Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.

Slides:



Advertisements
Similar presentations
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Advertisements

Cryptography and Network Security Chapter 20 Intruders
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Information Networking Security and Assurance Lab National Chung Cheng University Network Security (I) 授課老師 : 鄭伯炤 Office: Dept. of Communication Rm #112.
Web Server Administration TEC 236 Securing the Web Environment.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Information Networking Security and Assurance Lab National Chung Cheng University 2004/03/041 Auditing your Microsoft Windows system Host-Based Intrusion.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Vulnerability Assessment NIKTO.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
2004, Jei Nessus A Vulnerability Assessment tool A Security Scanner Information Networking Security and Assurance Lab National Chung Cheng University
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Achieving Trusted Systems by Providing Security and Reliability Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun Xu, Shuo Chen, Nithin Nakka and Karthik Pattabiraman.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Host-Based Intrusion Detection software TRIPWIRE & MD5.
Information Networking Security and Assurance Lab National Chung Cheng University 2004/03/031 A Real World Attack: wu-ftp Cao er kai ( 曹爾凱 )
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Information Networking Security and Assurance Lab National Chung Cheng University Yaha.
Enterprise Network Security Accessing the WAN Lecture week 4.
Hacking Web Server Defiana Arnaldy, M.Si
Hacking Unix/Linux.
Voyager Server Security and Monitoring Best practices and tools.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Lesson 9 Common Windows Exploits. UTSA IS 3523 ID and Incident Response Overview Top 20 Exploits Common Vulnerable Ports Detecting Events.
Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and Ravishankar K. Iyer Brett Hodges April 8, 2010.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Security Issues in Unix OS Saubhagya Joshi Suroop Mohan Chandran.
1 Web Server Administration Chapter 9 Extending the Web Environment.
Honeypot and Intrusion Detection System
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Linux Networking and Security
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Cracking Techniques Onno W. Purbo
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Introduction A security scanner is a software which will audit remotely a given network and determine whether bad guys may break into it,or misuse it.
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Operating System Hardening. Vulnerabilities Unique vulnerabilities for: – Different operating systems – Different vendors – Client and server systems.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 3 Network Security Threats Chapter 4.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 9 Intruders.
The Internet Worm Compromising the availability and reliability of systems through security failure.
Penetration Test Debrief
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
Onno W. Purbo Cracking Techniques Onno W. Purbo
Hacking Unix/Linux.
Chapter 9 Intruders.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Intrusion Detection system
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Internet Security by Alan S H Lam 2019/4/9.
Crisis and Aftermath Morris worm.
Understanding and Preventing Buffer Overflow Attacks in Unix
Presentation transcript:

Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp

Information Networking Security and Assurance Lab National Chung Cheng University 2 Description There have many intrusion accident happened in day. Do you know what technique that crackers can intrude your web server, mail server and ftp server. Today, this exercise will guide you through the process of discovering a vulnerable system, exploiting the vulnerability, and installing software to cover your tracks.

Information Networking Security and Assurance Lab National Chung Cheng University 3 Purpose Located a vulnerable system Exploit that vulnerability to gain a root shell Installed a RootKit Access the system via the RootKit

Information Networking Security and Assurance Lab National Chung Cheng University 4 Principle and Pre-Study (I) CERT Advisory CA Multiple Vulnerabilities in WU-FTPD 1.MAPPING_CHDIR Buffer Overflow 2.Message File Buffer Overflow 3.SITE NEWER Consumes Memory

Information Networking Security and Assurance Lab National Chung Cheng University 5 Principle and Pre-Study (II) What is Buffer overflow? 2003 Top Ten Vulnerability Threat (Symantec) 1Microsoft Windows DCOM RPC Internet Buffer Overrun 2Microsoft RPCSS DCOM Interface Long Filename Heap Corruption 3Microsoft Windows ntdll.dll Buffer Overflow 4Sun Solaris Sadmin Client Credentials Remote Administrative Access 5Sendmail Address Prescan Memory Corruption 6Multiple Microsoft Internet Explorer Script Execution 7Microsoft Windows Workstation Service Remote Buffer Overflow 8Samba ‘call_trans2open” Remote Buffer Overflow 9Microsoft Windows Locator Service Buffer Overflow 10Cisco IOS Malicious IPV4 Packet Sequence Denial of Service A type of programmatic flaw that is due to a programmer allowing for an unbounded operation on data.

Information Networking Security and Assurance Lab National Chung Cheng University 6 Required Facilities WARNING:  This process of cracking a system is only tested in internal network.  Do not actual exploit on unprivileve host Hardware  PC or Workstation with UNIX-like system Software  Wu-ftp  RootKits and Buffer Overflow Program

Information Networking Security and Assurance Lab National Chung Cheng University 7 Step (I): reconnaissance and scanning Use “nmap” for system scanning Test the account of anonymous

Information Networking Security and Assurance Lab National Chung Cheng University 8 Step (II): exploit the target Decompress the buffer overflow file and compile it List the usage of this tool

Information Networking Security and Assurance Lab National Chung Cheng University 9 Step (III): cracking Execute the buffer overflow on target host Got the root right

Information Networking Security and Assurance Lab National Chung Cheng University 10 Step (IV) Download the rootkit from outside and install it checking the login user Download the tool from another victim Execute the rootkit Decompress the rootkit

Information Networking Security and Assurance Lab National Chung Cheng University 11 Step (V): auto-patch the victim the default login password change the system command open the telnet port close the system filewall Report the system information

Information Networking Security and Assurance Lab National Chung Cheng University 12 Step (IV) try the rootkit if it works Now you can do anything We have got a root shell now The Telnet daemon has been replaced Input the ID and the Password Which predefine by us

Information Networking Security and Assurance Lab National Chung Cheng University 13 Summary Checking the OS and applications’ vulnerability periodically. Catch the idea of “Defense in Depth.”

Information Networking Security and Assurance Lab National Chung Cheng University 14 Reference CERT  Nmap  Buffer Overflow and RootKits download site 