyone using e-mail is essentially guaranteed to receive spam and malware, so the key is to make sure you take the right precautions to use this communications medium effectively and safely at the same time. Opening Attachments W h e n e-mail first began as a simple text-only command-line application to exchange simple messages between computer engineers it had not occurred to anyone that one day billions of messages would be flying around the globe or that a good percentage of those messages would contain a file attachment of some sort. W h e n the Internet exploded in the early 1990s and e-mail became a mainstream form of communication, file attachments soon emerged as a standard part of many messages as well. For personal e-mail, users found it a quick and simple way to share pictures of grandchildren with parents across the country or the world. For businesses it became a competitive advantage to be able to send a business proposal or the latest financial figures as a document or spreadsheet file attachment to an e-mail. It didn't take long for that competitive advantage to become a business necessity and for file attachments to become a requirement for conducting business. Fax machines quickly became glorified paper weights as businesses found e-mail file attachments to be faster and more reliable than faxing. 87 88 Chapter 6 9E-mail Safety For personal e-mail messages, the use of file attachments grew rapidly as well. Users found that they could not only attach graphic images such as photographs, but could attach files such as small movies and documents with jokes, and even share entire programs with friends and family. It is an unfortunate fact when it comes to malware and malicious computer activity that often what was intended as a feature can also be exploited and used against you. If a file attachment can be sent with a program you can click to execute and perform some function, there is nothing stopping a malicious developer from creating one that executes and performs a malicious function. For the most part, the success of file attachments as a means of propagating malware depends on what is called "social engineering." Basically, the author of the malicious e-mail has to compel the recipient to open the file attachment in some way. One of the first ways used to persuade recipients to open malicious e-mail attachments was by appealing to the user's curiosity. The Anna Kournikova virus claimed to contain a picture of the photogenic tennis star, but opening the attachment simply infected the computer. This social engineering was quickly followed by disguising the e-mail to appear to come from someone the user knows. Ostensibly, a user is more likely to trust a message from his Uncle George or a coworker he eats lunch with than he is a message from a complete stranger. Malware developers began by programming their viruses to send themselves out to the addresses in the address book from the e-mail program of the infected computer. Using this method of propagation led to a fairly high rate of success in ensuring that the infected e-mail went to people w h o personally knew the owner of the infected computer and would therefore be more likely to trust the message. Eventually users started to get wise to the idea that even a message from a trusted friend might be suspicious. Some companies educated their users and tried to condition them not to open certain types of file attachments because they might execute a malicious program. But, non-executable programs such as a TXT, or text, files were considered to be safe. Then one day someone received an e-mail from a friend with the Subject line "ILoveYou" and a message attachment called "Love-Letter-For-You.txt"... or so they thought. Without stopping to consider the fact that their Windows operating system was configured not to show known file extensions, therefore the "txt" should not be visible, they double-clicked on the attachment to open it and found themselves infected with the LoveLetter virus. In actuality, the file attachment was called "Love-Letter-For-You.txt.vbs" which capitalized on the Windows "feature" that hides known file extensions and exploited the acceptance of T X T files as being safe. LoveLetter was an excellent example of www.syngress.com E-mail Safety 9 Chapter 6 both social engineering and using "features" for malicious purposes. For details on hidden file extensions go to Chapter 1, "Basic Windows Security." Although antivirus software is continually updated to detect these new threats as they are created, it is still a reactive form of defense. Malware still gets past antivirus software and entices users to execute infected file attachments before the antivirus software is updated. To prevent these infections and to try to ensure that users do not even have an opportunity to execute malicious attachments, administrators began filtering certain attachment types regardless of whether they actually contained malicious code or not. This is one of the most prevalent methods for proactively protecting the network from potentially malicious executable file attachments, or file attachments that will run a program or perform commands if they are opened. As the list of blocked file types grows, malware developers simply find some other executable file types to spread malware and the cycle continues. Initially, this sort of proactive attachment blocking was reserved for corporate networks with administrators that knew how to build their own custom filters. Eventually, some e-mail client software began to block potentially malicious attachments as well. Starting with Outlook 2003, Microsoft began to block a lengthy list of attachment types that might potentially contain malicious code. Blocking file attachments that are k n o w n to be executable and therefore may pose a risk from a security perspective is a move in the right direction, but it too is somewhat reactive. Although it is more proactive to block a given file attachment type by default, most administrators and mail filters don't add a file type to the list of blocked types until after it has been used by some malware. In my opinion, a l l file attachments should be blocked by default and then the administrator or user should have to designate which types they will allow rather than the other way around. It has been a fairly c o m m o n practice in recent years to block all executable file attachments but to allow archive file types, specifically ZIP files from the popular compression program WinZip. The logic was that some users might be tricked through social engineering to double-click an executable file attachment, but surely if they had to first uncompress the archive file and then double-click the executable file it contained, that users would have enough sense not to do so unless they knew exactly what the file attachment was for and trusted the sender of the e-mail message. Some administrators even went so far as to block ZIP file attachments unless they were password protected to try to ensure that even users who might fall for social engineering requiring them to first open a ZIP file before executing the file attachment would have to go through the additional step of supplying a password to 89 90 Chapter 6 9E-mail Safety do so. Surely no user would go so far as to not only execute a file attachment they know nothing about and that came from an untrusted source, but to also first extract it from a compressed archive that requires a password. Well, early 2004 proved those theories wrong. With a vengeance. N e w malware dubbed Bagel and Netsky hit the Internet. Rather than trying to overwhelm the user with social engineering in the message, they each had exceptionally short, rather cryptic messages that simply said things like "the details are in the attachment." Both of these malware threats used ZIP file attachments and yet people still opened the ZIP file and executed the enclosed attachment and propagated the viruses. In fact, some versions of these threats even used password-protected ZIP files with the password included in the body of the message and users still opened the attachments and became infected. Although some users have been told for years to never open a file attachment unless they not only trust the sender, but also know exactly what the file attachment is and why the sender sent it to them, there are a vast number of home users who simply don't know. It's like going to the wrong side of town late at night with no "street smarts" and no concept of the risks and threats that exist. The "wrong" side of town can be relatively safe as long as you understand the risks and threats and how to avoid them. Using the Internet and e-mail is the same way. Getting a new computer and jumping straight onto the Internet without taking some security precautions is like driving without brakes or skydiving without a www.syngress.com E-mail Safety 9Chapter 6 parachute. As long as there are file attachments though, the bottom line is that the responsibility falls on you, the user, to exercise an appropriate amount of caution and c o m m o n sense before choosing to open or execute them. Web-Based versus POP3 E-mail Most home users use either a POP3 (Post Office Protocol) e-mail account or Webbased e-mail such as Hotmail or Yahoo. With some ISPs you have the option of doing either. Each type of e-mail has its advantages and security concerns. One of the biggest issues with Web-based e-mail is that it bypasses many security measures designed for e-mail. Corporate networks often have antivirus scanners at the e-mail server level designed to catch and block any malicious e-mail before it can get to the end user. There are also typically filters that block file attachments that may contain malicious code as well. W h e n e-mail comes through the Web rather than through the pre-defined channels for e-mail, these security measures are useless. Accessing personal e-mail at all, or at least accessing personal e-mail via the Web on your employer's network is an activity that should be governed by some sort of policy or procedure.You should check to make sure you aren't violating any rules by doing so. O n a positive note, the larger providers of Web-based e-mail; namely, Yahoo and Hotmail, now provide virus protection on their e-mail. It does not replace the need to run antivirus software on your own computer since e-mail is only one means of spreading malware, but it at least significantly reduces the risk of receiving an infected file attachment through Web-based e-mail. POP3 e-mail is the other standard primarily used by home Internet users. Programs like Outlook Express, Eudora, and Netscape Mail are typically used to download and view e-mail from a POP3 account. W h e n you set up the client software you have to supply information such as your username and password and the incoming and outgoing mail servers so the software can authenticate your account and send and receive e-mail. Rather than simply viewing your e-mail on a Web page, the actual messages are transferred from the e-mail server to your computer. Whether you use Web-based or POP3 e-mail, there are security concerns you should be aware of. Sending an unencrypted e-mail is the digital equivalent of writing your thoughts on a postcard. Would you write your bank account number, social security number or other personal and confidential information on a postcard to be seen by all as it passes from you to its intended destination? If you wouldn't share the information in public you shouldn't send it in an e-mail. E-mail is not inherently secure. It is convenient and quick, but not secure. 91 92 Chapter 6 9E-mail Safety Spoofed Add resses One of the most confusing things about e-mail for many users these days is spoofed e-mail addresses. Most people by now have experienced receiving an e-mail infected with some type of malware that appears to be from their cousins, best friends, or mothers. But when you contact those people to ask them why they sent you the email or to let them know they are distributing infected e-mail, you discover that they never actually sent you the e-mail to begin with. Most users have also had the opposite experience as well.You get the e-mail or phone call from your friends asking you why you sent them an infected e-mail message. It is also very c o m m o n to receive an auto-reply from some mail server either letting you know that the e-mail you sent contained a virus or w o r m or that the user you allegedly sent the e-mail to does not exist. All of these are examples of spoofed IP addresses. If I mail a letter to someone I could very easily write any name and address I choose in the return address portion. If I wrote your address in as the return address and the message was undeliverable it would get sent back to you rather than me. It is equally easy to alter or forge the address information on an e-mail. Using Microsoft Outlook you can enter an address in the From field as well as altering the Reply To address thereby making it appear that the e-mail came from a different source and sending any replies back to that same source. O n a corporate network it's not as easy because it will actually check to see if you have permission to send on behalf of the address you are trying to send from. However, you can simply invent a non-existent e-mail address, even if it's on a non-existent domain and that information is all the recipient will see. Well... almost all the recipient will see. Going back to the postal mail return address example, I may be able to write a return address to make it appear the letter originated from California, but the postmark will bear the mark of the city and state of the post office it actually came from. Similarly, each e-mail message contains information about its true source within the e-mail headers. In Outlook Express you can right-click on an e-mail message and select Properties to display information about the message. If you choose the Details tab you can click the button labeled Message Source and review information about exactly what server and IP address the message came from.You can view similar information in Microsoft Outlook by right-clicking the e-mail message and selecting Options to look at the Internet Headers. It would help to stop the confusion and stop clogging users' e-mail inboxes with useless messages if e-mail server antivirus programs were not configured to automatically reply to the sender. Originally it was a good idea. Rather than just blocking or E-mail Safety 9Chapter 6 cleaning the e-mail, a courtesy message was also sent to the originator of the message to inform them they had sent an infected message and that perhaps they needed to update their antivirus software or scan their system to make sure they didn't continue propagating the malware. For the past year or more, however, viruses and worms almost always spoof the source e-mail address. Many malware threats scan deep within infected systems to find addresses to propagate to as well as addresses to use in spoofing the source address. They look not only in the standard address book files, but also scan through temporary Internet files and other such data to find e-mail addresses embedded in Web pages. That means that the "courtesy" response to the sender ends up at the wrong place and confuses some innocent user into believing their computer might be infected or wondering how or why they even sent an e-mail to that address in the first place. The primary thing you need to know when it comes to the source address of an e-mail is not to trust it. Almost every part of an e-mail header can be forged with enough knowledge; fields like the Sender or From e-mail address and the Reply-To e-mail address can be changed simply by typing in a new one with some e-mail applications. Exercise caution and an appropriate amount of c o m m o n sense before choosing to open an e-mail message. Even if it appears to be from your brother, if the Subject of the message or the message itself seem suspicious or awkward it is better to err on the side of caution and simply delete it. W h e n you receive a misguided response or auto-response to a message that spoofed your e-mail address you should simply delete those as well. Spam We have all heard of spam by now. I am not referring to the distinctively flavored spiced ham meat product, but the bane of e-mail. The term has some bizarre link with a classic Monty Python skit based on the H o r m e l meat product and also owes its origination to a couple of attorneys from Phoenix, AZ who inundated Internet newsgroups with unsolicited marketing in 1994. As much as Hormel might like people to use some other term for unsolicited junk e-mail messages rather than providing a negative connotation to their trademarked meat product name, the term spam has stuck. Virtually everybody with an e-mail account is accustomed to receiving offers to refinance their home loan; purchase low-priced Vicodin, Viagra, and other pharmaceuticals on the Internet; hook up with an alleged blind date; and any number of other unsolicited commercial marketing. 93 94 Chapter 6 9E-mail Safety Most corporations and many e-mail programs now have the capability to filter e-mail to try to block spam messages so that you aren't bothered by them. There are also third-party programs you can use to block spam from getting into your computer. Personal computer security software products such as N o r t o n Internet Security Suite or McAfee Internet Security Suite include spam as one of the threats that they protect against. Like most of the other security measures we have discussed, such as antivirus software and intrusion detection, the filters to block spam messages are also reactive to some degree. Many of the spam-filtering applications use a point system to determine whether a message is spam or not. They can block source e-mail or IP addresses known to distribute spam and can scan the subject and body of incoming e-mail messages and look for keywords like "Viagra" or "refinance" that tend to appear in spam e-mail messages. The more such keywords appear in a single message, the more likely it is spam and will therefore be blocked. Spam filtering can still be somewhat messy, though. Legitimate messages you may want to receive may get filtered or quarantined by your spam-blocking software while some spam messages will still make it through. Often you can help to "teach" the spam-filtering software by letting it know when it has a false positive or false negative like this. The purveyors of spam continue to come up with new ways to try to trick or circumvent spam filters and make sure their message gets to your inbox whether you like it or not. One trick is to include a wide range of meaningless words with the spam message to throw off the point system. The more words there are in the overall message the smaller the percentage of spam trigger words will be so the message will pass the point scale system. The other trick is to use "hacker-speak" in place of real words, substituting alternate characters that look similar to the proper letters. For instance, you will often see spam messages where "Viagra" is spelled " v l @ g r @ " or something similar. Sometimes other characters might be inserted within the spelling as well like "v-ia-g-r-a."All of these are tricks are designed to get past spam-filtering software. Outlook Express does not offer much in the way of spam or junk mail protection. It is possible to block mail from a specific sender or an entire domain, but stopping spam by blocking individual senders is like trying to stop water with a net and blocking the entire domain to stop spam is like demolishing a house to kill a fly. Outlook, at least Outlook 2003, offers significantly better junk mail filtering. The j u n k mail filter is enabled by default, but set to Low to avoid having too many false positives and potentially filtering out legitimate messages. As you can see in Figure 6.1, you can add addresses to one of four junk mail filter lists: Safe Senders, Safe Recipients, Blocked Senders, and International. If a message is received from someone on the Safe Senders list it will be delivered even if it might otherwise have www.syngress.com E-mail Safety 9Chapter 6 failed the spare filter test.You can also provide an extreme level of security for your e-mail by configuring the junk mail filter to allow incoming mail only from addresses that are on your Safe Senders or Safe Recipients lists. In effect, rather than blacklisting one by one all of the addresses you don't want to get e-mail from, you create a much shorter list of only the addresses you do want e-mail from. Outlook's Junk E-mail options enable you to choose how strict to be with identifying junk email and what to do with it. Figure 6 . 1 0 u t l o o k ' s Junk E-mail Options In 2003, the United States Congress passed the CAN-SPAM Act. CAN-SPAM is a snappy acronym for "Controlling the Assault of Non-Solicited Pornography and Marketing." (Someone in Washington, DC, is probably making a pretty good salary from our tax dollars to make sure that our laws all have names that fit nicely into some fun code word like CAN-SPAM or the U S A - P A T R I O T Act, which stands for "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.") Although the law was created ostensibly to reduce or eliminate spare, it actually does as much to legitimize spare as a form of marketing as it does to eliminate it. What the CAN-SPAM act does do primarily is to provide the rules of engagement, so to speak, for legal marketing via e-mail. CAN-SPAM requires that the purveyors of spare provide some identifiable means for recipients to opt out of receiving any future messages and that no deception is used in transmitting the messages. It www.syngress.com 95 96 Chapter 6 9E-mail Safety requires all e-mail advertising to contain a valid reply-to address, postal mailing address, and a subject line and e-mail headers that are accurate. It provides penalties for any marketer that does not stay within these bounds. In essence, under this law a company can still inundate the Internet with useless junk mail and as long as they provide a legitimate reply-to e-mail address and postal address and offer a means for the recipient to opt out of receiving future messages, the responsibility falls on the user to basically unsubscribe from the spam. In Europe, the anti-spare law works in reverse, requiring that the user opt-in or choose to receive the commercial advertising before it can be sent. There are three glaring issues with trying to legislate spam in this way. First, socalled legitimate marketers of spam will continue to overwhelm users with spam, just ensuring that they do so within the bounds of the law. Second, the law can only reasonably be applied to companies or individuals within the United States even though a vast majority of spam originates from outside of the United States. Third, trying to control an activity through legislation assumes that the parties involved in the activity have any regard for the law in the first place. This last issue is evidenced by the explosion of spam zombies. In 2003, the two scourges of e-mail communications, spam and malware, converged as viruses such as Sobig propagated themselves to unprotected computers and, without alerting the owners, millions of computers became spam servers. These Trojan spam servers are commonly referred to as spam "zombies," e-mail servers that are dead until the E-mail Safety 9Chapter 6 attacker who controls the Trojan program calls them to life and begins to use them to generate millions of spam messages. These spam zombies enable the less scrupulous purveyors of spam to continue sending out hundreds of millions of unsolicited commercial message per day without regard for the C A N - S P A M act and with little concern that the messages can be traced back to their true originator. With thousands upon thousands of such compromised machines at their disposal, it also means that these spam pushers have virtually unlimited processing power and network bandwidth to work with. Aside from using spam filters or third-party spam-blocking software, there are a couple other things you can do to try to prevent spam from overwhelming your inbox. For starters, you should create a separate e-mail account to use for all Internet forms, registrations, and such. W h e t h e r your address is bought, stolen, or simply used inappropriately by the company you gave it to, there is a very good chance that once you start using an e-mail address on the Internet you will see an increase in spam. By using a separate e-mail account for those things and always using the same e-mail account you can narrow down where the spam will go to and keep it out of your main personal e-mail account. Another step you can take is to use the literal word "at" rather than the @ symbol when typing your e-mail address in various places. M u c h of the e-mail address harvesting done on the Web by spam companies is automated. Since an email addressed to tony(at)computersecurityfornongeeks.com will not actually work it will most likely simply be removed from the spammer's database. Some sites may require you to enter a valid e-mail address, but if you can get away with it you should try the word "at" separated with parentheses or dashes or something. O f course, the best thing you can do to help control the flood of spam is to never, ever respond to it and never actually purchase anything from a spam message. The cost of advertising in a newspaper or on television can be quite expensive, but the cost of sending out millions of spam e-mails is negligible. As long as even a fraction of a handful of the millions of people respond and make a purchase, it means that the spam campaign was profitable. As long as spamming works and generates profit for the spammers they will continue spamming. Hoaxes and Phishing If you have been using e-mail for more than a few weeks, perhaps you have received an e-mail message like the following: If you receive an e-mail entitled "Bedtimes" delete it IMMEDIATELY Do not open it. Apparently this one is pretty nasty. It will not only 97 98 Chapter 6 9E-mail Safety erase everything on your hard drive, but it will also delete anything on disks within 20 feet of your computer. It demagnetizes the strips on ALL of your credit cards. It reprograms your ATM access code and screws up the tracking on your VCR and uses subspace field harmonics to scratch any CDs you attempt to play. It will program your phone auto dial to call only 900 numbers. This virus will mix antifreeze into your fish tank. IT WILL CAUSE YOUR TOILET TO FLUSH WHILE YOU ARE SHOWERING. It will drink ALL your beer. FOR GOD'S SAKE, ARE YOU LISTENING?? It will leave dirty underwear on the coffee table when you are expecting company! It will replace your shampoo with Nair and your Nair with Rogaine. If the "Bedtimes" message is opened in a Windows 95/98 environment, it will leave the toilet seat up and leave your hair dryer plugged in dangerously close to a full bathtub. It will not only remove the forbidden tags from your mattresses and pillows, it will also refill your Skim milk with whole milk. * * * * * * * WARN AS M A N Y PEOPLE AS YOU CAN. Send to everyone. The preceding is actually a hoax of a hoax. There is no shortage of hoax e-mail topics, though. Maybe you've heard the one about how Bill Gates is beta testing some secret new e-mail tracking program and will pay you for every address you forward the message to? Or maybe you got the inside tip about the $200 Nieman Marcus cookie recipe? Any message that implores you to send it to your entire address book or bad luck will befall you and your computer will suffer a catastrophic meltdown is, by definition, a hoax. Just to make sure we've covered all of the bases, here are a few more of the most popular chain letter e-mail hoaxes that you can simply delete and save the rest of us from having to read them yet again: 9 There is no baby food manufacturer issuing checks as a result of a class action law suit. E-mail Safety 9Chapter 6 9 Disney is not offering any free vacation for your help in sending their e-mail to everyone you know. 9 M T V is not offering backstage passes to anyone who forwards the message to the most people. 9 There is no kidney theft ring and people are not waking up in a bathtub full of ice with their kidney mysteriously removed. 9 There is no bill pending in Congress to implement a tax on your Internet usage. The list goes on and on (and on and on) of hoax e-mail chain letters. Some of them have been traveling the globe for years. Small details may change here and there and then off they go around the Internet again. The majority do no harm other than to waste network bandwidth and people's time. O n e particularly tenacious one causes some minor damage. The Teddy Bear or JDBGMG1K hoax has been around for awhile. The message comes from a friend of a friend to let you know that you may in fact be infected with this dreaded teddy bear virus. There are many variations of the message, but the gist of it reads as follows: Hi, everybody: I just received a message today from one of my friends in my Address Book. Their Address Book had been infected by a virus and it was passed on to my computer. My Address Book, in turn, has been infected. The virus is called jdbgmgr.exe and it propagates automatically through Messenger and through the address book. The virus is not detected by McAfee or Norton and it stays dormant for 14 days before it wipes out the whole system. It can be deleted before it erases your computer files. To delete it, you just have to do the following. It then goes on to let you know exactly where you can find this insidious file. Lo and behold, there really IS a file there with a teddy bear icon. The catch with this hoax is that the jdbgmgr.exe file with the teddy bear icon is a standard file that is installed with many versions of the Microsoft Windows operating system, not an infected virus file. Inevitably, someone will receive this message and feel compelled to share the information as quickly as possible with everyone they know. One or two of those people will also fall for this hoax and propagate it to their entire address book, and so the domino effect continues. www.syngress.com 99 100 Chapter 6 9E-mail Safety Here are some things to look for and some precautions to take to try to keep yourself from falling prey to one of these hoaxes and continuing to perpetuate this insanity. First of all, if there are more than ten e-mail addresses in the To: or CC: fields you might want to question it. People don't generally send legitimate messages to such a broad range of addresses. If the actual message is five levels down because it's a forward of a forward of a forwarded message, it is most likely some form of hoax or chain letter e-mail. If it implores you to forward it quickly or send it to everyone you know, it is most like a hoax or chain letter e-mail. Even if it claims that the information has been authenticated or validated with a reputable source it does not mean that it has. In fact, the simple statement claiming that it has been verified with a reputable source is reason to believe that it has not and also suggests that there is a good likelihood that the message is a hoax or chain letter e-mail. It is fairly safe to assume that you will never receive a legitimate e-mail message that you actually need to forward to everyone you know. If you ever have any doubts about a message, check it out in one of the many hoax databases like Snopes (www.snopes.com) or the About.com Antivirus Hoax Encyclopedia (http:// antivirus.about.com/library/blenhoax.htm) or at an antivirus vendor Web site like McAfee (http://vil.nai.com/vil/hoaxes.asp). Even if you don't find it on one of these hoax reference sites, you should send it to your network administrator or the tech support or customer service from your ISP rather than to the world as you k n o w it. A phishing scam is a different and more malicious form of e-mail scam. Phishing, an adaptation of the word "fishing," involves sending an e-mail out to a large n u m b e r of addresses with some bait and seeing how many naive users you can hook. Typically, the goal of a phishing scam is to acquire usernames and passwords to financial sites such as banking institutions or PayPal in order to get into the accounts and remove the money from them. Phishing scams are often very sophisticated, with a very professional look and feel designed to mimic the real institution being targeted. In early 2004, the Gartner Group reported a significant spike in phishing scams. By Gartner estimates the number of people w h o have been victimized by phishing scams is approaching the two million mark. A phishing scam usually involves creating an elaborate replica of the target compaw's Web site. Past phishing scams have involved companies like Best Buy, AOL, EBay, PayPal, and Citigroup. An e-mail is then sent out to millions of users designed to look as if it is from the targeted company and using some form of social engineering to convince the user to click on a link that will take them to the malicious replica site. Users may be asked to enter information such as their username, pass- E-mail Safety 9Chapter 6 word, account number, and other personal or confidential information. After the attackers have gathered this information, they can then access your account and move or redirect your money to their own account. Typically, users end up protected and the company or financial institution takes the loss for any money that victims of the phishing scams might lose. There have been suggestions though that perhaps users should just know better or have more c o m m o n sense and that, in effect, the attacker didn't "steal" anything because the user volunteered the information and gave them the keys to the vault. It can be very difficult to detect a phishing scam. Both the e-mail bait and the replica Web site are generally very professionally done. The best bet to protect yourself is to remember that no reputable company will ask you to give them your username and password or other confidential and personal information on a Web site. U n d e r no circumstances should you use the link within the e-mail to connect to the company's Web site. O n e of the prevailing suggestions for handling phishing scams is to tell users that if they receive an e-mail that they are not sure about, they should close the e-mail and visit the company Web site on their own and figure out how to contact customer service for that company for more information. This advice falls a little short though. N o t only should you not use the link in the e-mail, but you should completely shut down your e-mail client program and close all Web browser windows. The attacker may have somehow executed a script or performed some other malicious magic that might redirect you to a replica site. After you have completely shut down your e-mail client and closed all browser windows, you can then open a new browser window and visit the Web site of the company in question. www.syngress.com 101 102 Chapter 6 9E-mail Safety Summary E-mail is a vital function for most personal computer users. This chapter covered the information you need to know to understand the risks associated with e-mail and how to protect yourself and your computer from them. After discussing a brief history of e-mail, we talked about e-mail file attachments and how to protect yourself from malicious file attachments. We also covered the risk of POP3 versus Web-based e-mail software. You learned how to filter and block unsolicited e-mails, or spam, and how to recognize e-mail hoax and phishing attack messages and avoid becoming a victim. Having read this chapter, you should be able to recognize the risks associated with email and to effectively protect your computer so that you can use e-mail safely. Additional Resources The following resources provide more information on e-mail safety: 9 Hu, Jim. "Comcast takes hard line against spam." ZDNetnews, June 10, 2004 (http: / / news. zdnet, com/2100-3513_22-5230615, html). 9 Landesman, Mary. Hoax Encyclopedia. About.com's Antivirus Software Web Page (http://antivirus.about.com/library/blenhoax.htm). 9 McAfee's Hoax Database (http://vil.nai.com/vil/hoaxes.asp). 9 McAlearney, Shawna. "Dangers of .zip Files." Techtarget's Security Wire Perspectives, March 4, 2004 (http"//s earchse curi ty. techtarget, com/qna/0,289202,si d 14_gci 953548,00. html). 9 MessageLabs Intelligence 2005 Annual Security Report (www. messagelabs, com/ Threat_Watch/Intelligenc e_Rep or ts / 2005_Annual _Security_Report). 9 Snopes (www.snopes.com). Chapter 7 103 104 Chapter 7 9Web Surfing Privacy and Safety Introduction Throughout history there have been inventions and discoveries that fundamentally changed the world as we know it. From the wheel to the printing press to the light bulb to airplanes, inventions have often been turning points in history. In more modern times, the creation of the World Wide Web has proved to be something of a miracle. In one decade it has transformed the way people work, study, shop, and play, and within a generation it has changed the way people interact. It has created entire business models, new streams of revenue, and new fields of employment. The Web has made almost every piece of information you could possibly want available at the click of a button. While the printing press made it possible to mass-produce written works so they could be shared with everyone rather than only an elite few, the Web took the notion a quantum leap farther so that almost every thought that has ever been written can be retrieved in the blink of an eye. In short, the World Wide Web has changed the world. It has created new ways to conduct financial transactions, conduct research, hold an auction, and shop for a car. However, with the advent of the Web and its conveniences, a new type of crime has also emerged: cybercrime. In this chapter, we'll discuss security concerns related to the World Wide Web and show you what you can do to protect your computer while online. The Revolutionary World Wide Web The Web has revolutionized shopping: almost anything can be purchased with a few clicks.You can compare prices and review product information from a variety of sources, letting you make informed purchasing decisions and ensuring you get the best price possible. Even items that can't be purchased over the Web per se, such as a car, can still be researched by comparing features, prices, customer feedback, and more before choosing the one that's right for you. The Web has revolutionized personal finance:You can move money from bank accounts to investment accounts and reconcile your checking account.You can pay bills without licking envelopes or paying postage.You can do research on companies and investment opportunities and buy and sell stocks and mutual funds without a broker. The Web has revolutionized education: children can use it to play educational games at any number of sites. Adults can take college-level courses via the Web and complete their bachelor's, master's, and even doctorate degrees from their computer. People of all ages can use it for studying and research. What used to take hours r www.syngress.com Web Surfing Privacy and Safety 9Chapter 7 pouring through books and magazines at the library can now be done in minutes with a quick search using Google or some other search engine. The Web has also unfortunately revolutionized crime. The Internet and the World Wide Web have done wonderful things to help bring new services and the access to mountains of information to people. But, just like computer software features that, though helpful to users, can often be used against them, many of the Web's convenient features and services can be exploited by malicious persons to steal users' personal information or harm their computers. For one thing, the Internet and the World Wide Web have created an entirely new type of extortion: cyber-extortion. By definition, extortion means to use illegal force or intimidation to obtain something. Essentially, to extort someone is to threaten them with dire consequences should the demands of the extortionist not be met. Cyber-extortionists typically contact companies and demand money in exchange for not breaking into their networks and causing harm to their data, or www.syngress.com 105 106 Chapter 7 9 Web Surfing Privacy and Safety exposing or stealing their customers' personal and confidential information. They may also threaten to launch some sort of Denial-of-Service attack, which would effectively render the victim's network useless for an indefinite period if the demands aren't met. Cyber-extortion doesn't typically directly affect individual users like yourself unless your personal and confidential information happens to be part of the data stolen from the company. However, certain features of the Web, which were designed to make it a richer and more useful m e d i u m for users, also provide a means of attack if you're unaware of such weaknesses and don't exercise caution. These features of the Web include the very languages and tools used to create the information you see on the Web page. H T M L (Hypertext Markup Language) is the core language used to create graphic Web pages. H T M L can be used to define different fonts and sizes of text, as well as to add color and pictures and configure other attributes of the Web page, but H T M L is also static. In order to provide customized information and interactive content, many Web sites use ActiveX controls script languages such as JavaScript or VBScript. These mini-programs allow the Web page to interact with database information and provide more functionality. However, if the Web site can execute a miniprogram on your computer in order to customize information for you, a malicious Web site might also be able to execute a mini-program on your computer to install a Trojan or virus of some sort. In the next sections, we will take a look at some of the security pitfalls of using the Web and how you can get the most out of this great resource without compromising the security of your computer system. Web Security Concerns So what are the threats you'll be facing and how do you protect yourself?. These threats come in a variety of guises, and over the next few pages we will look at those concerns. Cookies W h o doesn't like cookies? I love all kinds of cookies. I am particularly fond of homemade chocolate chip cookies or some nice warm snickerdoodles. W h e n Girl Scout Cookie season rolls around I can go broke buying Thin Mints and Tagalongs, but these aren't the kind of cookies we're referring to in this chapter so don't go trying to shove an oatmeal raisin cookie in your C D - P , O M drive. The cookies we're referring to here are of a different and much less enjoyable variety. Web Surfing Privacy and Safety 9Chapter 7 The basic concept of a Web cookie is not malicious or a security concern in and of itself. Basically, a cookie is a simple text file used by a Web server to store information about a user and the user's activities on a given Web site. The Web server can then retrieve this information to use in customizing future Web pages for that user. Aside from simply remembering who you are and some of your personal information, cookies help the Web site track how often users visit the site and how long they stay there or what pages they visit so they can work to design the Web site to best meet the needs of their visitors. They can also be used to track information which can used to target advertising that is more likely to interest you or track which ads have been shown to you already. If you've ever registered with the online retail site Amazon.com, you may have noticed that not only does the site greet you personally upon each return visit, but it remembers items you've shown interest in or purchased in the past and makes recommendations of other items you might like based on your previous activity on the site. It does this through the use of Web cookies. Cookies are simple text files; they can't actually do anything, malicious or otherwise. They can't contain malware or spyware. They can't access your hard drive or compromise your security. The only data that can be passed from a Web server to a cookie is the name of the cookie, the value of the cookie, the path or domain that the cookie is valid for, the expiration date of the cookie and whether or not the cookie requires a secure connection. As such, cookies pose no real security risk. The main threat from cookies is to your privacy more than your security.You should remember that Web sites and cookies have no way of getting your personal information except by you giving it to them. Many Web sites request that users register for free accounts or provide basic information about themselves before being allowed to use the site. Generally this is because the information and resources on the site are only free because the site is funded by advertising and the advertisers need to know the demographic makeup of the site's visitors so they know whether or not advertising on that site will be worthwhile. It is up to you though to make sure you're comfortable with the privacy policies of the Web site in question and to exercise caution with what sites you choose to provide your information to. There are a couple different kinds of cookies: session cookies and persistent cookies. A session cookie, as its name implies, exists only for the given Web session. Session cookies are removed from your computer once you close the browser window. The next time you visit that same site it will not retain any information about you or be able to access the information from the previous cookie. A persistent cookie on the other hand remains on your hard drive until it expires or until you delete it. Cookies like those used on Amazon.com are persistent www.syngress.com 107 108 Chapter 7 9Web Surfing Privacy and Safety cookies. They help the site to remember you and your preferences and to customize the information on the site to fit you. It is possible to control how your Web browser handles cookies or if cookies are allowed at all. In Internet Explorer, you can click Tools on the menu bar and choose Internet Options and then click the Privacy tab. There are six levels to choose from, ranging from Accept All Cookies to Block All Cookies and varying levels in between (see Figure 7.1). Figure 7.1 Internet Privacy Options Some personal firewall products also include functionality to protect your privacy while you surf the Web, including restricting cookies. While the base version of ZoneAlarm that is available for free does not have cookie filtering or blocking ability, ZoneAlarm Pro allows you to choose how cookies are handled.You can select whether or not to block session cookies or persistent cookies as well as whether or not to allow third-party cookies. It also lets you remove private header information which prevents sites from seeing information such as your IP address or your computer name or user account login name.You can also choose to override the expiration time frame on persistent cookies and set them to expire when you choose (see Figure 7.2). Web Surfing Privacy and Safety 9Chapter 7 F i g u r e 7.2 Custom Privacy Settings If you're concerned about privacy, it may sound logical enough to simply set your Internet Explorer to Block All Cookies and call it a day. Depending on how you use the Web and the types of sites you visit, this sort of blanket approach may cause more heartache than its worth. Many retail Web sites such as BestBuy.com, H o m e D e p o t . c o m , or Target.com require cookies in order to provide you customized information about what is available at stores in your area. If you block all cookies, these sites simply won't work. Internet Explorer does offer the ability to control cookies on a site-by-site basis as well (see Figure 7.3). Even if your cookie settings are set to block all cookies, you can click the Sites button at the bottom of the Internet Options Privacy tab. Here you can override your default cookie restrictions and add domain names to set Internet Explorer to Always Allow or Always Block cookies from a particular domain. Privacy and Anonymous Surfing Privacy is a very big issue for some people. It certainly seems you should at least have the right to choose what companies, entities, or individuals get to see your personal and confidential information. www.syngress.com 109 110 Chapter 7 9Web Surfing Privacy and Safety F i g u r e 7 . 