Internet Security by Alan S H Lam 2019/4/9.

Slides:



Advertisements
Similar presentations
Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Chapter 11 Firewalls.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Firewalls and Intrusion Detection Systems
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Information Networking Security and Assurance Lab National Chung Cheng University 2004/03/031 A Real World Attack: wu-ftp Cao er kai ( 曹爾凱 )
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
FIREWALL Mạng máy tính nâng cao-V1.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Distributed Denial of Service Attacks
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Lecture 9: Buffer Ovefflows and ROP EEN 312: Processors: Hardware, Software, and Interfacing Department of Electrical and Computer Engineering Spring 2014,
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Shellcode Development -Femi Oloyede -Pallavi Murudkar.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Footprinting and Scanning
DoS/DDoS attack and defense
Web Security Firewalls, Buffer overflows and proxy servers.
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Security fundamentals
The Intranet.
Working at a Small-to-Medium Business or ISP – Chapter 8
FIREWALL configuration in linux
Footprinting and Scanning
Firewall.
Managing Secure Network Systems
Backdoor Attacks.
Distributed Denial of Service Attacks
Computer Data Security & Privacy
Domain 4 – Communication and Network Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
Footprinting and Scanning
Security of a Local Area Network
Network Security: IP Spoofing and Firewall
Digital Pacman: Firewall Edition
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Firewalls Jiang Long Spring 2002.
Distributed Denial of Service Attacks
Lecture 3: Secure Network Architecture
Security.
Intrusion Detection system
Distributed Denial of Service Attacks
Session 20 INST 346 Technologies, Infrastructure and Architecture
6. Application Software Security
Implementing Firewalls
Presentation transcript:

Internet Security by Alan S H Lam 2019/4/9

Internet Security I. Aware of the Risks II. How they hack in The threats II. How they hack in Two real case studies with live demo amd and named Another hack in demo ftpd, rcp.statd III. Fighting back Counter measures and strategies Security Profile and Policy Firewall Architecture IE Network Firewall IV. Q&A and discussion 2019/4/9

Part I Aware of the risks The Threats 2019/4/9

The Threats Hacker Technologies Internet Engineering System Administration Network Management Reverse Engineering Distributing Computing Cryptography Social Engineering 2019/4/9

The Threats Hacking Tools become more and more sophisticated and powerful in term of Efficiency Distributing Stealth Automation User friendliness 2019/4/9

The Threats 2019/4/9

The Threats These hacking tools could be easily download from the Internet => Hacker tool ability increases Knowledge of hacker decreases Population of hacker increases Some day, even elementary school kid may hack into your system 2019/4/9

The Threats Your host does not need to be as famous as yahoo or ebay to be targeted They need a place to hide their trace They need your host as a stepping stone to hack other sites They need your host resource to carry out their activities 2019/4/9

The Threats Your host security weakness can be identified by scan tool Security of any network on the Internet depends on the security of every other networks No network is really secure 2019/4/9

The Threats The trends Hacking activities become more and more common Poor management networks will become the hackers playground 2019/4/9

The Threats The Trends From Jan to April 2000 (before we fully deploy our IE firewall for RLAB segment) , our site has received the following security warning Web page defacement Unauthorized system access Port scanning Ping broadcast scanning Telnet probe scanning 2019/4/9

Part II How They Hack In Two real case studies 2019/4/9

How they hack in General Steps Locate the victim host by some scanning program Identify the victim host vulnerability Attack the victim host via this vulnerability Establish backdoors for later access 2019/4/9

How they hack in Some hacking tools can automate the above steps into a single command. After break-in, use this victim host to hack or attack other network use this victim host resource to carry out their activities Web page defacement for certain assertion 2019/4/9

How they hack in Buffer Overflow Exploit stuffing more data into a buffer than it can handle it overwrites the return address of a function it switches the execution flow to the hacker code 2019/4/9

How they hack in Buffer Overflow Exploit Process Memory Region Low Memory Address Text Region (program code) Data Region (initialization/unintialization) Stack Region (subroutine local variable and return address) High Memory Address Process Memory Region 2019/4/9

How they hack in Buffer Overflow Exploit Top of Stack Function local void function(char *str) { char buffer[16]; strcpy(buffer,str); } void main() { char large_string[256]; int i; for( i = 0; i < 255; i++) large_string[i] = 'A'; function(large_string); Function local variable buffer sfp Save Frame Pointer ret Return address Str* Bottom of stack 2019/4/9

