Ethical Hacking: New Web 2.0 Attacks and Defenses HI-TEC 2011.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Attacks Framework Attacks Physical Access Attacks -- Wiretapping Server Hacking Vandalism Dialog Attacks -- Eavesdropping Impersonation Message Alteration.
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Measurement in Networks & SDN Applications. Interesting Questions Who is sending a lot to a subnet? – Heavy Hitters Is someone doing a port Scan? Is someone.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Security Issues and Challenges in Cloud Computing
© 2013 Imperva, Inc. All rights reserved. DDos Attacks and Web Threats: How to Protect Your Site & Information Tina Shaw Account Executive
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
Barracuda Web Application Firewall
19 Historical overview Main challenge: How to distribute content in high quality over the Internet cost-effectively? • Traditional “Best-effort” model:
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
EMU/ICT Incident Response Team Firewall Access Session Presenter: IRT TEAM Member.
Unit 28- Website Development Assignment 1- THEORY P3
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
1 쉽게 접근하자 DoS! Sookmyung Women’s Univ. 최서윤. 2 The DoS?! Sockstress DoS using LOIC Link Local DoS.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
| University of Missouri Copyright ©2007 MOREnet and The Curators of the University of Missouri Statenet Security on the cheap and easy Beth.
By Swapnesh Chaubal Rohit Bhat. BEAST : Browser Exploit Against SSL/TLS Julianno Rizzo and Thai Duong demonstrated this attack.
The Top Ten of Security. Ten best practices for securing your network. Ten best security web sites. Eight certifications.
Norman SecureSurf Protect your users when surfing the Internet.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Bezpečnost Windows pro pokročilé: přístup do sítě GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. | MCM:Directory.
The Security Circus.
Network Edge Protection: A Technical Deep-Dive into Internet Security & Acceleration Server
I-Hack’08 International Hacking Competition “Details”
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Denial of Service DoS attacks try to deny legimate users access to services, networks, systems or to other resources. There are DoS tools available, thus.
Web Application Firewalls
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Kona Security Solutions - Overview
The Security Circus MPICT Summer Conference, June, 2011.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Janis Buikauskis Joe Kubena Kyle Nelson Chris Schrader.
1 Host versus Network Security Steven M. Bellovin
SHAREPOINT & JQUERY. Hi, my name and I am a product manager at lightning tools. I have been working with SharePoint for 5 years.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
The Security Circus & DoS Attacks. Bio Summary The DoS Circus Layer 4 DDoS: Thousands of attackers bring down one site Layer 7 DoS: One attacker brings.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Cyber Security A Hackers Perspective. Bryan Seely Hacker ( The good kind ) Author Chief Information Security Officer Professional Speaker.
Calgary Computer Security Solutions
Daniel “3ICE” Berezvai Reverse Proxy Presentation by:
Common Methods Used to Commit Computer Crimes
Backdoor Attacks.
3 Best Website Speed and Performance Checking Tools
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Chapter 5 Electronic Commerce | Security
EC-Council v9 Exam Questions
Cert Store Solution is a platform of 100+ IT professionals and having 500+ IT/Security and Academic courses. Cert Store is the Gold and Accredited partner.
Myths About Web Application Security That You Need To Ignore.
Chapter 5 Electronic Commerce | Security
Reconnaissance Report Trillium Technologies
DoS is Over MPICT June 12, 2012.
Computer Security Fundamentals
Wikileaks, Anonymous, and The Jester
ECCouncil v10 Certified Ethical Hacker Exam (CEH V10) Get certified in one attempt!
Presentation transcript:

Ethical Hacking: New Web 2.0 Attacks and Defenses HI-TEC 2011

Bio

To Get These Materials samsclass.info All PowerPoints, projects, etc. available for anyone to use

Join Twitter

Ethical Hacking

Security Training at CCSF Security+ CEH (Certified Ethical Hacker) CISSP (Certified Information Systems Security Professional) Computer Forensics Firewalls

The Security Circus

Denial of Service Part 1

Summary The DoS Circus Layer 4 DDoS: Thousands of attackers bring down one site Layer 7 DoS: One attacker brings down one site Link-Local DoS: IPv6 RA Attack: One attacker brings down a whole network

The Security Circus Characters

Wikileaks Published <1000 US Gov't diplomatic cables from a leak of 250,000 Distributed an encrypted "Insurance" file by BitTorrent Widely assumed to contain the complete, uncensored leaked data Encrypted with AES-256--no one is ever getting in there without the key Key to be released if Assange is jailed or killed, but he is in UK now resisting extradition to Sweden and the key has not been released

Anonymous

Operation Payback 4chan's Anonymous group Attacked Scientology websites in 2008 Attacked the RIAA and other copyright defenders Using the Low Orbit Ion Cannon with HiveMind (DDoS) "Opt-in Botnet"