3 Site-by-Site Cookie Control Unfortunately, that doesn't seem to be the case and hasn't been the case for a very long time. Companies of all sorts collect reams of data on you. It's not that they're trying to spy on you per se, but data has become a commodity of sorts and it's better to have too much than too little as a general rule. It seems that you can't make a purchase these days without someone asking for your Zip code, phone number, or e-mail address. Why a retail electronics chain would need my life story and a D N A sample from my firstborn to sell me a 9-volt battery is still an enigma to me. I get enough telemarketing calls and spam e-mails as it is without passing my information out at every transaction I make. W h e n you make a purchase on your credit card or get cash from an ATM machine there is a computer record somewhere marking the date and time you were at that location. Grocery stores have discount clubs with special discounts for m e m bers which are primarily a fagade for gathering demographic information on their customers and tracking the items they buy for marketing efforts. Services like the Onstar service offered by General Motors in their vehicles can help you unlock the doors when you leave your keys in the car or summon emergency help if your vehicle is involved in an accident. It also means that there is someone out there tracking the exact location of your vehicle at any given moment. Just by putting together the pieces of the electronic trail left by people, you can often completely reconstruct their day. Starting from the credit card purchase at Starbucks in the morning, to the cell phone call placed from the dry cleaner, and the www.syngress.com Web Surfing Privacy and Safety 9Chapter 7 gasoline purchased with a credit card on the way to work, straight on through to paying for the pizza delivery on a credit card, you can tell where someone was, what they did and what they ate throughout the day. N o n e of this data collection is meant to encroach on your privacy. It is all a trade-off of convenience and security for privacy and anonymity. It's convenient to pay by credit card rather than carrying cash. It's convenient to be able to place a phone call virtually any time and any place. There is safety in knowing that even if you are knocked unconscious in a car accident that someone out there will get an alert and dispatch emergency services to your exact location. A lot of the data collected though does nothing for your safety, security, or convenience. Those inquisitive cashiers asking for your Zip code and those retail discount clubs tracking your purchases are not for your benefit. The information gathered is used for marketing primarily. Almost universally (there might be some less scrupulous company out there that doesn't fit this mold) this information is not tied to any personally identifying information. By collecting data about how many people from a certain Zip code frequent a given store location, the company can choose how to target its marketing efforts for m a x i m u m effectiveness. The more data that can be gathered, the more targeted the marketing can be. By tracking purchasing habits it is possible to correlate information to determine that certain age groups or ethnicities or genders are more likely to purchase a given product or service which allows the company to make the best possible use of their advertising dollars. This is the same sort of information gathering that goes on while you surf the Web. There is a great deal of seemingly innocuous information about you that can be extracted from the network traffic coming from your computer. W h e n you visit a Web site, it is possible for them in many cases to determine your IP address, your city, state, and country, what Web browser you are using, how many Web pages you have visited since opening the browser window, what Web page you came from to get to the page you are on and even read any information that might be sitting in your Clipboard from the last cut-and-paste operation you performed. In most cases, this information is harmless. The Web sites that track or collect this data generally do it for the demographic and marketing reasons cited earlier. If they know that the majority of their visitors use Internet Explorer, they can optimize their Web pages for that browser. If a company sees that most of their visitors come from a specific region of the country or the world, they can use that information to target their marketing efforts. For some, this may not seem like a big deal, but if the legitimate sites can retrieve this information from your computer, so can the malicious sites. Being able to determine your IP address and the Web browser you use is enough information www.syngress.com 111 112 Chapter 7 9Web Surfing Privacy and Safety to get an attacker started. They know what address to target and they can research vulnerabilities of the browser being used to find holes they might be able to exploit. If you have copied a credit card number, password, or any other confidential information into your Clipboard, that information may be accessible to an attacker as well. Some of this information can be blocked or removed fairly easily. By using a DSL/cable modem home router that does NAT (Network Address Translation), you can protect the IP addresses of the individual computers on your network. It will still be possible to find the IP address of the router's Internet connection, but not to identify the individual computers connected to the router. Other personal information is more difficult to block or remove and may require the use of third-party products such as ZoneAlarm Pro or Anonymizer. Zone Labs states that ZoneAlarm Pro strips or removes your personally identifying information from the packet headers before they leave your computer. Anonymizer is more a service than a product. With Anonymizer, all of your Web access is redirected through Anonymizer servers that hide and protect your identity from the Web servers you are accessing. Anonymizer prevents those Web servers from interacting directly with your computer. In many cases, having this information available is not harmful in any way, but if privacy is a primary concern of yours, using a product like the two just mentioned will help ensure your personal information is kept personal. Getting in the Zone I've mentioned a few times the fact that it is often a program feature designed to make things more convenient or add functionality for the user that is exploited and used against the user. W h e n it comes to surfing the Web, active scripting falls into this category. Active scripting is a general term which refers to the ability to include a script, or short program, within a Web page that can perform functions or gather information to make the Web page dynamic and "active." Whether it is simple information (like inserting the current date and time on a Web page) or more complicated (such as customizing data on the Web page to fit you personally), these small programs make the Web truly functional rather than simply a repository of static information. In the following example, document.write is used to load a control dynamically. Web Surfing Privacy and Safety // d o c w r i t e , j s document .write('') ; By its very nature, though, an active script program is able to interact with your computer. W h e n you visit a Web site and allow an active script to execute, you don't necessarily know if it will .just retrieve the current date and time from your computer so it can display it on the Web page, or if it will write a virus to your computer or completely erase your hard drive. One way of providing at least some protection against this sort of malicious activity is to make sure your User Account does not have administrative privileges. Often, the attack can only perform actions that the current User Account has the authority to do. A more effective way is to simply disable the ability for active scripting or ActiveX controls to run on your computer. This solution has a serious drawback though. There are sites that require active scripting functionality in order to operate. Internet Explorer uses the concept of"security zones" to let you segregate Web sites and apply a different set of rules to one group than you do to the other. To get to the security zones configuration, click the Tools menu option in Internet Explorer and select the 1 n t e r n e t O p t i o n s . Once the Internet Options window is open, select the S e c u r i t y tab. This window displays the four Internet Explorer Security Zones across the top: Internet, Local Intranet, Trusted Sites, and Restricted Sites (see Figure 7.4). Each of the zones can be configured using one of the four predefined rule sets in Internet Explorer, or you can create custom security configurations. By default, the Restricted Sites zone is configured for High security, the Internet zone is Medium, the Local Intranet zone is Medium-Low, and the Trusted Sites zone is set for Low. r www.syngress.com 9 114 Chapter 7 9Web Surfing Privacy and Safety Figure 7.4 Choose Your Security Levels Most of the sites you'll visit will fall under the restrictions of the Internet zone. Unless a Web site exists on your local network or has been explicitly placed by you into the Trusted Sites or Restricted Sites zones it is part of the Internet zone by default. If you find a site you know is safe and that needs lower restrictions, you can add it to the Trusted Sites zone. Conversely, if you encounter a site which you determine to be malicious in some way, you can add it to the Restricted Sites zone to protect yourself from it. Any sites that are on your local network fall into the Local Intranet zone. If you don't like the predefined rule sets or just find you need more security or fewer restrictions, you can customize the security zones as you see fit.You simply select the zone you wish to configure from the four options at the top and then click the C u s t o m Level button. From this screen, you can configure just about every aspect of how Internet Explorer interacts with Web pages and what sort of actions are allowed to occur or not to occur (see Figure 7.5). www.syngress.com Web Surfing Privacy and Safety 9Chapter 7 F i g u r e 7 . 5 Customize Your Security Settings You can choose whether or not to allow various types of active scripting.You can either disable them entirely, enable them entirely, or choose to be asked each time one occurs so that you can decide on a case-by-case basis whether to allow it or not.You can select how to handle file downloading from Web sites, whether or not a Web site can open other browser windows, and a variety of other settings. For the most part, the predefined rule sets will suffice, but for added safety you may want to customize the Internet zone and the active scripting options to Disable or to Prompt so that you can protect yourself from malicious scripts or at least be aware w h e n they are attempting to run. The Security Zones in Internet Explorer are a fairly effective way of letting you protect yourself from u n k n o w n Web sites without having to disable functionality on the sites that you trust. O n e caveat though is that there have been occasional vulnerabilities which have allowed a malicious Web site to bypass the Security Zones or perform functions under the context of a different Security Z o n e than the one they were in, so you still need to beware. So you now have the means of protecting yourself from u n k n o w n Web sites, but how do you know a site is what it says it is? That very question is discussed in the next section. 115 116 Chapter 7 9Web Surfing Privacy and Safety Shopping Safely" SSL and Certificates M y first and best advice w h e n it comes to shopping on the Web is the old Latin maxim caveat emptor~Let the buyer beware. I don't mean to scare you away from doing business on the Internet. I do most of my purchasing, banking, and other financial transactions on the Web. But, like most things having to do with the Web and computer security, you have to k n o w a few things and take some basic precautions in order to make it a safe endeavor. W h e n you go shopping at an actual retail store and make your purchase with your credit card, you obviously k n o w that you are doing business with the store you are standing in. It's a little trickier on the Web.Just because it looks like the Web site for the store or company you want to do business with doesn't mean it actually is. Stores have no way of proving you are w h o you say you are, though. They don't want to get left with a bad check or a fraudulent credit card purchase because they don't make m o n e y that way. Instead, they rely on a third party, preferably a trusted third party, to prove that you are you. In many cases (if they are doing their jobs), the retail clerks will ask to see some form of identification in order to validate that you are the actual owner of the credit card and to match the signatures. Usually the identification is a driver's license or some other form of identification that also has a photo so they can see that you also look like w h o you say you are. W h e n you are shopping on the Web, this sort of "prove you are w h o you say you are" goes the other way. Because anyone can buy a domain name and set up a Web site, and because attackers can sometimes intercept or redirect your attempts to connect with a Web site, you need some way of proving that the Web site is legitimate. Typically, this is done using a digital certificate from a trusted third party. In essence, a company that issues digital certificates vouches for the Web site. W h e n you try to purchase a digital certificate from companies such as Verisign, C o m o d o , or Thawte, you are not issued one until you provide proof that authenticates w h o you are. As consumers, we might be suspicious of w h e t h e r the site is legitimate, but we accept the "word" of these third parties w h e n we accept the digital certificate. T h e major Web browsers today, such as Internet Explorer and Netscape, have the capability to use SSL (Secure Sockets Layer) inherently. SSL is a protocol which not only provides a means for authenticating the Web server but also encrypts the data between your Web browser and the Web server, as well as checks the traffic to ensure it is not tampered with in any way. If a Web server has a valid digital certificate, your Web browser will automatically connect using an SSL session. If your session is secured via SSL, you will see a locked padlock icon at the b o t t o m of your Web browser window. If the Web server www.syngress.com Web Surfing Privacy and Safety 9Chapter 7 has no digital certificate, your Web browser will establish a normal insecure connection. However, if the Web server has an invalid or expired digital certificate, or if the certificate was issued from a source that your Web browser is not configured to trust, you will typically receive some sort of alert or warning which will allow you to choose whether or not you want to accept or trust that certificate (see Figure 7.6). Unless you are very sure, not only that the company that owns the Web site is a reputable company, but that this is truly their Web server and not a malicious replica, you should not accept the certificate. Figure 7.6 Accept or Don't Accept the Certificate There are some caveats even for a seemingly secure SSL connection. SSL relies on keys. The encryption of the data flowing from the Web server to your Web browser is done using the Web server's private key. Many Web servers store the private key in an area that can be accessed by an attacker. If an attacker obtains the private key of a Web server, they can create a spoof replica site and you would be unable to detect it because the digital certificate would match. They also would be able to decode any traffic going to and from that site. Another thing to consider is that a malicious Web site might have a valid certificate from a trusted third party as well.Your Web browser will establish the SSL connection and display the locked padlock icon, but that just tells you that you have an SSL connection established and that your communications with the Web server are encrypted. It doesn't necessarily mean that the Web server is safe, so you still need to exercise the caveat emptor idea and make sure you k n o w w h o you're connecting to. Financial Transactions I have been using financial software such as Intuit's Quicken to track my bank accounts and personal finances pretty much since I have had finances. Initially, it was www.syngress.com 117 118 Chapter 7 9Web Surfing Privacy and Safety a great tool but still required a lot more manual effort. I had to enter my transactions out of my checkbook each time I took money from an A T M machine. At the end of each m o n t h w h e n my statement would come, I would have to go back line by line to compare the statement to my computer data and make sure they matched exactly. In recent years, though, more and more banks have gone digital. I can now view my accounts virtually in real time to see how much money is currently in each account as well as what transactions have cleared. I can download all of that information straight into my personal finance software with a single click and reconcile the data on my computer with the information from the bank as I go. I can move money from one account to another with a few clicks of the mouse. The same digital revolution has occurred with personal investing. Investment sites such as E* Trade and Ameritrade popped up on the Web and soon the traditional brick-and-mortar investment companies like Charles Schwab and Salomon Smith Barney began to establish a presence online as well. W h e n you establish an account with one of these investment companies, you have many of the same abilities you have with an online bank account.You can view your portfolio of investments and buy or trade stocks, bonds, and mutual funds with a few clicks. These sites also offer a wealth of investment research and resources to help you analyze the various investments and find the ones that work best for your portfolio. Virtually every type of company you transact money with is now available online. In many cases, you can pay your mortgage payment, car payment, electric bill, gas bill, phone bill, cable bill, and just about any other bill online directly at the company's Web site. Even in cases where the actual company you are conducting business with isn't available online, many banks offer you the ability to pay your bills online directly from the bank W e b site as well. All of these services are tremendously convenient. Without leaving your chair you can move money from your checking account to your savings account and reconcile your bank accounts with your personal finance software.You can sell a few shares of stock and buy a few shares of mutual funds and then pay all your bills without writing a single check or licking a single envelope or stamp. Thousands of dollars whiz back and forth digitally across the Internet in the blink of an eye. O f course, there are security concerns you should be aware of and certain precautions you should take. In the case of online banking, investing, and bill paying, the security concerns and precautions are pretty much the same as for online shopping.You need to be sure the Web site you're visiting is secure. Banks, investment companies, and other companies that transact money over the Web should have valid digital certificates from a trusted third party.You should check for the locked padlock icon on your www.syngress.com Web Surfing Privacy and Safety 9Chapter 7 Web browser before conducting any business because that lets you k n o w that the data you send to the Web server is secure. Most of these Web sites use a unique username and password to authenticate users. The SSL connection and digital certificate are your way of knowing you are talking securely with the correct server. The username and password are the Web server's way of proving that the person accessing the account has the authority to do so. It is important that you choose a good, strong password and that you keep that username and password secure. Anyone w h o acquires your username and password will be able to access your account and perform any of the same financial transactions you can perform.You should also use a different username and a different password for each site so if your information from one site is compromised, an attacker won't have access to all of your accounts. For more details on using passwords, see Chapter 2. Another serious security concern w h e n it comes to using financial Web sites is the dramatic rise in phishing scams. It is very important to understand that no reputable company will ask you for your username and password, account number, credit card number, or any other confidential information through e-mail. If you do get an e-mail that claims to be from a financial institution that you do in fact have an account with, you should either contact their customer service by phone or close your e-mail software and all open Web browser windows and then open a new browser window to visit their site. Never click a link in an e-mail to visit a financial Web site. For more details on e-mail phishing, see Chapter 6. So your financial information is safe. But how about your children? Content Filtering and Childproofing The Web is a valuable resource and it can be both entertaining and educational. Almost any piece of information on any subject is available somewhere on the Web if you just know how to look for it. The Web also has a lot of sites of a questionable nature. There are porn sites, sites that push violence or hatred of one sort or another, and malicious sites that will attempt to infect your computer with a virus or compromise your security by installing a Trojan of some sort. If you stick to visiting well-known, brand-name sites like cnn.com, espn.com, disney.com, bestbuy.com, and so on, you can be fairly sure you won't run into these questionable or malicious sites. But, if you start trying to find information using a search engine like Google or Yahoo, there is no guarantee that the sites that come up on your search will be as clean. Children seem to be at a higher risk of accidentally landing on sites like these. As a rule they use the Internet and the Web differently than adults. Sites that children 119 120 Chapter 7 9Web Surfing Privacy and Safety tend to frequent more often, such as gaming sites and music sites, seem to have a m u c h higher chance of leading to unscrupulous sites. If you s o m e h o w access a distasteful or inappropriate Web site, you can simply ignore it and shut down the browser w i n d o w or visit another site. With children though, it is important that such sites not be allowed to be displayed in the first place.You need some means of blocking these sites and shielding your children so that they can use the Web safely. A variety of products are available to filter the Web content before it's allowed to be displayed on your screen. Some products are available for flee, such as the content filter software available at we-blocker.corn, while commercial products to filter Web content include such items as N e t Nanny. These products generally work in one of two ways. Some will maintain a database of Web sites that are k n o w n to fall into the various categories you might want to block. It will then block access to any Web sites that are in its database based on h o w you configure the content filter. The other m e t h o d is to actually examine the Web content in real time and search for key words or phrases or other clues that the site should be blocked. Some products may use a combination of these two methods. Regardless of which content filtering product you choose it will be up to you to configure it h o w you wish. Some people may want significantly more or less restrictions than others.You should also ensure that the software cannot be disabled or bypassed in any way by your children. Usually there is a password required to access the master or parent account and other users will not be able to configure or disable the software. If you are still unsure of what your children are doing on the computer or you want a little extra assurance you can install a monitoring program such as Spector Pro. Spector Pro from Spectorsoft records all e-mail, instant message chatting, keystrokes typed, Web sites visited, programs used, and peer-to-peer network files accessed. Additionally it will block access to Internet Web sites based on your configuration just like the content monitoring programs mentioned above.You can also configure Spector Pro to send an e-mail message to you instantly if the computer is being used in some inappropriate manner, and you can install it in such a way that other u s e r s ~ namely, the children using the c o m p u t e r ~ a r e not even aware that the software exists. A good percentage of your time on your personal computer will probably be spent surfing the Web for one reason or another. There is a seemingly endless supply of news, information, advice, entertainment and education on the Web. If you exercise these basic precautions and use some old-fashioned c o m m o n sense you can enjoy this vast resource safely and securely. www.syngress.com Web Surfing Privacy and Safety 9Chapter 7 Summary So, in this chapter you have learned that while the Web has made advancements possible in online shopping, personal finance, education, and of personal communication, there are dangers lurking out there for the unaware and unprotected. There are ways, however, to protect one's self and with a little effort you can defend yourself and your family from those dangers. Additional Resources The following resources provide more information on Web surfing privacy and safety: 9 Do Cookies Compwmise Security? Webopedia.com (www. web op e dia. com/DidYouKnow/Internet/2002/Cookies.asp). 9 Moulds, Richard. Whose Site is it Anyway? Help Net Security. March 29, 2004 (www.net-security. org/article.php?id= 669). 9 Safe Internet. Anonymous Su~ing and Privacy. Settings Internet Explorer 6.0. Home.zonenet.com (www. home. zonnet, nl/rob erthoenselaar/a) SettingslnternetExplorer, html). 9 Salkever, Alex. "Cyber-Extortion: When Data Is Held Hostage." Business Week Online. August 22, 2000 (www. busine sswe ek. com/ bwdaily / dnflash / aug2000 / nf20000822_308, htm). m The All-New Netscape Bwwser 8.12. Netscape.com (http: //wp. netscap e. com/security/techbriefs/servercerts/index.html). [] Weiss, Todd. "New Explorer 6 Active Scripting Flaw Reported." Computerworld. November 26, 2003 (www.computerworld.com/securitytopics/security/holes/story/0,10801,87582,00.html). www.syngress.com 121 This Page Intentionally Left Blank Chapter 8 123 124 Chapter 8 9Wireless Network Security Introduction I have a wireless network in my home. I am no "Mr. Fix-it" w h e n it comes to h o m e projects, so w h e n I had to figure out h o w to run network cable from the router in the kitchen to my kids' rooms, going through walls and floors and around cinder blocks, I sprang for the wireless equipment instead. At first, it was primarily so that I could use my laptop from any room in the house, but as time went by we eventually switched almost every computer in the house to a wireless connection. Wireless networks provide a great deal of convenience and flexibility, and are relatively easy to set up. Actually, they may be too easy to set up. Some pieces of wireless equipment are almost plug-and-play devices, which might explain why so many people don't read the manual or do their h o m e w o r k to figure out h o w to secure the network airwaves. I took my laptop out with me today to work on this book. I had no particular need for a network connection since I was just using my word processor on my computer, but as I drove through the subdivision I watched as my wireless network adapter detected network after network completely insecure and announcing their presence to the world. Unfortunately, this seems to be the n o r m rather than the exception. This chapter will take a look at wireless network security from two perspectives, and the steps you must take to use it securely in both. We will start with a brief overview of the wireless protocols and technology, and then look at what's required to secure your own h o m e wireless network to keep unauthorized users out of your network. Lastly, we will examine the security precautions you should take to securely use a public wireless network. The Basics of Wireless Networks T h i n k about h o w a wireless network affects the security of your network and your computers. W h e n you have a wired network, you have only one way in more or less. If you put a firewall on the network cable between your computers and the public Internet, your computers are shielded from most unauthorized access. The firewall acts as a traffic cop, limiting and restricting access into your network through that single access point. N o w you throw a wireless device on your network. It doesn't matter if it's one computer with a wireless network adapter or a wireless router or access point, the results are the same: you are n o w broadcasting data through the air.Your "access point" is n o w all around you. R a t h e r than a single point of access that can be easily protected, your access point is n o w three dimensional, all www.syngress.com Wireless Network Security 9Chapter 8 around you, at various ranges, from the next room to the house next door to the roadside in front of your home. Wireless equipment often boasts of ranges over 1,000 feet.The reality is that unless there are no obstructions, the temperature is above 75 and less than 78, the m o o n is in retrograde and it's the third Tuesday of the month, the range will be more like 100 feet. But if your wireless data can make it the 75 feet from your wireless router in the basement to where you are checking your e-mail while watching a baseball game as you sit on the couch in your living room, it can also make it the 60 feet over to your neighbor's house or the 45 feet out to the curb in front of your home. Although standard off-the-shelf equipment doesn't generally have tremendous range, the wardrivers, a term used to describe actively scouting areas specifically looking for insecure wireless networks to connect to, have h o m e g r o w n super antennas made with Pringles cans and c o m m o n household items from their garage that can help them detect your wireless network from a much greater range. 125 126 Chapter 8 9Wireless Network Security It is important that you take the time to understand the security features of your wireless equipment and make sure you take the appropriate steps to secure your network so that unauthorized users can't just jump onto your connection. Not only are your own computers exposed to hacking if an attacker can join your network, but they may initiate attacks or other malicious activity from your Internet connection which might have the local police or the FBI knocking on your door to ask some questions. A wireless network uses radio or microwave frequencies to transmit data through the air. Without the need for cables, it is very convenient and offers the flexibility for you to put a computer in any room you choose without having to wire network connections. It also offers you the ability to roam through your home freely without losing your network connection. In order to connect to the Internet, you will still need a standard connection with an ISP. Whether you use dial-up or a broadband connection like DSL or a cable modem, the data has to get to you some way before you can beam it into the air. Typically, you would connect your DSL or cable m o d e m to a wireless router and from there the data is sent out into the airwaves. If you already have a wired router on your network and want to add wireless networking, you can attach a wireless access point to your router. Any computers that you wish to connect to the wireless network will need to have a wireless network adapter that uses a wireless protocol compatible with your router or access point. A variety of wireless network protocols are currently in use. The most c o m m o n equipment for home users tends to be either 802.11b or 802.11g with 802.11a equipment coming in a distant third. The most c o m m o n protocol, particularly for home users, has been 802.1 lb; however, 802.1 lg is becoming the default standard because of its increased speed and compatibility with existing 802.1 l b networks. The following is a brief overview of the different protocols: 802.11b Wireless network equipment built on the 802.11b protocol was the first to really take off commercially. 802.1 l b offers transmission speeds up to 11 mbps, which compares favorably with standard Ethernet networks~plus, the equipment is relatively inexpensive. One problem for this protocol is that it uses the unregulated 2.4GHz frequency range, which is also used by many other common household items such as cordless phones and baby monitors. Interference from other home electronics devices may degrade or prevent a wireless connection. www.syngress.com Wireless Network Security 9Chapter 8 802.1 la The 802.11a protocol uses a regulated 5GHz frequency range, which is one contributing factor for why 802.1 l a wireless equipment is significantly more expensive than its counterparts. 802.1 l a offers the advantage of transmission speeds of up to 54 mbps; however, the increased speed comes with a much shorter range and more difficulty traversing obstructions, such as walls, due to the higher frequency range. 