WARNING ! The system is either busy or has been unstable. You can wait and See if it becomes available again, or you can restart your computer. *

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Network Security.
Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
SYSTEM ADMINISTRATION Chapter 19
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Attacks Mark Shtern.
Introduction to Security Computer Networks Computer Networks Term B10.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Web server security Dr Jim Briggs WEBP security1.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Lance West.  Just what is a Denial of Service (DoS) attack, and just how can it be used to attack a network.  A DoS attack involves exploiting operating.
DENIAL OF SERVICE ATTACK
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Linux Networking and Security
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
CHAPTER 9 Sniffing.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
1 The Main Event Battle Of the Sniffers. ● The Champion – Ethereal: Network Analyzer ● The Challenger – Ettercap: Network Security Suite.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
DoS/DDoS attack and defense
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
UNIX SYSTEM SECURITY Tanusree Sen Agenda Introduction Three Different Levels of Security Security Policies Security Technologies Future of.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Fall  Computer Crimes  Operating System Identification  Firewalking 2.
Networks Fall 2009.
DDoS Attacks on Financial Institutions Presentation
Network Security (the Internet Security)
Cloud Computing By: Vanika Jennings.
Backdoor Attacks.
Wireless Network Security
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
Red Team Exercise Part 3 Week 4
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

WARNING ! The system is either busy or has been unstable. You can wait and See if it becomes available again, or you can restart your computer. * Press any key to return to Windows and wait. * Press CTRL+ALT+DEL again to restart your computer. You will Lose unsaved information in any programs that are running. Press any key to continue.

Carl the Happy Chatter Group 4 Presents: But not for long…. Carl Morris Andrew Snyder Ken Nguyen Dec 4 2000 User Attacks

User Attacks What is it? An attack mounted against an end user of the Internet Goals of an attacker Obtain access to systems Eavesdrop on communications Aggravate and annoy a household user Cause damage! Anything to annoy an end user

Context of Discussion Not meant to apply to “computer geeks” Applies to average end user Attacks mounted easily by attackers with limited computer knowledge

Methods of choice Performed a search for phrases such as “How to find Windows NT passwords,” “Hacking into Computers” & “Easy Hacking” Used our own past experiences (world & class) Our own interests

We decided... The Big Three: Denial of Service (DoS) Packet Sniffing Back Orifice 2000

What is DoS? Attacker consumes limited resources on victim’s machine CPU time memory bandwidth

DoS Easy DoS Attack Ping Flooding Ping of Death WinNuke

Ping Flooding What is Ping Flooding? Sending huge amounts of ICMP Echo Requests Used legitimately to test your connection

Ping Flooding (cont.) Ping Flooding’s impact Ties up victim’s bandwidth Forces dialup users to disconnect May cause victim’s machine to crash

Ping Flooding (cont.) Ping Flooding is Hard! Need to know victim’s IP Easily obtained from ICQ, IRC, message forums, etc... Must type “ping destination_IP –t –l huge#”

Ping of Death What is Ping of Death? Carl receives a packet of illegal size Carl’s computer crashes 

Ping of Death (cont.) Ping of Death is also very hard Must type “ping destination_IP –l 65550”

WinNuke What is WinNuke? Takes advantage of Window’s Out of Band (OOB) bug Carl receives a pointer that is invalid Carl’s computer crashes 

WinNuke WinNuke is also very hard

Protect yourself Ping of Death & WinNuke Get patches for your appropriate OS to prevent overflow/pointer error

Protect yourself Ping Flooding Sets computer not to echo back, cuts by 50% Call your ISP, or set up your own firewall Stop it before it start: Do not give out your IP!

What Is Packet Sniffing? Packet sniffing is eavesdropping on network traffic. It consists of capturing packets on the network and analyzing them to obtain information.

What Is in a Packet? Source and Destination (MAC) A packet can contain information ranging from web addresses to passwords. However, it is all in binary form, and requires a protocol analyzer to make sense of it all.

MAC Each Ethernet card contains a 48-bit identifier – Media Access Control The first 24 bits identify the vendor The last 24 bits identify the card To find out your MAC: Win9x – winipcfg.exe WinNT – ipconfig /all Linux – ifconfig

How Is Packet Sniffing Used? Packets are captured. -- Promiscuous mode Packets are analyzed. -- Protocol analyzer (LanSleuth, Neptune, Ethereal)

Malicious Effects Websites Passwords Any unencrypted information sent over the network (Messages, Files)

Ease of Use Network Protocol Analyzers LanSleuth, Ethereal, Neptune, snoop Easy installation and configuration Some analyzers require administrative permissions

Examples Packet captured using Ethereal

Analyzing Packet entered into Ethereal Decode

Preventions Encrypt all transfers SSL – Secure Socket Language SSH – Secure Shell VPN – Virtual Private Networks

Detections In theory – impossible In practice – possible sometimes Stand-alone packet sniffers don’t transfer packets Non-standard generate traffic (DNS reverse lookups in order to find names associated with IP addresses)

Ping Method Send a request Nobody should respond Response --> Sniffer!

Packet Sniffing Re-visited Packets are “captured” on the network They are then analyzed - Passwords - Web sites Impossible to stop Difficult to detect

Back Orifice 2000 What is it? “The most powerful network administration tool available for the Microsoft environment” How is it used? An “administrator” creates a custom server file installs this server on the target machine connects to the target machine perform various functions

Back Orifice 2000 Malicious effects A malicious attacker can: Install the server on victim’s machine Take over computer Logging keystrokes Rebooting Viewing cached passwords the active screen etc Ease of use In the next few minutes, I will show you how to use BO2K

Back Orifice 2000 Create a server file…

Back Orifice 2000 Create a server file… (continued)

Back Orifice 2000 Time to connect

Back Orifice 2000 Some stuff…

Back Orifice 2000 Plugins Encryption (AES, IDEA, RC6, Serpent) Communications Server Enhancement Client Enhancement

Back Orifice 2000 BO Peep Plugin

Back Orifice 2000 BO Tools Plugin

Prevention Measures Umgr32.Exe anyone ? 1) Antivirus 2) firewall 3) don’t trust anyone 4) look for umgr32.Exe (or registry) on your computer 5) Microsoft: get a clue

Summary Many user attacks are so easy that even your mom could figure them out Some attacks can’t be protected against based on current network protocol and system architecture Microsoft needs to tighten up security on their products

Conclusion Are you safe? That kid next door could be screwing with you right now. You could be a victim of user attacks and not even know it. Practice online safety measures. You are not invincible: Don’t take security for granted

Questions