How they hack in Real Case Study I Hackers first located the victim hosts by sunrpc scan of 137.189 network Break-in the victim hosts via amd (Berkeley Automounter Daemon) buffer overflow vulnerability Created backdoor on port 2222 by starting a second instance of inetd daemon Used the victim hosts to scan other networks 2019/4/9

How they hack in Real Case Study II Hackers first located the victim hosts by BIND port 53 scanning Identify the victim OS (a telnet probe) Set up a trap DNS daemon at the hacker DNS server Kicked the victim hosts to query the hacker DNS server Break-in victim hosts via BIND buffer overflow Established back door accounts at the victim hosts Distribute, built and operated the IRC Bot (eggdrop) 2019/4/9

Part III Fighting Back Get Your Security Profile Set Your Security Policy Build the Firewall 2019/4/9

Get Your Security Profile Act as a hacker and try to break-in your host Port scan your host and see what network ports are open Figure out if the version of your host OS and software applications are vulnerable Can you cover up your trace after break-in? (Does your host have any monitoring or intrusion detection system) Can you easily establish back door after break-ins? (Have you built any firewall?) 2019/4/9

Set Your Security Policy There is always a trade off between security and convenience Identify your host services shutdown any unnecessary ports and build the kernel as minimum as possible Identify your target users, trusted hosts and networks so that you can formulate your host access lists Set up your firewall use private IP network use proxy servers 2019/4/9

Set Your Security Policy Set up your monitoring and intrusion detection systems COPS, tripewire, tcpdump, snmp Set up you operation codes/rules such as read only file system mounting ssh login sudo restrict login shell Set up your recovery plan recovery procedure and backup scheme 2019/4/9

Build Your Firewall and IDS Control and monitor the traffic IN and OUT of your network Block any unnecessary network connection from non-trusted hosts and networks Define your access rules according to your security policy Use packet filtering and Application Proxy Build sniffer to monitor your internal network traffic 2019/4/9

Firewall Architecture Dual-home host architecture 2019/4/9

Firewall Architecture Architecture using two routers 2019/4/9

Firewall Architecture Architecture using a merged interior and exterior router 2019/4/9

Build Your Firewall How it protects your network prevent port scanning prevent DDOS attack and IP spoofing from your host block any unnecessary network port opening increase the difficulty of creating back door after break-in facilitate the network monitoring and network intrusion detection 2019/4/9

Firewall in IE Network IE Network firewall policy Block any unnecessary network connection from non-trusted hosts and networks Users outside CUHK networks can only remote login IE network through gateway by using SSH http://gateway.ie.cuhk.edu.hk 2019/4/9

Firewall in IE Network Firewall Architecture First Layer: Packet Filtering at ERG router Second Layer: Proxy Gateway and Packet Filtering at Research Lab firewall http://firewall.ie.cuhk.edu.hk Third Layer: Set up packet filtering rules by ipchains at your host 2019/4/9

Firewall in IE Network IE Network Firewall Architecture IE Network Backbone Up stream network Research Lab Firewall ERG Router Research Lab Network Segment Research Lab Host 2019/4/9

Firewall in IE Network Set your own filter rules at your host Here is the example how you use ipchains to block all non-IE network TCP and UDP connections to your host except 80 port ipchains -A input -s 0.0.0.0./0.0.0.0 -d your_host_ip/255.255.255.255 80 -i eth0 -p 6 -j ACCEPT ipchains -A input -s ! 137.189.96.0/255.255.252.0 -d 0.0.0.0/0.0.0.0 -i eth0 -p 6 -j DENY -y ipchains -A input -s ! 137.189.96.0/255.255.252.0 -d 0.0.0.0/0.0.0.0 -i eth0 -p 17 -j DENY 2019/4/9

References Attack Sophistication VS Intruder Technical Knowledge http://www.cert.org/sepg99/sld010.htm Systems Compromised Through a Vulnerability in am-utils http://www.cert.org/incident_notes/IN-99-05.html CERT Advisory CA-99-12 Buffer Overflow in amd http://www.cert.org/advisories/CA-99-12-amd.html Real Case Study I (Buffer Overflow in amd) http://home.ie.cuhk.edu.hk/~shlam/ed/hack/case1 2019/4/9

References CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND http://www.cert.org/advisories/CA-99-14-bind.html Real Case Study II (Vulnerabilities in BIND ) http://home.ie.cuhk.edu.hk/~shlam/ed/hack/case2 Widespread Exploitation of rpc.statd and wu-ftpd Vulnerabilities http://www.cert.org/incident_notes/IN-2000-10.html Scans and Probes http://www.cert.org/current/current_activity.html#scans Building Internet Firewall By Chapman & Zwicky, O’Reilly ISBN 1-56592-124-0 2019/4/9