802.1 lg The 802.11g protocol has emerged as the new standard at this time. It combines the best aspects of both 802.11b and 802.11a. It has the increased transmission speed of 54 mbps like 802.11a, but uses the unregulated 2.4GHz frequency range, which gives it more range and a greater ability to go through walls and floors, and also helps keep the cost of the equipment down. 802.11g is also backwards-compatible with 802.11b, so computers with 802.11b wireless network adapters are still able to connect with 802.11g routers or access points. Next-Generation Protocols Wireless networking is relatively new and constantly evolving. A number of new protocols are currently being developed by the wireless industry, such as WiMax, 802.16e, 802.1 ln, and Ultrawideband. These protocols promise everything from exponentially increasing home wireless network speeds to allowing you to use a wireless connection to your ISP and even maintain a wireless network connection while in a moving vehicle. Some of these concepts may not appear in the immediate future, but others are already in use in one form or another. Most wireless network equipment vendors have already begun producing Pre-N or Draft-N devices. These devices are based off of the 802.11n protocol, but have been produced before the 802.11n protocol has actually been finalized. They promise speeds 12 times faster than 802.1 lg, and a range up to four times that of 802.11g. The major mobile phone carriers, such as Verizon, Cingular, and TMobile, all offer some sort of broadband wireless access which can be used virtually anywhere their cellular phone network can reach. Using a service like this can give you wireless access almost anywhere, any time, without restriction to any specific site. www.syngress.com 127 128 Chapter 8 9Wireless Network Security Basic Wireless N e t w o r k Security Measures Regardless of what protocol your wireless equipment uses, some basic steps should be taken to make sure other users are not able to connect to your wireless network and access your systems or hijack your Internet connection for their own use. Secu re You r Home Wireless Network To begin with, change the username and password required to access the administrative and configuration screens for your wireless router. Most home wireless routers come with a Web-based administrative interface. The default IP address the device uses on the internal network is almost always 192.168.0.1. Finding out what the default username and password are for a given manufacturer is not difficult. The equipment usually comes configured with something like "admin" for the username, and "password" for the password. Even without any prior knowledge about the device or the manufacturer defaults, an attacker could just blindly guess the username and password in fewer than ten tries. With a default IP address and default administrative username and password, your wireless router can be hacked into even by novices. Figure 8.1 shows the administration screen from a Linksys wireless router. This screen allows you to change the password for accessing the router management console. F i g u r e 8.1 The Administration Screen from a Linksys Wireless Router r www.syngress.com Wireless Network Security 9Chapter 8 Make sure you change the username to something that only you would think of. Just like renaming the Administrator account on your computer, you want to choose a username that won't be just as easy to guess as "admin" or whatever the default username was.You also want to choose a strong password that won't be easily guessed or cracked. Lastly, you should change the internal IP subnet if possible. The 192.168.x.x address range is for internal use only. A large percentage of those who use this address range use 192.168.0.x as their subnet, which makes it easy to guess. You can use any number from 0 to 254 for the third octet, so choose something like 192.168.71.x so potential attackers will have to work a little harder. For details on user accounts and administrator privileges, see Chapter 1. R e m e m b e r , the goal is to make it difficult for attackers or malware to penetrate your system. Nothing you do will make your network 100-percent impenetrable to a dedicated and knowledgeable attacker. But, by putting various layers of defense in place such as complex passwords, personal firewalls, antivirus software, and other security measures, you can make it sufficiently hard enough that no casual attacker will want to bother. Change the SSID Another big step in securing your home wireless network is not to announce that you have one. Public or corporate wireless networks may need to broadcast their existence so that new wireless devices can detect and connect to them. However, for your home, you are trying to prevent rogue wireless devices from detecting and connecting to your network. The wireless router or access point has a Service Set Identifier (SSID). Basically, the SSID is the name of the wireless network. By default, wireless touters and access points will broadcast a beacon signal about every 1/10 of a second, which contains the SSID among other things. It is this beacon which wireless devices detect and which provides them with the information they need to connect to the network. Your wireless network will most likely only have a handful of devices. Rather than relying on this beacon signal, you can simply manually enter the SSID and other pertinent information into each client to allow them to connect to your wireless network. Check the product manual that came with your wireless equipment to determine how to disable the broadcasting of the SSID. Your device will come with a default SSID which is often simply the name of the manufacturer, such as Linksys or Netgear. Even with the SSID broadcasting turned off, it is important that you not use the default SSID. There are only a handful of manufacturers of home wireless equipment, so it wouldn't take long to guess at the possible SSIDs if you leave it set for the default. Therefore, you need to change this, and preferably not to something equally easy to guess, like your last name. 129 130 Chapter 8 9Wireless Network Security Configure Your Home Wireless Network Next, you should configure your wireless network and any wireless network devices for infrastructure mode only. Two types of wireless networks are available for set up: infrastructure and ad hoc. In an infrastructure mode network, a router or access point is required, and all of the devices communicate with the network and with each other through that central point. An ad hoc network, on the other hand, allows each device to connect to each other in an "ad hoc" fashion (hence the name). Since you are going through all of this effort to make your router or access point more secure, you also need to make sure that the wireless devices on your network are not configured for ad hoc mode and might be providing another means for rogue wireless devices to gain unauthorized access to your network. By accessing the Properties for your wireless connection, you can click the A d v a n c e d b u t t o n at the bottom of the Wireless Networks tab to configure whether your wireless adapter will connect to infrastructure, ad hoc, or both wireless network types (see Figure 8.2). Figure 8.2 Configuring Connections for Your Wireless Adapter Restrict Access to Your Home Wireless Network To restrict access to your wireless network even further, you can filter access based on the M A C (Media Access Code) addresses of your wireless devices. Each network adapter has a unique MAC address that identifies it. As stated earlier in this chapter, your network will most likely consist of only a handful of devices, so it wouldn't require too much effort to enter the M A C address of each device into your wireless router or access point and configure it to reject connections from any other M A C addresses. Wireless Network Security 9Chapter 8 Even after you do all of these things, you're not completely secure.You're obscure, but not secure. Using tools freely available on the Internet, a war-driver could still intercept your wireless data packets as they fly through the air. They would be doing so blindly because your wireless access point is no longer broadcasting its presence, but it can still be done. Intercepting the traffic in this way can provide an attacker with both the SSID and a valid MAC address from your network so that they could gain access. By adding the MAC addresses of the devices that you know you want to connect to your wireless network, you can block access by other unknown devices and protect your wireless network (see Figure 8.3). Figure 8.3 Adding MAC Addresses to Your Wireless Router Use Encryption in Your Home Wireless Network To further protect your wireless communications, you should enable some form of encryption. Wireless manufacturers, in their haste to start selling equipment, rushed to create WEP (Wired Equivalent Privacy) encryption to provide some level of security while waiting for the official 802.1x security protocol to be standardized. It was quickly discovered that the underlying technology of WEP has a number of flaws which make it relatively easy to crack. The wireless industry has since migrated to the newer WPA (Wi-Fi Protected Access) encryption, which offers a number of significant improvements over WEP yet remains backwards-compatible with WEP devices. In order to use WPA though, all devices on the network must be WPA-capable. If one device uses WEE the network 131 132 Chapter 8 9Wireless Network Security will not be able to use some of the improved security features of WPA and your network may still be vulnerable to being exploited by the weaknesses found in W E E WPA2 has recently emerged to replace even WPA. Devices that are W P A 2 - c o m pliant meet stricter security requirements. Windows XP with Service Pack 2 (SP2) fully supports the features and functions of WPA2, allowing a higher level of wireless network security as long as all of your wireless network clients are capable of the same security level. While a knowledgeable and dedicated attacker with the right tools can still crack the encryption and access your wireless data, this should not discourage you from enabling it. It would be unusual for someone to dedicate that much time and effort to get into your wireless network when they can probably find five more unprotected wireless networks on the next block. It isn't practical to think you will be 100-percent secure, but turning on some form of encryption combined with the other precautions listed previously will deter the casual hacker and curious passerby. The more complex encryption schemes require more processing power to encode and decode, so you may consider sticking with the 40-bit (64-bit on some devices) W E P encryption rather than the stronger 128-bit, or even the WPA encryption, if you notice any performance issues. It is the difference between locking your house with a normal lock or using a deadbolt. Since an attacker can get past both with about the same effort, you may as well use the one that is easier for you but that still prevents most users from accessing your wireless network. ILeview Your Logs Most wireless routers keep logs of the devices that attach to them. Even if you have taken all of the preceding steps to secure your wireless network, it is a good idea to periodically review the logs from your wireless router and check for any rogue devices that may have gained access. The other major points to consider regarding a secure home wireless network are the same as they are for a wired network or computer security in general.You should make sure you are using strong passwords that can't be easily guessed or cracked on all of your devices, and protect your computers with personal firewall software. One final word of advice when it comes to securing your wireless network: a device that is not connected to the Internet can't be attacked or compromised j?0m the Internet.You may want to consider turning off'your wireless router or access point overnight or when you know that it won't be used for extended periods. If there are too many users trying to access the Internet and use their computers at varying hours, it may be impractical to turn off the wireless router, but you can still www.syngress.com Wireless Network Security 9Chapter 8 turn off any computers when not in use so that they are not exposed to any threats whatsoever. Use Public Wireless Networks Safely Public wireless networks, often referred to as hotspots, are springing up all over. National chains such as Starbucks Coffee, Borders Books, and McDonalds' have started adding wireless network access to their establishments through services provided by companies like TMobile or Boingo. Major hotel chains have gone from no access to dial-up access to broadband access, and now many are offering wireless network access. Many airports and college campuses have wireless networks as well. It seems like every week someplace new pops up where you can surf the Web while you're out and about. It is perilous enough jumping onto the Internet using your own network in the comfort of your home, but sharing an u n k n o w n network and not knowing if the network or the other computers are secure adds some new concerns. Some of the things you must do to use a public wireless network securely are just simple rules of computer security no matter what network you're connecting to, while others are unique to accessing a public wireless network. Install Up-to-Date Antivirus Software For starters, you should make sure you have antivirus software installed and that it is up-to-date.You don't know what, if any, protection the network perimeter offers against malware or exploits, or whether or not the other computers on the network with you are trying to propagate some malware.You also need to make sure that your operating system and applications are patched against known vulnerabilities to help protect you from attack. For details on protecting your computer from malware, see Chapter 3. Install a Personal Firewall Your computer should have personal firewall software installed. Again, you have no way of knowing offhand if the network you are joining is protected by any sort of firewall or perimeter security at all. Even if it is, you need the personal firewall to protect you not only from external attacks, but also from attacks that may come from the other computers sharing the network with you. For details on personal firewalls, see Chapter 5. As a standard rule of computer security, you should make sure that your critical, confidential, and sensitive files are password protected. In the event that any attacker or casual hacker happens to infiltrate your computer system, it is even more impor- www.syngress.com 133 134 Chapter 8 9Wireless Network Security tant that you protect these files w h e n joining a public wireless network. Make sure you restrict access to only the User Accounts that you want to access those files and use a strong password that won't be easily guessed or cracked. More importantly, it is vital that you disable file and folder sharing. This is even more critical if you happen to be using Windows XP H o m e edition because of the way Windows XP H o m e manages file and folder sharing and uses the Guest account with a blank password for default access to shared files and folders. Some attackers or malware may still find their way into your system, but that is no reason to leave the door unlocked and a big neon sign welcoming visitors. Additional Hotspot Security Measures All of the things I have mentioned so whether you are at home, at work, or browsing books at Borders. N o w let's do or consider w h e n connecting to a far are basic security measures that apply connecting to a public wireless network while take a look at some extra things you need to hotspot. Verify Your Hotspot Connection To begin with, you need to make sure you a r e connecting to a hotspot and not a malicious rogue access point. W h e n you are connecting to a public wireless network, www.syngress.com Wireless Network Security 9Chapter 8 it will broadcast the SSID, or network name, along with other information your wireless adapter needs to know in order to connect. It is very easy though for an attacker to set up a rogue access point and use the same or similar SSID as the hotspot. They can then create a replica of the hotspot login Web site to lure users into giving up their usernames and passwords or possibly even get credit card n u m bers and other such information from users who think they are registering for access on the real site. You should make sure that the location you are at even has a hotspot to begin with. Don't think that just because you happen to be at a coffee shop and a wireless network is available that it must be a free wireless hotspot. If you are at a confirmed hotspot location and more than one SSID appears for your wireless adapter to connect to, you need to make sure you connect to the right one. Some attackers will set up rogue access points with similar SSIDs to lure unsuspecting users into connecting and entering their login or credit card information. Watch Your Back Once you take care of ensuring that you are connecting with a legitimate wireless network, you need to take stock of who may be sitting around you. Before you start entering your username and password to connect to the wireless network or any other usernames and passwords for things like your e-mail, your online bank account, and so on, you want to make sure that no overly curious neighbors will be able to see what you are typing. After you have determined that nobody can see over your shoulder to monitor your typing and you have established that you are in fact connecting to a legitimate public wireless network, you can begin to use the Internet and surf the Web.You should always be aware though of the fact that your data can very easily be intercepted. N o t only can other computers sharing the network with you use packet sniffer programs such as Ethereal to capture and analyze your data, but because your data is flying through the air in all directions even a computer in a nearby parking lot may be able to catch your data using programs like NetStumbler or Kismet. Use Encryption and Password Protection To prevent sensitive data or files from being intercepted, you should encrypt or protect them in some way. Compression programs, such as WinZip, offer the ability to password-protect the compressed file, providing you with at least some level of protection.You could also use a program such as PGP to encrypt files for even more security. www.syngress.com 135 136 Chapter 8 9Wireless Network Security Password-protecting or encrypting individual files that you may want to send across the network or attach to an e-mail will protect those specific files, but they won't stop someone from using a packet sniffer to read everything else going back and forth on the airwaves from your computer. Even things such as passwords that obviously should be encrypted or protected in some way often are not. Someone who intercepts your data may be able to clearly read your password and other personal or sensitive information. Don't Linger O n e suggestion is to limit your activity while connected to a public wireless network.You should access only Web sites that have digital certificates and establish secure, encrypted connections using SSL (typically evidenced by the locked padlock icon and the U R L beginning with "https:"). Use a VPN For even greater security, you should use a V P N (virtual private network). By establishing a V P N connection with the computer or network on the other end, you create a secure tunnel between the two endpoints. All of the data within the tunnel is encrypted, and only the two ends of the V P N can read the information. If someone intercepts the packets midstream, all they will get is encrypted gibberish. For SSL-based VPNs, just about any Web browser will do. However, a large percentage of the V P N technology in use relies on IPSec, which requires some form of client software on your computer to establish a connection. It is not important that the V P N software on your computer and that on the other end be the same or even from the same vendor, but it is a requirement that they use the same authentication protocol. Corporations that offer V P N access for their employees typically supply the client software, but you can also get V P N client software from Microsoft or from Boingo. Use Web-Based E-mail One final tip for using a public wireless network is to use Web-based e-mail. If you are connecting to a corporate network over an encrypted V P N connection and accessing a corporate mail server like Microsoft Exchange or Lotus Notes, you will be fine. But if you are using a POP3 e-mail account from your ISP or some other email provider, the data is transmitted in clear text for anyone to intercept and read. Web-based e-mail generally uses an encrypted SSL connection to protect your data in transit, and major Web-based mail providers such as Hotmail and Yahoo also scan e-mail file attachments for malware. For details on Web-based e-mail, see Chapter 6. www.syngress.com Wireless Network Security 9Chapter 8 Summary Wireless networks represent one of the greatest advances in networking in recent years, particularly for home users who want to share their Internet connection without having to run network cabling through the floors and walls. Unfortunately, if not properly secured, wireless networks also represent one of the biggest security risks in recent years. In this chapter, you learned about the basic concepts of wireless networking and the key features of the main wireless protocols currently being used. We also covered some fundamental steps you need to do to protect your wireless network, such as changing default passwords and SSIDs, disabling the broadcasting of" your SSID, or even filtering access to your wireless network by MAC address. This chapter also discussed the strengths and weaknesses of the wireless encryption schemes such as WEP and WPA, and why you should ensure that your wireless data is encrypted in some way.You also learned that a layered defense, including components such as a personal firewall and updated antivirus software, is a key component of overall security, particularly when using public wireless hotspots. The chapter ended by discussing some other security concerns that are unique to public wireless hotspots, such as ensuring that the wireless network you are connecting to is a legitimate one and not a rogue hotspot set up to steal your information. In addition, you learned that using a VPN for communications and utilizing Web-based e-mail can help improve your security and protect your information while using public wireless networks. Additional Resources The following resources provide more information on wireless network security: 9 Bowman, Barb. How to Secure Your Wireless Home Network with Windows XP. Microsoft.corn (www. mi croso ft. c o m / win d owsxp / using/n e two rking/1 e arnm o re/bowman_ 05februaryl0.mspx). 9 Bradley, Tony, and Becky Waring. Complete Guide to Wi-Fi Security. Jiwire.com, September 20, 2005 (www.jiwire.com/wi-fi-security-travelerhotspot-1 .htm). 9 Elliott, Christopher. Wi-Fi Unplugged:A Buyer's Guide for Small Businesses. Microsoft.corn (www. microsoft, c ore/smallbusiness / resources/technology/broadband_mobil ity/wifi_unplugged a buyers_guide_for_small_businesses.mspx). 137 138 Chapter 8 9Wireless Network Security PGP Encryption Software (www.pgp.com/). Wi-Fi ProtectedAccess 2 (WPA2) Overview. Microsoft TechNet, May 6, 2005 (www. micro so ft. corn/technet/community/columns/c ableguy/ cg0505.mspx). WinZip Compression Software (www.winzip.com/). www.syngress.com Chapter 9 139 140 Chapter 9 9 Spyware and Adware Introduction In many ways, the discussion of spyware is really just an extension of the"Privacy and Anonymous Surfing" section of the Chapter 7. At its core, the problem of spyware relates directly to your privacy and how much, if any, information you wish to share with third parties, especially when you are unaware they are gathering the information. Spyware warrants its own chapter because it crosses the line from the ethical gray area of monitoring your activity and gathering your personal information, and heads into the starkly black area of gathering your information without your knowledge or consent, sometimes with malicious intent. Much of what a spyware removal program detects~such as cookies, Registry entries, and programs known to be related to spyware of some sort~are still more of an annoyance than a threat. However, there are still some spyware programs that pose a risk to the security of your system. But even those that don't pose a threat may still affect the performance and stability of your computer system. This chapter will examine the following: 9 The difference between adware and spyware 9 The pitfalls of the End User License Agreement (EULA) 9 How to protect your system against spyware 9 Tools to detect and remove spyware What Is Adware? The terms adware and spyware are often lumped together. In truth, there is a fundamental difference between the two, where adware tends to fall into that ethical gray area and stops short of crossing the line. Adware is software that's commonly used to generate ads, hence the name. Spyware often performs much more insidious actions, such as monitoring your keystrokes and capturing your username and password information or credit card numbers. When you watch standard network television (not cable), it doesn't cost you anything other than the price of the television itself and the electricity to run it. The various television networks make their money from advertising. Companies choose what programs or what time of day to broadcast their commercials based on viewer demographics. If a show is watched primarily by women, they won't waste their money advertising men's shaving gel. If a show is watched primarily by children, they won't run commercials for Lite beer. www.syngress.com Spyware and Adware 9Chapter 9 Some web sites and free software programs operate on this same business model. In effect, they provide the program or service to you free of charge and rely on advertising support to generate their profits. In order to determine your interests, these programs will often install adware which sits silently in the background. The adware can monitor various aspects of how you use your computer and what sorts of web sites you frequent, and then transmit that data back to the company. Afterward, the information can be used to select pop-up or banner ads that would most likely be of interest to you. Ironically, in the case of adware, you often agreed to install it and accepted whatever activity the adware is designed to perform when you installed the software. What makes adware legal, if not fully ethical, is that it is generally contained in the End User License Agreement (EULA). The EULA is that thing that comes up while you are installing software that asks whether you have read and agree to the terms as d e s c r i b e d ~ y o u know, that screen where you glance briefly and see that it's a bunch of techno-legal jargon and just click "yes" without actually reading anything? One well-known service that works in this way is the Kazaa peer-to-peer (P2P) network. P2P networks have come under a great deal of scrutiny as a result of the Recording Industry Association of America's war against users illegally swapping songs that are protected by their members' copyrights. P2P networking, however, is itself perfectly legal. It is possible to pay for the software and get a version that does not run ads, but a vast majority of users still choose to accept the advertising in exchange for getting access to the Kazaa network for free. Kazaa has over 2.5 million users, many of w h o m use the adware version of their P2P client software. Kazaa is not shy or secretive about the fact that adware will be installed on your system. In fact, it is clearly stated during the installation process. Step two of the installation lists all of the applications and adware that you agree to install in order to use Kazaa (see Figure 9.1). In order to proceed to step 3, you must check the box next to the statement "I agree to the Kazaa Media Desktop End User License Agreement and Altnet Peer Points Manager Package End User License Agreements." There is probably a fair chance that 99 percent of the users who click this box never even looked at the EULAs in question, much less actually read every word of them to understand what they were agreeing to. Unfortunately, this is true of all EULAs. People consider them an annoyance and fail to understand that it is a binding legal agreement between you and the software vendor. 141 142 Chapter 9 9Spyware and Adware Figure 9.1 The Kazaa Media Desktop Installer The Kazaa Media Desktop End User License Agreement (EULA) explains that to remove the included adware components or even to attempt to block or impede their functionality is a violation of the agreement (see Figure 9.2). The EULA outlines the terms and conditions you must agree to in order to legally use the product. Many freeware programs contain similar wording in their EULA, and so removing the adware components may in fact disable the free program you are trying to use. Figure 9.2 The Kazaa EULA www.syngress.com Spyware and Adware 9Chapter 9 The other EULA Kazaa requires you to agree to is from the third-party adware provider. The programs installed with Kazaa Media Desktop all have some remotely useful function. For example, Gator is used to provide context-sensitive advertising, while PerfectNAV suggests alternate web sites when the site you are searching for can't be found. The products installed by Kazaa Media Desktop and adware in general may be of value to some. It may seem wrong to force you to install those third-party applications in order to install and use the software, but that is the price for the "free" product. They aren't forcing you to install their software in the first place. Before you choose to accept installing these programs and agreeing to the EULA that governs them, you should take a look at what you are agreeing to. The EULA for Altnet Peer Points Manager and My Search Toolbar states that you agree that they can update the software at any time without notice and that you agree to accept "all updates" (see Figure 9.3). In effect they could "update" the software with completely new functionality that may perform actions you don't want on your system. Figure 9.3 The EULA for Altnet Peer Points Manager Even if you don't mind the privacy or security implications of running adware on your system and you're willing to accept that as a fair tradeoff for "free" software, you should keep the stability and performance of your system in mind. Adware is constantly running in the background, monitoring and recording your actions so it is using memory and processing power resources that could be put to better use. At some interval, it will have to transmit the accumulated data it has gathered back to 143 144 Chapter 9 9Spyware and Adware its home base, a process which will use some portion of your network bandwidth. On a broadband connection you may not notice it, but on a dial-up connection every byte counts and having adware communicating in the background could bring your already crawling network access to a virtual stop. What Is Spyware? While many people call all adware and spyware "spyware," there is a difference. As I just pointed out in the discussion of adware, adware is technically legal, if not always ethically right, and is something that you most likely have unwittingly agreed to install on your system. Spyware, by comparison, is a more covert or stealthy form of adware. In fact, many spyware applications are closer to being Trojan programs than actual adware, due to the fact that they come disguised as something else and install without your knowledge. Adware tends to stay in that gray area and focus its recording and monitoring efforts on data that is less personal and confidential, such as simply tracking generalities like what types of sites you visit, how often you visit them, how long you stay on each page, and other similar statistical data which can help web sites monitor how the site is used and help advertisers get the most bang for their buck by getting their ads in front of people more likely to be interested in their product or service. Spyware crosses the line into actual malware by installing itself secretly and without the user's consent, as well as through the data it tracks and reports in many cases. Some spyware actually relies on exploiting known vulnerabilities in your web browser to execute and install without your knowledge or consent. While adware is, for the most part, up front about the functions it will perform, spyware is covert and tenacious. Many spyware programs not only install without any clear method of uninstalling them, but actually go out of their way to obscure any way of removing them and may even disable some of the configuration and control options of the Web browser to prevent you from tampering with them. Spyware programs also sometimes spy on a broader scope of information than standard adware. They may even log your every keystroke, allowing them to capture usernames, passwords, account numbers, credit card numbers, and every word you type in your e-mail program, among other things. This obviously crosses the line from simply monitoring your activity for demographic reasons to carrying out pure spying with malicious intent. Still, the majority of spyware consists of Web bugs and tracking cookies designed to track and monitor your activity just like adware, except without your knowledge or consent. O f course, I keep stating that spyware is bad or malicious because it does these things without the "user's" knowledge. What I should be saying is that spyware is bad www.syngress.com Spyware and Adware 9 Chapter 9 and malicious if it does these things without the owner's knowledge. There is a whole market segment devoted to legal spyware designed for employers, which they can install on their computers to monitor the activity of their employees, and similar products for parents that can be installed on their computers to monitor the activity of their children. Products like Spector Pro from Spectorsos silently sit in the background and monitor and record all Web activity, all incoming and outgoing e-mail messages, all instant-message chat sessions, capture every keystroke typed, and monitor every program used and every file exchanged on peer-to-peer (P2P) networks. In fact, Spector Pro can also be configured to record an actual snapshot image of the screen at set intervals so the contents of the screen can be reviewed as well in case all of the other monitoring and tracking missed something. Spector Pro C N E (Corporate Network Edition) and similar products such as NetVizor from Employee-Monitoring.corn promise to increase employee productivity, eliminate the leaking of trade secrets and confidential company information and aid in the investigation of employees suspected of inappropriate activity among other things. In a home environment, you aren't typically worried about losing trade secrets (What are your kids going to do? E-mail the secret family recipe for apple pie?) or lack of productivity. But, with so much inappropriate content on the Web and so many unknowns, it provides a tremendous amount of peace of mind to know that you can see every last thing that occurs on the computer when you're not there. With a product like Spector Pro, you can also configure the software to block certain sites or services during specific hours of the day and set it to e-mail you immediately if certain key words occur in e-mails or on the Web sites being viewed. Getting Rid of Spyware Eradicating spyware from your system is sometimes much easier said than done. Adware, and simpler spyware that are similar to adware, are fairly easy to remove. Legitimate adware will often have an actual uninstall program. But, to scan your computer for spyware and adware and help remove it, you can use a product such as Ad-aware from Lavasoft (www.lavasos or Spybot Search & Destroy (http://spybot.safer-networking.de/en/) from Patrick Kolla. Both of these programs are free for personal use and do an excellent job of detecting and removing adware and swware. They each rely on a database of known spyware, using a method similar to how an antivirus software compares files to a database of known malware. Before running a scan, you should always check for updates from the vendor to make sure your software can catch any new spyware and 145 146 Chapter 9 9Spyware and Adware adware. Both products are excellent, but often one will catch things that the other doesn't, so you may want to run both just to be thorough. W h e n you run a scan, the product will examine the processes currently running, look for files such as cookies, as well as executable program files, and will scan your system Registry for any entries related to known spyware (see Figure 9.4). Unless you have your cookie security completely locked down, which may make surfing some Web sites difficult or impossible, you will most likely find at least some entries for tracking cookies detected as spyware or adware. Figure 9.4 Scanning a Computer with Ad-aware With both products, you will be presented with a list of the files, Registry entries, and processes that were detected and identified as spyware or adware.You can then choose whether or not to remove each of them. Ad-aware allows you to get some clarification about what the object is by double-clicking it to get details such as its size, location, the last time it was accessed and what risk-level Ad-aware has assigned it, as well as a short description of the object (see Figure 9.5).You can also look up the name of the object or the vendor of the object in Google to try and research more details about where the spyware came from and what it is designed to do. Spyware and Adware 9Chapter 9 Figure 9.5 Ad-aware's Object Details I should reiterate that in some cases you agreed to install the adware in exchange for a "free" product or service and that removing or disabling the adware in any way is a violation of your agreement with the EULA. If you opt to remove the adware, you should technically uninstall the software that it came with to remain legal. The spyware removal products will generally warn you of this same thing before moving forward with the cleaning and deleting process. Ad-aware and Spybot Search & Destroy will both detect and remove the vast majority of spyware and adware in existence. For the money (free) you can't beat them, but they have to be run manually and only remove what they find when you scan your computer after the fact. They don't proactively protect your system from getting spyware and adware installed in the first place. Antivirus software vendors Symantec (makers of Norton antivirus products) and MacAfee, Inc. have added the capability for their software to detect and block known spyware and adware. Even personal firewall software like Zone Alarm Pro will let you control adware by blocking cookies and alerting you to programs that try to execute without your knowledge. The line between antivirus software, personal firewall software, anti-spyware software, and other security products is constantly being blurred as vendors add functionality to their products. Lavasoft offers a more advanced version of Ad-aware, Ad-aware Pro, at a reasonable price which provides significantly more security, specifically aimed at protecting your computer from spyware and adware. Ad-aware Pro locks down areas of the 147 148 Chapter 9 9Spyware and Adware memory and Registry targeted by spyware and provides real-time blocking of spyware, adware, and attempts to download software without your knowledge. It also blocks pop-up ads and allows you to scan mapped drives across a network. Neither Spybot nor Ad-aware will detect or remove commercial spyware products such as Spector Pro or its sibling, eBlaster. Hopefully, if these products exist on your system, they have been installed legitimately by the owner of the computer system to monitor its usage. However, it is possible that someone might install a product like this on your system as a spying tool to stealthily monitor your actions, read your e-mails, collect your passwords, and have it all e-mailed to them without your knowledge. If you feel there may be an unauthorized installation of a program like this installed on your system, you should try scanning it with SpyCop. SpyCop (http://spycop.com/) will detect not only the typical spyware and adware, but claims to also detect over 400 commercially available snooping programs such as Spector Pro. SpyCop scans every single file on the system to ferret out keystroke loggers, password recorders, e-mail recorders, and all other types of insidious or malicious software. SpyCop boasts the largest database of spying and surveillance software in the world. If you suspect you might have spyware on your system, or you know that you do but none of the products mentioned can detect or remove it, as a last resort try using Hi]ackThis (www.spywareinfo.com/~meri]n/programs.php). This will scan your computer like the other programs, but it will also look for spyware-like traits or activities rather than simply comparing the scan to a database of specific known spyware. Hi]ackThis is a powerful tool, but analyzing the results can be tricky for novices. W h e n you perform a scan using Hi]ackThis, it quickly generates a log of objects that may or may not be spyware (see Figure 9.6). Some may be programs you've installed intentionally. For most people, the information supplied will look like gibberish. But, thankfully, you can highlight any item on the list and click the program's Info O n Selected Item button for a brief description of it.You can also refer to sites such as SpywareInfo.com or WildersSecurity.com for extra assistance.These sites (and many others) offer users an opportunity to submit Hi]ackThis log files, which volunteer experts then help decipher and let you know what is valid and what is potentially swware or adware. If the analysis still doesn't make any sense to you or if you're unable to determine if a file or program should be removed or left alone, you can refer to the Hi]ackThis tutorial (it's hosted at a few different sites, but a good place to find it is at www.spywareinfo.com/~merijn/htlogtutorial.html) to learn more about what all of the codes and gibberish mean. The bottom line though is that Hi]ackThis is not a tool for beginners or novices. If you can't find an entry on the forums previously listed that refers to the same object you have a question about, you can click "Save Log" to save the information from your scan and submit it to get some expert help. Spyware and Adware 9Chapter 9 F i g u r e 9 . 6 Results of a Scan with HijackThis If an item is determined to be safe, you can check the box next to it and click the Add Checked To Ignorelist button so it won't show up again on future scans. If you discover traces of spyware or adware that you want to remove, simply check the boxes for those items and click Fix Checked.You need to be positive that you only check the boxes on items you are sure are related to spyware or malware, however. Once you click Fix Checked, there is no turning back and if you remove the wrong things you may cause legitimate software programs to stop functioning. Privacy is a serious concern for many, and spyware and adware infringe on your privacy by tracking your actions and habits and reporting that information back to some third party. However, most spyware and adware doesn't infringe on your privacy any more than your credit card company knowing where and when you shopped and what you bought or your cell phone company knowing what phone number you called, where you were when you called it, and how long you talked. It is a personal choice to decide how much information you are comfortable sharing, but remember that spyware and adware also use computer system resources like memory, processing power, and Internet bandwidth, and may cause your system to perform poorly or crash entirely. Using the information and tips from this chapter will help you take back control of just how much information you care to share and with whom. www.syngress.com 149 150 Chapter 9 9Spyware and Adware Summary Spyware poses a serious threat to computer users and it is important that you understand this threat and how to defend against it. In this chapter, you learned the sometimes subtle differences between adware and spyware, and the way some spyware applications use the EULA to get permission from the user to install themselves. You learned that many types of adware and spyware are more of a nuisance than a threat, but that there are some very malicious types of spyware out there as well. We then discussed some of the tools and techniques available which you can use to detect and remove spyware applications from your computer. Armed with this information, you should be better prepared to protect your system from the threat of spyware. Additional Resources The following resources provide more information about spyware and adware: 9 Ad-aware (www. lavas o ftu sa. c o m / d e fault, sh tml. e n). 9 Bradley, Tony. How to Analyze Ho'ackThis Logs (http://netsecurity.about.com/od/popupsandspyware/a/aahijackthis.htm). 9 HijackThis (www. spyware info. c o m / ~ m e rij n / programs, p h p). 9 Kroeker, Kirk. Beyond File Sharing:An Interview with Sharman Networks CTO Phil Morle. E C T News Network, Inc.'s TechNewsWorld. January 21, 2004 (www. technewsworld, corn/story/32641, html). 9 So How Did I Get InfectedAnyway? (http: //forums.spywareinfo. com/index.php?act- SF&f-7). 9 Spybot Search & Destroy (h ttp://spyb o t. safe r-ne tworking, de / en/). 9 SpyCop (http: / / spyc op. corn/). www.syngress.com t.rl This Page Intentionally Left Blank Chapter I 0 153 154 Chapter 10 9Keeping Things Secure Introduction The care and feeding of your computer is an ongoing process, not a product or event. Some people believe that their computer must be secure because it came with antivirus software installed. What they fail to realize is that new vulnerabilities are discovered and exploits created daily. Your antivirus software, operating system, and other applications are only as strong as their last update. If it has been a week since you last updated, your system is potentially vulnerable to any threat that has been created or discovered in the past seven days. It is imperative for the security of your computer that you regularly update products such as your antivirus, personal firewall, and anti-spyware software.You should also apply patches and updates for your operating system and applications to make sure they are protected against known vulnerabilities. Even in the absence of actual threats to the security of your computer system, a computer requires regular maintenance and upkeep. Just like your car needs to have the oil changed, the air filter replaced and the windshield washer fluid refilled periodically, the computer needs some basic cleaning and tuning to keep it running smoothly. Removing unnecessary files and defragmenting your hard drive are two tasks that can speed up your PC and extend its lifespan at the same time. This chapter will cover the different tasks you need to perform for regular computer maintenance as well as the applications and services that you must keep patched and updated to maintain a secure computer. In this chapter, you will learn how to do the following: 9 Maintain your hard drive through Disk Cleanup and Disk Defragmenter. 9 Erase your pagefile to protect your personal information. 9 Patch and update your computer against new vulnerabilities. 9 Use the Windows XP Security Center to monitor security. 9 Keep your antivirus and firewall software up to date. General PC Maintenance Maintaining your hard drive may not seem like it has much to do with security. In part, this is true. Defragmenting your hard drive will help it run smoother and last longer and increase the overall speed and efficiency of your computer, but it won't do anything to make your PC more secure. Keeping Things Secure 9Chapter 10 Defragmenting your data will not make it more secure, but it will improve performance and increase the speed of your computer. Slow computer performance is one of the primary indicators of malware infection or computer compromise, so anything that helps keep your hard drive humming along is a good thing and keeps you from being overly paranoid about security. Disk cleanup may not seem like it has anything to do with security either. However, this general PC maintenance task can help protect your computer system and your personal information. Part of the process of performing Disk Cleanup on a Microsoft Windows XP system is to clean out temporary files and Internet cache files and other data remnants that might be lurking on your computer harboring sensitive or confidential information that an attacker could potentially gain access to. Disk Cleanup As you use your computer each day, there are a variety of files that get used or written to your computer that can contain sensitive information. Most of these files are not meant to be kept long term. In fact, they can't even be viewed or accessed like normal files. But, the information is still there and a knowledgeable attacker may be able to locate it and decipher the contents to learn valuable information about you or your computer system. Files like the temporary Internet files or the temporary files within Windows are two common areas where sensitive information might be lingering. The Recycle Bin may also hold data that you thought you had gotten rid of, but is still hanging around on your hard drive. To clear out this data and keep your hard drive uncluttered by useless, unnecessary, and possibly damaging data, you should perform Disk Cleanup once a week. To begin Disk Cleanup, click Start I All P r o g r a m s I Accessories I S y s t e m Tools I D i s k Cleanup.You will see a window like the one in Figure 10.1. W h e n you first start Disk Cleanup, you must choose the drive you want to clean. 