C risis And A ftermath Eugene H. Spafford 발표자 : 손유민.

Slides:



Advertisements
Similar presentations
Buffer Overflows Nick Feamster CS 6262 Spring 2009 (credit to Vitaly S. from UT for slides)
Advertisements

Computer Science CSC 405Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 3. Program Security -- Part I.
Communications of the ACM (CACM), Vol. 32, No. 6, June 1989
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
CSE331: Introduction to Networks and Security Lecture 32 Fall 2002.
October 15, 2002Serguei A. Mokhov, 1 UNIX Security 2: A Quick Recap SOEN321 - Information Systems Security Revision 1.3 Date: September.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
The Internet Worm Crisis and Aftermath Miyu Nakagawa Cameron Smithers Ying Han.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Lecture 11, : The Internet, Summer : The Internet Lecture 11: Secure services David O’Hallaron School of Computer Science and Department.
Overview Computer security threats Unintentional:
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 10.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
COS 420 DAY 24. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Student evaluations Latest.
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
1 Lecture 7 Security Problems and Virus 2 Contents u How things go wrong u Change in environment u Bound and syntax checking u Convenient but dangerous.
Applications: Remote Login (TELNET,Rlogin) In this chapter we shall explore internetworking by examining high level internet services and protocols that.
Attacks Let us start by looking at traditional attack types. Address spoofing (=cheating) This is a set of attacks where the attacker sets to IP or TCP.
Chapter 10 Networking and the Internet ITSC 1458.
PVM. PVM - What Is It? F Stands for: Parallel Virtual Machine F A software tool used to create and execute concurrent or parallel applications. F Operates.
Understanding the CORBA Model. What is CORBA?  The Common Object Request Broker Architecture (CORBA) allows distributed applications to interoperate.
Survey “Intrusion Detection: Systems and Models” “A Stateful Intrusion Detection System for World-Wide Web Servers”
Controlling Files Richard Newman based on Smith “Elementary Information Security”
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
More Network Security Threats Worm = a stand-alone program that can replicate itself and spread Worms can also contain manipulation routines to perform.
FTP Client Application CSC 8560 Brian Jorgage 4/27/2004.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Inetd...Server of Servers Looks at a number of ports Determines when a service is needed on any of those ports Calls the appropriate server Restarts new.
Department of Computer Science Southern Illinois University Edwardsville Spring, 2008 Dr. Hiroshi Fujinoki FTP Protocol Programming.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Workbook 10 Chapter 8. Remote Shell Commands Pace Center for Business and Technology 1.
1 Electronic Messaging Module - Electronic Messaging ♦ Overview Electronic messaging helps you exchange messages with other computer users anywhere in.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
CH 25-Remote Login (TELNET,Rlogin)
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
1 Chapter 34 Internet Applications (Telnet, FTP).
Oracle Data Integrator Agents. 8-2 Understanding Agents.
Crisis And Aftermath Eugene H. Spafford 이희범.  Introduction  How the worm operated  Aftermath Contents.
Accessing Evitech network via FTP by Susan Jansson.
Programmed Threats Richard Newman. What is a Programmed Threat? Potential source of harm from computer code May be in form of - Executable program - Executable.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
A Failure to Learn from the Past Presented by Chad Frommeyer CSC 493/593 Professors Charles E. Frank/James Walden.
AMH001 (acmse03.ppt - 03/7/03) REMOTE++: A Script for Automatic Remote Distribution of Programs on Windows Computers Ashley Hopkins Department of Computer.
CS 245 – Part 1 Using Operating Systems and Networks for Programmers Jiang Guo Dept. of Computer Science California State University Los Angeles.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
Computer Communication: An example What happens when I click on
The Internet Worm Incident Eugene H. Spafford  Attack Format –Worm vs. Virus  Attack Specifications –Worm operation –Infection and propagaion  Topics.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
ECHO A System Monitoring and Management Tool Yitao Duan and Dawey Huang.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
1 Example security systems n Kerberos n Secure shell.
Network Attacks Instructor: Dr. X. Outline Worms DoS.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
The Internet Worm Compromising the availability and reliability of systems through security failure.
FTP Lecture supp.
Module 4 Remote Login.
Viruses and Other Malicious Content
File Transfer Protocol
Virus 18/11/2018.
Internet Worms, SYN DOS attack
File Transfer Protocol
Crisis and Aftermath Eugene H. Spafford
Crisis and Aftermath Morris worm.
Presentation transcript:

C risis And A ftermath Eugene H. Spafford 발표자 : 손유민

C ontents Introduction How the worm operated Crisis and Aftermath

W hat is worm? Worm - self-replicating computer program - propagate over the network - run without user intervention - cause serious harm to the network & system resources

C ompare of Worm vs. Virus WormVirus Independence in running? ○ X How to operate? Consume the resources of its host Insert itself into a host’s program When invoked?Itself When infected program is running TargetSeveral systemsTarget machine

M orris Worm When: November 2, 1988 Where: MIT What happened? - Infect Sun 3 systems and VAX computer running variants of 4 BSD UNIX ⇒ Systems became so loaded that they were unable to continue any processing!!!

