 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.

Slides:



Advertisements
Similar presentations
Lesson 3-Hacker Techniques
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
Understand Database Security Concepts
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Cryptography and Network Security Chapter 20 Intruders
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Trojan Horse Program Presented by : Lori Agrawal.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
CSA 223 network and web security Chapter one
Handling Security Incidents
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Viruses & Destructive Programs
Attacks Against Database By: Behnam Hossein Ami RNRN i { }
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Security CS Introduction to Operating Systems.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Computer Skills and Applications Computer Security.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Асоциация за информационна сигурност Мрежова сигурност 1 изборен курс във ФМИ на СУ понеделник, зала 325, ФМИ, 19:00 четвъртък, зала 200,
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Filip Chytrý Everyone of you in here can help us improve online security....
Botnets A collection of compromised machines
SQL Injection.
Common Methods Used to Commit Computer Crimes
Instructor Materials Chapter 7 Network Security
Botnets A collection of compromised machines
Security in Networking
Security.
Lecture 2 - SQL Injection
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Intrusion.
Test 3 review FTP & Cybersecurity
Chapter Goals Discuss the CIA triad
6. Application Software Security
Presentation transcript:

 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.”  Not Computer Network Exploitation  “…enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.” Computer Network Attack2 Joint Publication 3-13

 Preventing access to information through denial, disruption, degradation, or destruction  Does not require exploitation of the target system  DDoS  Driving a truck into a transformer  Tripping over a wire in a datacenter Computer Network Attack3

4

5

 What most people consider “hacking”  Enables further access into a target computer system.  Gaining unauthorized privileges  Also enables further intelligence gathering  Provides access to user accounts  Databases  Password files Computer Network Attack6

 Intelligence collection  Further assess target for other vulnerabilities  Find information about target not otherwise available  Corporate Espionage  Gain access to trade secrets  Profit  Sell the information to the highest bidder  Extortion  Botnets  Hacktivism  Ideological view of something (Anonymous, LulzSec, etc)  Social Status  Be that “ l33t h4X0r” ( geek translation: elite hacker)  Other  Destruction of information systems Computer Network Attack7

8

9

10

Computer Network Attack11

Computer Network Attack12

 Simply gaining access to a host is not necessarily enough for an attacker to accomplish his goal - the attacker may have to escalate privileges to those of another user.  Attackers want to access a file that belongs to another user (timvic) and which has permissions set so that only that user is allowed to access it.  Other examples of access an attacker might want to take that require higher privileges are killing processes they don't own or opening network connections on "low-numbered" ports, like port 80, that have special meanings. Computer Network Attack13

 Password guessing works if users on the target system are allowed to use simple passwords  Remember, the longer and more complex the password, the more difficult it is to break.  4 characters (upper/lower case)  52 4 = ~ 7 million  7 characters (A-Z, a-z, 0-9)  62 7 = ~ 3.5 trillion  Brute forcing passwords takes a long time  Still works!  Users choose inherently bad passwords all the time passw0rd12345lovesecret password1passgod Computer Network Attack14

 Password guessing also works against predictable passwords  Pet’s name  Significant other  Phone number  Password reuse  Default passwords (as we saw in lab) can really cause problems if not changed.  Routers, smart devices, even the iPhone come with default passwords set  Early iPhones could be “rooted” because of a weak default password (alpine)  Voic systems Computer Network Attack15

 Code Injection is another means to exploit a target machine.  Can be local or remotely exploited  Involves sending specially crafted data to a computer system to cause it to misbehave.  Buffer Overflows  SQL Injections  Trojan Horses Computer Network Attack16

 Take advantage of vulnerabilities in code  Allow the intruder to send arbitrary code of his or her choosing to a machine for execution.  Used to gain access to a machine for DoS  Commonly used for privilege escalation as well Computer Network Attack17

 Take advantage of structured queries to a database  Data entered in a format that causes the application to perform some task it is not designed for  May give access to customer data, passwords, credit card numbers, etc  Can also be used to write files to the hard drive  Can I rewrite an ACL to allow access for unauthorized personnel?  Very common web application vulnerability Computer Network Attack18

 Malicious code included in an innocuous program.  Embedded either within the application directly, or by binding it to a pre-compiled executable.  Can be used to take control of hosts and allow the attacker to do anything a user sitting in front of the machine could do. Computer Network Attack19

 Once the intruder has a foothold in the system or has enough information about it, they can choose one of two options  Attack  Erasing the hard drive  Modifying the information contained on the drive.  DoS, DDoS  Further exploitation  Escalate privilege to gain better foothold  Steal passwords  Essentially, start from the beginning if necessary to gain more access. Computer Network Attack20

Computer Network Attack21