155 156 Chapter 10 9Keeping Things Secure Figure 10.1 Selecting the Drive You Want to Clean Disk Cleanup works only on hard drives, and it only cleans up one drive at a time. If you have more than one hard drive, or your hard drive is partitioned into multiple drives, you will have to run Disk Cleanup separately for each drive that you want to clean. After you select the drive you want to clean and click OK, Windows will analyze the drive. This can take a minute as Windows checks all the files on the drive to determine which ones should be compressed or deleted. While it is thinking, you will see a window with a progress bar so you can see that things are moving along. After the analysis is completed, Disk Cleanup will display the results and let you know how much space you can potentially free up on your hard drive by completing Disk Cleanup. The display (see Figure 10.2) begins with statement about the total disk space that can be freed up and lists the different types or areas of data that can be removed along with the total space that you can potentially free up by removing them. Figure 10.2 Results of Analysis with Disk Cleanup Keeping Things Secure 9Chapter 10 Check or uncheck the different boxes to choose which data you want to get rid of and which you want to hang on to.You can click on each one to view a short description of it to help you determine what you want to do. After you finish selecting, click O K to begin the Disk Cleanup process. This can take some time, particularly if you have selected to compress old files. Erase the PageFile Windows uses part of your hard drive space as "virtual memory." It loads what it needs to load into the much faster R A M (random access memory), but creates a swap, or page, file on the hard drive that it uses to swap data in and out of R A M . The pagefile is typically on the root of your C: drive and is called pagefile.sys. Pagefile.sys is a hidden system file, so you won't see it unless you have changed your file viewing settings to show hidden and system files. Virtual memory enables Windows to open more windows and run more programs simultaneously while keeping only the one being actively used in R A M . The pagefile can be a security risk as well, though. The issue is the fact that information remains in the pagefile even after the program or window is shut down. As you use different programs and perform different functions on your computer, the pagefile may end up containing all sorts of potentially sensitive or confidential information for an attacker to discover. To reduce the risk presented by storing information in the pagefile, you can configure Windows XP to erase the pagefile each time you shut down Windows. Click Start I C o n t r o l Panel. From the Control Panel, select A d m i n i s t r a t i v e Tools I Local S e c u r i t y Policy to open the Local Security Settings window (see Figure 10.3). The Local Security Settings window enables you to customize the local security policy settings, including clearing the pagefile on system shutdown. Double-click S h u t d o w n : Clear V i r t u a l M e m o r y Pagefile, and then select the E n a b l e d radio button. Click O K and close the Local Security Settings window. From now on, when you shut down Windows, the pagefile will automatically be cleared as well. 157 158 Chapter 10 Figure 9Keeping Things Secure 10.3 The Local Security Settings Window Disk Defragmenter When you first write a file to your hard drive, your computer does its best to keep all the data together on the disk. However, as data is read, deleted, rewritten, copied, and moved, a single file may end up scattered across the entire drive with a few kilobytes of data here and a sector or two there. This file fragmentation can degrade performance and reduce the overall longevity of the hard drive. When you access a fragmented file, the hard drive has to work double-time to bounce all over the place and put the pieces of data back together instead of just reading the data in order in one place. To cure this, you should periodically defragment your hard drive. The Windows Disk Defragmenter utility can be found in System Tools. Click Start I All Programs I Accessories I System Tools I Disk Defragmenter (see Figure 10.4). At the top of the Disk Defragmenter console is a list of the drives available for defragmentation. Initially, you have only two choices for what to do with those drives. After you select a drive, you can simply dive right in and start defragmenting by clicking Defragment, or you can click Analyze to have Disk Defragmenter take a look and let you know just how fragmented your disk is. The Windows Disk www.syngress.com Keeping Things Secure 9Chapter 10 Defragmenter uses a color-coded representation to illustrate how fragmented the selected drive is. Figure 10.4 The Windows Disk Defragmenter Utility If you do select Analyze, the Disk Deffagmenter will take a look and let you know if it is worth your while to defragment the drive at this time. Before you actually start a deffagmentation, you should be aware that the process takes a toll on system resources.You can still use your computer, but the drive will be chugging away as fast as it can, moving and juggling pieces of files to get them back in order on the drive.You will probably notice that your computer is much slower and less responsive while it is in the process of defragmenting. It is best to start the defragmenting utility when you are done using the computer for the day or stepping away for a lunch break or something. Sched u led Tasks If you leave your computer on overnight, it may be best to simply create a Scheduled Task in Windows to run the Disk Defragmenter automatically while you sleep. Using a Scheduled Task will not only execute the defragmenting when you aren't busy using the computer but also ensure that your hard drive is defragmented on a regular basis without you having to manually initiate it. To create a scheduled task, click S t a r t I All P r o g r a m s I A c c e s s o r i e s I S y s t e m Tools I S c h e d u l e d Tasks. In the Scheduled Tasks console, click A d d Scheduled Task.You can then follow the wizard to create your task (see Figure www.syngress.com 159 160 Chapter 10 9Keeping Things Secure 10.5). The wizard displays a list of programs to choose from, but you can also browse and select virtually any executable to use for your scheduled task. Disk Deffagmenter does not typically show up on the list of programs to choose from in the wizard.You will need to click the Browse button and find the file manually. The file is called deffag.exe and is located in the System32 directory under Windows on your hard drive. After you select the file to execute, you can provide a name for your scheduled task and choose the frequency for performing it. I recommend that you schedule Disk Deffagmenter to run at least monthly, or possibly even weekly.You will need to supply a username and password for an account that has permission to run Disk Defragmenter. F i g u r e 10.5 The Add Scheduled Task Wizard If you click Finish on the next final screen of the wizard, the Disk Deffagmenter utility will run at the scheduled time, but it will just open the utility rather than actually initiating drive defragmentation.You must specify the drive you want to defragment in the command line for the scheduled task. If you have multiple drives or partitions, you will need to create a separate scheduled task to deffagment each one. O n the final screen, make sure you check the box next to O p e n a d v a n c e d p r o p e r t i e s for this task w h e n I click Finish, then click Finish. In the R u n field of the Advanced Settings, type a space at the end of the command and then add the drive letter you wish to defragment, such as C: (see Figure 10.6). Click O K to close Advanced Settings and you are done creating the Scheduled Task to defragment your drive(s). Keeping Things Secure 9Chapter 10 F i g u r e 10.6 The Run Field of Advanced Settings Patches and Updates When it comes to keeping your computer secure, keeping it patched and updated is arguably the most important thing you can do. Antivirus, anti-spyware, and personal firewall software all contribute to the security of your computer system, but malware and exploits typically take advantage of known vulnerabilities. If your computer was patched so that the vulnerabilities no longer exist, the malware would not be able to function in most cases. Microsoft provides a number of ways for you to stay informed about the latest vulnerabilities and patches so that you can protect your computer: 9 A u t o m a t i c U p d a t e s Windows has a feature called Automatic Updates which, as its name implies, automatically checks for new patches that affect the security of your computer system.You can configure Automatic Updates to download and install new updates, just download them, but leave the installation to you, or to simply notify you when new updates are available. 9 W i n d o w s U p d a t e Site Automatic updates only works for critical patches or updates that affect security. For patches that affect simple functionality, or updates to device drivers and such, you have to periodically visit the 161 162 Chapter 10 9Keeping Things Secure Windows Update site. Click Start I A ll P r o g r a m s I Windows Update. Follow the prompts on the site to let Windows Update scan your system and identify the patches or updates that affect your computer.You can choose whether to use Express, and let Windows Update patch your system automatically, or use Custom, which lets you pick and choose which patches you want to apply. 9 M i c r o s o f t S e c u r i t y Bulletins The second Tuesday of each month is Microsoft's "Patch Tuesday."This is the day they release all their Security Bulletins, and related patches, for the month. O n rare occasions, if a new vulnerability is discovered and actively being exploited in the wild, Microsoft will release a Security Bulletin out of cycle. But, to stay informed you should mark your calendar or subscribe to receive the notifications from Microsoft when new Security Bulletins are released. Microsoft offers a Microsoft Security Newsletter for Home Users (www.microsoft.com/athome/security/secnews/default.mspx), or you can stay informed using Really Simple Syndication by adding the Security At H o m e P,.SS Feed (www.microsoft.com/athome/security/rss/rssfeed.aspx) to your RSS reader. 9 Updating Other Applications There are far too many vendors and applications for us to cover them all. Many vendors have built-in methods to automatically check for current updates. Where possible, I recommend that you use these features.You can also sign up with vendors to receive notices or alerts when patches or updates are available.You can also use security sites such as Secunia (http://secunia.com) to stay informed of vulnerabilities that affect your operating system or applications. For more in-depth information, see Chapter 4, "Patching." Windows XP Security Center The Windows XP Security Center provides a sort of one-stop shopping information dashboard for the security status of your computer. Using a standard Green/Yellow/Red system, you can tell at a glance if your personal firewall, automatic updates, and antivirus software are up-to-date (see Figure 10.7). To get more information on the status of your computer, click the options in the Windows XP Center. The Security Center recognizes most personal firewall and antivirus applications, so status will still be reported as Green as long as you have something installed. The www.syngress.com Keeping Things Secure 9Chapter 10 Security Center will report status as Yellow or R e d on your antivirus software, though, if the software has not been updated recently. W h e n the Windows XP Security Center detects an issue that affects the security of your computer, it will also notify you with a pop-up alert from the systray at the lower-right corner of your screen. If your personal firewall or antivirus software is not green, you should check the software to make sure it is running properly and has current information for detecting the latest threats from the vendor. You can use the links on the left of the screen to access more security information and resources from Microsoft. There is a link to get the latest virus and security information and also a link to access the Windows Update site to get the latest patches and updates for your computer. F i g u r e 10.7 Options in the Windows XP Security Center 163 164 Chapter 10 9Keeping Things Secure Summary Installing security software and configuring your computer to be more secure are both valuable accomplishments. However, security is a process, not an event, and it requires ongoing awareness and maintenance to keep your computer secure. In this chapter you learned about some basic computer maintenance tasks such as Disk Cleanup and Disk Deffagmenter and how to erase your pagefile. Some of these tasks are not directly related to security, but they do keep your system running smoothly, which stops you from falsely believing your computer has been infected by malware. We also talked about ensuring that you keep your computer patched and updated. This applies not only to the operating system, but also to the other applications that you use.You learned that most malware and other malicious attacks use exploits of known vulnerabilities and that by patching your computer you can protect it from those attacks. Lastly, we had a short overview of the Windows XP Security Center. We discussed how the Security Center is a dashboard for monitoring the current state of security on your computer and that it provides useful information and links to resources that you can use to keep your system secure. Additional Resources The following resources provide more information on how to keep your computer secure: Bradley, Tony. Automatically Erase Your Page File. About.com (http://netsecurity. about, com/od/windowsxp/qt/aa071004.htm). Description of the Disk Cleanup Tool in Windows XP. Microsoft.corn (http: //supp ort. microsoft, com/kb / 310312/). How to Defragment Your Disk Drive Volumes in Windows XP. Microsoft.corn (http: //support.microsoft. com/kb / 314848/). How to Schedule Tasks in Windows XP. Microsoft.com (http://support.microsoft.com/?kbid=308569). Manage Your Computer's Security Settings in One Place. Microsoft. com. August 4, 2004 (www.microsoft.com/windowsxp/using/security/internet/sp2_ wscintro.mspx ). www.syngress.com Chapter 7 1 165 166 Chapter 11 9When Disaster Strikes Introduction No matter how much time, effort, and technology you put into securing your computer or network, it is almost inevitable that something will eventually infect your system or compromise your data. To minimize the impact that such events have on you, it is important to take the proper steps to protect your data. There are some steps you must take in advance if you want to be able to recover from a security incident, and others that you should take once you think your computer has been compromised in order to clean it up system and to get it back up and running as quickly as possible. Check the Event Logs One of the first places you should look if you suspect that something is amiss is the Windows Event Logs. Most users don't even know that the Event Logs exist, and even those who do often forget to use them as a troubleshooting resource. The Event Logs contain information and alerts regarding virtually any aspect of the Windows operating system. There are different categories of Event Logs. Some applications add their own auditing and logging functionality into the Windows Event Viewer, but by default the categories of logs are Application, Security, and System. To access the Event Viewer, which lets you see the log entries, click Start I C o n t r o l Panel I Administrative Tools I Event Viewer. If you click Security in the left pane, the entries for security events will appear in the right pane of the Event Viewer console (see Figure 11.1). The Event Viewer Console displays the logs for different categories of events, providing information about access, execution, and errors, among other things. The catch with logging in the Event Viewer, particularly when it comes to events in the Security category, is that Windows will capture log data only for the events it is configured to monitor. By default, none of the security event auditing is enabled in Windows XP Professional, but Windows XP Professional provides control over how event logging is done. When Disaster Strikes 9Chapter 11 Figure 1 1.1 The Event Viewer Console Enable Security Auditing To enable Security event logging in Windows XP Professional, click Start ] Control Panel ] Administrative Tools ] Local Security Policy. In the left 167 168 Chapter 11 9When Disaster Strikes pane of the Local Security Settings console, click the plus sign (+) next to Local Policies, then click A u d i t Policy (see Figure 11.2). The Local Security Settings Console allows you to specify various security policy options, including which security events to include in auditing and logging. Figure 11.2 The Local Security Settings Console For each of the events listed in the right pane, you can configure Windows to disable event auditing, audit successful events, audit failed events, or audit both success and failure events. For example, if you enable Success for Audit account logon events, a log entry will be created each time an account logs onto the system successfully. If you enable Failure on the same setting, Windows will create a log entry every time an account logon attempt fails. www.syngress.com When Disaster Strikes 9Chapter 11 After a suspected attack or compromise of your computer, you can review the Event Viewer Security logs for signs of suspicious or malicious behavior. Either Success or Failure alerts could provide useful information depending on the scenario. If you find Successful account logon entries at a time that you know for sure you did not use your computer, it demonstrates that perhaps someone else has gotten your username and password. If you find Failure entries for account logon in the Event Viewer, it shows you that an attacker has been attempting to gain access to your system. These are examples of some entries that you might find suspicious and that could help you determine if your system was compromised, and if so, identify who, when, or how it happened. At first you might think it makes sense that you would want to audit all events, Success and Failure.You have to keep in mind that the monitoring and logging of each and every event takes its toll on the computer processor and uses m e m o r y resources, impacting the overall performance of the computer. Also, the log data takes up space on the hard drive. Logging every single event may cause your log data file to quickly fill up or grow larger than you can effectively manage. The trick is to find a good balance between monitoring and logging the events that will be most useful in identifying issues without affecting system performance or filling your hard drive. For home users, we recommend that you configure Audit Policy to monitor and log the Security events shown in Table 11.1. Table 11.1 Security Events A u d i t Policy Audit Audit Audit Audit Audit Audit account Iogon events account management directory service access Iogon events object access policy change No Auditing Failure X X X X X X X Audit privilege use X Audit process tracking X Audit system events Success X X www.syngress.com 169 170 Chapter 11 9When Disaster Strikes Review Your Firewall Logs If you don't find any evidence of suspicious or malicious activity in the Event Viewer logs, you can take a look at the logs for your personal firewall software. Admittedly, the information is more cryptic than most home users will be able to understand, but with a little bit of effort and maybe a few Google searches, you might be able to weed out specific log entries that help identify where or how a problem originated. If you are using the Windows Firewall, logging will need to be enabled just like the Security event logging. To turn on logging for the Windows Firewall, click Start ] C o n t r o l Panel ] Security Center, and then click the Windows Firewall link at the bottom of the Security Center console. In the Windows Firewall properties console, click Advanced, then select Settings (next to Security Logging) to open the Log Settings window. On the Log Settings window, you can choose to log dropped packets and/or successful connections.You can specify what the log file should be called, where you want it to be located, and what the maximum size is before it begins to overwrite itself (see Figure 11.3). Figure 1 1.3 The Windows Firewall Log Settings The resulting log file generated by the Windows Firewall is simply a TXT file that can be viewed in Notepad or any other text editor program. The information provided includes the time and date of the log entry, source IP address and port, destination IP address and port, the protocol being used, and some advanced information that is typically blank in the logs anyway. Because the information is in a T X T file, the columns don't line up well and it can be difficult to match up the information with the column it belongs in. Other personal firewall software, such as the personal firewall component of Trend Micro's PC-cillin Security Suite (see Figure 11.4), www.syngress.com When Disaster Strikes 9Chapter 11 provides a more graphical log viewer that makes it easier to tell which information belongs in which column. Figure 1 1.4 The Trend Micro PC-cillin Personal Firewall The firewall logs typically show the source and destination IP address and the source and destination port for traffic to or from your computer. Some personal firewalls provide more details, such as what network protocol is being used, the application generating the traffic, or a description of what the potential issue is. As I stated, this information is more complex and confusing than most home users will be able to handle. However, you may be able to isolate specific traffic that seems suspicious based on the application being used or the time of day the log entries were made; this information may help you determine how or when your computer became infected or compromised. Scan Your Computer Scanning through firewall logs or reviewing entries in the Windows Event Viewer may both be too technical for an average user. If analyzing log data seems more involved or complex than you would like, you probably should start by scanning your system using your antivirus and/or antispyware software. www.syngress.com 171 172 Chapter 11 9When Disaster Strikes If you notice that your system is acting weird or is unusually slow, or you just have reason to suspect that something isn't quite right, run a manual virus and spyware scan of your computer (see Figure 11.5).You should be aware up front that full system scans generally take quite a while to complete and that they are very m e m o r y - and processor-intensive. In other words, you should plan on taking a coffee break or something while the scan is running because it will probably be difficult to do anything productive with the computer during this time. Figure 1 1 . 5 Running a Full Manual Scan of Your Computer with Your Antivirus Software Before you even start running a virus or spyware scan, verify that you have the most current version of the virus or spyware signatures from your software vendor. There is no point in scanning your system with information from last week if the malware that compromised your machine was just discovered yesterday. In some cases, you actually may want to reboot the computer into Safe Mode in order to execute the scan. The reason is that some malware can hijack or shut down processes that your antivirus or antispyware software needs to do the scan. There are also some malware threats that are tenacious and can't be removed or cleaned up while they are still running in memory. Booting the computer into Safe Mode allows only the bare m i n i m u m processes to run, which blocks malware that is programmed to run at Startup from being able to start. www.syngress.com When Disaster Strikes 9Chapter 11 Restore Your System Windows XP does provide a very useful feature w h e n it comes to troubleshooting and repairing issues with the computer system. The System Restore feature lets you essentially go back in time to when the computer was still running smooth and happy. If you know approximately when you started noticing issues with your computer or w h e n you think your computer may have become infected, you can simply revert to an earlier system restore point to undo the damage. Click Start I All P r o g r a m s I Accessories I System Tools I System Restore to open the System Restore console.You can use the System Restore console either to return your system to a previous state or to mark a new system restore point (see Figure 11.6). Installing new software in Windows generally creates a new system restore point automatically, but you can also manually create a system restore point before you make configuration changes as a safety net to let you undo your changes if something goes wrong. F i g u r e 1 1.6 The System Restore Console If you click Restore m y c o m p u t e r to an earlier time and then click Next, the System Restore utility will display a calendar. The days that have system restore points saved will be bold.You can click a date, then select the system restore point you want to use and click Next. www.syngress.com 173 174 Chapter 11 9When Disaster Strikes The final screen warns you that Windows will shut down and reboot as a part of the System Restore process, and that any programs you have installed since the system restore point was created will be lost. It also reassures you that any data files will be retained though, so you won't lose Word documents or Quicken financial data by reverting to a previous system restore point. Start from Scratch If your computer is in fact infected or compromised in any way, hopefully your security software, such as antivirus and antispyware applications, will be able to identify and remove the problem. Depending on the threat, though, simply "cleaning up" may not be sufficient. For the majority of viruses, worms, and spyware, simply detecting and removing the malware are all that is needed. However, once a system is infiltrated it is sometimes difficult to tell exactly what has or has not been compromised.Your antivirus software may remove the detected malware, but fail to recognize backdoor or rootkit software left behind by the attacker. If you are not confident that your computer is completely free of malware threats and that no malicious applications are still lingering on your computer, www.syngress.com When Disaster Strikes 9Chapter 11 allowing an attacker to access or control your computer, you should consider simply starting over. Make sure you have backed up your personal data, and then simply reinstall the Windows operating system from scratch. Before you blow away your computer system, you should make sure you have at least Service Pack 2 available on a CD so that you can install it without having to connect to the Internet. Once you reinstall the operating system, you will need to visit the Windows Update Web site or use Automatic Updates to get caught up on vulnerability patching again. Restore Your Data As a matter of regular system maintenance and data protection, you should be backing up your personal or critical data on a regular basis. Only you can decide how often is good enough. For a small business, backing up daily to ensure customer data and transactions are protected may make sense. But, if you are a home user who cares about protecting only your personal financial information and you only do your bills monthly, a monthly backup may suffice. Regardless, it is critical that you back up your data. It is an area where Murphy's Law is almost guaranteed to bite you. If you back up your data, you will probably never need it. But, if you do not back up your data, you are inviting catastrophe to strike and it is only a matter of time before some malware or just a plain, old-fashioned hard drive failure wipes your data out. For the sake of argument, we'll assume that you have been backing up your data on a regular basis.You might be using a third-party backup product such as Backup For One or WinBackup, or you might be using the built-in backup utility that comes with Windows XP (see Figure 11.7). Whatever method you have used, you will need to follow the vendor instructions for restoring your backed-up data once you complete the fresh installation of your operating system. Call In the Pros Between System Restore or simply reinstalling the operating system and restoring your data from backup, most home users ought to be able to remove or undo whatever program or configuration change is causing the problem and get back to using the computer. 175 176 Chapter 11 Figure 9When Disaster Strikes 1 1.7 The Built-in Backup Utility in Windows XP For businesses however, there may be other legal implications involved. Businesses may be governed by a variety of computer security regulatory requirements, which dictate how customer or financial data must be stored and protected and what to do if you suspect that data may have been compromised. For small office / home office computers that you suspect may be infected or compromised in some way, you should seek professional help to make sure that laws are followed and that all proper steps are taken to clean the system, collect evidence to identify the attacker, and notify any customers whose personal or confidential data may have been compromised. Summary If you have followed the advice in the rest of the book, you would hopefully not need to worry about a disaster. But, even with the best of security, it is entirely possible that your computer may someday become infected or compromised by malware or an attack of some sort. This chapter walked you through some of the steps you can take to identify and remove any threats from your computer when an attack or security breach occurs. You learned how to configure and use the Windows Event Viewer to review Security logs and how to analyze your personal firewall logs for signs of intrusions or suspicious activity. The chapter also discussed running a manual scan of your computer for viruses, spyware, or other malware, including how to do so in Safe Mode for particularly tenacious threats.You also learned that you can use System Restore to go back in time to undo problems, although sometimes it is best simply to reinstall the oper- www.syngress.com When Disaster Strikes 9Chapter 11 ating system and restore your personal data in order to be completely sure that your computer is clean and safe. Lastly, we talked about calling for professional help, especially in the case of a business where private or personally identifiable customer information may have been compromised. Businesses are governed by a variety of computer security regulations that dictate how security breaches should be handled. Additional Resources The following resources provide more information on topics covered in this chapter: 9 Backup for One. Lockstep Systems, Inc. (www.backup-forone. c o m / i n d e x , html). 9 Bradley, Tony. How to Configure the Windows X P Firewall. About.com. (http"//ne ts e curity, about, com/od/s e curingwindowsxp / qt/aaqtwinfirewall, h tm). 9 Bradley, Tony. How to Enable Security Auditing in Windows X P Pro. About.com (http: / / nets e curity, about, corn/cs/tutorials/ht/ht040503, htm). 9 How to restore the operating system to a previous state in Windows XP. Microsoft.com. (http://support.microsoft.com/kb/306084/EN-US/). 9 How to use Backup to restorefiles and folders on your computer in Windows XP. Microsoft.com. (http://support.microsoft.com/default.aspx?scid=kb;%5Bln%5D;309340). 9 To Start the Computer in Safe Mode. Microsoft's Windows XP Professional Product Documentation. (www. micro so ft. corn/resources / do cumentation/windows/xp / all/proddocs/en-us/boot_failsafe.mspx?mfr= true). 9 WinBackup. Uniblue Systems Ltd. (www.liutilities.com/products/winbackup/). 177 This Page Intentionally Left Blank ...lh ",,,I I,D bO I'D gJ t~ 180 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop Introduction The primary focus of this book has been on how to secure and protect computers that are running Microsoft operating systems, specifically Windows XR Although you won't typically find them preinstalled on the computer system you buy at the local electronics retail giant, there are alternatives out there. Microsoft has taken a lot of heat for the vulnerabilities and weaknesses in its software security, and it is a favorite target of attackers. Some security experts suggest simply using other products such as a version of the Linux operating system. When it comes to discussing Linux, most end users are not very interested in what vendors or consultants focus on (i.e., the advantages that appeal to the "propeller head"). The tech set focuses on selling points such as system stability, the possibility of enhanced security, and the fact that Linux can save companies money on licensing. However, most end users simply care about their desktop experiences. Users state that they want a desktop that is "intuitive" and "easy to understand." What they are implying, however, is that they want a desktop similar to what they already know. One of the things that Microsoft and Apple ihave done admirably is to convince end users that their interfaces have always been intuitive and easy to use, even though these companies have changed these interfaces radically over the last 10 years. End users want to know how to access productivity applications once they have logged on. They want to know how to locate files on the hard drive and open them with the proper application. They really tend to care very little about anything else. So, in this chapter, you will learn about choosing the proper desktop environment and window manager.You will learn which e-mail, personal information management (PIM) and Web browser applications are optimal for to migrating from applications such as Outlook, Outlook Express, and Internet Explorer. Because you want to open Word, PowerPoint, and Excel files, you will need to know the ideal Linux office suite, as well as additional open-source solutions. By the end of this chapter, you will know how to ensure that you will be able to remain productive on your desktop. Common Desktop Environments At one time, U N I X versions (like other operating systems of the day) did not have a graphical user interface (GUI). By the time Macintosh and Windows appeared, U N I X systems had become somewhat obscure to the average end user. www.syngress.com Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 With the increasing popularity of Linux, questions such as whether Linux uses the command line are becoming less common. Still, one of the first tasks end users face is choosing the right desktop environment. You will want to choose a desktop that you consider: 9 Easy to use (and easy to learn) 9 Easy to customize 9 Easy to upgrade O f course, "easy" is a relative term, but you will have to consider the relative benefits and drawbacks of the most common desktop environments. Remember, with any UNIX-based operating system, there is more than one way to do anything. You should get information from consultants who will provide you with a manageable set of choices. Ask consultants to justify the environments that they recommend to you. The most common desktop environments are Gnome (www.gnome.org) and KDE (www.kde.org). Additional environments exist, including the Common Desktop Environment (CDE) and Xfce. In the following sections of this chapter, we discuss each of these environments. We have one caveat for you, however: Please do not think that we are partial to any one of these desktops over the other. We prefer an environment provided by the Blackbox window manager, mostly because the interface is cleaner and does not imitate the Windows desktop. Making the "right" choice of a desktop environment depends on various factors. Avoid becoming a victim of the "Gnome versus KDE" wars. Have a consultant show you various desktop environments. Take a "test drive." Only then will you be able to make a relatively informed choice. So, as you read on, consider the relative strengths and weaknesses of each environment. Gnome The Gnome desktop was developed by The G N U Project (www.gnu.org), which is responsible for developing a wide array of software for various platforms, including Windows, Linux, and Macintosh. Figure 12.1 shows the Gnome desktop on a Red Hat Linux system. Understand, however, that the desktop shown in Figure 12.1 represents default settings. It is possible to customize your desktop so that it appears significantly different. Gnome offers users the following benefits: It is associated with The G N U Project (www.gnu.org). Consequently, Gnome is licensed under GNU's General Public License (GPL), which ensures that the code is created by open-source, freely available technology. r www.syngress.com 181 182 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop F i g u r e 12.1 The Gnome Desktop Environment 9 Many applications are written to Gnome or use Gnome libraries. Gnome prides itself in being the desktop environment that welcomes diverse development environments, including C, C + + , T c l / T k , and Python. Gnome's use of the GPL is also a contributing factor to the sheer diversity of applications available to Gnome. 9 The code is reviewed by the same team that works on projects such as GnuPG (essentially open-source PGP) and many other applications. 9 Gnome desktop developers have taken special steps to make sure that Gnome is accessible by the disabled. 9 If you want to use applications such as Galeon, Evolution, and GnomeMeeting, you might want to consider using Gnome as the default desktop. 9 Gnome is often considered cleaner because, by default, it provides fewer options. The Gnome desktop often does not appear as tightly integrated as KDE's desktop. Moreover, Gnome applications have traditionally been produced at a slower rate than KDE applications. However, many vendors have adopted Gnome because Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 of its association with GNU, which means that the software is more likely to remain open source. To learn more about Gnome, go to www.gnome.org. KDE For many, KDE appears to be the most similar to the Windows environment. Figure 12.2 shows the KDE environment in a R e d Hat Linux system. F i g u r e 1 2 . 2 Using KDE Compare Figure 12.2 with Figure 12.1. As you can see, R e d Hat took special pains to make both interfaces look remarkably similar. This does not have to be the case. KDE offers the following benefits: 9 Applications are tightly integrated.You can tell that the people who developed KDE set out from the start to design a desktop with a logical flow and a coherent organization. End users often feel that a KDE desktop provides access to more applications more quickly. 9 The KDE desktop provides well-written applications that allow you to configure networking easily. 9 If you like applications such as KMail and Konqueror, you might want to make KDE the default desktop. 183 184 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop One of the drawbacks of the KDE environment is that it tends not to invite diverse development, as does Gnome. Therefore, you may not find as many K D E compatible applications as in Gnome. KDE is based on the Qt GUI toolkit, and as a result, it was not based on GNU's GPL. This is no longer the case. Nevertheless, this history caused many developers to adopt Gnome, at least throughout the 1990s. In addition, there is a general perception that KDE runs slower than Gnome. Personally, we have found that both KDE and Gnome run slowly, compared with more Spartan environments, such as Blackbox, which is discussed later in this chapter. Common Features Both G n o m e and KDE have the following priorities: 9 Ease of use and customization 9 Support for multiple languages Both G n o m e and KDE support Windows-like menus. Experienced Windows users should feel comfortable quite quickly, as long as they know where to access the applications they need. Both KDE and G n o m e include their own versions of the "Start" application dialog box, which allows end users to launch applications that do not reside on the menu. Again, the best strategy for you is to experience both environments. Because both KDE and Gnome pride themselves in providing a full GUI environment, they can run quite slowly. Many people seem to have access to powerful, m o d e r n computers, so this is often not an issue. Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 Install Both, Make One the Default If disk space permits, install both Gnome and KDE. Then choose the desktop you want to use by default. Consequently, you can have access to both KDE and Gnome applications in either environment. Not every Gnome application is compatible in KDE, and vice versa. However, compatibility problems are increasingly rare. Conduct research about additional desktop environments and how to choose them. This way, you will be empowered to choose and customize your desktop environment. Alternative Window Managers The Xfce desktop environment was designed to run on any U N I X system, including Linux. It is also designed to be compatible with both Gnome and KDE. One of the features special to Xfce is that it supports "drag-and-drop" file management more completely than its competitors do. For more information on Xfce, go to www.xfce, org. Another alternative desktop environment is the C o m m o n Desktop Environment (CDE), which was developed by a team composed of employees from HP, Novell, Sun, and IBM. Sun Solaris systems have traditionally shipped with CDE. It is not a c o m m o n window manager. For more information about CDE, go to wwws.sun.com/software/solaris/cde/. The X Window System and Window Managers The X W i n d o w system was designed to provide a standards-based GUI environment. Thus, a developer who wants to create an X W i n d o w server simply needs to read c o m m o n standards. He or she can then create applications that conform to those standards. The X environment was designed from the beginning to be network compatible, meaning that it is possible to run an X W i n d o w session over the network. Consequently, using the X W i n d o w environment, you can connect to a remote system's X W i n d o w server to control it as if you were sitting directly in front of the remote system. An X W i n d o w server is responsible for making sure that the GUI environment is available. This environment is most often made available to the local system, but it can also be made available to remote systems. Thus, whenever you log on to the www.syngress.com 185 186 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop Gnome or KDE environment, you are running an X Window session. The Gnome or KDE environment is simply a client to the local system. Two primary implementations of the X Window environment exist: 9 X . o r g The X Window server used by the majority of Linux distributions, because it conforms to the GPL. 9 XFree86 Until roughly 2002, the default X Window server software for most platforms. However, XFree86 adopted a new license, dropping the GPL.As a result, many vendors and developers began supporting the X.org server. Figure 12.3 shows the X.org Web site. Figure 12.3 The X.org Web Site X Window Servers versus Window Managers A window manager mediates between the X server and the desktop environment. It is responsible for managing window toolbars and menus. It is also responsible for determining the position of applications as they are launched. Commonly used window managers include: 9 Metacity The default window manager for Gnome desktops, after version 8.0. 