CS682- Network Management and Security Prof. Katz.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

ETHICAL HACKING.
IP Addressing and Subnetting
IP Masquerading Homes and Businesses: When you only have one IP but you have LOTS of machines.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Intrusion Detection Systems and Practices
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Computer Security and Penetration Testing
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
Network Security With nmap By *** *****. Installing nmap netlab-2# cd /usr/ports/security/nmap netlab-2# make install all.
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 18 HACKING (CONTINUED). WHY DO PEOPLE HACK ?  JUST FOR FUN.  SHOW OF THEIR KNOWLEDGE.  HACK OTHER SYSTEM SECRETLY.  DESTROY ENEMY’S COMPUTER.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Introduction to Network Address Translation
Honeypot and Intrusion Detection System
CIS 450 – Network Security Chapter 3 – Information Gathering.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Linux Networking and Security
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Firewall Security.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
NAT Network Address Translation. Reading CNI – pp Port Mapping LA – pp NAT.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 1 Scaling IP Addresses.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
Welcome to Early Bird Class
NAT/PAT by S K SATAPATHY
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Filip Chytrý Everyone of you in here can help us improve online security....
Network Devices and Firewalls Lesson 14. It applies to our class…
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Backdoor Attacks.
Introduction to Networking
Introduction to Networking
Firewalls.
Network Security: IP Spoofing and Firewall
Digital Pacman: Firewall Edition
Firewalls Routers, Switches, Hubs VPNs
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
6. Application Software Security
Presentation transcript:

CS682- Network Management and Security Prof. Katz

The Hacker Mentality The term was originally used to mean someone who made software do that which the programmer did not intend. Over time it was adapted to classify those who do the above for illegal purposes

Different types of hackers Network Hackers – Continuously pound on networks looking for holes Phreaks – Hardware hackers Crackers – Code breakers Most hackers believe they are “elite” and will not get caught. Some are right, most are wrong.

Evolution of a hacker Hackers recently have been High School or undergraduate students. After learning all they can about the target they begin trying to find a solution to let them in

After a hacker gets in The hacker will contact the system administrator The hacker will retrieve the desired data The hacker will deface the machine

Common forms of entry Easy passwords Unpatched servers (known attacks) Security recommendations unfollowed Buffer overflows

Progression of a hack The hacker will initially determine all available information about the target network The hacker will select a target which has the least amount of protection, which will allow him to get the data he wants. The target will be compared against well known attacks If source code is available for the target’s systems, the hacker will examine the code for new ways in. The hacker may attempt to gain access to the password database. The hacker will attempt brute force access to the system The hacker may attempt to gain physical access to the system.

What tools are available? If the hacker has programming experience, he can create his own tools Commercially available tools are often free nmap ( L0phtcrack Tcpdump (network monitors) Various assorted tools designed to scan for well known attacks.

RFC-1918 / NAT

RFC-1918 Hosts not connected to the Internet do not need unique addresses Hosts connected through a proxy server or Address Translation device do not need unique addresses NB: The proxy server or NAT device will need at least 1 unique address!

Network Address Translation IP Address theory provides 4,294,967,296 unique IP addresses. Because of Subnetting we’ve used almost the entire domain. NAT allows us to use RFC1918 (fake, illegal) addresses for our LAN and have only a few addresses seen on the InternetRFC1918

Types of NAT One-to-One: Does not eliminate the number of used IP addresses, but provides for greater security One-to-Many: Wastes IP addresses, only done when necessary for security Many-to-One: One real address is used by many fake addresses

Concepts of NAT Only important if Every machine needs an IP address unique to its network Networks need at least one unique address When data traverses a NAT device the TCP and IP headers will be changed and in some cases the data will be changed too

How NAT works

Why is NAT secure In Many-to-One NAT, connections are never allowed from the outside to the LAN unless they are expected (ie FTP) Generally in One-To-One NAT open ports must be indicated and connections specifically allowed Outside individuals have no concept of the layout of the LAN

Problems with NAT Non-OSI compliant protocols will not work without special consideration Protocols which make a connection back to the original host will not work Sometimes difficult to install/maintain Sometimes costly

NAT Devices All Cable Modem/DSL Routers Checkpoint Firewall-1 Linux CISCO IOS Windows 2000

Linux NAT