How hackers do it Ron Woerner Security Administrator CSG Systems, Inc. Hacking 101 How hackers do it Ron Woerner Security Administrator CSG Systems, Inc. G:\Dataware\Marketing\Sales Training\August ‘97 Boot Camp\CMS.ppt
What do you think when you hear: Hacker or cracker Melissa, LoveBug (ILOVEYOU) Denial of Service (DoS) attacks Packet sniffing Password cracking Information warfare or Cybercrime Social engineering 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
Home Security Analogy Systems Security is like securing your house Policies are the written understanding Access control and passwords are the keys Window and door locks keep out intruders A security camera watches open doors The intent is to make the environment less inviting to those looking for easy pickings 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
The “Crown Jewels” Question: What are your “Crown Jewels”? What attracts hackers to your company? Why would a hacker take interest in your company? What is your companies biggest vulnerabilities? 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
CSG Systems, Inc.Confidential & Proprietary Security Risks You need to be concerned about: Disclosure of confidential information - The disclosure of personal and private information about individuals can lead to civil or criminal liability for your company. Data loss - Data can be electronically destroyed or altered either accidentally or maliciously. Damage to reputation - Customers, potential customers, investors, and potential investors are all influenced by a security incident. Downtime - A security incident can shut an organization down. 4/30/2019 CSG Systems, Inc.Confidential & Proprietary ©2000, CSG Systems, Inc. All rights reserved
Anatomy of a Hack Perimeter / Vulnerability Assessment Exploitation Footprinting Scanning Enumeration Exploitation Gaining Access Escalating privileges Pilfering Covering Tracks Creating backdoors 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
Assessment Footprinting - Information gathering Open source search on the site Network Solutions (www.networksolutions.com/cgi-bin/whois/whois) ARIN whois (www.arin.net/whois) This gives network and contact information DNS lookup (nslookup, Sam Spade) The Domain Name Server gives further network and system information 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
Assessment Scanning - System type Enumeration - Getting details IP Address determination - ping sweep Determines which systems I can access Port Scan (TCP/UDP) Shows what is “open” on those systems Enumeration - Getting details System/application vulnerabilities What’s running on a particular system System users Who is on that system 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
Exploitation Gaining access Escalating privilege (gaining root/admin) Password eavesdropping Buffer overflows Application vulnerabilities Escalating privilege (gaining root/admin) Password cracking Network sniffing 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
Exploitation Pilfering - getting the “crown jewels” Covering Tracks Finding whatever is valuable such as Credit information Personal information Additional system information Covering Tracks Loading a “root kit” Clear log files Hide tools Secure the system Creating back doors - so they can get in again 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
Denial of Service (DoS) Rendering a service offered by a workstation or server unavailable to others - Disabling the target. Reasons: To get a system reboot Hacker covering his/her tracks Malicious intent How it’s done: Ping of death - ICMP techniques Syn (network) vulnerabilities 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
Social Engineering An attack based on deceiving users or administrators at the target site to gain information or access. The “old con job” Typically done by telephoning users or operators. The “hackers” pretend to be an authorized user and attempt to gain information about the systems and/or gain illicit access to systems. Requires little technical skill. Relies on people’s “natural” trusting nature. 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved
What you can do ALL systems/applications are insecure! It’s up to the administrators and users for security. Think Security Secure passwords Physical security Report incidents/anomalies Work with system/application administrators 4/30/2019 ©2000, CSG Systems, Inc. All rights reserved