9 Sawfish The default window manager for Gnome versions 8.0 and older. Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 9 K W i n The default window manager for KDE. 9 Tab W i n d o w M a n a g e r ( T W B ) An older w i n d o w manager designed to provide only the necessary elements for a desktop. Often used during remote X sessions to ensure maximum compatibility with systems that may not have more ambitious window managers installed. 9 E n l i g h t e n m e n t At one time, Enlightenment was meant to be an upgrade to F ~ M . For some time, however, it has been an independent project. You can learn more about Enlightenment at www.enlightenment.org. 9 FVWM The latest version of F ~ M is F V W M 2 , available at www.fvwm, org. 9 A f t e r S T E P You can learn more about AfterSTEP at www.afterstep.org. 9 WindowMaker You can learn more about W i n d o w M a k e r at w w w . w i n - dowmaker.org. 9 B l a c k b o x Some support for KDE, but does not officially support Gnome. You can obtain Blackbox at http://blackboxwm.sourceforge.net. At least a dozen w i n d o w managers exist. Choose a window manager that makes sense to you. If you expect a full KDE environment that most closely imitates Windows, then you will want to use KWin. If you want a simpler desktop, you could use W i n d o w M a k e r or Blackbox. If you want a desktop that appears exactly like a Macintosh system, then choose Metacity. For more information about window managers, go to www.xwinman.org. Continued 187 188 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop Window Managers as Alternative Desktop Environments You are not limited to Gnome, KDE, C D E , and XFCE. Alternatives to the Blackbox w i n d o w manager are shown in Figure 12.4. Blackbox is quite different from both G n o m e and KDE. For example, it does not have Windows-like menus or taskbars. In addition, Blackbox is a window manager, and not simply a desktop environment. Figure 12.4 The Blackbox Environment www.syngress.com Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 You simply right-click on the desktop to make the menu appear.You can then select the applications you want to run. O n e of the benefits of an environment like Blackbox is that it is less resource intensive, and thus loads faster. We prefer speed in any case, mostly because we do not have the money to purchase a new system each time a G n o m e or KDE developer introduces a new process-hungry G U I feature. www.syngress.com 189 190 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop E-mail and Personal Information Management Clients E-mail and PIM have become closely related, because most people communicate their availability through e-mail these days. This section discusses e-mail and PIM software that will help you remain organized, even without Outlook. It has been our experience that most end users think Outlook is e-mail. Many people don't realize that they are simply using an application to send and get their email. So even if you you no longer use Outlook or Outlook Express, you still can use e-mail. If you aren't sure how e-mail exists outside of Outlook or Outlook Express, read the following sections. There is certainly no shortage of e-mail applications in the Linux space. Commonly used e-mail applications include: 9 Evolution 9 KDE Suite/KMail 9 Mozilla mail/Thunderbird 9 Aethera 9 Sylpheed Evolution Evolution is Gnome's default mail and PIM client. KMail and Evolution will run in any window manager you decide to use. They will also run inside the KDE, Gnome, or Blackbox environments. Figure 12.5 shows the Evolution e-mail interface. From here, you can send and receive e-mail. Evolution stores its files in the mbox format. If your username is james, look for e-mail in the directory/home/james/evolution/local, which contains directories for all of your mail folders. Inside each folder you will find a file called mbox, which is your mail in mbox format. Evolution also has PIM features, including the calendaring feature shown in Figure 12.6. Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 F i g u r e 12.5 Evolution and the E-mail Interface F i g u r e 12.6 Evolution Showing the Calendaring Interface Benefits of using Evolution include" It is developed by Novell, a company with a history of developing a solid customer base. It will run on any c o m m o n window manager (for example, KDE or Gnome). 191 192 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop It is designed to work with common groupware servers, such as Microsoft Exchange. Evolution, Microsoft Exchange, Novell GroupWise, and OpenExchange Evolution is unique in that it works well with servers created by other vendors. For example, Evolution's Connector for Microsoft Exchange allows you to take advantage of all features provided by Exchange. Similarly, plug-ins for Evolution allow it to act as a client for Novell GroupWise and Novell's OpenExchange servers.You can learn more about Evolution at www.novell.com/products/evolution. KDE Suite/KMail KDE's default mail client is called KMail. It can either be run by itself or built into Kontact, which makes it look more like Outlook. In KMail and most other mail clients, all your mail will end up in your home directory in a folder called Mail unless you are running IMAP. Inside your/home/user_name/Mail folder are all of your mail files such as inbox, trash, sent, drafts, and so forth. Copy the files over and make sure you set permissions correctly so that you have sole read and write permissions on them.Your Mail folder should look something like this: is -lh total /home/james/Mail IIM -rw ....... 1 james james 0 Aug -rw ....... 1 james james IIM -rw ....... 1 james james 0 Aug -rw ....... 1 james james 26K -rw- . . . . . . 1 james james 0 May 20 Aug 20 Aug 17 19:51 20 19:51 19:51 13 drafts 19:04 18:32 inbox outbox sent-mail trash Figure 12.7 shows the KMail application. Kontact Kontact is essentially KMail on steroids. It allows you to connect to the following groupware servers: Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 F i g u r e 1 2 . 7 KMail 9 Microsoft Exchange Currently, Kontact supports Microsoft Exchange 2000 only. For more information, go to www.microsoft.com. 9 Novell GroupWise Currently, Kontact supports version 6.5. For more information, go to www.novell.com. 9 e G r o u p W a r e A PHP-based groupware application designed by and for the open-source community, eGroupWare runs on Linux servers. For more information, go to www.egroupware.org. 9 The Kolab project Kolab is a groupware server first established by the German government. For more information, go to www.bsi.bund.de. Thus, KMail is a competitor (or should we say, kompetitor?) to Evolution.You can learn more about Kontact at www.kontact.org. Aethera Like Evolution, Aethera is an e-mail application with bundled PIM software, and it is licensed under the GPL. However, Aethera is designed to support only the Kolab groupware server as of this writing. Figure 12.8 shows Aethera's calendaring feature. 193 194 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop Figure 12.8 Aethera's Calendaring Feature Aethera is a GPL application, and is considered quite reliable. However, its limited groupware support may be a problem for those companies that do not want to migrate to a Kolab server.You can learn more about Aethera at www.thekompany, com/proj ects/aethera/index.php3. Mozilla Mail/Thunderbird Mozilla Mail, shown in Figure 12.9, is bundled in with the Mozilla Web browser and Composer, a GUI H T M L editor. Mozilla Mail is a capable e-mail client, and supports SMTP, POP3, and IMAP. Figure 12.9 Mozilla Mail Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 Mozilla Mail is extremely common, and it is a stable product. Because it is bundled with an H T M L editor and a browser, it is a perfect recommendation for companies that want an integrated suite. Many companies will find that their end users can take advantage of the H T M L editor, and the Web browser.You can learn more about Mozilla Mail at www.mozilla.org. We also discuss Mozilla Mail in the section of this chapter titled "Migrating Mail." Thunderbird Even though Thunderbird is also created by the developers at Mozilla.org, it uses different code than Mozilla Mail does. Thus, Thunderbird deserves to be treated as a different application. Figure 12.10 shows the Thunderbird application. F i g u r e 12.10 Thunderbird Application Thunderbird does not support groupware servers, loads fast, and has a small footprint, making it ideal for those who need a stand-alone e-mail application.You can learn more about Thunderbird at www.mozilla.org. Sylpheed Sylpheed, shown in Figure 12.11, is one of many e-mail applications that exist in the market. It does not have groupware or scheduling features. However, it does one thing quite well: it supports PGP and GPG. Although many clients say that they support PGP and GPG, few work as well as Sylpheed. 195 196 Chapter 12 Figure 9Microsoft Alternatives: Inside the Linux Desktop 12.1 1 Sylpheed Thus, if you need to use PGP or GPG, consider Sylpheed. To learn more about Sylpheed, go to http://sylpheed.good-day.net. Sylpheed's creators have focused on making sure that it supports IPv6, which is the next version of IP, designed to improve security. Essential Information N o matter what client you plan to use, you will need the following information: 9 The S M T P server name or IP address 9 The P O P 3 or IMAP server name or IP address 9 User authentication information (for example, username and password) Take the time to write down this information so that it is handy. As you conduct a migration, you will not want to repeat this information constantly to those w h o are helping you. E-mail and PIM Software Don't think that you have to receive just one recommendation from a consultant for e-mail or a PIM application. In many cases, you may have to install multiple applications to get what you want. For example, you may need to use Evolution to connect to your company's Exchange server and use your calendars, but use KMail in order www.syngress.com Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 to use your Internet e-mail. It is more likely, however, that you will want to standardize to use of one application. If you preferred Outlook, you will probably prefer Evolution. If you already use the Windows Mozilla/Netscape/Thunderbird variants, you will find it very easy to make a transition over to their Linux counterparts. If you are still using Eudora, you will likely choose KMail, as it has a relatively similar look and feel. All these applications are all quite stable and feature rich. Migrating Mail If you are using something other than Outlook for your mail, you may not have to convert your e-mail format, as your mail is most likely already in an mbox format. However, if you are using Outlook, you have to convert the format in which your mail is stored. There are five ways to do this. We will start with the easiest, and move to the "if all else fails" way last. Depending on the version of client that is in use, you might have to upgrade before you can move the mail. This part of the migration can take a long time per person if you need to migrate thousands of e-mails per client. One of the best ways to ensure that you have time for a proper migration is to plan a staged migration, which involves using multiple applications to convert your e-mail.You may find that you cannot export mail directly from a Windows e-mail application and then import it into a Linux application.You will find that you must first export e-mail into an intermediary e-mail client that can then export your email into the format required by the e-mail application you want to use. Now, let's look at the steps necessary when migrating from Outlook and Outlook Express. Migrating from Outlook or Outlook Express The first step is to back up your e-mail in case you have any problems. In Outlook, you want to export your e-mail messages to a single .pst file. This step is done by clicking on File [ Import and Export to bring up the Import and Export Wizard dialog box.You then select Export to a file, as shown in Figure 12.12. After clicking Next, choose Personal F o l d e r File (.pst). Then, select the top of the tree by clicking on Personal Folders and make sure to select the check box Include all subfolders. Make sure that you remember where you save the backup.pst file. As you save the file, do not export your backup using any encryption, compression, or password protection. If you do, the import process will fail.You can now import the file into Mozilla. www.syngress.com 197 198 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop Figure 12.12 The Microsoft Outlook Import and Export Wizard Window Importing Outlook Mail into Mozilla Now, install Mozilla on the Windows desktop system. Make sure you select Mozilla and not Firefox or Thunderbird for this step, even if you do not plan to run Mozilla at the end of the process. First, install Mozilla and select C o m p l e t e when asked which components you want to install.You do not need to tell the system to make Mozilla the default browser or e-mail client. Once it's installed, start MoziHa and click on Windows]Mail & N e w s g r o u p s . Y o u do not need to fill in the settings in the account wizard that will pop up.You can import these into Mozilla from Outlook if you're so inclined; it will appear as a second account. Once you have the account set up you need to import the old mail out of Outlook into Mozilla. Now, do the same for the settings and the address book. If you prefer, you can just export the address book in .csv format from Outlook or Outlook Express and import it into Mozilla the same way as the mail. To do so, click Tools IImport on the Import screen, select Mail, and select the mail client your importing from; it will do the rest. Once you have completed these steps, you will have your mail converted from a .pst format to a standard mbox mail format. In our case, the imported mail folders end up in C:\Documents and Settings\james\Application Data\Mozilla\Profiles\default\033c70c 1.sit\Mail\Local Folders\Outlook Mail.sbd\Inbox.sbd. Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 Inside this folder are all the folders that existed in the O u t l o o k client.You will notice you have two files for every folder: the mail file itself and an index of what is in the file. If you try to open the file without the .msf extension in something such as Notepad, you will see it's a standard mbox mailfile. Some people have reported that Mozilla does not do the conversion. N o w you can copy all of these files over to the new system in whatever fashion you p r e f e r ~ b u r n them to a CD, FTP them to the server, or use winscp to copy them over to the new system. LibPST LibPST is a Linux application that converts PST files into Mozilla-compatible mbox files. Therefore, once you have generated a PST file, you simply install and use LibPST on your Linux system to prepare the contents of your PST file for use with Mozilla.You can obtain LibPST from http://sourceforge.net/projects/ol2mbox. LibPST is ideal if you have a particularly large PST file that you need to convert. In many cases, Mozilla will fail to process it using its own conversion utility. Importing Outlook Mail into Evolution O n e way you can import O u t l o o k Mail into Evolution is to use an application called Outport.You can download O u t p o r t from http://outport.sourceforge.net. For example, suppose you have a group of e-mail messages named Syngress in O u t l o o k Express, similar to that shown in Figure 12.13. Figure 12.13 E-mail Messages in Outlook 199 200 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop All you have to do is download Outport, and then double-click the outport.exe application. The Outport main interface will appear, as shown in Figure 12.14. Figure 12.14 Using Outport to Export Messages from Outlook When the Outport interface appears, you can choose various Outlook elements to export, including: 9 Outlook Calendar entries 9 Contacts 9 Mail messages 9 Journal entries 9 Notes 9 Individual tasks Before clicking the E x p o r t button, you will need to specify a destination directory. In the preceding example, the C:\outport directory is used.After clicking Export, Outport will convert and export the files into the Outport directory, where you can view them in a file manager, such as Windows Explorer, shown in Figure 12.15, or Gentoo, a file manager for Linux (www.obsession.se/gentoo). www.syngress.com Microsoft Alternatives: Inside the Linux Desktop Figure 9Chapter 12 12.15 Viewing Exported Messages in Windows Explorer Once you have exported these files, you can then import them into Evolution or into another application so that you can more easily convert them into files that Evolution understands. Document Standards As you migrate e-mail and PIM software settings from Windows systems to Linux, you will have to become familiar with the following standards: 9 The Internet Calendaring and Scheduling Core Object Specification (iCalendar) standard Known as Ical, it is defined in tLFC 2445.Apple machines were among the first to adopt this standard. Used for personal calendars. 9 The Vcalendar standard (Vcal) Used for making appointments. 9 Virtual Card standard (Vcard) An electronic business card format meant to provide a uniform, textual representation of an event. It is a crossplatform way to represent a calendar event. Outport can export into these formats. This standard is defined in tLFC 2426, and is used often used in PIM software. The Hard Way The least favorable migration option is to simply forward e-mail from a Windows client to the new Linux system. If you have to resort to this method, perhaps the easiest way is to forward an entire mail folder. Still, forwarding a large number of e-mail messages as one e-mail will probably guarantee that you will never find the e-mails again, unless you work hard to sift through (perhaps) dozens of attachments buried in a folder. Therefore, use your best j u d g m e n t w h e n forwarding e-mail. 201 202 Chapter 12 ~ Microsoft Alternatives: Inside the Linux Desktop Web Browsers Web browsers are not just used to "surf the Web"; they can be used to launch embedded applications, check e-mail, and view groupware calendars. As a result, Web browsers are increasingly sophisticated, and must support various authentication and encryption schemes. In this section, we discuss how to choose the appropriate browser(s). Most end users will expect their Linux systems to offer one (and only one) browser. With Windows, everyone tends to use Internet Explorer. This browser has been on every computer since Windows 98; many end users became accustomed to Internet Explorer on Windows 95 systems. With Linux, however, there are several choices, including: 9 Mozilla 9 Firefox 9 Galeon 9 Konqueror 9 Opera No single Linux Web browser can meet everyone's needs.You will have to become familiar with many of the browsers available. In this section, we discuss the most important GUI-based browsers. Mozilla Mozilla, shown in Figure 12.16, is actually a group of applications that includes the Mozilla browser, Mozilla Mail, and Composer. Mozilla's advantages include: 9 T a b b e d b r o w s i n g The ability to see multiple pages in one window allows you to browse more efficiently. 9 The Gecko rendering engine An engine that renders the Web pages quickly and efficiently. 9 Speed The browser renders pages quickly and loads into memory quite easily. 9 Stability The code is extensively reviewed, and it can be more stable than many other vendors' browsers. www.syngress.com Microsoft Alternatives" Inside the Linux Desktop 9 Chapter 12 p o p - u p b l o c k i n g You do not need to download third-party software to block pop-up ads if you are using Mozilla. 9 Built-in 9 Built-in applications You can view newsgroups and can use an Internet Relay Chat (IRC) client. Figure 1 2 . 1 6 Mozilla If you need a full-service package and do not want to deal with separate applications, choose Mozilla. Mozilla and Microsoft CHAP The Internet Information Services (IIS) Web server uses a special form of the Challenge Handshake Authentication Protocol (CHAP), called M S - C H A R Microsoft designed IIS this way. The intent was that if an IIS administrator was to enable MSC H A R only those using Internet Explorer could authenticate securely. However, Mozilla.org was able to implement M S - C H A P as of version 1.6.This is an important development, because it eliminates one more reason for remaining with Internet Explorer, which has experienced the most serious security problems. Firefox Firefox is a stand-alone browser based on the Gecko engine, just like Mozilla (see Figure 12.17). 203 204 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop F i g u r e 1 2 . 1 7 Firefox However, Firefox is not simply another form of Mozilla. Firefox has the following features: 9 I m p r o v e d c u s t o m i z a t i o n From fbnt choice to determining which buttons you will see, Firefox is designed to allow more customization. 9 Faster page r e n d e r i n g Firefox has a more current version of the Gecko engine. 9 Smaller footprint The Firefox developers have tried to keep the application's size down to roughly 4 MB. If you do not mind using separate applications (for example, separate Web browsers and e-mail clients), then choose Firefox. Finally, Firefox benefits from MSCHAP compatibility.You can learn more about Firefox at www.mozilla.org. Galeon Galeon is specially designed for the Gnome desktop. However, it uses Mozilla's Gecko rendering engine. Consequently, it is a solid choice if you want the stability and speed of the Gecko engine, and want to take advantage of the Gnome desktop environment. As good as Mozilla and Firefox are, they are not specifically designed to run in Gnome. Therefore, Galeon may load and render faster than any browser in an optimized Gnome environment. For more information about Galeon, go to http: / / galeon, sourc eforge, net. Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 Konqueror Konqueror, shown in Figure 12.18, is KDE's default browser. It uses the K H T M L rendering engine. Interestingly, the new browser in Mac OS, Safari, uses the same rendering engine. If you are migrating over from Macintosh systems, Konqueror might be the best choice. Figure 12.18 The Konqueror Web Browser O f all the browsers profiled in this chapter, Konqueror is the only one meant specifically for L i n u x / U N I X systems. It is not a cross-vendor browser. Opera Opera is the only fee-based browser discussed in this chapter. To some companies, paying for software actually brings a sense of security. Paying for software, many feel, results in a stronger support contract. Opera's developers argue that Opera has the following advantages: 9 The fastest rendering of any Web browser 9 Tabbed browsing 9 The ability to focus and "zoom in" on content 9 IP, C compatibility In many ways, Opera offers the same features as Mozilla. www.syngress.com 205 206 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop Migrating Bookmarks You will find that migrating to a Linux browser is relatively easy, because virtually every browser that runs Linux automatically imports the bookmarks exported from Internet Explorer. The exported bookmark data is easily found. However, with recent versions of Internet Explorer, this data is stored in a directory. On our system, the Internet Explorer bookmarks are found in C:\Documents and Settings \james \ Favorites. Once you have installed Mozilla, Firefox, or Opera, this data is easier to get to since it will be stored in a single file. This file can be called bookmark.htm, bookmarks.htm, bookmark.html, or bookmarks.html, depending on the version of the browser. All you have to do is copy this file to the new Linux system when you migrate the operating system. Then, simply find the feature for managing bookmarks. In Firefox, for example, you would go to B o o k m a r k s I M a n a g e B o o k m a r k s . When the Bookmarks Manager window opens, go to File ] I m p o r t , and then select the F r o m File option button.You can then select the Internet Explorer bookmark file you exported. Browser Plug-Ins Windows users are likely aware of dozens of browser plug-ins. In Linux, you will find a more limited set of plug-ins, although most of the essential ones are supported, including: 9 Macromedia Flash, and Shockwave/Director 9 R.ealNetworks Realplayer 9 Adobe Acrobat Reader Following is a discussion of each plug-in technology. Macromedia Flash and Shockwave/Director Macromedia Flash has been available in Linux for a number of years. It is relatively easy to install. However, Flash does not automatically upgrade itself in Linux as it does in Windows browsers. Make sure you understand that you will have to manually update your Flash plug-ins periodically. Installing Flash is as simple as downloading it from Macromedia's Web site at www.flash.com. Once you download the file (for example, insta~__flash_ player 7 linux.tar.gz), you simply unzip and untar it and then change to the Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 install_flash_player 7 linux/directory.You then run the flashplayer-installer script (for example, flashplayer-installer) and follow the onscreen instructions. As of this writing, Macromedia Shockwave/Director can be installed in Linux only by using the CrossOver Office Plugins bundle, which we discuss later in this chapter. However, this will likely change, as Macromedia has begun demonstrating true interest in Linux, now that its market share has increased. Because there is virtually no business justification for it, though, few people other than graphic artists or home users will need this functionality. In short, if you need Shockwave/Director, install the CrossOver Office Plugins bundle. RealPlayer RealPlayer, shown in Figure 12.19, is one of the more essential plug-ins, because it allows you to view streaming media.You can use it for both streaming audio and video. F i g u r e 1 2.1 9 RealPlayer You can run R.ealPlayer from any of the Web browsers profiled in this chapter. For example, in Konqueror, you will be asked which application you want to use. Simply enter the name of the RealPlayer binary (for example, realplay), and you will be able to see or hear the media you have chosen.You can download the basic version of R.ealPlayer free of charge at www.realplay.com.You will have to meet with a consultant to discuss which version to use. You may have to specify RealPlayer as a "helper application" in order to properly run streaming video. To do this, open the Preferences in any browser and access the appropriate window that allows you to define file associations. For 207 208 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop example, in Konqueror, you would go to Settings I Configure Konqueror, and then select the File Associations screen. In Mozilla, you would go to Edit I Preferences, select Helper Applications, and then define the appropriate MIME type. C o m m o n MIME types for streaming media include: 9 application/x-pn-realaudio (for rm and ram files) 9 audio/x-realaudio (for ra files) 9 audio/x-wav (for wav files) Adobe Acrobat Reader Another essential plug-in is Adobe Acrobat Reader, shown in Figure 12.20. F i g u r e 1 2 . 2 0 Acrobat Reader You may have to define the MIME type for PDF on certain browsers. MIME types you can define include: 9 application/pdf 9 application/x-pdf 9 application/acrobat www.syngress.com Microsoft Alternatives: Inside the Linux Desktop 9 text/pdf 9 text/x-psdf 9Chapter 12 We have always found application/pdf to be sufficient. Acrobat Reader is available free of charge at www.adobe.com. Office Application Suites You have already learned about migrating workstations to Linux-based e-mail/PIM clients and Web browsers.You will likely find a way to be happy managing e-mail and using browser-based applications. However, you do not simply use e-mail and Web browsers all day; you will need to create documents and presentations. "Where," you will ask, "is Microsoft Word?"You will also want to know where your Excel and PowerPoint applications are. In other words, you will want to know if you will be able to work with your files. You will want to do your jobs, and you will not want the operating system to "get in the way." Managers will be concerned about lost productivity.You will need to receive assurance from a consultant that even though you will be migrating from Microsoft Office, you will remain productive.You will need to be shown that you will: 9 Still be able to work with your .doc, .rtf, .xls, and .ppt files. 9 Become comfortable with new applications in an acceptable period of time. 9 Be able to exchange files with others who will still be using Microsoft software. The most common office software suites include: 9 OpenOffice,org 9 StarOffice 9 KOffice 9 Hancom Office The following sections will discuss each suite. OpenOffice.org OpenOffice.org quickly became the standard for the Linux office suite when Sun introduced it in 1999. OpenOffice has several applications. The following are the most often used: www.syngress.com 209 210 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop 9 Star Writer (swriter) A word processor; the equivalent of Microsoft Word. 9 Star Impress (simpress) Slide presentation software; the equivalent of Microsoft PowerPoint. 9 Star Calc (scale) Spreadsheet software; the equivalent of Microsoft Excel. 9 Star Web (sweb) Web page creation software; the equivalent of Microsoft FrontPage Express. Basically, very little needs to be done to OpenOffice once you have it installed. If you share documents outside of your company, as many people do, you can make document sharing easier by telling OpenOffice to save in .doc, .xls, or .ppt format natively. This step is done by clicking Tools I O p t i o n s ] Load&Save J General, and in the standard file format section, make sure you select Always save as Microsoft Word 9 7 / 2 0 0 0 / X P for D o c u m e n t type, text document. Do the same for Spreadsheet and Presentations. Make sure you do not select templates, though, as this has to be done differently.You can learn more about OpenOffice at www.openoffice.org. OpenOffice.org can open any document created in Microsoft Office 2000. For example, the document shown in Figure 12.21 was created in Microsoft Office 2000. Figure 12.21 Star Writer www.syngress.com Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 The document shown in Figure 12.21 was also modified by Office 2003. Figure 12.22 shows the Star Impress program.You can see that the interface is quite similar to PowerPoint. F i g u r e 1 2 . 2 2 Star Impress The document shown in Figure 12.22 was created in PowerPoint, and then opened in Star Impress. In fact, the majority of the slides created for this chapter were created in Star Impress. These slides were then sent to several individuals who used nothing but Microsoft PowerPoint. They were completely oblivious that the slides were created on a Linux system. Figure 12.23 shows the Star Calc application opening a simple spreadsheet. The spreadsheet in Figure 12.23 is relatively simple. However, most individuals will do little more with a spreadsheet than create rows and columns, and then calculate summaries. Notice also that this particular spreadsheet supports tabbed sheets. 211 212 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop Figure 12.23 Star Calc Limitations" Macros and PDF Files With very few exceptions, PDF files are all easily read, created, or modified by OpenOfiqce. The exception to this rule is if you're using macros.Although these won't run natively on OpenOffice or any of the other alternatives, there is a way to rewrite your macros to work with OpenOffice, as it contains its own very powerful Macro Writer. OpenOffice.org has the capability to create PDF files "on the fly."This feature is quite impressive, but is still not completely perfected. It is anticipated that future versions will offer production-quality PDF generation. We have found that more complex templates do not work well in OpenOffice. This suggests that more complex work, such as that done by desktop publishers, may be too ambitious for OpenOffice.org. However, OpenOffice.org can handle the vast majority of your word processing, slide presentation creation, and spreadsheet development demands. Nevertheless, the average end user will not encounter any difficulty using OpenOffice. Only those end users who engage in truly advanced word processing and spreadsheet creation will encounter problems. Microsoft Office 2003 has introduced features not supported by OpenOffice.org, as well as Office 2000 and Office XP. For example, Microsoft Office 2003 allows you to create editing restrictions on certain portions of a file. OpenOffice.org does not support this feature. It is important to understand, however, that many people have not upgraded their Office 2000 software to Office 2003, and that they, too, do not take advantage of these features. Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 One other weakness of OpenOffice.org is macro support.You cannot simply import all of your macros into StarOffice. At its best, recreating macros is never particularly fun. At its worst, it is an enormous time burden. If you require extensive macro support, we suggest that you read about CrossOver Office. So don't let a consultant leave you with the impression that office suites such as OpenOffice.org will replace Microsoft Office painlessly. In some cases, you will end up disappointed. Make sure that you determine exactly what you need and make sure that any consultant you meet with has thoroughly tested a solution before recommending it. Future Plans It is likely that OpenOffice.org will be able to generate Shockwave Flash (SWF) files on the fly. Thus far, no office suite has this capability. OpenOffice.org already uses X M L as the basis of its files. Consequently, this suite is capable of handling complex tasks. It is simply going to take time for OpenOffice.org to equal products such as Microsoft Office. StarOffice StarOffice is essentially a stable version of OpenOffice.org with the promise of customer support. Perhaps an analogy will help: StarOffice is to OpenOffice.org much like Netscape Navigator is to Mozilla. Just as Netscape takes a stable version of Mozilla and then sells it, Sun takes OpenOffice.org and sells it as StarOffice. Corporations are becoming increasingly fond of StarOffice, because they can purchase customer support in case of a problem or bug. For a nominal fee, you receive customer support, Internet-based file storage, additional document templates, and increased macro support.You can learn more about StarOffice at www.starofrice.com. KOffice A project of the KDE team, KOffice is a fully functional replacement for Microsoft Office. Figure 12.24 shows the KWriter application, the default KDE text editor. Although more powerful than a simple text editor such as Wordpad or Notepad, it is nevertheless not as powerful as Star Writer. www.syngress.com 213 214 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop Figure 12.24 KWriter Hancom Office H a n c o m Office is sold by a Korean company that has the following goals: 9 Create a user-friendly suite that is compatible with Microsoft Office. 9 Support a large number of languages. Extensive Unicode support means that H a n c o m office is also ideal if you need to support offices that process documents in Chinese (both simplified and traditional), Korean, and Arabic. You can learn more about H a n c o m Office by going to www.hancom.com. One of the ways in which H a n c o m Office tries to ensure compatibility with Microsoft Office documents is an automatic update feature. This feature allows you to quickly obtain the latest filters and rendering engines. One of the limitations of H a n c o m Office is that it does not support macros written in Visual Basic. H a n c o m Office does not improve upon OpenOffice.org or StarOffice in this regard. Running Windows Applications on Linux Every user in a company will not be able to be ported over to Linux at all times. Rather than concede defeat, you have two alternatives: 9 Install software that allows your Linux system to imitate, as it were, a Windows system. Once you get the emulator properly installed, all you have to do is install a Windows application on the Linux Use an emulator. Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 system. The emulator will then allow the Windows application to run directly from inside Linux. 9 Use r e m o t e desktop administration software. Simply install a server that allows you to directly access the desktop through a Web browser or specialized application. We'll now discuss each option. Compatibility Layer Software In many ways, the software discussed here is not emulation software. In the strictest sense, emulator software recreates the software application programming interfaces (APIs), and the actual functions of the C P U (for example, a Pentium chip). Wine, CrossOver Office, and Win 4 Lin Workstation do not recreate the architecture of the CPU. Therefore, they are technically not emulators. Nevertheless, it is still common practice to lump this software into the emulator category, because using applications such as Wine, you can make your Linux system behave as if it were a Windows system. In fact, if you properly configure these applications, certain native Windows applications will run, thinking that they are in a Windows environment.These applications use sets of APIs to help convince native Windows applications that they are, in fact, running on Windows. So, to avoid controversy, we will not call these applications "emulators," even though that's basically what they are. Taking the lead of the developers of Wine, we are calling these applications "compatibility layer software," because they all create a layer between the Linux operating system and the Windows application. The benefit of this type of emulator, well, software, is that you can use native Windows applications directly from your Linux desktop.You do not have to rely on a network connection to another system. However, emulators can be somewhat tricky to configure, and the slightest change in the application's configuration can "break" your configuration and force a time-consuming and possibly costly service call. As you prepare to use an emulator, ask the following questions: 9 What version of the Windows operating system does the application require? 9 Do you require access to raw data from inside Linux? 9 How many people need to access these applications, and the resulting data from them, at one time? In short, what is the expected load on this system? 215 216 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop These questions will help you determine the correct hardware size, and the appropriate software. Now, let's look at some of the c o m m o n emulators available. Wine Wine is an acronym for "Wine is not an emulator." Wine is meant to provide a replacement for Windows; it does not require Windows to run. Therefore, you do n o t need a Windows license to run a Windows application.You will, however, need a license to run the application. Suppose, for example, that you managed to run Microsoft Word on Wine.You would not need a license for the Microsoft Windows operating system. However, you would need to license Microsoft Word. It is important to understand that Wine has enjoyed a "work in progress" standing for many years. Many Windows applications do run in Wine. A list of Windows applications verified to run in Wine is available at www.winehq.org/site/ supported_applications. A Web site called "Frank's Corner" (http://frankscorner.org) provides tips to help get various applications going.Applications that Frank has worked with include: 9 Microsoft Office 2000 9 Macromedia Flash M X 9 PhotoShop 7.0 People have had significant success with Wine. However, Wine is not yet a "production quality" tool; it is more of an extended "hack in motion."The fact that your needed application runs today on the latest and greatest version of Wine is no guarantee that it will run properly when you upgrade to the next version. However, there is a much more reliable application: Code Weavers' CrossOver Office. Code Weavers' CrossOver Office CrossOver Office is essentially a perfected commercial version of Wine. CrossOver Office allows any Windows application to run smoothly (or, as smoothly as any application can run using compatibility software). As with Wine, if you use CrossOver Office you do not need to purchase a Windows license.You will find that with CrossOver Office, upgrades will not cause existing configurations to fail. In addition, CrossOver Office makes it possible to run all of the Visual Basic macros on which many Microsoft Office users rely. CrossOver Office makes it relatively easy to install and run Windows applications in Linux. Still, there are drawbacks to this solution. First, CrossOver Office requires significant amounts of memory. In addition, not all of the features of your Microsoft Alternatives: Inside the Linux Desktop 9Chapter 12 Windows applications will be available. Therefore, although you may be able to run a copy of Macromedia Flash M X , you may still find some features missing. In spite of these drawbacks, you will likely find that between the alternative programs discussed previously and applications such as CrossOver Office, you will be able to migrate any user to Linux. To learn more about CrossOver Office, go to www. cod ewe avers, c o m/si te / p rodu cts. 217 218 Chapter 12 9Microsoft Alternatives: Inside the Linux Desktop Summary Choosing the appropriate desktop environment requires several skills. First, you need to know about the options. Second, you need to identify what you want and need. You then need to know how to match current technologies to your needs. In this chapter, you learned about available technologies and how to weigh them against your needs. From common desktops such as Gnome and KDE to e-mail and Web applications, you learned how to choose solutions that can save you time and money.You also learned how to migrate settings and how to install native applications on Linux that cannot, for some reason, be replaced by their Linux counterparts. This chapter helped you identify problems, possibilities, and solutions. Now that you are more familiar with Linux desktop solutions, continue your learning process by installing some of the software profiled in this chapter. The only way you can take the next step in your knowledge and ability to solve problems is to go through the process of installing the software. Additional Resources The following links provide more information related to alternatives to Microsoft products: Eastham, Chuck, and Bryan Hoff. Moving from Windows to Linux, Second Edition. Boston: Charles River Media, 2006 (www. charlesriver.com/books/BookDetail.aspx?productlD = 122989). 9 Fedora Core Linux (http://fedora.redhat.com/). 