Checklists a Day: Week in Review – January 18, 2010

This week we will be focusing our checklists on guides that will help you to assess your risk management programs. Often times we like to say that risk management drives our audit programs and it drives our information security programs – but how do we know our risk management programs work? I have seen some companies run asset inventories and call that a risk assessment. I’ve seen other companies run vulnerability scans of their systems and call that a risk assessment. What is a risk assessment and how do I know if it meets my business needs. This week’s resources try to answer those questions and a little more.

We’ll post a summary again next week – or follow us live at @jamestarala and @isaudit! This week’s tweets are focused on risk management models for those of you trying to decide which model works best for you. We hope you enjoy them.

Risk Management Checklists & Security Guides

NIST 800-30 on Risk Assessment

Risk Assessment Resources from the University of GA

Truth 2 Power on Assessing Risk Management

Resources from the State of Ohio EPA

Resources from the State of DE

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Automating Audit Tests with Eventtriggers.exe (20 Critical Control Scripting Tip)

One of the issues that we have been dealing with extensively lately is the issue of auditing and automation. This has come most often been raised when we’ve been discussing how to address automating control assessments in conjunction with implementing the 20 Critical Controls. One of the core principles of the 20 Critical Controls is that organizations need to have the ability to automate security assessments in order to reduce risk detection times and allow for a more prompt response to detected threats.

One way to assist with the automation of any given assessment is to script your assessments and automate the scripts you write. This way your tests can work for you and can automatically respond in some way should a particular event be discovered. Rather than creating a mechanism to perform detection and alerting from scratch, why not use a mechanism that’s already built into most Microsoft Windows versions you’re already running? The Windows Event Log is a great place to start.

First, you can use a command such as EventCreate to generate new event log entries as a result of a particular action in your scripts. For example, if you use nmap with PBNJ to look for new hosts on your network (think critical control #1), then you could use EventCreate to generate an event log entry every time a new device is discovered. Or, for example, let’s say you use WMIC to list startup items on a machines (think critical control #2), then you could use EventCreate to generate an event log entry every time a new startup entry is added. Get the idea? Use built in Windows tools to support your automation efforts – and all it costs is a little sweat equity and trial with built in tools!

For more details on how to use EventCreate, check out these resources to get started:

Microsoft TechNet Reference on EventCreate:

http://technet.microsoft.com/en-us/library/bb490899.aspx

Microsoft Support article for creating custom event log entries:

http://support.microsoft.com/kb/324145

For details on how to use eventtriggers in more depth, here are a couple resources that will help to get you started:

Microsoft TechNet Reference on EventTriggers.exe:

http://technet.microsoft.com/en-us/library/bb490901.aspx

Petri.co.il Article on EventTriggers.exe:

http://www.petri.co.il/how-to-use-eventtriggersexe-to-send-e-mail-based-on-event-ids.htm

In addition to automating tasks with the eventtriggers.exe command, you may also want to consider command line e-mail tools which can be used to generate an e-mail as a result of an action in your command line tool. Two such free command line tools that you may want to consider are:

Blat (http://www.blat.net/)

Bmail (http://www.beyondlogic.org/solutions/cmdlinemail/cmdlinemail.htm)  (Old Link Removed)

To run either of these tools you will need to have access to an active mail server, although thankfully it does not need to listen only on tcp/25 – but you do have to use the SMTP protocol. While security by obscurity is certainly no singular way to protect your system, running administrative mail servers like this on alternate ports can never hurt!

Checklists a Day: Week in Review – January 4, 2010

Now that the New Year has begun, we’re back in the saddle providing audit checklists and resource that we hope will help auditors and information security professionals in general with their daily jobs. There are a lot of really good resources on the web that we can take advantage of, but the trouble is who has the time to find them. It turns out we do. And as we find these resources we hope it will make your lives easier by showing you some of the audit resources that are already out there for you.

This last week our focus for the week was on security metrics and organizations that have provided resources on security metrics. More and more when we’re at conference venues we have students asking us if we have resources on security metrics. Especially students of the 20 Critical Controls have been asking us – who else is providing security metrics? Here are a few for you to consider.

We’ll post a summary again next week – or follow us live at @jamestarala and @isaudit! This week’s tweets are focused on risk management resources and checklists for evaluating risk management programs. We hope you enjoy them.

Security Metric Checklists & Security Guides:

Security Metrics from the 20 Critical Controls

The Center for Internet Security Metrics Guide (Old Link Removed)

ISECOM RAVs (Old Link Removed)

NIST 800-55

NIST IR-7502 (Old Link Removed)

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Checklists a Day: Week in Review – October 5, 2009

So as promised this last week we focused on the Software Development Lifecycle (SDLC) and how to audit an SDLC in an organization. As usual we also wanted to make sure that we gave everyone some fun technical tools to play with, so to keep with the theme we tweeted on tools that you could use to perform automated fuzzing tests on applications. There are a number of other tools we could have also addressed, and we could go on for a few weeks giving you tools , but hopefully you’ll have a good starter list of tools to use now.