H ow the worm operated Took advantage of ① the flaws in standard s/w installed on UNIX - fingered - sendmail - password mechanism ② a mechanism used to simplify the sharing of resources in local area networks - rsh, rexec

F ingered Finger - UNIX daemon which allows users to obtain information about other user over TCP/IP - The worm broke fingered program by “buffer overrun” - The worm exploited gets() call - Causes the program to return to worm program code → The worm can run alone!!

S endmail Sendmail - mailer program to route mail in a heterogeneous network By debug option, tester can run programs to display the state of the mail system without sending mail or establishing a separate login connection Worm use debug option to invoke set of commands instead of user address

P assword Mechanism in UNIX Password mechanism - When user log-on ① Insert password ② User-provided password is encrypted ③ Compare to previously encrypted password ④ If match, we get a accessibility

R sh & Rexec rsh and rexec are remote command execution services ① rsh - client IP, user ID ② rexec - user ID, Password

H igh-level Description Main program - Collects information on other machines in the network - Reading public configuration files - Running system utility programs Vector program - Program which install main program - Connects back to the infecting machine, transfers the main worm binary - Deleted automatically

S tep 1. Socket for Vector program - A socket was established - Randomly generates - Challenge string - Magic number - Random file name

S tep 2. Vector program 2.1. Using the rsh, rexec, fingerd2.2. Using the sendmail PATH=/bin: /usr/bin: /usr/ucb cd /usr/tmp echo gorch49; sed ‘/int zz/q’> x c; echo gorch 50 [text of vector program] int zz; debug mail from: rcpt to: data cd /usr/tmp cat > x c << ‘EOF’ [text of vector program] EOF cc –o x x c;./x rm –f x x c; Echo DONE cc –o x x c;./x rm –f x x c; quit

S tep 3. File Transfer - Vector program connects to the server - Transfer 3 files - Worm: ① Binary for Sun 3 ② Binary VAX machine - Source code of vector program - The running vector program becomes a shell with its input, output connected to the server

S tep 4. Infect Host - For each object files, the worm tires to build an executable object - If successively execute, the worm kills the command interpreter and shuts down the connect - Otherwise it clear away all evidence of the attempt at infection

S tep 5. Hide Worm - New worm hides itself - Obscuring its argument vector - Unlinking the binary version of itself - Killing its parent - Read worm binary into memory and encrypt - And delete file from disk

S tep 6. Gathering Information - The worm gathers information - Network interface - Hosts to which the local machines was connected - Using ioctl, netstat - It built lists of these in memory

S tep 7. Reachability - Tries to infect some from the list - Check reachability using telnet, rexec

S tep 8. Infection Attempts - Attack via rsh - /usr/bin/rsh, /bin/rsh (without password checking) - If success, go to Step 1 and Step 2.1

S tep 8. (Cont’d) Infection Attempts - Finger - Connects to finger daemon - ① Passes specially constructed 536 bytes ② buffer overflow ③ stack overwritten ④return address changed - execve(“/bin/sh”, 0, 0) - If success, go to Step 1 and Step 2.1

S tep 8. (Cont’d) Infection Attempts - Connection to SMTP (sendmail) - Step 2.2

S tep 9. Password Cracking - ① Collect information - /etc/hosts.equiv and /.rhosts - /etc/passwd -.forward - ② Cracking passwd using simple choices - ③ Cracking passwd with an internal dictionary of words - ④ Cracking passwd with /usr/dict/words

S tep 10. When Password Broken - Brake into remote machines - Read.forward,.rhosts of user accounts - Create the remote shell - Attempts to create a remote shell using rexec service - rexec to current host then try rsh command to remote host

C haracteristics Checks if other worms running - One of 7 worms become immortal Fork itself and Kill parent - No excessive CPU time Change pid, scheduling priority Re-infect the same machine every 12 hours There are no code to explicitly damage any system and no mechanism to stop

A ftermath Morris Worm is the first worm Around 6000 major UNIX machines were infected ( 10% of the network at that time) Important nation-wide gateways were shutdown Topic debated - punishment

A ftermath Robert T. Morris arrested - Says he just wanted to make a tool to gauge the size of the internet - 3 years of probation, a fine($10,050), community service(400 hours) CERT(Computer Emergency Response Team) was established