Foundations of Network and Computer Security J J ohn Black Lecture #12 Oct 5 th 2004 CSCI 6268/TLEN 5831, Fall 2004.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.
Foundations of Network and Computer Security J J ohn Black Lecture #24 Oct 31 st 2007 CSCI 6268/TLEN 5831, Fall 2007.
Foundations of Network and Computer Security J J ohn Black Lecture #16 Oct 25 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
Foundations of Network and Computer Security J J ohn Black Lecture #15 Oct 20 th 2005 CSCI 6268/TLEN 5831, Fall 2005.
The MS Blaster worm Presented by: Zhi-Wen Ouyang.
Foundations of Network and Computer Security J J ohn Black Lecture #21 Oct 19 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Sep 28 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
1 Lecture 24 Hiding Exploit in Compilers bootstrapping, self-generating code, tombstone diagrams Ras Bodik Mangpo and Ali Hack Your Language! CS164: Introduction.
CSE331: Introduction to Networks and Security Lecture 31 Fall 2002.
Foundations of Network and Computer Security J J ohn Black Lecture #20 Oct 16 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
VIRUS Jan Damsgaard Dept. of Informatics Copenhagen Business School
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2014.
Data Security.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
32-1 Internet Safety/Security Issues Trojan/Virus precautions When you run an executable program from an untrusted source you’re opening yourself.
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Security at NCAR David Mitchell February 20th, 2007.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
By Demi Gardiner 8P Who’s been on your computer??
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Computer security By Isabelle Cooper.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Sight Word List.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Malicious Software.
VIRUS.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
W elcome to our Presentation. Presentation Topic Virus.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
Take a tour around my slideshow to learn more about viruses.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Cases Study: Code Red. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle. Case Study: Code Red Author: Jedidiah.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
OVERVIEW Virus & Worm overview Virus & Worm Difference CodeRed Worm Impact Detection Prevention.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Insecure PCs virus malware phishing spam spyware botnets DNS spoofing identity theft Trojan horse buffer overflow DoS attack worm keyloggers cross-site.
Chapter 40 Internet Security.
Mark Ryan Professor of Computer Security 25 November 2009
Foundations of Network and Computer Security
A Distributed DoS in Action
Case Study: Code Red Author: Jedidiah R. Crandall,
Brad Karp UCL Computer Science
Introduction to Internet Worm
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black Lecture #12 Oct 5 th 2004 CSCI 6268/TLEN 5831, Fall 2004

Announcements Project #0 due today Please sign a disclaimer if you have not already done so –I have them with me Project #1 has been assigned –See web page Quiz #2 Back

Quiz #2 Stats (Also on the web page) Statistics on quiz2 Mean score Standard Deviation 5.13 Median v 4 * 3 * * * * * 2 * * * * * * * * * * 1 * * * * * * * * * * * * *

Certs in My Browser Let’s see how many certificates we have on this machine, just for fun… –This may not make it through to Tegrity, but we’ll live dangerously for just a minute

ILoveYou (2000) Clever technology, great social engineering –Subject: I love you –Body: Kindly check attached love letter from me And message was from sender you know! –Attachment: LOVE-LETTER-FOR-YOU.TXT.vbs Note the double-extension – VBS script If you didn’t have your OS set to show extensions, you’d just see LOVE-LETTER-FOR-YOU.TXT

It Gets Worse SirCam, Nimda, CodeRed, BadTrans –Nimda: very complex Mostly spread via unpatched IIS servers, but also –Via (attached EXE) –Browsing dubious web sites with unsecured browser –Using backdoors from other viruses (CodeRed II, eg) –Payload: back door access –Code Red (2001) Tons of variants still around

Code Red Payload Coordinated attack against www1.whitehouse.gov –Used hardcoded IP address –Checked to ensure port 80 was active first –Easy to stop this, and indeed the IP was moved before Code Red launched its payload, so no direct damage done windowsupdate.microsoft.com was infected too –Users got infected while trying to patch! First version used static seed for random() –Limited the number of IPs it generated Five days later this was fixed

Code Red Details Spreads as a bad HTTP request. The IIS system mishandles the request, and instead executes the included packet with full permissions. The infected server then creates 99 threads which each attack random IP addresses –Random number generator works properly now This continues for the 1-19 of the month. On the of the month, all the threads attack a specific IP at –Still see network traffic surges today from this worm –People don’t patch! Defaces current pages on the server –Welcome to Hacked by Chinese!