HB Gary Federal Aaron Barr Developed a questionable way to track people down online By correlating Twitter, Facebook, and other postings Announced in Financial Times that he had located the “leaders” of Anonymous and would reveal them in a few days

Social Engineering & SQLi

Leaked HB Gary s For Bank of America Discredit Wikileaks Intimidate Journalist Glenn Greenwald For the Chamber of Commerce Discredit the watchdog group US Chamber Watch Using fake social media accounts For the US Air Force Spread propaganda with fake accounts

Drupal Exploit

Th3j35t3r "Hacktivist for Good" Claims to be ex-military Originally performed DoS attacks on Jihadist sites Bringing them down for brief periods, such as 30 minutes Announces his attacks on Twitter, discusses them on a blog and live on irc.2600.net

Jester's Tweets from Dec 2010

Th3j35t3r v. Wikileaks He brought down Wikileaks single-handed for more than a day –I was chatting with him in IRC while he did it, and he proved it was him by briefly pausing the attack

Wikileaks Outage One attacker, no botnet

Th3j35t3r After his Wikileaks attack He battled Anonymous He claims to have trojaned a tool the Anons downloaded He claims to pwn Anon insiders now

Jester's Tweets

Westboro Baptist Outage 4 sites held down for 8 weeks From a single 3G cell phone –

LulzSec The skilled group of Anons who hacked H B Gary Federal Hacked – US Senate – Pron.com – Sony – FBI – PBS – Fox News

LulzSec Attacks on Government Sites FBI, CIA, US Senate, NATO UK's National Health Service SOCA, the UK's Serious Organised Crime Agency taken down

Booz Allen Hamilton 150,000 US Military s & hashed passwords Half the passwords cracked within 24 hours

T-Flow of LulzSec Arrested

Topiary of LulzSec Arrested

Layer 4 DDoS Many Attackers – One Target

Companies that Refused Service to Wikileaks Amazon Paypal Mastercard Visa Many others

Low Orbit Ion Cannon Primitive DDoS Attack, controlled via IRC Sends thousands of packets per second from the attacker directly to the target Like throwing a brick through a window Takes thousands of participants to bring down a large site They tried but failed to bring down Amazon

Low Orbit Ion Cannon

Operation Payback v. Mastercard Brought down Visa, Mastercard, and many other sites –Easily tracked, and easily blocked –High bandwidth, cannot be run through anonymizer –Dutch police have already arrested two participants

Mastercard Outage 3,000 to 30,000 attackers working together

Layer 7 DoS One Attacker – One Target Exhausts Server Resources

Layer 7 DoS Subtle, concealable attack Can be routed through proxies Low bandwidth Can be very difficult to distinguish from normal traffic

HTTP GET

SlowLoris Send incomplete GET requests Freezes Apache with one packet per second

R-U-Dead-Yet Incomplete HTTP POSTs Stops IIS, but requires thousands of packets per second

Keep-Alive DoS HTTP Keep-Alive allows 100 requests in a single connection HEAD method saves resources on the attacker Target a page that is expensive for the server to create, like a search – A php script –pkp keep-dead.php

keep-dead

XerXes Th3j35t3r's DoS Tool Routed through proxies like Tor to hide the attacker's origin No one knows exactly what it does Layer 7 DoS?

XerXes

Link-Local DoS IPv6 Router Advertisements

IPv4: DHCP PULL process Client requests an IP Router provides one Host Router I need an IP Use this IP

IPv6: Router Advertisements PUSH process Router announces its presence Every client on the LAN creates an address and joins the network Host Router JOIN MY NETWORK Yes, SIR

Router Advertisement Packet

RA Flood

Windows Vulnerability It takes a LOT of CPU for Windows to process those Router Advertisements 5 packets per second drives the CPU to 100% And they are sent to every machine in the LAN (ff02::1 is Link-Local All Nodes Multicast) One attacker kills all the Windows machines on a LAN

Responsible Disclosure Microsoft was alerted by Marc Heuse on July 10, 2010 Microsoft does not plan to patch this Juniper and Cisco devices are also vulnerable Cisco has released a patch, Juniper has not

Defenses from RA Floods Disable IPv6 Turn off Router Discovery Block rogue RAs with a firewall Get a switch with RA Guard

RA Guard Evasion Add "Fragmentation Headers" to the RA Packets –

Fragmentation Headers

Defending Websites

Attack > Defense Right now, your website is only up because –Not even one person hates you, or –All the people that hate you are ignorant about network security

Defense Mod Security--free open-source defense tool Latest version has some protections against Layer 7 DoS Akamai has good defense solutions Caching DNS Redirection Javascript second-request trick

Load Balancer

Counterattacks Reflecting attacks back to the command & control server Effective against dumb attackers like Anonymous' LOIC –Will lose effect if they ever learn about Layer 7 DoS, which is happening now

CloudFlare