Hands-On Ethical Hacking and Network Defense Chapter 3 Network and Computer Attacks Last modified 9-1-10.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
By Hiranmayi Pai Neeraj Jain
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Hands-On Ethical Hacking and Network Defense Chapter 3 Network and Computer Attacks.
Chapter Nine Maintaining a Computer Part III: Malware.
Video Following is a video of what can happen if you don’t update your security settings! security.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Chapter 3 Network and Computer Attacks. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the different.
 a crime committed on a computer network, esp. the Internet.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Two Types of Software.
Malicious Software.
NetTech Solutions Protecting the Computer Lesson 10.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Hands-On Ethical Hacking and Network Defense Chapter 3 Network and Computer Attacks Last modified
Understand Malware LESSON Security Fundamentals.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
The Need for Information Security(2) Lecture 3. Slide 2 Information Extortion  Information extortion is an attacker or formerly trusted insider stealing.
Computer Security Keeping you and your computer safe in the digital world.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Chapter 40 Internet Security.
Common Methods Used to Commit Computer Crimes
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Firewalls.
Hands-On Ethical Hacking and Network Defense
Information Security Session October 24, 2005
Introduction to Internet Worm
Presentation transcript:

Hands-On Ethical Hacking and Network Defense Chapter 3 Network and Computer Attacks Last modified

Objectives Describe the different types of malicious software Describe methods of protecting against malware attacks Describe the types of network attacks Identify physical security attacks and vulnerabilities

Malicious Software (Malware) Network attacks prevent a business from operating Malicious software (Malware) includes Virus Virus Worms Worms Trojan horses Trojan horsesGoals Destroy data Destroy data Corrupt data Corrupt data Shutdown a network or system Shutdown a network or system

Viruses Virus attaches itself to an executable file Can replicate itself through an executable program Needs a host program to replicate Needs a host program to replicate No foolproof method of preventing them

Antivirus Software Detects and removes viruses Detection based on virus signatures Must update signature database periodically Use automatic update feature

Common Viruses

Base 64 Encoding Used to evade anti-spam tools, and to obscure passwords Encodes six bits at a time (0 – 64) with a single ASCII character A - Z:0 – 25 A - Z:0 – 25 a – z:26 – 51 a – z:26 – 51 1 – 9:52 – 61 1 – 9:52 – 61 + and -62 and 63 + and -62 and 63 See links Ch 3a, 3b

Base64 Example ORACLE -> T1JBQ0xF Link Ch 3r Link Ch 3r

Viruses (continued) Commercial base 64 decoders Shell Executable piece of programming code Executable piece of programming code Should not appear in an attachment Should not appear in an attachment

Macro Viruses Virus encoded as a macro Macro Lists of commands Lists of commands Can be used in destructive ways Can be used in destructive ways Example: Melissa Appeared in 1999 Appeared in 1999 It is very simple – see link Ch 3c for source code It is very simple – see link Ch 3c for source code

Writing Viruses Even nonprogrammers can create macro viruses Instructions posted on Web sites Instructions posted on Web sites Virus creation kits available for download (see link Ch 3d) Virus creation kits available for download (see link Ch 3d) Security professionals can learn from thinking like attackers But don’t create and release a virus! People get long prison terms for that. But don’t create and release a virus! People get long prison terms for that.

Worms Worm Replicates and propagates without a host, often through Replicates and propagates without a host, often through Infamous examples Code Red Code Red Nimda Nimda Can infect every computer in the world in a short time At least in theory At least in theory

Spread of Code Red Worm See link Ch 3u

ATM Machine Worms Cyberattacks against ATM machines Cyberattacks against ATM machines Slammer and Nachi worms Slammer and Nachi worms Trend produces antivirus for ATM machines Trend produces antivirus for ATM machines See links Ch 3g, 3h, 3i Nachi was written to clean up damage caused by the Blaster worm, but it got out of control Nachi was written to clean up damage caused by the Blaster worm, but it got out of control See link Ch 3j Diebold was criticized for using Windows for ATM machines, which they also use on voting machines Diebold was criticized for using Windows for ATM machines, which they also use on voting machines