SQL/Slammer (2003) Exploits buffer overflow in MS SQL server –UDP traffic to port 1434 Side-effect was DoS –Worm propagated so fast that it shut down many sites –Launched 12:30am EST victim numbers doubled every 8.5 seconds –By 12:45am, large pieces of the Internet were basically gone 300,000 cable modem users in Portugal down South Korea off the map (no cell phones or computer access) –Seattle 911 resorted to paper –Continental cancelled flights from Newark hub

SQL/Slammer BGP Churn

Witty Worm (March 2004) Attacked a security product! –Internet Security Systems (ISS) ISS RealSecure Network, RealSecure Server Sensor, RealSecure Desktop, and BlackICE –You can’t even trust your security systems?! Vulnerability revealed by eEye Digital Security –Witty released 10 hours after vulnerability was released –Destructive payload (deletes pieces of hard drive)

Flash Viruses Viruses can spread very fast –SQL/Slammer had only a 376 byte code size –No pause between propagation attempts Reading assignment –Read “How to 0wn the Internet in your Spare Time” A real problem –If you reinstall an old OS and attempt to download patches, you may be infected before you can patch!

Prevention Stay patched –windowsupdate.com –Linux patches Reduce network services to those needed –“Best block is not be there” – Mr. Miagi –Windows still comes with a ton of stuff turned on –SQL Slammer victims didn’t even know they were running an SQL server! –netstat –a Might surprise you

Prevention (cont) Don’t open attachments unless you’re sure –Always run a virus scanner –Even Word docs are dangerous Don’t visit questionable web sites –Esp if your browser is set to low security levels –Javascript is evil

Trojans Malicious code hidden within another object – attachments can contain trojans –This is how many viruses spread Backdoor is usually considered as a synonym –Putting a backdoor into login.c qualifies

Thompson’s Turing Award Lecture (1995) Thompson and Ritchie won the Turing award for creating Unix Thompson’s is my favorite Turing award lecture –“Reflections on Trusting Trust” –Please read it (it’s short) His lecture has three stages –Stage I: a “Quine” –A Quine is a program which outputs its own source code

A Quine in C char*f="char*f=%c%s%c;main() {printf(f,34,f,34,10);}%c"; main(){printf(f,34,f,34,10);} We printf the string f, inserting f into itself as a parameter –Yow! We could attach any extra code we like here File this away in your head for now: we can write a program which outputs its own source code

Thompson, Stage II Note that a C compiler is often written in C –Kind of strange chicken-and-egg problem –How to bootstrap Interesting “learning behavior” –You add a feature, compile compiler with itself, then it “knows” the feature Once you get a rudimentary compiler written, it can be arbitrarily extended

Thompson, Stage III Add a backdoor to login.c –Allow valid passwords plus some “master” password –Note that this would be caught soon enough because it exists in the login.c source code Ok, so be sneakier –Add code in cc.c (the C compiler) to add the backdoor to login.c whenever compiling login.c –Add self-replicating code to the C compiler to reproduce itself plus the login.c backdoor!

Implementing the Trojan Now compile login.c –Compiler adds the backdoor Compile cc.c –Compiler sees that it’s compiling itself and self- replicating code runs to ensure login.c trojan and cc.c trojan are compiled into cc binary Now remove all this new code from cc.c –Back door exists only in binary! –login.c and cc.c will continue to have trojan even after infinite recompiles

Moral of the Story The amount of cleverness we haven’t even thought of yet is scary –We’re probably never going to have completely secure computers and networks –The most we can hope for is “best effort” from those we trust and from ourselves –It’s going to be an eternal battle between us and the criminals