ACCESS ROUTEROS USING MULTI-FACTOR AUTHENTICATION MIKROTIK USER MEETING 2018

Similar documents
MikroTik Security : The Forgotten Things

Securing Mikrotik

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Penetration Testing: How to Test What Matters Most

How NOT To Get Hacked

Securing CS-MARS C H A P T E R

MikroTik Security : Built-in Default Configuration

Cloud Hosted Network Monitoring and Authentication. Simple Solution using MikroTik RouterOS

CISCO VPN CLIENT CONFIGURATION MANUAL E-PUB

Chapter 5: Vulnerability Analysis

Don t blink or how to create secure software. Bozhidar Bozhanov, LogSentinel

Routerboard Security. Barry Higgins Allness IT. UK MuM 2018

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

CompTIA. PT0-001 EXAM CompTIA PenTest+ Certification Exam Product: Demo. m/

Addressing penetration testing and vulnerabilities, and adding verification measures

Security Testing. - a requirement for a secure business. ISACA DAY in SOFIA. Gabriel Mihai Tanase, Director, Cyber Services KPMG in CEE

Troubleshooting and Cyber Protection Josh Wheeler

Data Breach Preparedness & Response

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

A Model for Penetration Testing

14 December, Mikrotik V2 9 DAILY BOOKS # Kindle # 3TB3OLQRB7. 14 December, 2017 E-BOOK MIKROTIK V2 9. Document Filetype: PDF 259.

Cyber Security Audit & Roadmap Business Process and

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Ingram Micro Cyber Security Portfolio

Understanding Perimeter Security

ASA/PIX Security Appliance

Computer Network Vulnerabilities

Penetration Testing with Kali Linux

hidden vulnerabilities

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

[FILE] MIKROTIK TRAINING USER MANUAL ARCHIVE

IMEC Cybersecurity for Manufacturers Penetration Testing and Top 10

Penetration Testing. James Walden Northern Kentucky University

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Internet infrastructure

W H IT E P A P E R. Salesforce Security for the IT Executive

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

SSH and keys. Network Startup Resource Center

RouterOS, Firewall, and Beyond: Maintain IP Reputation Over the Internet By Michael Takeuchi 20 October 2018, Yogyakarta MikroTik User Meeting

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Plug and play solution for managing lan users with MikroTik RouterOS

How Breaches Really Happen

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Cyber security tips and self-assessment for business

Remote Desktop Security for the SMB

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

DIS10.1 Ethical Hacking and Countermeasures

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Raj Jain. Washington University in St. Louis

#RSAC LMG Security 1

Ethical Hacking and Prevention

CSWAE Certified Secure Web Application Engineer

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release)

MIKROTIK ROUTER SETUP PRODUCT CATALOG E-BOOK

Best Practices (PDshop Security Tips)

McAfee Certified Assessment Specialist Network

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

CYBER SECURITY and Mobile Money: Challenges and Opportunities NOVEMBER 28 TH 2016 PRESENTER: CECIL WILLIAMS

Our sponsors Zequi V Autopsy of Vulnerabilities

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

Security Audit What Why

New Features and Updates in RouterOS

MU2b Authentication, Authorization and Accounting Questions Set 2

Defense in Depth Security in the Enterprise

SECURITY TESTING. Towards a safer web world

Oracle Database Security Assessment Tool

Payment Card Compliance and Challenges

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Exposing The Misuse of The Foundation of Online Security

Lecture Overview. INF5290 Ethical Hacking. Lecture 4: Get in touch with services. Where are we in the process of ethical hacking?

INF5290 Ethical Hacking. Lecture 4: Get in touch with services. Universitetet i Oslo Laszlo Erdödi

5 IT security hot topics How safe are you?

Chapter 9. Firewalls

Compliance vs Competence: Cyber Security Management for Data Centers. Dr. Suku Nair University Distinguished Professor and Chair, SMU

DHIS2 Hosting Proposal

CHCSS. Certified Hands-on Cyber Security Specialist (510)

Security and Authentication

CompTIA Security+(2008 Edition) Exam

Loading Internet Protocol Security (IPSec) (CDR-882/780/790/990 Cellular Router)

the SWIFT Customer Security

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

Oracle Security Masterclass

10 Things Every Auditor Should Do Before Performing a Security Audit

COMPUTER NETWORK SECURITY

Cybersecurity Auditing in an Unsecure World

PROTECTING INFORMATION ASSETS NETWORK SECURITY

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Understanding IT Audit and Risk Management

Oracle Security Masterclass

CyberP3i Course Module Series

Are You Avoiding These Top 10 File Transfer Risks?