Important Worms

Trojan Programs Insidious attack against networks Disguise themselves as useful programs Hide malicious content in program Hide malicious content in programBackdoorsRootkits Allow attackers remote access Allow attackers remote access

Firewalls Identify traffic on uncommon ports Can block this type of attack, if your firewall filters outgoing traffic Windows Firewall in XP SP2, Vista, and Win 7 does not filter outgoing traffic by default Windows Firewall in XP SP2, Vista, and Win 7 does not filter outgoing traffic by default Trojan programs can use known ports to get through firewalls HTTP (TCP 80) or DNS (UDP 53) HTTP (TCP 80) or DNS (UDP 53)

Trojan Demonstration in Win XP Make a file with command-line Windows commands Save it as C:\Documents and Settings\ username\cmd.bat Start, Run, CMD will execute this file instead of C:\Windows\System32\Cmd.exe

Improved Trojan Resets the administrator password Almost invisible to user

Windows DLL Hijacking Vulnerability DLL files are loaded from the incorrect directory Affects over 200 applications on every version of Windows No good patch yet ( ) Link Ch 3s, 3t, 3u Link Ch 3s, 3t, 3u

iClicker Questions

Which type of malware pretends to be one thing, but is really something different? A. Virus B. Spyware C. Worm D. Trojan E. Keylogger

Which type of malware attaches itself to an executable file? A. Virus B. Spyware C. Worm D. Trojan E. Keylogger

Which type of malware spreads through without being attached to a host file? A. Virus B. Spyware C. Worm D. Trojan E. Keylogger

Many trojans communicate over ports TCP 6667 and UDP What protection would stop that network traffic? A. Antivirus B. Antispyware C. Rootkit remover D. Firewall E. Updates

Spyware Sends information from the infected computer to the attacker Confidential financial data Confidential financial data Passwords Passwords PINs PINs Any other stored data Any other stored data Can register each keystroke entered (keylogger) Prevalent technology Educate users about spyware

Deceptive Dialog Box

Adware Similar to spyware Can be installed without the user being aware Can be installed without the user being aware Sometimes displays a banner Main goal Determine user’s online purchasing habits Determine user’s online purchasing habits Tailored advertisement Tailored advertisement Main problem Slows down computers Slows down computers

Protecting Against Malware Attacks Difficult task New viruses, worms, Trojan programs appear daily Antivirus programs offer a lot of protection Educate your users about these types of attacks

Virus Alert

Educating Your Users Structural training Includes all employees and management Includes all employees and management monthly security updates monthly security updates Update virus signature database automatically

Educating Your Users SpyBot and Ad-Aware Help protect against spyware and adware Help protect against spyware and adware Windows Defender is excellent too Windows Defender is excellent tooFirewalls Hardware (enterprise solution) Hardware (enterprise solution) Software (personal solution) Software (personal solution) Can be combined Can be combined Intrusion Detection System (IDS) Monitors your network 24/7 Monitors your network 24/7

FUD Fear, Uncertainty and Doubt Avoid scaring users into complying with security measures Avoid scaring users into complying with security measures Sometimes used by unethical security testers Sometimes used by unethical security testers Against the OSSTMM’s Rules of Engagement Against the OSSTMM’s Rules of Engagement Promote awareness rather than instilling fear Users should be aware of potential threats Users should be aware of potential threats Build on users’ knowledge Build on users’ knowledge

Intruder Attacks on Networks and Computers Attack Any attempt by an unauthorized person to access or use network resources Any attempt by an unauthorized person to access or use network resources Network security Security of computers and other devices in a network Security of computers and other devices in a network Computer security Securing a standalone computer--not part of a network infrastructure Securing a standalone computer--not part of a network infrastructure Computer crime Fastest growing type of crime worldwide Fastest growing type of crime worldwide