9 FirefoxWeb Browser (www.mozilla.com/firefox/). Star Office Productivity Suite (www.sun. c o m/software / star / staro ffi ce / index.jsp). tD This Page Intentionally Left Blank Appendix A 221 222 Appendix A 9Essential Network Communications Introduction In order to better secure your home computer or home network, it helps if you have some basic knowledge of how it all works so that you can understand what exactly you are securing and why. This appendix will help provide an overview of the terms and technology used and some of the tips, tricks, tools, and techniques you can use to make sure your computer is secure. This appendix will provide an understanding of what these terms are so that w h e n you read about the latest malicious code spreading through the Internet and how it gets into and infects your computer, you will be able to decipher the techie terms and determine if this affects you or your computer and what steps you can or should take to prevent it. The information in this appendix is a little more technical than the rest of the book, and is included for those who want to learn a little more and gain a deeper understanding of how computer networking works and the technologies that make it work. Computer Protocols In the Merriam-Webster Dictionary, protocol is defined in listing 3b as, "A set of conventions governing the treatment and especially the formatting of data in an electronic communications system." I'm not sure that makes things much clearer to a layperson. Put simply, if you called an orange an apple and I called it a plum we would never be able to communicate. At some point we would have to come to some agreement as to what to call it. For computers and the Internet there were many organizations coming up with their own proprietary way of formatting and transmitting data. To ensure that all computers would be able to talk to each other and not just to their "own kind," protocols were created and agreed to. TCP/IP, which stands for Transmission Control Protocol/Internet Protocol, is not a single protocol. It is a set of communication standards. T C P and IP are the two main protocols of the bunch. T C P / I P has been accepted as the standard for Internet communications and comes packaged by default with all major operating systems. To communicate using TCP/IP, each host must have a unique IP address. As we discussed earlier, your IP address is similar to your street address. It identifies your host on the Internet so that communications intended for you reach their destination. www.syngress.com Essential Network Communications 9Appendix A Communication Ports When you sit down to watch TV, you have to tune your TV to a specific frequency in order to view the Weather Channel. If you want the Disney Channel, you need to change to a different frequency. To view C N N , you need to set your TV to yet another frequency. Similarly, when you are surfing the Internet, there is a certain port that is used when your computer wants to receive H T T P (Hypertext Transfer Protocol, used for viewing H T M L or Web pages) traffic. To download files you might use FTP (File Transfer Protocol), which would be received on a different port. SMTP (Simple Mail Transfer Protocol, used for transmitting e-mail messages) communications would be received on a different port. There are 65,536 ports available for use in TCP or UDP. They are divided into three ranges. The Internet Assigned Numbers Authority (IANA) manages the first 1,024 ports (0-1,023). This range is known as the well-known port numbers and includes standard default ports such as H T T P (port 80), FTP (port 21), and SMTP (port 25). These port numbers are reserved and should not be used arbitrarily. The second range is the registered port numbers, which contains ports 1024 through 49151.The Registered Port Numbers can be used by ordinary programs and user processes that are executed by the user. The use of specific port numbers is not carved in stone. These ports are generally used transiently when needed. The third range is the dynamic or private port numbers, which range from 49152 through 65535.These can be used by applications and processes initiated by the user, but it is uncommon. There are known Trojan horse and backdoor programs that use this extreme upper range so some security administrators are leery of traffic in this range. TCP and UDP Protocols One of the protocols that use this block of ports is TCP. TCP enables two hosts on the Internet to establish a connection with each other. One host will initiate the connection by sending a request to the other. That host will respond, agreeing to establish the connection. Finally, the originating host will respond once more to acknowledge receipt of the acceptance and the connection is established. When data is fed to TCP, TCP breaks it into smaller, more manageable pieces called packets. A header is written for each packet, which specifies the originating IP address, the destination IP address, the sequence number, and some other key identifying information. www.syngress.com 223 224 Appendix A 9Essential Network Communications W h e n the packets leave to traverse the Internet and get to their destination, they may not take the same path. There are thousands of routers, and complex algorithms help to decide from nanosecond to nanosecond which path is going to be the best path for the next packet. This means that the packets may not arrive at their destination in the same order they were sent out. It is the responsibility of the T C P protocol on the receiving end to look at the sequence number in the packet headers and put the packets back in order. If there are missing packets, error messages are sent back to let the sending computer know to resend the data. T C P also does flow control by sending messages between the two hosts letting them know to speed up or slow down the rate of sending packets depending on network congestion and how fast the receiving computer can handle processing the incoming packets. U D P is another protocol that works with IP networks. Unlike TCP, U D P does not establish a connection. U D P does not provide any sort of error protection or flow control. It is primarily used for broadcasting messages. The sending host gets no acknowledgement that the message was successfully received. Because U D P does not take the time to set up a connection between the two hosts, perform flow control to monitor network congestion, or do the sort of errorchecking and receipt acknowledgement that T C P does, it has much less overhead in terms of time and resources. Some services that benefit from this are DNS, SNMP, and streaming multimedia (for example, watching a video clip over the Internet). Understanding IP Addresses and DNS The term "host" can be confusing because it has multiple meanings in the computer world. It is used to describe a computer or server that provides Web pages. In this context, it is said that the computer is "hosting" the Web site. Host is also used to describe the companies that allow people to share their server hardware and Internet connection as a service rather than every company or individual having to buy all their own equipment. A "host" in the context of computers on the Internet is defined as any computer that has a live connection with the Internet. All computers on the Internet are peers to one another. They can all act as servers or as clients.You can run a Web site on your computer just as easily as you can use your computer to view Web sites from other computers. The Internet is nothing more than a global network of hosts communicating back and forth. Looked at in this way, all computers, or hosts, on the Internet are equal. Each host has a unique address similar to the way street addressing works. It would not work to simply address a letter to Joe Smith.You have to also provide the www.syngress.com Essential Network Communications 9Appendix A street address; for example, 1234 Main Street. However, there may be more than one 1234 Main Street in the world, so you must also provide the city: Anytown. Maybe there is a Joe Smith on 1234 Main Street in Anytown in more than one state, so you have to add that to the address as well. In this way, the postal system can work backward to get the mail to the right destination. First they get it to the right state, then to the right city, then to the right delivery person for 1234 Main Street, and finally to Joe Smith. O n the Internet, this is called your IP (Internet Protocol) address. The IP address is made up of four blocks of three numbers between 0 and 255. Different ranges of IP addresses are owned by different companies or ISPs (Internet service providers). By deciphering the IP address, it can be funneled to the right host. First it goes to the owner of that range of addresses; then it can be filtered down to the specific address it's intended for. I might name my computer "My C o m p u t e r " but there is no way for me to know how many other people named their computer "My Computer," so it would not work to try to send communications to "My Computer" any more than addressing a letter simply to "Joe Smith" would get delivered properly. With millions of hosts on the Internet, it is virtually impossible for users to remember the IP addresses of each Web site or host they want to communicate with, so a system was created to enable users access sites using names that are easier to recall. The Internet uses Domain Name Service (DNS) to translate the name to its true IP address to properly route the communications. For instance, you may simply enter "yahoo.com" into your Web browser. That information is sent to a DNS server, which checks its database and translates the address to something like 64.58.79.230, which the computers can understand and use to get the communication to its intended destination. DNS servers are scattered all over the Internet, rather than having a single, central database. This helps to protect the Internet by not providing a single point of failure that could take down everything. It also helps speed up processing and reduces the time it takes for translating the names by dividing the workload among many servers and placing those servers around the globe. In this way, you get your address translated at a DNS server within miles of your location, which you share with a few thousand hosts rather than having to c o m m u nicate with a central server halfway around the planet that millions of people are trying to use. Your ISP will most likely have its own D N S servers. Depending on the size of the ISP, it may have more than one DNS server and they may be scattered around the globe as well for the same reasons cited earlier. An ISP has the equipment and www.syngress.com 225 226 Appendix A 9Essential Network Communications owns or leases the telecommunications lines necessary to establish a presence on the Internet. In turn, they offer access through their equipment and telecommunication lines to users for a fee. The largest ISPs own the major conduits of the Internet referred to as the "backbone." Picture it the way a spinal cord goes through your backbone and acts as the central pipeline for communications on your nervous system.Your nervous system branches off into smaller paths until it gets to the individual nerve endings similar to the way Internet communications branch from the backbone to the smaller ISPs and finally down to your individual host on the network. If something happens to one of the companies that provide the telecommunications lines that make up the backbone, it can affect huge portions of the Internet because a great many smaller ISPs that utilize that portion of the backbone will be affected as well. Managing IP Addresses Originally, IP addresses were manually coded to each computer. As the Internet exploded and millions of hosts were added, it became an overwhelming task to track which IP addresses were already in use or which ones were freed up when a computer was removed from the network. D H C P (Dynamic Host Configuration Protocol) was created to automate this process. A D H C P server is given a block of addresses that it controls. Hosts that are configured to use D H C P will contact the D H C P server when they are turned on to request an IP address. The D H C P server will check its database of addresses and find one that is not in use to assign to the host. W h e n the host is turned off or removed from the network, that IP address is released and the D H C P server can use it for a new host. The exponential growth of the Internet caused a shortage in the available IP addresses similar to the way the growth of cell phones, pagers, and the like have caused a shortage of phone numbers. Unlike the phone system though, the Internet could not simply add a new prefix to the mix to create new phone numbers. While the current version of the IP protocol (IPv6) is designed to allow for an exponential increase in the number of available addresses, the IPv4 protocol is still the primary version in use, and it was running dry fast. NAT (Network Address Translation) can be used to expand the potential number of addresses. NAT essentially uses only one IP address to communicate on the Internet and a completely separate block of IP addresses on the local network. The local network addresses need to be unique from each other, but since the out- www.syngress.com Essential Network Communications 9Appendix A side world will not see the local network addresses, they don't need to be unique to the world. Without NAT, a company with 100 computers that wanted all 100 to connect to the Internet would need to have 100 separate public IP addresses. That same company using N A T would only need one public IP address and would assign the computers on the local network internal IP addresses. This "hiding" of the internal IP addresses works not only to allow for more hosts to share the Internet, but also to provide a layer of security. By not allowing the outside world to know the precise IP addresses of your internal hosts, you take away a key piece of information that hackers could use to break into your network. Firewalls N o w that we have covered T C R U D R and ports we can move on to discussing firewalls. A basic firewall is designed to block or control what traffic is allowed into or out of your computer or network. O n e way to do this is to simply block all incoming T C P and U D P traffic on all ports. For many home users this will work just fine. The firewall will still allow a response using the T C P or U D P ports through as long as the connection was initiated by your computer, but blocking in this manner will make sure no external computers can initiate a session with your computer. If you do want to host a Web site or enable files to be downloaded from your computer using FTR or enable other computers to connect to yours for online gaming, you will need to open the respective port. For example, to host a Web server, you would configure your firewall to block all incoming U D P and T C P traffic on all ports except port 80. O n most basic home cable/DSL routers, the portblocking firewall can be configured to allow traffic through a port to a specific host so that your other computers are still protected from this sort of traffic, but external hosts are able to access your Web server or game connection or whatever else you want. This sort of basic firewall has some issues that can be exploited by hackers and malicious programmers to sneak through, which is why there are more advanced firewall systems. I mentioned that with this sort of port blocking, communications in response to connections initiated by your computer would be allowed through even on ports you were blocking. Using this knowledge, a hacker can forge the packet to make it look like it is a reply rather than an initiation of a connection and the firewall will allow it through. Even on connections that are initiated by your computer, a malicious programmer can still exploit weaknesses in the system to sneak packets through. To 227 228 Appendix A 9Essential Network Communications guam against some of these weaknesses there are other types of firewalls: stateful inspection packet filters, circuit-level gateways, and application-level gateways to name a few. Another consideration for firewalls is that it is not always enough to monitor or block inbound traffic.You may get a virus or Trojan horse program through a connection you initiated, thereby bypassing the firewall, or through e-mail. These malicious programs can open ports and initiate connections from your computer once they are planted there. Most software-based firewalls like Zone M a r m or Sygate, as well as more advanced hardware-based firewalls, will monitor outbound connections. Appendix B 229 230 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) Introduction The Internet continues to grow as small businesses and home users realize the opportunities available to them with a wider audience for goods. Using personalized Web sites and e-mail addresses, as well as having a permanent Internet connection, creates a closer customer experience with remote users. This closeness comes at a price as systems are made accessible 24x7. With accessibility, unwelcome guests and customers have invitations to use the network. The exploitation of vulnerabilities on a system include misusing protocols, or applications, by connecting to an IP address on an open T C P or U D P port of a system on the network. Security for the home isn't as well developed as in a corporate environment. Users often do not have the time to become experts while maintaining their businesses or working remotely. Using netstat to Determine Open Ports on a System The netstat c o m m a n d does many useful things other than determining open ports on a system, including displaying m e m o r y and network buffer usage, system route table information, and interface statistics. To understand more about those options, read the documentation online about netstat. The following focuses on using netstat to determine the open ports and whether they should be open. W h e n a remote system or user wishes to access a service on your computer (e.g., Web server), the underlying OS on the remote system creates a connection to a port on your computer system on behalf of the remote user. A process listening on a port will accept incoming connections to that port. A large part of securing your system from network attack is an audit of these services. Once you know what is running, you can turn off services that have opened ports that you don't need, and make sure to secure the services you do need. It will also establish a baseline as to what should be running. W h e n the system starts acting sluggishly, or responding in an abnormal fashion, you can quickly check to make sure there are no rogue processes running on unrecognized ports. The - a flag tells netstat "show the state of all sockets." O n e understanding of a socket is as a listening port. The -n flags tells netstat to not attempt to resolve names via DNS. This is generally a good practice because you remove a dependency on working DNS, and netstat will return information more quickly. If you need to look up an IP-to-name mapping, you can always do that later with the host, nslookup, or dig commands. Here is an example of netstat output using the - a a n d - n flags. Case Study: SOH0 (Five Computers, Printer, Servers, etc.) Sample netstat-Output Appendix B on a UNlX Server Active Internet connections (including servers) Proto Recv-Q Send-Q t CP 0 Local Address Foreign Address State 0 6.7.8.9.60072 221,132.43.179.113 SYN-SENT tCP 0 0 6.7.8.9.25 221.132.43.179.48301 ESTABLISHED tC P 0 120 6.7.8.9.22 24.7.34.163.1811 ESTABLISHED tCP 0 0 6.7.8.9.60124 67.46.65.70.113 tCP 0 0 127.0.0.1.4000 tCP 0 0 127.0.0.1.60977 tCP 0 0 "-4000 tCP 0 0 6.7.8.9.22 tCP 0 0 tCP 0 0 tCP 0 0 tcP 0 0 t CP 0 t CP 0 t CP t CP FIN-WAIT-2 127.0.0.1.60977 ESTABLISHED 127.0.0.1.4000 ESTABLISHED *.* LISTEN 24.7.34.163.50206 ESTABLISHED 6.7.8,9,62220 216.120.255.44.22 ESTABLISHED 6.7.8.9.22 24.7.34.163.65408 ESTABLISHED 6.7.8.9.22 67.131.247.194.4026 ESTABLISHED 6.7.8.9.64015 217.206.161.163.22 ESTABLISHED 0 6.7.8.9.22 82.36.206.162.48247 ESTABLISHED 0 *.80 0 0 *.993 0 0 *.25 tCP 0 0 tCP 0 tCP 0 LISTEN *.22 *.* *.* *** *.* 0 *.21 *.* LISTEN 0 127.0.0.1.53 *.* LISTEN t CP 0 0 6.7.8.9.53 UdP 0 0 127.0.0.1.123 UdP 0 0 6.7.8.9.123 UdP 0 0 *.123 UdP 0 0 *.65510 *.* *.* UdP 0 0 127.0.0.1.53 *.* UdP 0 0 6.7.8.9.53 *.* LISTEN LISTEN LISTEN LISTEN *.* *.* *.* Active Internet6 connections (including servers) Proto Recv-Q Send-Q Local Address Foreign Address (state) LISTEN *.123 *.* *.* *.* *** *.* *.* *.65509 *.* tcp6 0 0 *.25 tcp6 0 0 *.22 udp 6 0 0 fe80::1%100.123 udp6 0 0 : : 1.123 udp6 0 0 fe80::2e0:81ff:f.123 udp 6 0 0 udp6 0 0 LISTEN 231 232 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) Active UNIX domain sockets Recv-Q Send-Q Inode Conn Refs Nextref Addr Address Type c204c440 dgram 0 0 0 clfd80c0 0 c2026540 c20fd040 stream 0 0 0 clfcd3c0 0 0 clfcd3c0 stream 0 0 0 c20fd040 0 0 clfd3300 stream 0 0 0 clfd8680 0 0 clfd8680 stream 0 0 0 clfd3300 0 0 c2129e40 stream 0 0 0 c20db500 0 0 c20db500 stream 0 0 0 c2129e40 0 0 0 0 0 /var/run/lo -> g c204cb40 stream 0 0 0 c20fdb00 c20fdb00 stream 0 0 0 c204cb40 0 c20fdc00 stream 0 0 0 c2129800 0 0 c2129800 stream 0 0 0 c20fdc00 0 0 c2026540 dgram 0 0 0 clfd80c0 0 clf9c740 dgram 0 0 0 clfd80c0 0 clfd80c0 dgram 0 0 cc32615c 0 c204c440 clfd8300 dgram 0 0 cc3260b4 0 /var/run/lo -> g clf9c740 /var/run/lo 0 -> g /var/run/log /var/chroot/na 0 0 0 med/var/run/log Examine the parts that have TCP and UDP ports in the first section of the output. Unless you're actively running IPv6, you can safely ignore the tcp6, and udp6 output. Additionally, U N I X domain sockets are local within the machine and not network related. Sample netstat--TCP Output on a UNIX Server 0 6.7.8.9.60072 221.132.43.179.113 SYN 0 0 6.7.8.9.25 221.132.43.179.48301 ESTABLISHED 0 120 6.7.8.9.22 24.7.34.163.1811 ESTABLISHED tcp 0 0 6.7.8.9.60124 67.46.65.70.113 FIN tcp 0 0 127 tcp 0 0 127.0.0.1.60977 tcp 0 tcp tcp ESTABLISHED ESTABLISHED 9 0 9 0 9 1 .4 0 0 0 127 . 0 90 9 1 9 60977 127.0.0.1.4000 SENT m WAIT 2 Case Study: SOHO (Five Computers, Printer, Servers, etc.) *.* 9Appendix B tcp 0 0 *.4000 tcp 0 0 6.7.8.9.22 24.7.34.163.50206 ESTABLISHED LISTEN tcp 0 0 6.7.8.9.62220 216.120.255.44.22 ESTABLISHED tcp 0 0 6.7.8.9.22 24.7.34.163.65408 ESTABLISHED tcp 0 0 6.7.8.9.22 67.131.247.194.4026 ESTABLISHED tcp 0 0 6.7.8.9.64015 217.206.161.163.22 ESTABLISHED tcp 0 0 6.7.8.9.22 82.36.206.162.48247 ESTABLISHED tcp 0 0 *.80 *.* LISTEN tcp 0 0 *.993 *.* LISTEN tcp 0 0 *.25 *.* LISTEN tcp 0 0 *.22 *.* LISTEN tcp 0 0 *.21 *.* LISTEN tcp 0 0 127.0.0.1.53 *.* LISTEN tcp 0 0 6.7.8.9.53 *.* LISTEN Notice the last field contains different words like ESTABLISHED and LISTEN. This denotes the state of the socket. The sockets that show active services waiting for connections are lines that contain LISTEN. The * fields describes a port open to any IP address, so *.80 in the local address field tells us that this machine has port listening on every IP interface in this machine. Generally, a system will only have one IP address, but occasionally can have multiple interfaces. So, a short way of getting the listening TCP ports on a U N I X system would be netstat -an I grep LISTEN, extracting only the LISTEN lines. slick: {8} netstat -an I grep LISTEN tcp 0 0 *.4000 *.* LISTEN tcp 0 0 *.80 *.* LISTEN tcp 0 0 *.993 *.* LISTEN tcp 0 0 *.25 *.* LISTEN tcp 0 0 *.22 *.* LISTEN tcp 0 0 *.21 *.* LISTEN tcp 0 0 127.0.0.1.53 tcp 0 0 6.7.8.9.53 tcp6 0 0 *.25 *.* LISTEN tcp6 0 0 *.22 *.* LISTEN *.* *.* LISTEN LISTEN Okay, we have a list of TCR so let's move on t o the U D P section. U D P doesn't have any state field, because unlike TCP, U D P is a stateless protocol model. Each packet is discrete and disconnected in any way to the previous packet arriving on that port. There is no provision in the protocol for retransmission of dropped packets.Applications like N T P and D N A rely on U D E 233 234 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) slick: {9} n e t s t a t - a n ] grep udp udp 0 0 127.0.0.1.123 udp 0 0 10.1.2.3.123 udp 0 0 *.123 *.* 0 0 *.65510 *.* 0 0 127.0.0.1.53 10.1.2.3.53 f e 8 0 : :1 % 1 o 0 . 123 *. * udp udp udp *.* *.* * .* 0 0 * .* udp6 0 0 udp6 0 0 ::1.123 *.* udp6 0 0 fe80::2e0:81ff:f.123 *.* udp6 0 0 *.123 *.* udp6 0 0 * .65509 * .* Ignore the udp6 (IPV6) lines. The third field is the same as the TCP output from before. This is the listening address and port. The IP address of this machine is 6.7.8.9, and there is a localhost interface, 127.0.0.1, for local TCP and U D P communication. 127.0.0.1 is the localhost and not visible to the Internet. Anything that is not recognizable and requires further information should be audited. Sample Ports Requiring Auditing tcp 0 0 *.4000 *.* LISTEN tcp 0 0 *.80 *.* LISTEN tcp 0 0 *.993 *.* LISTEN tcp 0 0 *.25 *.* LISTEN tcp 0 0 *.22 *.* LISTEN tcp 0 0 *.21 *.* LISTEN tcp 0 0 127.0.0.1.53 *.* LISTEN tcp 0 0 6.7.8.9.53 udp 0 0 10.1.2.3.123 udp 0 0 *.123 udp 0 0 *.65510 udp 0 0 10.1.2.3.53 LISTEN N o w we need to figure out what processes on the local system correspond to those services. Looking in the/etc/services file, we can determine what U N I X services usually reside on these ports. This does not mean that a service hasn't hijacked a well-known port specifically to hide its footprint, but it gives us a better idea of what could be running. Case Study: SOHO (Five Computers, Printer, Servers, etc.) 9Appendix B Sample/etc/services Output ftp 21/tcp # File T r a n s f e r ssh 22/tcp # Secure Shell ssh 22/udp telnet 23/tcp Protocol # 24 - p r i v a t e smtp 25/tcp mail # 26 - u n a s s i g n e d time 37/tcp timserver time 37/udp timserver Looking at the audited ports, we can determine what service is potentially being served and whether this service should be open to the outside world to function correctly. Recording the information for later use will help us determine problems in the future (see Table B.1). Table B.1 Partially Audited Ports Connection Type IP + PORT tcp * .4000 tcp *.80 Web server tcp *.993 IMAPS server tcp *.25 SMTP server tcp *.22 Secure shell tcp *.21 FTP server tcp 6.7.8.9.53 DNS server Possible Service There is no way to know that this service is actually what is being used on the port without querying the system. We use another useful tool, lsof, to inspect each open port. Determining More Information with Isof Query the kernel data structures to return what process is associated with each particular port. The c o m m a n d that allows us to do this deep digging is lsof. This is a tool for listing open files on a U N I X system. In the U N I X world, pretty much everything is a file, and so lsofwill also list open ports, and tell you which process is holding that port open. www.syngress.com 235 236 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) lsof also has many flags, but we will keep it to a few simple examples. We examine a U D P connection on port 53. From the following output, we can see that it is named, which serves D N S as expected. slick: COMMAND {38} Isof -n-i UDP:53 PID USER FD TYPE DEVICE SIZE/OFF named 1177 named 20u IPv4 0xclf5f000 0t0 NODE NAME UDP 6.7.8.9:domain named 1177 named 22u IPv4 0xclf5f0d8 0t0 UDP 127.0.0.1:domain Checking U D P port 65510, we see that it is also named. This is most likely the rndc control channel. slick: COMMAND named {39} isof -n-i PID USER 1177 named UDP:65510 FD TYPE DEVICE SIZE/OFF 24u IPv4 0xclf5flb0 0t0 NODE NAME UDP *:65510 Examining T C P port 4000 with ~of, we see that this is a user process. We should talk to user Paul and discover what the service running on port 4000 is. slick: COMMAND {40} isof -n -i T C P : 4 0 0 0 PID U S E R FD TYPE DEVICE SIZE/OFF NODE NAME telnet 16192 paul 3u IPv4 0xc2065b44 0t0 TCP 127.0.0.1:60977- razors 22997 paul 4u IPv4 0xclff2ca8 0t0 TCP *:4000 razors 22997 paul 16u IPv4 0xc206516c 0t0 TCP 127.0.0.1:4000- >127.0.0.1:4000 >127.0.0.1:60977 (ESTABLISHED) (ESTABLISHED) (LISTEN) Using netstat-an, create a list of listening ports. With lsof,, check each of these ports to figure out what processes are actually listening, and confirm that the services match the processes as expected. Figure out if those processes are needed, and either turn them off, or set up an ACL on your firewall to allow that service through. Using netstat on Windows XP With Windows XP, there are additional flags -b,-v, a n d - 0 that will show additional information.-b displays the executable involved in creating the connection. In the following example, you can see that Apache is running on the local system and it has port 80 o p e n . - v when used w i t h - b will display the sequence of components that created the connection.-0 will display the process that has the port open (see Table B.2). C:\Documents Active and Settings\jdavis>netstat Connections -anvb Case Study: SOHO (Five Computers, Printer, Servers, etc.) 9Appendix B Proto Local Address Foreign Address State PID TCP 0.0.0.0:80 0.0.0.0:0 LISTENING 1268 237 C:\WINDOWS\system32\imon.dll C:\Program Files\Apache Software Foundation\Apache2.2\bin\libapr-l.dll C:\Program Files\Apache Software Foundation\Apache2.2\bin\libhttpd.dll C:\Program Files\Apache Software Foundation\Apache2.2\bin\httpd.exe C:\WINDOWS\system32\kerne132.dll [httpd.exe] TCP 0.0.0.0:135 LISTENING 0.0.0.0:0 252 C:\WINDOWS\system32\imon.dll C:\WINDOWS\system32\RPCRT4.dll c:\windows\system32\rpcss.dll C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\ADVAPI32.dll [svchost.exe] Table B.2 Common Ports Associated with Popular Services 20 FTP data 68 DHCP 123 NTP 161 SNMP 993 SIMAP 21 FTP 79 Finger 137 NetBIOS 194 IRC 995 SPOD 22 SSH 80 http 138 NetBIOS 220 IMAP3 1433 MS SQL Svr 23 SMTP 110 POP3 139 NetBIOS 389 LDAP 2049 NFS 43 whois 115 SFTP 143 IMAP 443 SSL 5010 Yahoo! Messenger 53 DNS 119 NNTP 445 SMB 5190 AOL Messenger Closing all ports on a system makes the system useless on a network. Anytime a browser is used, or e-mail, is read, traffic is tunneling across open ports. Protect ports by using a firewall. As an individual worrying about the needs of a SOHO's firewall infrastructure, also make sure you "AUDIT" your systems by following these basic security steps to better ensure the company's security: r- www.syngress.com -~q 238 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) Apply the latest patches to any systems. This could be as simple as turning on Windows Auto Updater, or downloading the latest security patches for your favorite Linux distribution. Update any firmware on appliances you are running. This includes the firewall, the printer, the wireless router, and any other networked appliance if applicable. Determine which data is critical data. Set up an automated process for backing up that data. Make sure to have copies of those backups in multiple locations. Turn off unneeded services on your servers, and appliances. Due to the small size of a S O H O , there is often a misconception that there is no need for a firewall, that the company is insignificant to any would-be crackers or script kiddies. Everyone connected to the Internet should be aware of the potential dangers inherent in the medium. Just as you don't leave your front door open for any would-be thieves, the "front door" and any other open access points into the S O H O should be protected. Every open port on an Internet-visible host is an open access point into your system. By visiting random Web sites or opening dangerous e-mail, a user exposes himself to potential virus infections. Every time a user interacts with other systems on the Internet, his IP address is logged. Using this IP address, malicious users can hack in to the network using known vulnerabilities with standard applications. The malicious user will be looking for credit card numbers, bank accounts, or passwords to subscription Web sites, among other activities. For future abuse of the network, the malicious user could install a Trojan horse that would allow him to revisit the system later. A firewall doesn't solve all the potential security risks. It is a perimeter security measure that will stop a percentage of attacks. It will help prevent systems from being zombiefied and then attack other systems and networks. Additionally, if a malicious user manages to crack a valid user's password, he can access the internal network with that user's credentials. Then it is just a matter of taking advantage of the vulnerabilities on the systems to get elevated privileges. www.syngress.com Case Study: SOHO (Five Computers, Printer, Servers, etc.) 9Appendix B There are a number of Internet-ready devices on the market to address the needs of a S O H O firewall. Depending on the number of servers, and environment of the S O H O , it is also possible to install and manage a firewall built on top of NetBSD, Linux, or other familiar OSes. Some appliances come with V P N features for remote access to network and resources. By using one of the Internet-ready devices, you lower the bar to entry in getting your firewall set up and blocking the traffic needed. This chapter and the case study explore the S O H O firewall.They examine the advantages, problems, and possible solutions, and then extend to design and implementation of a simple firewall solution that includes a VPN. Employing a Firewall in a SOHO Environment Any system is vulnerable to infiltration, infection, and compromise in a network. Systems can be turned into zombie systems and then remotely controlled by the attacker, and used to attack other systems and networks. E-mail, future project plans, and competitive information could expose the company to an unknown degree of liability. This would brand a company to its customers, and potential customers as less than reliable. Do not be the low-hanging fruit that is easily snatched by an attacker. Safeguard yourself, company, brand name, and customers by seriously analyzing your security needs. As one aspect of a comprehensive security solution, the firewall protects the home and small office from external attack by only allowing authorized users and applications to gain access, while allowing network pass through for authentic data. Host-Based Firewall Solutions Use a host-based firewall as one element in your defense in-depth strategy, but do not rely on that application alone to protect your data and systems. Zone Fire Marm, Windows XP Internet Connection Firewall, and other host-based firewalls protect individual systems. Having a firewall that sits outside the system that runs the applications you are using means the firewall is protecting all your assets in a unified fashion, minimizing problems of application interference. If a host-based firewall solution crashes, it can take the system down with it. If an appliance crashes, only the appliance is affected. Finally, a host-based firewall uses the resources of your system to protect you. An appliance does not take away CPU, and memory resources, to protect access to resources. www.syngress.com 239 240 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) Make sure to update all systems on a regular basis for patches, or updates to applications. Install antivirus software, antispyware software, and a software firewall to the host. This will harden the host considerably. Protect the system behind a firewall appliance. This creates two layers of protection for each system. Introducing the SOHO Firewall Case Study The following case study illustrates the design of a simple S O H O firewall intended for the average user without much hands-on systems or security experience. The user is interested in securing his networked business assets, while allowing his family general use of the broadband network access. He wants to protect all systems from attack on the outside, and prevent dangerous outgoing traffic. He also wants to encourage external traffic to a personalized company Web site, and to interact with his customers with a personalized e-mail address. This section describes the user's current situation, the problem, the proposed solution, and the implementation of the solution. Assessing Needs Tom Little is a sole trader in the home office space. He has set aside a room in his h o m e as an office for tax deductions. He has two desktops in his office that are the core of his business infrastructure. One contains billing invoices, customer account information, and account management software that his wife uses in her role as secretary for the business. The other system includes all of his e-mail correspondence with vendors and customers, and his project plans for the various accounts he is currently working. Tom has a printer connected to his main work system that is shared. Tom has a networked 160GB Ethernet hard drive on which he stores backups of his files. He also uses his laptop connected to the network. Tom's two children have their own PCs. Tom grants them Internet time while watching over them, allowing them to explore and broaden their knowledge in a supervised environment. Tom currently has broadband access to his home. All his systems are connected via cat 5 cable from the DSL router provided by his ISE Tom wants to create a more segregated network. He also wants to move the kids' systems out of his office. He plans to implement a wireless solution to allow him to access his business resources remotely with his laptop. He also wants a personalized Web site and e-mail address so he can e-mail his clients from a @ c o m pany.com address rather than the @yahoo.com address he has been using. Tom does www.syngress.com Case Study: SOHO (Five Computers, Printer, Servers, etc.) 9Appendix B a little investigation of the products available and realizes many of the solutions are well within his budget (see Figure B. 1). F i g u r e B.1 Tom's Current Network Topology Defining the Scope of the Case Study Tom's challenge is that he needs to protect his company's assets without interfering with the running of his business, or his family's access to the Internet. All equipment he uses must be readily available, and inexpensive. Designing the SOHO Firewall This section explains how Tom determines his needs, and plans, designs, and implements a firewall with VPN. Tom learns more about the available features, differences in firewall technology, and costs of different vendor solutions. Tom proceeds by: 9 Determining the requirements. 9 Analyzing the existing environment. 9 Creating a preliminary design. 9 Developing a detailed design. 9 Implementing the firewall with VPN and modifying the network. www.syngress.com 241 242 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) Tom begins his investigation by: 9 Determining the functional requirements of his family and business. 9 Talking to local user groups for recommendations. 9 Drawing a physical map of his home. Determining the Functional Requirements The users of the network are Tom, his wife, and their children. Tom and his wife both use the Internet for recreational purposes, and for the home business. His children use the Internet for school projects, and gaming. Tom works with his family to define expectations of the home network. Determining the Needs of the Family Although Tom's wife sees the benefits of separating the children's PCs from the home office, she is worried that she won't be able to get the access she needs to the Internet. She also doesn't see how she will be able to supervise the kids' browsing habits. The kids aren't sure how they will be able to print their school papers, and are concerned that a firewall will adversely affect the bandwidth that is available for their gaming. They are excited about having the computers in their own space. Tom plans to buy his wife a laptop to facilitate her working remotely and watching over the kids, and a printer for the kids to print their schoolwork. Tom is considering either running a Web server, and e-mail server locally, or paying for hosted services. This limits his budget for modifying his network to include a firewall to $200. Talking to Local User Groups Tom has heard of the local user group BayLISA, a group of system and network administrators ranging in skill levels. The group meets once per month to discuss issues related to their professions. It can also be a social atmosphere. Tom decides to e-mail the group with a detailed list of his problem. He registers with the BayLISA group by sending an e-mail to the mailing list manager majordomo@baylisa.org with the body "subscribe baylisa." He follows the verification mechanism.After watching traffic for a few days, he submits his request. Tom receives a number of responses from his query and notes all of the information. He categorizes product recommendations and experience separate from the general comments about his problems. Many users recommend he use a hosted site, as he www.syngress.com Case Study: SOHO (Five Computers, Printer, Servers, etc.) 9Appendix B does not have the expertise to manage a Web or e-mail server. He could accidentally expose all his private files with the Web server, and expose his business network to more vulnerabilities by having incorrectly configured servers, or nonpatched servers. He is reassured that the process of setting up a wireless network is painless, so he can move his children's computers out of the office. Additionally, although he could set up a firewall on a Linux- or Unix-based system, he doesn't have the finances to spend on the hardware, or the expertise to support the OS, applications, and firewall tuning that would be required. He is better off purchasing a firewall appliance he just has to remember to update regularly. Creating a Site Survey of the Home Based on his preliminary investigations and guidance from the user group, Tom comes up with the following design considerations: 9 He needs to purchase a firewall with V P N capabilities. 9 He needs to purchase a wireless access point to connect the laptops and children's systems. 9 He needs to purchase two wireless cards for the children's desktop computers. m He needs to invest in a hosted service plan that will allow him to have a personalized Web site, and e-mail address. The next step is to analyze the existing environment. This includes: 9 Identifying current technology options and constraints. m Investigating the costs. 9 Weighing the costs and benefits of each solution. Tom determines that there is an equal amount of business, school, and entertainment content being used for the broadband access. He determines the second printer for the kids is a good choice, as it will limit the access the children need to the office network. He also determines that he does not want the Web server, and email server, affecting the family's bandwidth, so he has decided to remotely host these services. Tom's existing network is very simple. The broadband service is delivered to the house from a DSL modem. From the modem, the service is wired to the PCs via a cat 5 Ethernet cable. The printer is a peripheral of his main business PC via the PC's serial port. It is shared out to the local network. The networked disk is connected via a cat 5 Ethernet cable that sits 243 244 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) Identifying Current Technology Options and Constraints After talking to the local user groups, exploring the options available on the store shelves, and doing searches on the Internet using the words SOHOfirewall best practices, Tom realizes he has several options in configuring his firewall. Tom creates a list of the options available so he can better examine the choices he has to make. He fills out a list of important features, technical specs, and the pricing associated for each model. His list looks similar to Table B.3 with a column for each solution. Table B.3 Vendor Feature List Vendor Product Features Website Firewall Type VPN Type Intrusion Prevention Intrusion Detection Antivirus Protection Content Filtering Update Mechanism Licensing Management Netgear Prosafe FVS 114 Stateful Packet Inspection IPSec (ESP,AH), MD5, SHA-1, DES, 3DES, IKE, PKI, AES Y Y N Some Via Web Browser NA Via Web Browser Technical Processor OS Memory Ports Wireless Console/Modem Certifications Price 200 MHz 32-bit RISC 2MB Flash, 16MB SDRAM 4 N N VPNC Compliant $79.99 Case Study: SOHO (Five Computers, Printer, Servers, etc.) 9 Appendix B He then populates the list with the various vendor offerings he finds at the local Fry's Electronics, Best Buy, and online listings. He would prefer to purchase the hardware locally, because if it doesn't work, he wants the ease of returning it quickly. He quickly determines that the Linksys Wireless G Broadband Router, at $59.99, and the Netgear Prosafe VPN Firewall model FVS 114, at $79.99, fit perfectly into his budget and have all the functionality he needs. Implementing the SOHO Firewall This section describes at a high level how Tom builds his firewall protected VPN accessible network. He approaches the implementation by: 9 Assembling the network components. 