This week’s tweets have been a little more random on the checklists we’ve chosen, but the tools will all be consistent. We’re going to focus the tools this week on free tools that Microsoft has embedded in the operating system to give auditors a hand with how to perform assessments against user accounts in an Active Directory environment. I hope you enjoy them!

We’ll post again next week – or follow us live at @jamestarala and @isaudit!

SDLC  Audit Checklists & Security Guides:

SDLC Checklist from Baylor University

SDLC Checklist from ISACA

SDLC Resources from Microsoft

White Box Fuzzing Checklist

Checklist for Auditing IT Contracts

Fuzzing Tools for Auditing Applications:

OWASP WSFuzzer

Wapiti

Microsoft MiniFuzz

iDefense’s Tools

HD Moore’s Axman

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Checklists a Day: Week in Review – September 28, 2009

So this week we’re back from Tweet-cation, and back to posting audit checklists and tools for everyone to enjoy. Last week I was teaching in San Diego for SANS Network Security and now I’m back and back on the bandwagon. We know everyone’s busy and it’s easy to miss some of these references, so here you go in blog format – which can now be indexed FOREVER by the Google Gods.

This last week’s topic was web application assessment, and we’ll continue the trend via Twitter this week with audit checklists for evaluating an SDLC and tools for fuzzing applications to boot! Not following me on Twitter yet? The handles are @isaudit and @jamestarala.  

Web Application Audit Checklists & Security Guides:

OWASP Web Application Checklist

Web Application Basic & Advanced Checklists

Microsoft – Web App Architecture

Basic SANS Institute Checklist

Tools for Auditing Web Applications:

W3AF

HP WebInspect

Wikto

IBM Appscan

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Checklists a Day: Week in Review – September 7, 2009

Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well. So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

This week’s focuses are on auditing segregation of duties controls and tools that you can use for auditing file system access controls. As usual we try to offer a mix of commercial plus free tools for you to try out and we hope you enjoy them. On the checklist side we’ve also included a few matrixes that you can use to evaluate position descriptions within your organization as well. Hopefully you can include these in your audit plans, regardless of the technical systems you’re evaluating.

Segregation of Duties Audit Checklists & Security Guides:

Segregation of Duties #1

Segregation of Duties #2

Segregation of Duties #3

Segregation of Duties #4

Segregation of Duties #5 (Old Link Removed)

Tools for Auditing File Access Controls:

Access Auditor

Quest Active Roles

Microsoft Xcalcs

Sysinternals AccessEnum

File Server Change Reporter

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Checklists a Day: Week in Review – August 31, 2009

Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well. So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

This last week we focused on a series of operational security audit checklists and guides that didn’t follow one particular theme – they were checklists we found that we thought would generally be helpful to everyone. We also decided to give everyone a list of some of the more popular vulnerability assessment engines out there – both commercial and open source. If you’re not using one already, pick one free and one commercial tool – compare the results!

Please feel free to keep the requests coming. We’ll try to oblige as often as we can with new checklists based on your feedback.

Audit Checklists & Security Guides:

Security Update Process

Policy Inventory Checklist

Anti-Virus (Old Link Removed)

Handheld Devices

Data Center Physical Security

Tools for Vulnerability Management:

Tenable Security

eEye Digital Security

Qualys

OpenVAS

Rapid7

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Checklists a Day: Week in Review – August 24, 2009

Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well. So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

This last week we focused back to process controls and operational assurance. We listed checklists to help auditors evaluate an organization’s stance on privacy based issues. We also listed out tools that exist to help an organization to better manage their audit program. Many of this past week’s tools were commercial, but sometimes those can be the best tool for the job.

This upcoming week will focus on additional operational controls, and we’ll through in some choices for vulnerability assessment along the way.

Privacy Audit Checklists & Security Guides:

Privacy Checklist #1

Privacy Checklist #2

Privacy Checklist #3

Privacy Checklist #4

Privacy Checklist #5

Tools for Audit Program Management:  

Archer Technologies

TeamMate

MetricStream

Paisley Enterprise GRC

Pentana Audit Work System (Old Link Removed)

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Twitter, SSL, and SHA-1 – Is Encryption Really Important?

In the information security universe security engineers, managers, curmudgeons and the like daily flock to the Internet to find their news, perform their research, and read about the topic of the day. More and more these same security minded individuals are flocking to social media sites to learn about the day’s daily infosec gossip – myself included. However in this mad rush for information I have to wonder, are we following or concerned about the same security principles that we all preach about in our professional lives?

One of the more popular sites we all visit is still Twitter – the Microblogging service. If we are going to consider this site a part of our research cadre, should we not require the same security standards of it that we do for all of our other applications?

This article is not meant to fully discuss all the social media security issues on the horizon, or even to evaluate Twitter as an appropriate tool. Instead it’s meant to address simply one topic – How does Twitter handle user authentication to their site?