Audit Network Security. University System of New Hampshire

Transcription:

ACCESS ROUTEROS USING MULTI-FACTOR AUTHENTICATION MIKROTIK USER MEETING 2018 Yogyakarta, Indonesia 20 Oktober 2018

About Me 2 Didiet Kusumadihardja 12 tahun pengalaman di IT RT/RW Net, Startup (e-commerce), Manage Service, IT Consulting, IT Auditor, Penetration Tester & Training Service Penguji UKK TKJ Mikrotik Certified Trainer Mikrotik Certified Consultant https://about.me/didiet

Services Offered 3 1. Network Assessment/Design Service 2. IT General Control Audit Service 3. Vulnerability Assessment & Penetration Testing Service 4. IT Due Diligence Service 5. Training Service UU ITE No 11 Tahun 2008 POJK 38/POJK.03/2016 SEOJK 21/SEOJK.03/2017 PBI 16/8/PBI/2014 PCI DSS ISO 27001 Additional Discovery Planning Discovery Attack Reporting

4 Background

Data Breaches News 2016 5

Data Breaches News 2017 6

Data Breaches News 2018 7

MikroTik Security Fixed 8 6.38.5 (9 Maret 2017) www - fixed http server vulnerability 6.41.3 (8 Maret 2018) smb - fixed buffer overflow vulnerability, everyone using this feature is urged to upgrade 6.42.1 (23 April 2018) winbox - fixed vulnerability that allowed to gain access to an unsecured router 6.42.7 (17 Agustus 2018) security - fixed vulnerabilities CVE-2018-1156, CVE- 2018-1157, CVE-2018-1158, CVE-2018-1159

Exploits 9

Amount of Time to Crack Passwords 10

Processing Power vs Passwords 11

Reality 12 Dictionary Attack Password Dictionary Exploits Brute Force Attack Bad Guys

Humans and Password 13

Password Tips 14

Indonesia Regulation 15

16 How we do it with RouterOS?

Multi-Factor Authentication on RouterOS 17 Something you know Password Something you have SSH Keys Somewhere you from IP Address

Create SSH Public & Private Key 18 1. Generate 2. Save Private Key 3. Copy Public Key and save to file 3 1 2 For OS X and Linux users can use ssh-keygen

RouterOS Configuration 19 1. Upload Public Key 2. Create New User 3. Import SSH Key

Login using SSH Keys 20 1 Connection > SSH > Auth 2

Only permit from specific IP address 21

Other Methods (1/3) 22 Port Knocking https://wiki.mikrotik.com/wiki/port_knocking

Other Methods (2/3) 23 VPN then remote access 1. VPN (PPTP/SSTP/OpenVPN) 2. Remote Access (Winbox/SSH) VPN Network Address

Other Methods (3/3) 24 Out of Band Network Management Network

Audit Trail / Log as Evidence 25

Audit Trail / Log using The Dude 26

Summary 27 Defense in Depth Layers 1. Policies, Procedure, and Awareness 2. Physical 3. Perimeter 4. Internal Network 5. Host 6. Application 7. Data

Reference 28 ArsTechnica. 2012. 25-GPU cluster cracks every standard Windows password in <6 hours. https://arstechnica.com/information-technology/2012/12/25-gpu-cluster-cracks-every-standard-windowspassword-in-6-hours/. BetterBuys. Estimating Password-Cracking Times. https://www.betterbuys.com/estimating-password-crackingtimes/. C# Corner. 2015. Passphrase vs Password For Security. https://www.csharpcorner.com/uploadfile/66489a/passphrase-vs-password-for-the-security/. Information is beautiful. 2018. World s Biggest Data Breaches. http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/. MikroTik. 2015. Port Knocking. https://wiki.mikrotik.com/wiki/port_knocking. MikroTik. 2016. Manual: The Dude v6/syslog. https://wiki.mikrotik.com/wiki/manual:the_dude_v6/syslog. NIST. 2017. Easy Ways to Build a Better P@$5w0rd. https://www.nist.gov/blogs/taking-measure/easy-ways-buildbetter-p5w0rd. Records Management Center. 2017. Identity Theft Is It All Digital. https://rmcmaine.com/identity-theft-report/. Reuters. 2017. Yahoo says all three billion accounts hacked in 2013 data theft. https://www.reuters.com/article/usyahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-iduskcn1c82o1. ScienceDirect. 2017. Towards port-knocking authentication methods for mobile cloud computing. https://www.sciencedirect.com/science/article/pii/s1084804517302813 (Accessed 2018-09-04). The Hacker News. 2018. Hackers Infect Over 200,000 MikroTik Routers With Crypto Mining Malware. https://thehackernews.com/2018/08/mikrotik-router-hacking.html. The New York Times. 2016. Yahoo Says 1 Billion User Accounts Were Hacked. https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html.

Didiet Kusumadihardja Mobile: +62 813 1115 0054 e-mail: didiet@arch.web.id 29 Diijinkan menggunakan sebagian atau seluruh materi pada modul ini, baik berupa ide, foto, tulisan, konfigurasi dan diagram selama untuk kepentingan pengajaran, dan memberikan kredit kepada penulis serta link ke www.arch.web.id