9 Installing the components. 9 Testing the configuration from the various access points. Assembling the Components Tom visits his local hardware store, Fry's Electronics, and picks up a Linksys Wireless G Broadband Router, a Netgear Prosafe VPN Firewall model FVS 114, and two ASUS 802.11b/g Wireless LAN cards. He already has the cat 5 cables that will connect his business systems to the firewall. Installing the Components Tom is reasonably experienced with hardware installation, having previous upgraded the children's desktops. He feels comfortable having assembled the components, and tools, so he shouldn't have any problems putting the network together. Remote Virtual D M Z After looking at the various options available for hosting his Web and e-mail servers, Tom chooses to go with the Yahoo! Small Businesses Services site. He has been using his @yahoo.com address for years and has not had any problems with it. He knows that Yahoo? has a reliable and redundant network due to the nature of its business. He is also impressed with their use of regular snapshots, and backups of Web sites. He feels secure in the knowledge that his Web site will not just disappear at a moment's notice. Tom searches for a descriptive domain name widgets.com at http://smallbusiness.yahoo.com/webhosting. He tries tomswidgets.com, and it is available. He clicks on c o m p a r e all plans. Looking at the disk space and other features, he realizes that for now, he just needs the starter plan. He pays a $25 setup fee 245 246 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) and $11.95 for 5GB of space, 200 possible business e-mail addresses, and other features. He knows that it will take approximately 24 hours before his domain is live, but he is immediately able to begin editing the site. His wife logs in to the site, and replicates a brochure she made for the company using the site builder tools. He is investing in a solution that means he doesn't have to rely on understanding all the technical decisions on how to build a reliable, fault-tolerant mail and Web server solution, and manage the spam and anti-virus protection for his inbound and outbound e-mail. For now, the space will just hold his Widget catalog, and contact information but his wife has many creative ideas on how to improve the site. This solution has created a remote virtual D M Z that separates his Web server and mail server from his home systems. It maximizes his time in not having to manage servers that would also consume the bandwidth into his home. Installing the Wireless Cards Tom puts on an antistatic wristband before he opens the children's PCs. He unplugs the power, and all of the cables, and sets the systems on a flat working surface. He opens each PC in turn, attaching the wristband to the metal frame of the computer. He unscrews the screw holding the metal guard in place in front of the open PCI slot. He inserts one of the cards carefully, pushing until he feels the card firmly click into place. He repeats the procedure on the second computer. Tom closes each system, noting the MAC address for each card. He powers the systems back on after plugging them in. The Add New Hardware wizard appears, and Tom follows the instructions for installing the software for the cards. He confirms that the MAC addresses are what he expects by opening a command window with Start I R u n I c o m m a n d . He types i p c o n f i g / a l l and sees Ethernet adapter Media Wireless State Description Physical Network Connection: . . . . . . . . . . 9 : Media . . . . . . . . . . 9 : ASUS Address . . . . . . . . disconnected 802.11b/g Wireless LAN Card 9 : 00-11-E6-AB-24-9C He repeats this process on the second computer. While he is noting down MAC addresses, he checks the two laptops to confirm their addresses. Configuring the Wireless Router Tom plugs in the wireless router into the DSL modem. He follows the instructions for connecting to the wireless router that came with the packaging. He first sets the wireless network name to WiHoInc and disables the SSID broadcast.According to www.syngress.com Case Study: SOHO (Five Computers, Printer, Servers, etc.) 9Appendix B the user group postings, this makes it less likely that individuals trolling for wireless access will discover his wireless network. The default username and password for the wireless router is blank username, and admin for the password. Change this as soon after the basic configuration. He enables WPA Pre-Shared key, chooses AES for encryption, and creates a reasonable length shared key "Widgets for the Win."This is a pass phrase that will be easy for him to remember, but not easy for others to take advantage of. He records it in his PDA device in an encrypted format where he keeps the rest of his passwords that access his important data. He enables MAC filtering, which will allow him to permit only PCs listed to access the wireless network. He edits the MAC filter address and adds his children's PCs, and the two laptops. He clicks the Security tab, and enables the firewall protection. Although this is not Tom's main firewall, this will protect his laptop, and kids' systems from some attacks. He makes sure Block Anonymous Internet requests is enabled. He also filters multicast and I D E N T requests. He does not filter Internet NAT redirection. He logs in to each of the children's PCs, as well as the laptops, and configures them to connect to the WiHolnc network. After confirming that the connections work, he disassembles and reassembles the children's PCs in their rooms. He could configure the wireless firewall to only allow network traffic at certain times of day to prevent his children from browsing the network while he or his wife is not around, but he feels they will follow the rules for using the Internet. Additionally, he has logging turned on so he knows exactly where the systems are browsing. He also has the capability of enabling blocking of specific sites, or keywords. The firewall on the wireless appliance is limited, so in the future he may pick up another firewall appliance to put between the network router and the wireless appliance. Configuring the Firewall with VPN Router Tom connects a cat 5 Ethernet cable from the wireless router to his firewall. He turns on the firewall. He then connects his computer and printer network ports to the firewall Ethernet ports. He checks that the lights for each of the ports are showing up as connected. www.syngress.com 247 248 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) The firewall separates the internal network from the other networks, keeping the interior of the network the most secure. If the wireless network is compromised, the servers on the internal network are not accessible. He browses to 192.168.0.1 (the default IP address for this particular appliance). He accepts all the defaults allowing the wireless router to give the firewall a D H C P address, and let the firewall give his internal systems their own IP addresses. The default username and password for the firewall is admin, and password. Change this soon after the basic configuration. Tom checks the Basic Settings. He can safely accept this basic configuration from the initial setup. He then checks logging, and checks the All Websites and news groups visited, All incoming T C P / U D P / I C M P traffic, All Outgoing T C P / U D P / I C M P traffic, Other IP traffic, and Connections to the Web based interface of this Router, as he wants to get as much information as possible about what is happening in his internal network. Later, after he feels comfortable with what is normal behavior on his systems, he might turn off some of the logging so it is not as comprehensive. Tom doesn't worry about the syslog server configuration, as he does not have a logging infrastructure. For now, Tom isn't going to e-mail the logs to himself; instead, he chooses to look at them and clear them manually. The logging is now comprehensive. The highlighted portion of the log in Figure B.2 shows Tom's access to the Administrator Interface. O n the Rules tab, Tom sees that he can configure specific rules to allow and disallow services, and actions from happening. Tom plans to watch his log for a few days and determine what if anything he needs to tune. Tom invested in a solution that would give him VPN functionality. This allows him to connect his laptop remotely to the internal system so he can print, or access records from his porch or anywhere in his house. N o w that he has the basic firewall configured, he can configure the VPN access. He clicks on the VPN wizard, and gives the connection a name. He reuses his pre-shared key, and chooses remote VPN client. www.syngress.com Case Study: SOHO (Five Computers, Printer, Servers, etc.) 9Appendix B F i g u r e B.2 Administrator Access Logged He downloads the Netgear V P N client software so that he can use IPSec to connect to the VPN. Optionally, he could connect direct to another V P N firewall via his firewall if he were to bring on board a remote partner using this same V P N wizard setting on the V P N firewall. Testing the Configuration from Various Access Points Tom first checks that his children can access the Internet. The speeds appear to be fine connecting to www.yahoo.com. He next tries to access his office printer, or his office server. Both appear to be inaccessible to his children. Next, Tom checks that he has access to the Internet on his laptop. He knows he can browse the Web from his children's PCs, so he is not expecting any problems. He is not d i s a p p o i n t e d ~ t h e wireless works as expected. He turns on the V P N tunnel by clicking on the application software icon. He now has access to the printer, and servers, that are sitting in his office. He confirms this by accessing the printer and file shares available from his server. Finally, Tom checks that his office servers have the access required to function within the scope of his business needs. He accesses the widget production site to download costs of materials. The connection works. He can also print from both systems, and access his backup file server. He is satisfied that his network is working the way he expects it to. 249 250 Appendix B 9Case Study: SOHO (Five Computers, Printer, Servers, etc.) Summary A firewall acts as a border guard, filtering packets by application proxy, packet filtering, or state inspection. Tom's final network topology is comprehensive. He has an internal D M Z that creates an untrusted network that is still protected within his network, an external virtual D M Z via the hosted service, and an internal protected network behind the firewall (Figure B.3). F i g u r e B.3 Tom's Network with Firewall Choose the right firewall for your needs. If you don't have a GB connection, 1000Mbps is not useful. 10/100 is sufficient. DHCP, a decent management GUI for managing the firewall, wireless access points, virtual private networks, along with the type of filters, and the mechanism of firewalling are all aspects you need to analyze to determine what will be the most cost-effective with feature trade-offs. Don't implement services you won't use. www.syngress.com Case Study: SOHO (Five Computers, Printer, Servers, etc.) 9Appendix B Solutions Fast Track Introducing the SOHO Firewall Case Study [-d Security is an important function that S O H O users must address as they connect to the intranet. gl Protection of networked assets can be seen as securing your house on a virtual level. V------d End services you do not need so you do not have open ports on your system that could be used to infiltrate your network. Use netstat to determine what services are running on which ports. Designing the SOHO Firewall Gaming, education, and business interactions are all components of the functional requirements. V---d In the preliminary design, the user opts for a remote service hosting his Web and e-mail, a firewall, and wireless router. Implementing the SOHO Firewall [-4I In the detailed design, the user assembles the components, installs the hardware, configures the software, and tests access points. [-4I Configuration includes examining the default settings, enabling logging, and the VPN. Further modifications to the firewall can be enabled after examining typical usage from the logs. V4I Depending on the functional requirements, there are a n u m b e r of solutions that range in price from $50 to $600 for small businesses, and home office users. V4I Change default passwords for all appliances. 251 252 Appendix B ~ Case Study: SOHO (Five Computers, Printer, Servers, etc.) Frequently Asked Questions The fOllowing Frequently Asked Questions, answered by the authors of this book, are designed to both measure your understanding of the concepts presented in this chapter and to assist you with real-life implementation of these concepts. To have your questions about this chapter answered by the author, browse to www.syngress.com/solutions and click on the "Ask the Author" form. Q: How do I maintain an out-of-the-box solution firewall? A; Check the Web site for the manufacturer of the Web site. Sign up for any mailing lists, and make sure to install any firmware patches that are recommended. Q m One of my applications isn't working right. How do I make it work? A: First, take the firewall out of the picture. Does it work now? If so, start working basic principles.Turn on the highest level logging on the firewall. Does it show in the logging that the connection is being refused? If so, configure a rule in the rule set to match that setting.You can figure out what settings are needed using tletstat on the s y s t e m ~ n n i n g"~i the application to see what ports it is looking for. If you a r J ' t seeifig a connection refused in the logs, check to see if you see any p r o b l e m ~ d j : ..~. Imwiththis part,icular application and your chosen appliance. Finally, if a / e l s e tails, a/~iyou cant find the information o n your own, contact the m ~ t u r e r l " L ~ p o r t . ~ By going through these steps first, you can show that you have n ~ i g e n t lve your own problem, :e and the support staff will b e . ~ r e a t t ~ e :eps you have taken. Q: If it doesn't work, whom do I talk to? A" Contact support for the manufacturer. Check ntation that came with the appliance, and the vendor's Web site. It i r e c o n l n ~ d to check the vendor's Web site prior to purchasing a solution to gauge the support level available. Check your favorite mailing lists, baylisa@baylisa.org, and sage-members@sage.org. Local Linux user group mailing lists like svlug@svlug.org can generally be helpful, or you can check security mailing lists. Q" What is the cost of the out-of-the-box solution? A: This case study showed a solution that cost $130 for the wireless and firewall appliances, and then a Web services fee of $12 per month to host the Web site. Depending on the solutions you choose, you may spend less or more based on the functionality, and vendor. Appendix C 253 254 Appendix C 9Glossary of Technology and Terminology ActiveX: ActiveX is a Microsoft creation designed to work in a manner similar to Sun Microsystems' Java. The main goal is to create platform-independent programs that can be used continually on different operating systems. ActiveX is a loose standards definition; not a specific language. An ActiveX component or control can be run on any ActiveX-compatible platform. ActiveX defines the methods with which these C O M objects and ActiveX controls interact with the system; however, it is not tied to a specific language. ActiveX controls and components can be created in various programming languages such as Visual C + + , Visual Basic, or VBScript. Active Scripting: Active scripting is the term used to define the various script programs that can run within and work with Hypertext Markup Language (HTML) in order to interact with users and create a dynamic Web page. By itself, H T M L is static and only presents text and graphics. Using active scripting languages such as JavaScript or VBScript, developers can update the date and time displayed on the page, have information pop up in a separate window, or create scrolling text to go across the screen. Adware: While not necessarily malware, adware is considered to go beyond the reasonable advertising one might expect from freeware or shareware. Typically, a separate program that is installed at the same time as a shareware or similar program, adware will usually continue to generate advertising even when the user is not running the originally desired program. * Antivirus Software: Antivirus software is an application that protects your system from viruses, worms, and other malicious code. Most antivirus programs monitor traffic while you surf the Web, scan incoming e-mail and file attachments, and periodically check all local files for the existence of any known malicious code. Application Gateway: An application gateway is a type of firewall. All internal computers establish a connection with the proxy server. The proxy server performs all communications with the Internet. External computers see only the Internet Protocol (IP) address of the proxy server and never communicate directly with the internal clients. The application gateway examines the packets more thoroughly than a circuit-level gateway when making forwarding decisions. It is considered more secure; however, it uses more m e m o r y and processor resources. www.syngress.com Glossary of Technology and Terminology 9Appendix C Attack: The act of trying to bypass security controls on a system. An attack may be active, resulting in the alteration of data; or passive, resulting in the release of data. Note: The fact that an attack is made does not necessarily mean that it will succeed. The degree of success depends on the vulnerability of the system and the effectiveness of the existing countermeasures. Attack is often used as a synonym for a specific exploit.* Authentication: O n e of the keys in determining if a message or file you are receiving is safe is to first authenticate that the person w h o sent it is w h o they say they are. Authentication is the process of determining the true identity of someone. Basic authentication is using a password to verify that you are w h o you say you are. There are also more complicated and precise methods such as biometrics (e.g., fingerprints, retina scans). Backbone: The backbone of the Internet is the collection of major communications pipelines that transfer the data from one end of the world to the other. Large Internet service providers (ISPs) such as AT&T and W o r l d C o m make up the backbone. They connect through major switching centers called Metropolitan Area Exchange (MAE) and exchange data from each others' customers through peering agreements. Backdoor: A backdoor is a secret or u n d o c u m e n t e d means of gaining access to a computer system. Many programs have backdoors placed by the programmer to allow them to gain access in order to troubleshoot or change a program. Other backdoors are placed by hackers once they gain access to a system, to allow for easier access into the system in the future or in case their original entrance is discovered. Biometrics: Biometrics is a form of authentication that uses unique physical traits of the user. Unlike a password, a hacker cannot "guess" your fingerprint or retinal scan pattern. Biometrics is a relatively new term used to refer to fingerprinting, retinal scans, voice wave patterns, and various other unique biological traits used to authenticate users. Broadband: Technically, broadband is used to define any transmission that can carry more than one channel on a single m e d i u m (e.g., the coaxial cable for cable TV carries many channels and can simultaneously provide Internet access). Broadband is also often used to describe high-speed Internet connections such as cable modems and digital subscriber lines (DSLs). 255 256 Appendix C 9Glossary of Technology and Terminology Bug: In computer technology, a bug is a coding error in a computer program. After a product is released or during public beta testing, bugs are still apt to be discovered. W h e n this occurs, users have to either find a way to avoid using the "buggy" code or get a patch from the originators of the code. Circuit-level Gateway: A circuit-level gateway is a type of firewall. All internal computers establish a "circuit" with the proxy server. The proxy server performs all communications with the Internet. External computers see only the IP address of the proxy server and never communicate directly with the internal clients. Compromise: W h e n used to discuss Internet security, compromise does not mean that two parties c o m e to a mutually beneficial agreement. Rather, it means that the security of your computer or network is weakened. A typical security compromise can be a third party learning the administrator password of your computer. Cross Site Scripting: Cross site scripting (XSS) refers to the ability to use some of the functionality of active scripting against the user by inserting malicious code into the H T M L that will run code on the users' computers, redirect them to a site other than what they intended, or steal passwords, personal information, and so on. XSS is a programming problem, not a vulnerability of any particular Web browser software or Web hosting server. It is up to the Web site developer to ensure that user input is validated and checked for malicious code before executing it. Cyberterrorism: This term is more a buzzword than anything and is used to describe officially sanctioned hacking as a political or military tool. Some hackers have used stolen information (or the threat of stealing information) as a tool to attempt to extort money from companies. D H C P : Dynamic Host Configuration Protocol (DHCP) is used to automate the assignment of IP addresses to hosts on a network. Each machine on a network must have a unique address. D H C P automatically enters the IP address, tracks which ones are in use, and remembers to put addresses back into the pool when devices are removed. Each device that is configured to use D H C P contacts the D H C P server to request an IP address.The D H C P server then assigns an IP address from the range it has been configured to use. The IP address is leased for a certain amount of time. W h e n Glossary of Technology and Terminology 9Appendix C the device is removed from the network or w h e n the lease expires, the IP address is placed back into the pool to be used by another device. D e m i l i t a r i z e d Zone: The demilitarized zone (DMZ) is a neutral zone or buffer that separates the internal and external networks and usually exists between two firewalls. External users can access servers in the D M Z , but not the computers on the internal network. The servers in the D M Z act as an intermediary for both incoming and outgoing traffic. D N S : The Domain Name System (DNS) was created to provide a way to translate domain names to their corresponding IP addresses. It is easier for users to remember a domain name (e.g., yahoo.corn) than to try and remember an actual IP address (e.g., 65.37.128.56) of each site they want to visit. The D N S server maintains a list of domain names and IP addresses so that when a request comes in it can be pointed to the correct corresponding IP address. Keeping a single database os all domain names and IP addresses in the world would be exceptionally difficult, if not impossible. For this reason, the burden has been spread around the world. Companies, Web hosts, ISPs, and other entities that choose to do so can maintain their own D N S servers. Spreading the workload like this speeds up the process and provides better security instead of relying on a single source. Denial of" Service: A Denial-of-Service (DOS) attack floods a network with an overwhelming amount of traffic, thereby slowing its response time for legitimate traffic or grinding it to a halt completely. The more c o m m o n attacks use the built-in features of the Transmission Control Protocol ( T C P ) / I P to create exponential amounts of network traffic. E - m a i l Spoofing: E-mail spoofing is the act os forging the header information on an e-mail so that it appears to have originated from somewhere other than its true source. The protocol used for e-mail, Simple Mail Transfer Protocol (SMTP), does not have any authentication to verify the source. By changing the header information, the e-mail can appear to come from someone else. E-mail spoofing is used by virus authors. By propagating a virus with a spoofed e-mail source, it is more difficult for users w h o receive the virus to track its source. E-mail spoofing is also used by distributors of spam to hide their identity. 257 258 Appendix C 9Glossary of Technology and Terminology Encryption: Encryption is when text, data, or other communications are encoded so that unauthorized users cannot see or hear it. An encrypted file appears as gibberish unless you have the password or key necessary to decrypt the information. Firewall: Basically, a firewall is a protective barrier between your computer (or internal network) and the outside world. Traffic into and out of the firewall is blocked or restricted as you choose. By blocking all unnecessary traffic and restricting other traffic to those protocols or individuals that need it, you can greatly improve the security of your internal network. Forensic: Forensic is a legal term. At its root it means something that is discussed in a court of law or that is related to the application of knowledge to a legal problem. In computer terms, forensic is used to describe the art of extracting and gathering data from a computer to determine how an intrusion occurred, w h e n it occurred, and who the intruder was. Organizations that employ good security practices and maintain logs of network and file access are able to accomplish this much easier. But, with the right knowledge and the right tools, forensic evidence can be extracted even from burned, waterlogged, or physically damaged computer systems. Hacker: C o m m o n l y used to refer to any individual who uses their knowledge of networks and computer systems to gain unauthorized access to computer systems. While often used interchangeably, the term hacker typically applies to those who break in out of curiosity or for the challenge itself, rather than those who actually intend to steal or damage data. Hacker purists claim that true hacking is benign and that the term is misused. Heuristic: Heuristics uses past experience to make educated guesses about the present. Using rules and decisions based on analysis of past network or e-mail traffic, heuristic scanning in antivirus software can self-learn and use artificial intelligence to attempt to block viruses or worms that are not yet known and for which the antivirus software does not yet have a filter to detect or block. Hoax: A hoax is an attempt to trick a user into believing something that is not true. It is mainly associated with e-mails that are too good to be true or that ask you to do things like "forward this to everyone you know." Glossary of Technology and Terminology 9Appendix C H o s t : As far as the Internet is concerned, a host is essentially any computer connected to the Internet. Each computer or device has a unique IP address which helps other devices on the Internet find and communicate with that host. H T M L : H T M L is the basic language used to create graphic Web pages. H T M L defines the syntax and tags used to create documents on the World Wide Web ( W W W ) . In its basic form, H T M L documents are static, meaning they only display text and graphics. In order to have scrolling text, animations, buttons that change when the mouse pointer is over them, and so on, a developer needs to use active scripting like JavaScript or VBScript or use third-party plug-ins like Macromedia Flash. There are variations and additions to H T M L as well. Dynamic Hypertext Markup Language (DHTML) is used to refer to pages that include things like JavaScript or CGI scripts in order to dynamically present information unique to each user or each time the user visits the site. Extensible Markup Language (XML) is gaining in popularity because of its ability to interact with data and provide a means for sharing and interpreting data between different platforms and applications. I C M P : Internet Control Message Protocol (ICMP) is part of the IP por- tion of TCP/IP. C o m m o n network testing commands such as P I N G and Trace R o u t e ( T R A C E R T ) rely on the I C M E I d e n t i t y T h e f t : Use of personal information to impersonate someone, usually for the purpose of fraud.* IDS: An Intrusion Detection System (IDS) is a device or application that is used to inspect all network traffic and to alert the user or administrator when there has been unauthorized access or an attempt to access a network. The two primary methods of monitoring are signature based and anomaly based. Depending on the device or application used, the IDS can alert either the user or the administrator or set up to block specific traffic or automatically respond in some way. Signature-based detection relies on the comparison of traffic to a database containing signatures of known attack methods. Anomaly-based detection compares current network traffic to a known good baseline to look for anything out of the ordinary. The IDS can be placed strategically on the network as a Network-based Intrusion Detection System (NIDS), which will inspect all network traffic, or it can be installed on each individual 259 260 Appendix C 9Glossary of Technology and Terminology system as a Host-based Intrusion Detection System (HIDS), which inspects traffic to and from that specific device only. Instant Messaging: Instant messaging (IM) offers users the ability to communicate in real time. Starting with Internet Relay Chat (IIkC), users became hooked on the ability to "chat" in real time rather than sending emails back and forth or posting to a forum or message board. Online service providers such as America Online (AOL) and CompuServe created proprietary messaging systems that allow users to see when their friends are online and available to chat (as long as they use the same instant messaging software). I C Q introduced an IM system that was not tied to a particular ISP and that kicked off the mainstream popularity of Instant Messaging. Internet: The Internet was originally called Arpanet, and was created by the United States government in conjunction with various colleges and universities for the purpose of sharing research data. As it stands now, there are millions of computers connected to the Internet all over the world. There is no central server or owner of the Internet; every computer on the Internet is connected with every other computer. Intranet: An Intranet is an Internet with restricted access. Corporate Intranets generally use the exact same communication lines as the rest of the Internet, but have security in place to restrict access to the employees, customers, or suppliers that the corporation wants to have access. IP: The IP is used to deliver data packets to their proper destination. Each packet contains both the originating and the destination IP address. Each router or gateway that receives the packet will look at the destination address and determine how to forward it. The packet will be passed from device to device until it reaches its destination. IP Address: An IP Address is used to uniquely identify devices on the Internet. The current standard (IPv4) is a 32-bit number made up of four 8-bit blocks. In standard decimal numbers, each block can be any number from 0 to 255. A standard IP address would look something like "192.168.45.28." Part of the address is the network address which narrows the search to a specific block, similar to the way your postal mail is first sent to the proper zip code. The other part of the address is the local address that specifies the actual device within that network, similar to the way your specific street Glossary of Technology and Terminology 9Appendix C address identifies you within your zip code. A subnet mask is used to determine how many bits make up the network portion and how many bits make up the local portion. The next generation of IP (IPv6 or [IP Next Generation] IPng) has been created and is currently being implemented in some areas. IP Spoofing: IP spoofing is the act of replacing the IP address information in a packet with fake information. Each packet contains the originating and destination IP address. By replacing the true originating IP address with a fake address, a hacker can mask the true source of an attack or force the destination IP address to reply to a different machine and possibly cause a DoS. IPv4: The current version of IP used on the Internet is version 4 (IPv4). IPv4 is used to direct packets of information to their correct address. Due to a shortage of available addresses and to address the needs of the future, an updated IP is being developed (IPv6). IPv6: To address issues with the current IP in use (IPv4) and to add features to improve the protocol for the future, the Internet Engineering Task Force (IETF) has introduced IP version 6 (IPv6) also known as IPng. IPv6 uses 128-bit addresses rather than the current 32-bit addresses, allowing for an exponential increase in the number of available IP addresses. IPv6 also adds new security and performance features to the protocol. IPv6 is backwards compatible with IPv4 so that different networks or hardware manufacturers can choose to upgrade at different times without disrupting the current flow of data on the Internet. ISP: An ISP is a company that has the servers, routers, communication lines, and other equipment necessary to establish a presence on the Internet. They in turn sell access to their equipment in the form of Internet services such as dial-up, cable modem, Digital Subscriber Line (DSL), or other types of connections. The larger ISPs form the backbone of the Internet. JavaScript: JavaScript is an active scripting language that was created by Netscape and based on Sun Microsystems' platform-independent programming language, Java. Originally named LiveScript, Netscape changed the name to JavaScript to ride on the coattails of Java's popularity. JavaScript is used within H T M L to execute small programs, in order to generate a dynamic Web page. Using JavaScript, a developer can make text or graphics 261 262 Appendix C 9Glossary of Technology and Terminology change when the mouse points at them, update the current date and time on the Web page, or add personal information such as how long it has been since that user last visited the site. Microsoft Internet Explorer supports a subset of JavaScript dubbed JScript. Malware: Malicious Code (Malware) is a catch-all term used to refer to various types of software that can cause problems or damage your computer. The c o m m o n types of malware are viruses, worms, Trojan horses, macro viruses, and backdoors. N A T : Network Address Translation (NAT) is used to mask the true identity of internal computers. Typically, the NAT server or device has a public IP address that can be seen by external hosts. Computers on the local network use a completely different set of IP addresses. W h e n traffic goes out, the internal IP address is removed and replaced with the public IP address of the NAT device. W h e n replies come back to the NAT device, it determines which internal computer the response belongs to and routes it to its proper destination. An added benefit is the ability to have more than one computer communicate on the Internet with only one publicly available IP address. Many home routers use NAT to allow multiple computers to share one IP address. Network: Technically, it only takes two computers (or hosts) to form a network. A network is any two or more computers connected together to share data or resources. C o m m o n network resources include printers that are shared by many users rather than each user having their own printer. The Internet is one large network of shared data and resources. Network Security: This term is used to describe all aspects of securing your computer or computers from unauthorized access. This includes blocking outsiders from getting into the network, as well as password protecting your computers and ensuring that only authorized users can view sensitive data. P2P: Peer-to-peer Networking (P2P) applies to individual PCs acting as servers to other individual PCs. Made popular by the music file swapping service, Napster, P2P allows users to share files with each other through a network of computers using that same P2P client software. Each computer on the network has the ability to act as a server by hosting files for others to download, and as a client by searching other computers on the network for files they want. Glossary of Technology and Terminology 9Appendix C Packet: A packet, otherwise known as a datagram, is a fragment of data. Data transmissions are broken up into packets. Each packet contains a portion of the data being sent as well as header information, which includes the destination address. Packet Filter: A packet filter is a type of firewall. Packet filters can restrict network traffic and protect your network by rejecting packets from unauthorized hosts, using unauthorized ports, or trying to connect to unauthorized IP addresses. Packet Sniffing: Packet sniffing is the act of capturing packets of data flowing across a computer network. The software or device used to do this is called a packet sniffer. Packet sniffing is to computer networks what wire tapping is to a telephone network. Packet sniffing is used to monitor network performance or to troubleshoot problems with network communications. However, it is also widely used by hackers and crackers to illegally gather information about networks they intend to break into. Using a packet sniffer, you can capture data such as passwords, IP addresses, protocols being used on the network, and other information that will help an attacker infiltrate the network. Patch: A patch is like a Band-Aid. W h e n a company finds bugs and defects in their software, they fix them in the next version of the application. However, some bugs make the current product inoperable or less functional, or may even open security vulnerabilities. For these bugs, users cannot wait until the next release to get a fix; therefore, the company must create a small interim patch that users can apply to fix the problem. Phishing: Posting of a fraudulent message to a large number of people via spare or other general posting asking them to submit personal or security information, which is then used for further fraud or identity theft. The term is possibly an extension of trolling, which is the posting of an outrageous message or point of" view in a newsgroup or mailing list in the hope that someone will "bite" and respond to it.