The big issues that have been focused on the last couple weeks have been Twitter.com’s use of SSL (or lack thereof) and TweetDeck’s use of Base64 encoding for passing user credentials. But for today let’s just focus on the mothership – Twiter.com.

The obvious part of this discussion is that Twitter.com does not require SSL when users authenticate to their site. They are certainly not the first site to have this issue, and many of us were willing for years to authenticate to sites like eBay or others without using SSL. Not that it was right, but it was a reality. So when we authenticate to Twitter our credentials are being passed outside of an encrypted tunnel. But are they being sent in clear text as many have suggested?

The first thing we need to do in order to answer this question is capture some traffic between the browser and the Twitter website. Laura Chappell has already written a great overview of this here:

Twitter Twace Analysis Report (PDF; 2 pgs)
TweetDeck Twace Analysis Report (PDF; 13 pgs)
Twitter Trace Files (ZIP 1MB)

Update: Unfortunately the last time we looked, Lara’s site was down. Let’s cross our fingers that they come back online soon and that the above links reactivate!

The next step is to look into specifically the portion of the web transaction dealing with authentication. To make things simple we can use WebScarab from OWASP to intercept the information. What it turns out is that during authentication we see cookies set and credentials sent to the website. Here is a decoded sample:

lang=en, auth_token=, _twitter_sess=BAh7CzoTcGFzc3dvcmRfdG9rZW4iLTUwOGFmZjNhNzg1NTczMT

ZhOGEzZjY2YWZlMjgxOGQxZTA0ZmU5MmE6CXVzZXJpBD09+QM6DGNzcmZfaWQiJTgxODVl

NjZmYzBjZTc3NDhmMjFhNzBmYWUyZGI4OTk2Og5yZXR1cm5fdG8wIgpmbGFz

aElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpA

dXNlZHsAOgdpZCIlZmM0N2RkMTJmYTViNGQ5NTk0MDY5MWMxNmMxMjUzNWE=

–a62476dde49ef8df0fbda6be783d00618633253f

If we look at this sample what we notice right away is at the end of the capture is a 40 character series of letters and numbers which looks a lot like a hash of some sort. Knowing that the characters following the double dashes are 40 characters long, and that SHA-1 generates 40 character hash strings, and that SHA-1 is one of the most popular hashing protocols being used right now, let’s assume they’re using a SHA-1 hash for this algorithm.

Guessing that they’re using SHA-1, and since we know the password that was used to create the original hash, we can next determine if the SHA-1 in use is using a salt value with it. It turns out if we place the original password for the account in a hash generator, it does not equal the hash we have here. That would seem to indicate that they’re using a salted (or HMAC) with the original password to help protect the data being hashed (that’s a good thing).

So while the threat of someone cracking the hash has been minimized, this still doesn’t remove the possibility of a replay attack against Twitter’s authentication scheme. Although I haven’t tried this, it appears that there is a possibility that an unscrupulous individual could capture data such as this, modify an HTTP request with this hash in the header, and attempt to authenticate using someone else’s account. Why does this work? Because the site is not using SSL to protect the hash.

So what information do we have that makes this possible:

1. The Twitter username is sent in clear text in the HTTP body. But really, even if it wasn’t we all advertise our handles anyways (I’m @jamestarala and @isaudit, remember).

2. The Twitter authentication credentials are not being sent in an SSL tunnel.

3. The Twitter hash is clearly visible in the HTTP requests. Although the password is hashed, the hash is sent in the clear.

So why do I bring all this up? Well, for a few reasons, let’s summarize:

1. We should all be critically asking questions like this for the applications we’re using. Especially security practitioners.

2. Auditors should consider using processes like this more to evaluate the application systems they’re evaluating. Authentication is hugely important, let’s not let application developers, system analysts, or vendors off the hook.

3. We want to encourage vendors and service providers (like Twitter) to be aware of the risk levels they’re accepting on our behalf.

The bottom line is that these are risk decisions that we’re making on a daily basis. Let’s make sure we have all the information before we make these decisions. Will I stop using Twitter, likely not, but I will certainly be aware of my surroundings when I choose to do so. Life is risky, at least now I feel I can make an intelligent choice about the risk I’m taking in this one case.

Checklists a Day: Week in Review – August 17, 2009

Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well. So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

We kept the technology focus last week and decided to post links to checklists and security guides that we thought would help people with their audits of Microsoft Windows systems. This may or may not be related to my migration to Windows 7 this week personally. What can I say though, I just can’t help myself sometimes. So enjoy your Windows audits. This coming week we’ll go back to some process controls. Enjoy the privacy checklists this week…

Microsoft Windows Audit Checklists & Security Guides:

General Windows Security

Microsoft Windows Vista

Microsoft Windows Server 2008

Microsoft Windows Server 2003

DISA Checklists for Windows

Microsoft Windows XP

Microsoft Windows Audit Tools:

Microsoft Baseline Security Analyzer

WinAudit

WinFingerprint (Link no longer available)

BelSecure

DISA Gold Disks (Old Link Removed)

Quest Reporter

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.