Denial-of-Service Attacks Denial-of-Service (DoS) attack Prevents legitimate users from accessing network resources Prevents legitimate users from accessing network resources Some forms do not involve computers, like feeding a paper loop through a fax machine Some forms do not involve computers, like feeding a paper loop through a fax machine DoS attacks do not attempt to access information Cripple the network Cripple the network Make it vulnerable to other type of attacks Make it vulnerable to other type of attacks

Testing for DoS Vulnerabilities Performing an attack yourself is not wise You only need to prove that an attack could be carried out You only need to prove that an attack could be carried out

Distributed Denial-of-Service Attacks Attack on a host from multiple servers or workstations Network could be flooded with billions of requests Loss of bandwidth Loss of bandwidth Degradation or loss of speed Degradation or loss of speed Often participants are not aware they are part of the attack They are remote-controlled "zombies" They are remote-controlled "zombies"

Buffer Overflow Attacks Vulnerability in poorly written code Code does not check predefined size of input field Code does not check predefined size of input fieldGoal Fill overflow buffer with executable code Fill overflow buffer with executable code OS executes this code OS executes this code Can elevate attacker’s permission to Administrator or even Kernel Can elevate attacker’s permission to Administrator or even Kernel Programmers need special training to write secure code

Ping of Death Attacks Type of DoS attack Not as common as during the late 1990s How it works Attacker creates a large ICMP packet Attacker creates a large ICMP packet More than 65,535 bytes Large packet is fragmented at source network Large packet is fragmented at source network Destination network reassembles large packet Destination network reassembles large packet Destination point cannot handle oversize packet and crashes Destination point cannot handle oversize packet and crashes Modern systems are protected from this (Link Ch 3n) Modern systems are protected from this (Link Ch 3n)

Session Hijacking Enables attacker to join a TCP session Attacker makes both parties think he or she is the other party

Addressing Physical Security Protecting a network also requires physical security Inside attacks are more likely than attacks from outside the company

Keyloggers Used to capture keystrokes on a computer Hardware Hardware Software SoftwareSoftware Behaves like Trojan programs Behaves like Trojan programsHardware Easy to install Easy to install Goes between the keyboard and the CPU Goes between the keyboard and the CPU KeyKatcher and KeyGhost KeyKatcher and KeyGhost

Keyloggers (continued) Protection Software-based Software-basedAntivirus Hardware-based Hardware-based Random visual tests Look for added hardware Superglue keyboard connectors in

Behind Locked Doors Lock up your servers Physical access means they can hack in Physical access means they can hack in Consider Ophcrack – booting to a CD-based OS will bypass almost any security Consider Ophcrack – booting to a CD-based OS will bypass almost any security

Lockpicking Average person can pick deadbolt locks in less than five minutes After only a week or two of practice After only a week or two of practice Experienced hackers can pick deadbolt locks in under 30 seconds Bump keys are even easier (Link Ch 3o)

Card Reader Locks Keep a log of who enters and leaves the room Security cards can be used instead of keys for better security Image from link Ch 3p Image from link Ch 3p

iClicker Questions

Which type of encoding uses six bits at a time? A. Binary B. Octal C. Hexadecimal D. Base64 E. MD5 1 of 5

What security measure watches all network traffic, detecting attacks? A. FUD B. IDS C. Antispyware D. Antivirus E. Updates 2 of 5

Which hazard can capture passwords even when you are using a secure connection? A. Virus B. Spyware C. Worm D. Trojan E. Keylogger 3 of 5

Which item enforces physical security? A. Card Reader Lock B. IDS C. Firewall D. Antivirus E. Antispyware 4 of 5

If an attacker cuts off the electrical power to a server, what attack has occurred? A. DoS B. Buffer Overflow C. Trojan D. Virus E. FUD 5 of 5