* Port: A port has a dual definition in computers. There are various ports on the computer itself (e.g., ports to plug in your mouse, keyboards, Universal Serial Bus [USB] devices, printers, monitors, and so forth). However, the ports that are most relevant to information security are virtual ports found in T C P / I E Ports are like channels on your computer. Normal Web or Hypertext Transfer Protocol (HTTP) traffic flows on port 80. Post Office 263 264 Appendix C 9Glossary of Technology and Terminology Protocol version 3 (POP3) e-mail flows on port 110. By blocking or opening these ports into and out of your network, you can control the kinds of data that flows through your network. Port Scan: A port scan is a method used by hackers to determine what ports are open or in use on a system or network. By using various tools, a hacker can send data to T C P or User Datagram Protocol (UDP) ports one at a time. Based on the response received, the port scan utility can determine if that port is in use. Using this information, the hacker can then focus his or her attack on the ports that are open and try to exploit any weaknesses to gain access. Protocol: A protocol is a set of rules or agreed-upon guidelines for communication. W h e n communicating, it is important to agree on how to do so. If one party speaks French and one German, the communications will most likely fail. If both parties agree on a single language, communications will work. O n the Internet, the set of communications protocols used is called T C P / I R T C P / I P is actually a collection of various protocols that have their own special functions. These protocols have been established by international standards bodies and are used in almost all platforms and around the globe to ensure that all devices on the Internet can communicate successfully. Proxy Server: A proxy server acts as a middleman between your internal and external networks. It serves the dual roles of speeding up access to the Internet and providing a layer of protection for the internal network. Clients send Internet requests to the proxy server, which in turn initiates communications with actual destination server. By caching pages that have been previously requested, the proxy server speeds up performance by responding to future requests for the same page, using the cached information rather than going to the Web site again. W h e n using a proxy server, external systems only see the IP address of the proxy server so the true identity of the internal computers is hidden. The proxy server can also be configured with basic rules of what ports or IP addresses are or are not allowed to pass through, which makes it a type of basic firewall. Glossary of Technology and Terminology 9Appendix C Rootkit: A rootkit is a set of tools and utilities that a hacker can use to maintain access once they have hacked a system. The rootkit tools allow them to seek out usernames and passwords, launch attacks against remote systems, and conceal their actions by hiding their files and processes and erasing their activity from system logs and a plethora of other malicious stealth tools. Script Kiddie: Script kiddie is a derogatory term used by hackers or crackers to describe novice hackers. The term is derived from the fact that these novice hackers tend to rely on existing scripts, tools, and exploits to create their attacks. They may not have any specific knowledge of computer systems or why or how their hack attempts work, and they may unleash harmful or destructive attacks without even realizing it. Script kiddies tend to scan and attack large blocks of the Internet rather than targeting a specific computer, and generally don't have any goal in mind aside from experimenting with tools to see how much chaos they can create. SMTP: Simple Mail Transfer Protocol (SMTP) is used to send e-mail. The SMTP protocol provides a common language for different servers to send and receive e-mail messages. The default T C P / I P port for the SMTP protocol is port 25. SNMP: Simple Network Management Protocol (SNMP) is a protocol used for monitoring network devices. Devices like printers and routers use SNMP to communicate their status.Administrators use SNMP to manage the function of various network devices. Stateful Inspection: Stateful inspection is a more in-depth form of packet filter firewall. While a packet filter firewall only checks the packet header to determine the source and destination address and the source and destination ports to verify against its rules, stateful inspection checks the packet all the way to the Application layer. Stateful inspection monitors incoming and outgoing packets to determine source, destination, and context. By ensuring that only requested information is allowed back in, stateful inspection helps protect against hacker techniques such as IP spoofing and port scanning T C P : The T C P is a primary part of the T C P / I P set of protocols, which forms the basis of communications on the Internet. T C P is responsible for breaking large data into smaller chunks of data called packets. T C P assigns each packet a sequence number and then passes them on to be transmitted to their destination. Because of how the Internet is set up, every packet may not take the same path to get to its destination. T C P has the responsi- 265 266 Appendix C 9Glossary of Technology and Terminology bility at the destination end of reassembling the packets in the correct sequence and performing error-checking to ensure that the complete data message arrived intact. T C P / I P : T C P / I P is a suite of protocols that make up the basic framework for communication on the Internet. T C P helps control how the larger data is broken down into smaller pieces or packets for transmission. T C P handles reassembling the packets at the destination end and performing error-checking to ensure all of the packets arrived properly and were reassembled in the correct sequence. IP is used to route the packets to the appropriate destination. The IP manages the addressing of the packets and tells each router or gateway on the path how and where to forward the packet to direct it to its proper destination. Other protocols associated with the T C P / I P suite are U D P and ICMR Trojan: A Trojan horse is a malicious program disguised as a normal application. Trojan horse programs do not replicate themselves like a virus, but they can be propagated as attachments to a virus. U D P : U D P is a part of the T C P / I P suite of protocols used for c o m m u n i cations on the Internet. It is similar to T C P except that it offers very little error checking and does not establish a connection with a specific destination. It is most widely used to broadcast a message over a network port to all machines that are listening. VBScript: VBScript is an active scripting language created by Microsoft to compete with Netscape's JavaScript. VBScript is based on Microsoft's popular programming language, Visual Basic. VBScript is an active scripting language used within H T M L to execute small programs to generate a dynamic Web page. Using VBScript, a developer can cause text or graphics to change when the mouse points at them, update the current date and time on the Web page, or add personal information like how long it has been since that user last visited the site. Virus: A virus is malicious code that replicates itself. N e w viruses are discovered daily. Some exist simply to replicate themselves. Others can do serious damage such as erasing files or rendering a computer inoperable. Glossary of Technology and Terminology 9Appendix C V u l n e r a b i l i t y : In network security, a vulnerability refers to any flaw or weakness in the network defense that could be exploited to gain unauthorized access to, damage, or otherwise affect the network W o r m : A w o r m is similar to a virus. Worms replicate themselves like viruses, but do not alter files. The main difference is that worms reside in m e m o r y and usually remain unnoticed until the rate of replication reduces system resources to the point that it becomes noticeable. * These definitions were derived from R o b e r t Slade's Dictionary of Information Security (Syngress. ISBN: 1-59749-115-2). With over 1,000 information security terms and definitions, Slade's b o o k is a great resource to turn to w h e n you come across technical words and acronyms you are not familiar with. www.syngress.com 267 This Page Intentionally Left Blank Index 802.11x wireless protocols, 126-1.27 A access restricting to home wireless network, 130-131 Windows, levels and permissions, 18-21 accounts Guest, disabling in Windows XP, 11-12 user. See user accounts Acrobat Reader, 208-209 active scripting and Web surfing, 112-115 ActiveX controls, 106 Ad-aware, 145,146, 147-148 addresses IE See IP addresses MAC, 130-131 spoofed e-mail, 92-93 Administrator account securing home system, 128-129 Windows XP, 9-13 Adobe Acrobat Reader, 208-209 advertising See also spam, spyware adware, 140-144, 150 Aethera e-mail (Linux), 193-194 AfterSTEP window manager, 187 AirSnarf, 134 Amazon.com, 107 antivirus software using, 44-47 for wireless networks, 133 application gateways, 74 applications in desktop environments (Linux), 181-184 Office application suites (Linux), 209-214 running Windows on Linux, 214-217 updating, 162 A1LPNET, 86 attachments, e-mail, 87-91 attacks. See specific attack authentication, CHAP protocol, 203 Automatic Update (Windows XP), 57-60, 161 automating maintenance tasks, 159-161 B backing up data, 175 Backup For One, 175 BIOS (Basic Input/Output System), setting password in, 37-38 Blackbox window manager, 187, 188-189 blocking cookies, 108-109 e-mail file attachments, 89-90 ports via firewall, 227 spam, 94 Bloomberg cyber-extortion, 105 booting into Safe Mode (Windows), 174 bots described, 43 Brain virus, 43 browsers (Linux), 202-209 269 270 Index Brute Force Attacks, 36 Bugtraq vulnerability information, 57 C cable/DSL routers firewalls, 74-80 and NAT, 70, 112 CAN-SPAM Act, 95, 97 CDE (Common Desktop Environment), 185 certificates, digital, 116-117 CHAP (Challenge Handshake Authentication Protocol), 203 childproofing the Web, 119-120 Code Red worm, 48 Cohen, Fred, 43 Comcast's spam blocking, 96 Common Desktop Environment (CDE), 185 communication ports, 223 Computer Management Console (Windows XP), 9-11 computer networks. See networks computers. See PCs configuring home wireless networks, 130-131 Internet Explorer security zones, 113-115 log file size, 168 screen savers, 26-27 Windows Firewall, 76-80, 170-171 Windows services, 22-24 Windows user accounts, Security Groups, 8-16 ZoneAlarm firewall, 79 connections configuring for home wireless networks, 130-131 verifying hotspot, 135 content filtering, Web, 119-120 cookies, and security, 106-109 cracking passwords, 35-36 crime on the Web, 105-106 CrossOver Office suite, 216-217 cryptography. See encryption cumulative patches, 55 cyber-extortion, 105 D data, restoring, 175 defragmenting hard disks, 158-159 and performance, 155 denial-of-service (DOS) attacks, 76 desktop environments (Linux), 180-185,189 devices Plug and Play, 23 running NAT, 70 DHCP (Dynamic Host Configuration Protocol), 226 Dictionary Attacks, 35-36 digital certificates, 116-117 dir command, 25 disabling file sharing, 17-18, 134 firewall logging, 78 Guest accounts (Windows XP), 11-12 Simple File Sharing (Windows XP), 17-18 Windows services, 22-24 Index disaster response, event log-checking, 166-167 Disk Cleanup, 155-157 disk cleanup for PCs, 155-157 Disk Defragmenter, 158-159 displaying See also viewing Windows Display properties, 26-27 DNS servers, and IP address handling, 225 DoS (denial-of-service) attacks, 76 DSL cable and firewalls, 74-80 and NAT, 70, 112 and wireless networks, 126 E e-mail attachments, 87-91 evolution of, 86 hoaxes, phishing, 97-101 migrating from Windows to Linux desktops, 196-201 and PIM clients (Linux), 190-196 and PIM software (Linux), 96-201 resources on safe, 102 spare, 93-97 spoofed addresses, 92-93 Web-based and POP3, 91,136 education and the Web, 104-105 Employee-Monitoring.corn, 145 emulator software, 214-216 enabling firewall logging, 78 Security event logging, 167-169 encryption 271 password, 135-136 using with home wireless networks, 131-132 Enlightenment window manager, 187 erasing pagefiles, 157-158 event logs, 80, 166-169 Event Viewer, using, 166-167 Evolution e-mail (Linux), 190-192 exporting e-mail from Outlook, 199-201 F FAT32 vs. NTFS, 16 file and folder security, disabling sharing, 134 file attachments, opening e-mail, 86-91 files See also specificfile type and disk cleanup for PCs, 155-157 hidden extensions, 24-25 Windows, security, 16-21 filtering packet, and firewalls, 72-73 ZIP files, 90 financial transactions over the Web, 118-119 Firefox browser, 203-204 firewalls application gateways, proxy firewalls, 74 generally, 69-71 packet routing and filtering, 72-73 personal, 74-80, 133-134 resources about, 84 routers and ports, 71-72 security considerations, 227-228 272 Index stateful inspection, 73 in wireless networks, 124 folders, Windows Security, 16-21 FVWM window manager, 187 G Galeon browser, 204 gateways, application, 74 Gnome desktop environment (Linux), 181-185 GNU Project, 181 Groups, Windows Security, 13-15 Guest accounts, disabling in Windows XP, 11-12 H Hancom Office suite, 214 hard disks &fragmenting, 158-159 disk cleanup, 155-157 heuristic scanning, 47 hidden file extensions, 24-25 HIDS (host-based intrusion detection system), 80-81 HijackThis tool, 148, 149 hoaxes, 97-101 home wireless networks, securing, 128-133 host-based intrusion detection system (HIDS), 80-81 hosts, and IP addressing, DNS, 224-226 Hotmail Web-based e-mail, 91 hotspot security (wireless), 133-134 HTML (Hypertext Markup Language) and Web pages, 106 HTTP port 80, 223 Hybrid Attacks, 36 iCalendar, 201 ICS (Windows Internet Connection Sharing), 70 identity theft. See phishing IDSs (intrusion detection systems), 69 IIS (Internet Information Services), disabling, 23 importing bookmarks into Linux, 206 importing Outlook mail into Mozilla, 198-199 Internet Calendaring and Scheduling Core Object Specification (iCalendar) standard, 201 Internet Explorer setting security levels in, 113-115 vulnerabilities of, 57 Internet Information Services (IIS), 23 intrusion detection systems (IDSs), 69, 80-83 IP (Internet Protocol), 222 IP addresses described, 225 managing, 226-227 and network traffic flow, 70-72 spoofed e-mail, 92 IPSs (intrusion prevention systems), 69, 80-83 J JavaScript, 106 JDBGMG1L hoax, 99 Index 273 K M KDE desktop environment (Linux), 181,183-185 KDE suite/KMail, 192-193 keylogging, 144 KOffice suite, 213-214 Kolla, Patrick, 145 Konqueror browser, 205 KWin window manager, 187 MAC Media Access Code) addresses, 130-131 Macromedia Flash (Linux), 206-207 Macromedia Shockwave/Director, 207 maintenance, general PC, 154-161 Malicious Software Removal Tool, 50 malware See also spam, spyware described, 5-6 e-mail security concerns, 86-91 history of, 43-44 removing, 49-51 resources on, 52 McFee malware removal tools, 50 McFee VirusScan, 45-46 Melissa virus, 43 memory, erasing pagefiles, 157-158 Messenger, Windows, disabling, 23 Metacity window manager, 186 Microsoft Exchange, and Evolution, 192 Microsoft Internet Explorer, vulnerabilities of, 57 Microsoft Outlook Express migrating e-mail to Linux desktop, 197-199 vulnerabilities, 92, 94 Microsoft PowerPoint, 211 Microsoft Security Bulletins, 55, 162 Microsoft Windows. See Windows migrating bookmarks to Linux, 206 e-mail from Windows to Linux desktops, 197-199 from Windows to Linux desktops, 189 L L33t-5p34K G3n3r@t0r, 35 Lavasoft, 145 legislation, CAN-SPAM Act, 95 LibPST conversion application (Linux), 199 licensing, GNU Public License, 181 links, and phishing, 100-101 Linksys wireless routers, 128 Linux common desktop environments, 180-185 e-mail and PIM clients, 190-196 e-mail and PIM software, 196-201 Office application suites, 209-214 summary, 218 Web browsers, 202-209 X Window system, window managers, 185-189 logging enabling and disabling, 78 enabling Security event, 167-169 security event logs, 166-167 logins, Windows XP, 7 logs, event, 80 274 Index money transactions over the Web, 116-119 monitoring Internet traffic, 28 Web activity, 145 Mozilla Mail/Thunderbird browser/e-mail, 194-195, 198-199, 202-203 Opera browser, 205 Outlook Express migrating to Linux desktops, 197-199 spam blocking, 94 spoofed addresses, vulnerability, 92 N packet filtering, 72-73 packet routing, firewalls and, 72-73 pagefiles, erasing, 157-158 Password Safe, 37 passwords See also permissions cracking, 35-36 keeping secure, 32-35 protecting in wireless networks, 135-136 setting in BIOS, 37-38 storing, 36-37 strong, 12 use and security of, 30-31 weak, 6 and Windows access levels, 18-21 Windows XP Administrator account, 12-13 patches for PCs, 161-162 precautions, 60-63 purpose and procedures, 55-60 resources on, 64 terminology, 54-55 PCs (personal computers) booting into Safe Mode, 174 general maintenance, 154-161 Linux. See Linux patches and updates, 161-162 NAT (Network Address Translation), 70, 75,112,226-227 Net Nanny, 120 NetVizor, 145 Network Address Translation (NAT), 70, 75, 112,226-227 network-based intrusion detection system (NIDS), 80-82 network traffic, firewalls' handling of, 69-73 networks computer protocols and ports, 222-224 IP addresses and DNS, 224-226 peer-to-peer (P2P), 72 virtual private (VPNs), 136 and Windows security, 6 wireless. See wireless networks NIDS (network-based intrusion detection system), 80-82 NTFS vs. FAT32, 16 O Office application suites (Linux), 209-214 opening e-mail attachments, 87-91 OpenOffice.org, 209-213 P Index resources on securing, 164 restoring system, 173-174, 176-177 scanning events, log data, 171-172 scheduling maintenance tasks, 159-161 Windows XP Security Center, 162-163 PDF files, 208, 212 peer-to-peer (P2P) networking, 72 perimeter security firewalls, 69-80 introduction to, 68-69 intrusion detection and prevention, 80-83 permissions See also passwords and Windows access levels, 18-21 personal firewalls, 133-134 PGP encryption program, 135 phishing, 100-101, 119 physical security, 6 points, setting system restore, 62 pop-up spam and Windows Messenger Service, 4 POP3 (Post Office Protocol) e-mail servers, 72 vs. Web-based e-mail, 91,136 ports communication, 223 firewalls and, 71-72 PowerPoint, 211 preventing spyware, 145-150 virus and worm infections, 49-51 privacy adware and, 149 and anonymous Web surfing, 109-112 275 profiles, user account, 8 protocols See also specific protocol 802.11x wireless, 126-127 computer, TCE UDE 222-224 proxy firewalls, 74 PSW.Win.32.WOW.x Trojan horse, 30-31 public wireless networks, using safely, 133-134 R RAM (random access memory), erasing pagefiles, 157 RealPlayer plug-in, 207-208 rebooting in Safe Mode, 172 Registry, Windows, disabling Remote Registry, 23 removing malware, 49-51 spyware, 145-150 renaming admin accounts, home wireless systems, 128-129 Windows XP Administrator account, 12-13 resources e-mail safety, 102 on firewalls, 84 hoax databases, 100 keeping PCs secure, 164 on malware, 52 on passwords, 39 on patching, 64 PC recovery, 177 spyware and adware, 150 Web surfing privacy, safety, 121 Windows security, 28 276 Index wireless network security, 136 restore points, setting, 62 restoring Windows XR 173-175 Roboform (password program), 37 rollups described, 55 rootkits described, 43 routers and firewalls, 71-72 R.SA Security's survey on password security, 31 running Windows applications on Linux, 214-217 S Safe Mode, booting into, 172, 174 Sawfish window manager, 186 scanning, antivirus, 45-47 scheduling antivirus scans, 46-47 Internet Calendaring and Scheduling Core Object Specification (iCalendar) standard, 201 maintenance tasks, general PC, 159-161 screen savers, Windows, 25-27 scripting, active, and Web surfing, 112-115 Secunia's vulnerability information, 57 Secure Password Generator, 35 securing home wireless networks, 128-133 passwords, 32-35 security See also specific product or platform e-mail. See e-mail firewalls. See firewalls hotspot, 133-134 of passwords, 30-31 perimeter, 68-69 physical, 6 SSL connections, 116-117 Web surfing safely, 104-112 Windows XP Security Center, using, 162-164 Security Bulletins (Microsoft), 55 security event logging, enabling, 167-169 Security Focus's Bugtraq, 57 Security Groups, Windows, 13-21 Service Pack 2 (Windows XP), 5 service packs described, 55 Service Set Identifier (SSID), 129, 135 services, Windows, 21-24 session cookies, 107 sharing files, folders (Windows), 16-21 Shockwave/Director, 207 Simple File Sharing (Windows XP), 17-18 Simple Mail Transfer Protocol (smwP), 71 small office/home office (SOHO) perimeter security, 68-69 personal, cable/DSL router firewalls, 74-75 SMTP port, 223 SMTP (Simple Mail Transfer Protocol), 71 Snort IDS program, 82 software See also specific product or application antivirus, 44-49 compatibility layer, 215-216 malware, 5-6, 42-43 Index SOHO (small office/home office), 68-69, 74-75 spam e-mail, 93-97 and Windows Messenger Service, 4 Spector Pro monitoring program, 120, 145,148 spoofed e-mail addresses, 92-93 Spybot Search & Destroy, 145,148 SpyCop, 148 spyware adware, 140-144 generally, 144-145 introduction to, 140 preventing and removing, 145-150 resources on, 150 SQL Slammer virus, 43-44, 56 SSDP Discovery Service, 22-23 SSID (Service Set Identifier) changing, 129 and wireless encryption, 135 SSL (Secure Socket Layer) and shopping safety, 116-117 Star Writer, Star Impress, Star Calc, Star Web (Linux), 209-212 StarOffice suite, 213 stateful inspection, 73 storing passwords, 36-37 streaming video, 207 strong passwords, 12, 33-35 surfing the Web, privacy of, 109-112 Sylpheed e-mail application, 195-196 Symantec, 146 system restore, Windows XP, 173-174 277 T Tab Window Manager (TWB), 187 TCP/IP (Transmission Control Protocol/Internet Protocol), 223-224 Thunderbird (Mozilla), 195 traffic firewalls' handling of, 69-74 monitoring incoming and outgoing, 228 transactions, financial, over the Web, 116-119 Trend Micro's HouseCall, 51 Trend Micro's PC-cillin software, 45, 46-47, 79, 171 Trojan horses described, 43 PSW.Win.32.WOW.x, 30-31 TWB (Tab Window Manager), 187 TXT files, 88-89 U UDP protocol, 224 Universal Plug and Play (UPnP), 22-23 updating antivirus software, 47-49 patches, 55, 58-60 security on PCs, 161-162 UPnP (Universal Plug and Play), 22-23 U1KLs (universal resource locators) and spoofed addresses, 92-93 user accounts Windows configuration, 7-13 278 Index Windows XP home account types, 15-16 V VBScript, 106 Vcalendar standard, 201 Vcard (Virtual Card standard), 201 viewing Event Viewer Security logs, 169 installed services, 21-24 Virtual Card standard (Vcard), 201 virtual memory, erasing pagefiles, 157-158 virtual private networks (VPNs), 136 viruses, 42-43, 52 VPNs (virtual private networks), 136 vulnerabilities patches and, 54-56 Windows file and folder sharing, 16-21 W wardriving, 125 weak passwords, vulnerability of, 6 Web, the and active scripting, 112-115 content filtering, 119-120 cookies, 106-109 resources for using safely, 121 shopping and financial safety, 116-119 threats and vulnerabilities, 104-106 Web-based e-mail, 136 Web browsers (Linux), 202-209 WEP (Wired Equivalence Privacy), 131-132 WinBackup, 175 window managers (Linux), 185-189 WindowMaker window manager, 187 Windows access levels and permissions, 18-21 Automatic Update (Windows XP), 58-60 FAT32 vs. NTFS, 16 file and folder security, 16-21 hidden file extensions, 24-25 migrating to Linux desktops, 189 screen savers, 25-27 security groups, 13-15 Security Groups, 13-15 services, 21-24 threats and vulnerabilities, 5-13 update site, 161-162 vulnerabilities generally, 4-5 XP. See Windows XP Windows Disk Defragmenter, 158-159 Windows Event Logs, 80, 166-167 Windows Firewall, 76-80, 170-171 Windows Internet Connection Sharing (ICS) and NAT, 70 Windows Messenger Service disabling, 23 spam and, 4 Windows Services Console, 21-24 Windows System Restore feature, 61-62 Windows XP Administrator Tools, 9-11 Automatic Update, 57-60 Backup Utility, 175-176 disabling Guest accounts, 11-12 Index home account types, 15-16 logging in, 7 password security, 33-35 System Restore feature, 173-174 user account configuration, 7-13 Windows Firewall, 76-80 Windows System Restore feature, 61-62 Windows XP Home, auditing security, 167,166-167 Windows XP Security Center, using, 162-163 Windows XP Service Pack 2, 5 Wine emulator, 216 WinZip, 89, 135 Wired Equivalence Privacy (WEP), 131-132 wireless networks basics and protocols, 124-127 hotspot security, 134-137 public, using safely, 133-134 securing home system, 128-133 security resources, 136 World of Warcraft (WOW)Trojan, 30-31 World Wide Web. See Web, the WorldWide WarDrive (WWWD), 125 worms, 42-43, 52 WPA (Wi-Fi Protected Access), 131-132 X X Window servers, 187-188 X Window system, window managers (Linux), 185-189 279 Xfce desktop environment (Linux), 185 Y Yahoo's Web-based e-mail, 91 Z ZIP files, 89-90 zombies described, 43 ZoneAlarm firewall, 79-80, 108-109, 112 Syngress'. Syn.gress The Definition o[ a Serious Security Library (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. Syngress IT Security Project Management Handbook Susan Snedaker The definitive work for IT professionals responsible for the management of the design, configuration, deployment and maintenance of enterprise-wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. ISBN: 1-59749-076-8 Price: $59.95 US $77.95 CAN Combating Spyware in the Enterprise Paul Piccard Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. System administrators and security professionals responsible for administering and securing networks ranging in size from SOHO networks up to the largest enterprise networks will learn to use a combination of free and commercial anti-spyware software, firewalls, intrusion detection systems, intrusion prevention systems, and host integrity monitoring applications to prevent the installation of spyware, and to limit the damage caused by spyware that does in fact infiltrate their networks. ISBN: 1-59749-064-4 Price: $49.95 US $64.95 CAN Practical VolP Security Thomas Porter After struggling for years, you finally think you've got your network secured from malicious hackers and obnoxious spammers. Just when you think it's safe to go back into the water, VolP finally catches on. Now your newly converged network is vulnerable to DoS attacks, hacked gateways leading to unauthorized free calls, call eavesdropping, malicious call redirection, and spam over Internet Telephony (SPIT). This book details both VolP attacks and defense techniques and tools. ISBN: 1-59749-060-1 Price: $49.95 U.S. $69.95 CAN Syngress'. Syn.gress The Definition of a Serious Security Library (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives Dr. Eric Cole, Michael Nordfelt, Sandra Ring, and Ted Fair Have you ever wondered about that friend your spouse e-mails, or who they spend hours chatting online with? Are you curious about what your children are doing online, whom they meet, and what they talk about? Do you worry about them finding drugs and other illegal items online, and wonder what they look at? This book shows you how to monitor and analyze your family's online behavior. ISBN: 1-93183-641-8 Price: $39.95 US $57.95 CAN Stealing the Network: How to Own an Identity Timothy Mullen, Ryan Russell, Riley (Caezar) Eller, Jeff Moss, Jay Beale, Johnny Long, Chris Hurley, Tom Parker, Brian Hatch The first two books in this series "Stealing the Network: How to Own the Box" and "Stealing the Network: How to Own a Continent" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest-growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... ISBN: 1-59749-006-7 Price: $39.95 US $55.95 CAN Software Piracy Exposed Paul Craig, Ron Honick For every $2 worth of software purchased legally, $1 worth of software is pirated illegally. For the first time ever, the dark underground of how software is stolen and traded over the Internet is revealed. The technical detail provided will open the eyes of software users and manufacturers worldwide! This book is a tell-it-like-it-is expos~ of how tens of billions of dollars worth of software is stolen every year. ISBN: 1-93226-698-4 Price: $39.95 U.S. $55.95 CAN Syngress'. Syn.gress The Definition o[ a Serious Security Library (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. Phishing Exposed Lance James, Secure Science Corporation, Joe Stewart (Foreword) If you have ever received a phish, become a victim of a phish, or manage the security of a major e-commerce or financial site, then you need to read this book. The author of this book delivers the unconcealed techniques of phishers including their evolving patterns, and how to gain the upper hand against the ever-accelerating attacks they deploy. Filled with elaborate and unprecedented forensics, Phishing Exposed details techniques that system administrators, law enforcement, and fraud investigators can exercise and learn more about their attacker and their specific attack methods, enabling risk mitigation in many cases before the attack occurs. ISBN: 1-59749-030-X Price: $49.95 US $69.95 CAN Penetration Tester's Open Source Toolkit Johnny Long, Chris Hurley, SensePost, Mark Wolfgang, Mike Petruzzi This is the first fully integrated Penetration Testing book and bootable Linux CD containing the "Auditor Security Collection," which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost penetration testers including HD Moore, Jay Beale, and SensePost. This unique package provides you with a completely portable and bootable Linux attack distribution and authoritative reference to the toolset included and the required methodology. ISBN: 1-59749-021-0 Price: $59.95 US $83.95 CAN Google Hacking for Penetration Testers Johnny Long, Foreword by Ed Skoudis Google has been a strong force in Internet culture since its 1998 upstart. Since then, the engine has evolved from a simple search instrument to an innovative authority of information. As the sophistication of Google grows, so do the hacking hazards that the engine entertains. Approaches to hacking are forever changing, and this book covers the risks and precautions that administrators need to be aware of during this explosive phase of Google Hacking. ISBN: 1-93183-636-1 Price: $44.95 U.S. $65.95 CAN Syngress'. Syn.gress The Definition of a Serious Security Library (sin-gres)" noun, sing,. Freedom from risk or danger; safety. See security. Cisco PIX Firewalls: Configure, Manage, & Troubleshoot Charles Riley, Umer Khan, Michael Sweeney Cisco PIX Firewall is the world's most used network firewall, protecting internal networks from unwanted intrusions and attacks. Virtual Private Networks (VPNs) are the means by which authorized users are allowed through PIX Firewalls. Network engineers and security specialists must constantly balance the need for air-tight security (Firewalls)with the need for on-demand access (VPNs). In this book, Umer Khan, author of the #1 best selling PIX Firewall book, provides a concise, to-the-point blueprint for fully integrating these two essential pieces of any enterprise network. ISBN: 1-59749-004-0 Price: $49.95 US $69.95 CAN Configuring Netscreen Firewalls Rob Cameron Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Advanced troubleshooting techniques and the NetScreen Security Manager are also covered.. ISBN: 1--93226-639-9 Price: $49.95 US $72.95 CAN Configuring Check Point NGX VPN-I /FireWall- I Barry J. Stiefel, Simon Desmeules Configuring Check Point NGX VPN-1/Firewall-1 is the perfect reference for anyone migrating from earlier versions of Check Point's flagship firewall/VPN product as well as those deploying VPN-1/Firewall-1 for the first time. NGX includes dramatic changes and new, enhanced features to secure the integrity of your network's data, communications, and applications from the plethora of blended threats that can breach your security through your network perimeter, Web access, and increasingly common internal threats. ISBN: 1--59749-031-8 Price: $49.95 U.S. $69.95 CAN Syngress'. Syn.gress The Definition o[ a Serious Security Library (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. Winternals Defragmentation, Recovery, and Administration Field Guide Dave Kleiman, Laura E. Hunter, Tony Bradley, Brian Barber, Nancy Altholz, Lawrence Abrams, Mahesh Satyanarayana, Darren Windham, Craig Schiller As a system administrator for a Microsoft network, you know doubt spend too much of your life backing up data and restoring data, hunting down and removing malware and spyware, defragmenting disks, and improving the overall performance and reliability of your network. The Winternals| Defragmentation, Recovery, and Administration Field Guide and companion Web site provide you with all the information necessary to take full advantage of Winternals comprehensive and reliable tools suite for system administrators. ISBN: 1-59749-079-2 Price: $49.95 US $64.95 CAN Video Conferencing over IP: Configure, Secure, and Troubleshoot Michael Gough Until recently, the reality of videoconferencing didn't live up to the marketing hype. That's all changed. The network infrastructure and broadband capacity are now in place to deliver clear, real-time video and voice feeds between multiple points of contacts, with market leaders such as Cisco and Microsoft continuing to invest heavily in development. In addition, newcomers Skype and Google are poised to launch services and products targeting this market. Video Conferencing over IP is the perfect guide to getting up and running with video teleconferencing for small to medium-sized enterprises. ISBN: 1-59749-063-6 Price: $49.95 U.S. $64.95 CAN Syngre s s." The Definition of a Serious Security Library Syn.gress (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. How to Cheat at Designing Security for a Windows Server 2003 Network Neil Ruston, Chris Peiris While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization's security needs. ISBN: 1-59749-243-4 Price: $39.95 US $55.95 CAN How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure Melissa Craft, Michael Cross, Hal Kurz, Brian Barber The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts to drill deeper and focus on aspects such as group policy design. Finally, readers will learn to create the physical design for an active directory and network Infrastructure including DNS server placement; DC and GC placements and Flexible Single Master Operations (FSMO) role placement. ISBN: 1-59749-058-X Price: $39.95 US $55.95 CAN How to Cheat at Configuring ISA Server 2004 Dr. Thomas W. Shinder, Debra Littlejohn Shinder If deploying and managing ISA Server 2004 is just one of a hundred responsibilities you have as a System Administrator, "How to Cheat at Configuring ISA Server 2004" is the perfect book for you. Written by Microsoft MVP Dr. Tom Shinder, this is a concise, accurate, enterprise tested method for the successful deployment of ISA Server. ISBN: 1-59749-057-1 Price: $34.95 U.S. $55.95 CAN Syngress: The Definition of a Serious Security Library Syn.gress (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. Configuring SonicWALLFirewalls Chris Lathem, Ben Fortenberry, Lars Hansen Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Advanced troubleshooting techniques and the SonicWALL Security Manager are also covered. ISBN: 1-59749-250-7 Price: $49.95 US $69.95 CAN Perfect Passwords: Selection, Protection, Authentication Mark Burnett User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords, and this highly entertaining and informative book filled with dozens of illustrations reveals his findings and balances the rigid needs of security professionals against the ease of use desired by users. ISBN: 1-59749-041-5 Price: $24.95 US $34.95 CAN Syngres s." The Definition of a Serious Security Library Syn.gress (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. Skype Me! From Single User to Small Enterprise and Beyond Michael Gough This first-ever book on Skype takes you from the basics of getting Skype up and running on all platforms, through advanced features included in Skypeln, SkypeOut, and Skype for Business. The book teaches you everything from installing a headset to configuring a firewall to setting up Skype as telephone Base to developing your own customized applications using the Skype Application Programming Interface. ISBN: 1-59749-032-6 Price: $34.95 US $48.95 CAN Securing IM and P2P Applications for the Enterprise Brian Baskin, Marcus H. Sachs, Paul Piccard As an IT Professional, you know that the majority of the workstations on your network now contain IM and P2P applications that you did not select, test, install, or configure. As a result, malicious hackers, as well as virus and worm writers, are targeting these inadequately secured applications for attack. This book will teach you how to take back control of your workstations and reap the benefits provided by these applications while protecting your network from the inherent dangers. ISBN: 1-59749-017-2 Price: $49.95 US $69.95 CAN Syngress'. Syn.gress The Definition of a Serious Security Library (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. How to Cheat at Managing Windows Server Update Services Brian Barber If you manage a Microsoft Windows network, you probably find yourself overwhelmed at times by the sheer volume of updates and patches released by Microsoft for its products. You know these updates are critical to keep your network running efficiently and securely, but staying current amidst all of your other responsibilities can be almost impossible. Microsofl's recently released Windows Server Update Services (WSUS) is designed to streamline this process. Learn how to take full advantage of WSUS using Syngress' proven "How to Cheat" methodology, which gives you everything you need and nothing you don't. ISBN: 1-59749-027-X Price: $39.95 US $55.95 CAN How to Cheat at IT Project Management Susan Snedaker Most IT projects fail to deliver- on average, all IT projects run over schedule by 82%, run over cost by 43% and deliver only 52% of the desired functionality. Pretty dismal statistics. Using the proven methods in this book, you'll find that IT project you work on from here on out will have a much higher likelihood of being on time, on budget and higher quality. This book provides clear, concise, information and hands-on training to give you immediate results. And, the companion Web site provides dozens of templates for managing IT projects. ISBN: 1-59749-037-7 Price: $44.95 U.S. $64.95 CAN Syngress'. Syn-gress The Definition of a Serious Security Library (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. Managing Cisco Network Security, Second Edition Offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance, and management of security policy across an extended organization. These are the tools that you have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manager software used by thousands of small-to-midsized businesses, and a special section on Cisco wireless solutions. ISBN:1-931836-56-6 Price:$69.95USA $108.95CAN How to Cheat at Managing Microsoft Operations Manager 2005 Tony Pihzecker, Rogier Dittner, Rory McCaw, Gordon McKenna, Paul M. Summitt, David E. Williams My e-mail takes forever. My application is stuck. Why can't I log on? System administrators have to address these types of complaints far too often. With MOM, system administrators will know when overloaded processors, depleted memory, or failed network connections are affecting their Windows servers long before these problems bother users. Readers of this book will learn why when it comes to monitoring Windows Server System infrastructure, MOM's the word. ISBN:1-59749-251-5 Price:$39.95U.S. $55.95CAN ..::i!il SYN~RESS | Syngress'. Syn.gress The Definition of a Serious Security Library (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure This book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts to drill deeper and focus on aspects such as group policy design. Finally, readers will learn to create the physical design for an active directory and network Infrastructure including DNS server placement; DC and GC placements and Flexible Single Master Operations (FSMO) role placement. ISBN: 1-59749-058-X Price: $39.95 US $55.95 CAN Exam 70-29 I: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 ISBN: 1-931836-92-2 Price: $59.95 US Exam 70-293: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure ISBN: 1-931836-93-0 Price: $59.95 US Exam 70-294: Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure ISBN: 1-931836-94-9 Price: $59.95 US Syngre s s." The Definition o[ a Serious Security Library Syn.gress (sin-gres)" noun, sing,. Freedom from risk or danger; safety. See security. Snort 2.1 Intrusion Detection, Second Edition Jay Beale, Brian Caswell, et. al. "The authors of this Snort 2.1 Intrusion Detection, Second Edition have produced a book with a simple focus, to teach you how to use Snort, from the basics of getting started to advanced rule configuration, they cover all aspects of using Snort, including basic installation, preprocessor configuration, and optimization of your Snort system." -Stephen Northcutt Director of Training & Certification, The SANS Institute ISBN: 1-931836-04-3 Price: $49.95 U.S. $69.95 CAN Ethereal Packet Sniffing Ethereal offers more protocol decoding and reassembly than any free sniffer out there and ranks well among the commercial tools. You've all used tools like tcpdump or windump to examine individual packets, but Ethereal makes it easier to make sense of a stream of ongoing network communications. Ethereal not only makes network troubleshooting work far easier, but also aids greatly in network forensics, the art of finding and examining an attack, by giving a better "big picture" view. Ethereal Packet Sniffing will show you how to make the most out of your use of Ethereal. ISBN: 1-932266-82-8 Price: $49.95 U.S. $77.95 CAN Nessus Network Auditing Jay Beale, Haroon Meer, Roelof Temmingh, Charl Van Der Walt, Renaud Deraison Crackers constantly probe machines looking for both old and new vulnerabilities. In order to avoid becoming a casualty of a casual cracker, savvy sys admins audit their own machines before they' re probed by hostile outsiders (or even hostile insiders). Nessus is the premier Open Source vulnerability assessment tool, and was recently voted the "most popular" open source security tool of any kind. Nessus Network Auditing is the first book available on Nessus and it is written by the world's premier Nessus developers led by the creator of Nessus, Renaud Deraison. ISBN: 1-931836-08-6 Price: $49.95 U.S. $69.95 CAN Syngress'. Syn.gress The Definition o[ a Serious Security Library (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. Buffer OverFlow Attacks: Detect, Exploit, Prevent James C. Foster, Foreword by Dave Aitel The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapons used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks. ISBN: 1-932266-67-4 Price: $34.95 US $50.95 CAN Programmer's Ultimate Security DeskRef James C. Foster The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software development lifecycle, none has yet to address the overarching technical problems of incorrect function usage. Most books fail to draw the line from covering best practices security principles to actual code implementation. This book bridges that gap and covers the most popular programming languages such as Java, Perl, C++, C#, and Visual Basic. ISBN: 1-932266-72-0 Price: $49.95 US $72.95 CAN Hacking the Code: ASP.NETWeb Application Security Mark Burnett This unique book walks you through the many threats to your Web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of the corresponding threats. ISBN: 1-932266-65-8 Price: $49.95 U.S. $79.95 CAN "Thieme's ability to be open minded, conspiratorial, ethical, and subversive all at the same time is very inspiring"-Jeff Moss, CEO, Black Hat, Inc. Richard Thieme's Islands in the Clickstream: Reflections on Life in a Virtual World Richard Thieme is one of the most visible commentators on technology and society, appearing regularly on CNN radio, TechTV,and various other national media outlets. He is also in great demand as a public speaker, delivering his "Human Dimension of Technology" talk to over 50,000 live audience members each year. Islandsin the Clickstreamis a single volume "best of Richard Thieme." ISBN: 1-931836-22-1 Price: $29.95 US $43.95CAN "Thieme's Islands in the Clickstream is deeply reflective, enlightening, and refreshing."-Peter Neumann, Stanford Research Institute "Richard Thieme takes us to the edge of cliffs we know are there but rarely visit ... he wonderfully weaves life, mystery, and passion through digital and natural worlds with creativity and imagination. This is delightful and deeply thought provoking reading full of "aha!" insights."-C/inton C. Brooks, Senior Advisor for Homeland Security and Asst. Deputy Director, NSA "WOW! You eloquently express thoughts and ideas that l feel. You have helped me, not so much tear down barriers to communication, as to leverage these barriers into another structure with elevators and escalators." -Chip Meadows, CISSP,CCSE, USAA e-Securi~/ Team "Richard Thieme navigates the complex world of people and computers with amazing ease and grace. His clarity of thinking is refreshing, and his insights are profound."-Bruce Schneier, CEO, Counterpane "1 believe that you are a practioner of wu wei, the effort to choose the elegant appropriate contribution to each and every issue that you address."-Hal McConnell (fomer intelligence analyst, NSA) "Richard Thieme presents us with a rare gift. His words touch our heart while challenging our most cherished constructs. He is both a poet and pragmatist navigating a new world with clarity, curiosity and boundless amazement."-Kelly Hansen, CEO, Neohapsis "Richard Thieme combines hi-tech, business savvy and social consciousness to create some of the most penetrating commentaries of our times. A column I am always eager to read."-Peter Russell, author "From Science to God" "These reflections provide a veritable feast for the imagination, allowing us more fully to participate in Wonder. This book is an experience of loving Creation with our minds."-Louie Crew, Member of Executive Council of The Episcopal Church "The particular connections Richard Thieme makes between mind, heart, technology, and truth, lend us timely and useful insight on what it means to live in a technological era. Richard fills a unique and important niche in hacker society!"-Mick Bauer, Security Editor, Linux Journal ....iil SYNi~RESS | Syngress'. Syn.gress The Definition of a Serious Security Library (sin-gres)" noun, sing. Freedom from risk or danger; safety. See security. Stealing the Network: How to Own a Continent Ryan Russell, FX, Dan "Effugas" Kaminsky, Joe Grand, Tim Mullen, Jay Beale, Russ Rogers, Ken Pfeil, Paul Craig The first book in the "Stealing the Network" series was called a "blockbuster" by Wired magazine, a "refreshing change from more traditional computer books" by Slashdot.org, and "an entertaining and informative look at the weapons and tactics employed by those who attack and defend digital systems" by Amazon.com. This follow-on book once again combines a set of fictional stories with real technology to show readers the danger that lurks in the shadows of the information security industry... Could hackers take over a continent? ISBN: 1-931836-05-1 Price: $49.95 US $69.95 CAN Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle Erik Pace Birkholz "Strap on the night vision goggles, apply the camo pain, then lock and load. Special Ops is an adrenaline-pumping tour of the most critical security weaknesses present on most any corporate network today, with some of the world's best drill sergeants leading the way." -Joel Scambray, Senior Director, Microsofl's MSN ISBN: 1-928994-74-1 Price: $69.95 USA $108.95 CAN Stealing the Network: How to "Own the Box" Ryan Russell, FX, Joe Grand, and Ken Pfiel Stealing the Network: How to Own the Box is NOT intended to be an "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there now by our competition. So, what IS it? Steafing the Network: How to Own the Box is an edgy, provocative, attack-oriented series of chapters written in a first-hand, conversational style. World-renowned network securib, personalities present a series of chapters written from the point of an attacker gaining access to a system. This book portrays the street fighting tactics used to attack networks. ISBN: 1-931836-87-6 Price: $49.95 USA $69.95 CAN SYNi~RESS |
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : Yes Page Mode : UseOutlines XMP Toolkit : 3.1-702 Modify Date : 2008:02:19 23:31:21-06:00 Create Date : 2007:07:16 17:25:57+05:30 Metadata Date : 2008:02:19 23:31:21-06:00 Format : application/pdf Title : Document ID : uuid:ef3ba92c-c519-434f-9d95-48a722047240 Instance ID : uuid:122e3db7-733d-4fc2-868c-7577ccd83d05 Page Count : 321 Page Layout : SinglePage Subject : Author : Creator : 0100.tif Producer : PageGenie PDFGeneratorEXIF Metadata provided by EXIF.tools