Chapter 12: Anatomy of an Attack

Slides:



Advertisements
Similar presentations
BlueRedGreenPurpleOrange.
Advertisements

Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Cryptography and Network Security Chapter 20 Intruders
Forces that Have Brought the world to it’s knees over the centuries.
Exploits Dalia Solomon. Categories Trojan Horse Attacks Trojan Horse Attacks Smurf Attack Smurf Attack Port Scan Port Scan Buffer Overflow Buffer Overflow.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Introduction to Security Computer Networks Computer Networks Term B10.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
IS Network and Telecommunications Risks
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
2004, Jei Nessus A Vulnerability Assessment tool A Security Scanner Information Networking Security and Assurance Lab National Chung Cheng University
Computer Security and Penetration Testing
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Bill Gates’ RSA 2006 Keynote presentation Questions and answers.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Truth About Protecting Passwords COEN 150: Intro to Information Security Mary Le Carol Reiley.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
CERN’s Computer Security Challenge
Some Practical Security AfNOG 2004 Workshop Hervey Allen May 2004 Liberal borrowing from Brian Candler.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Software Security Testing Vinay Srinivasan cell:
Introduction of Internet security Sui Wang IS300.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Types of Electronic Infection
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Cracking Techniques Onno W. Purbo
DNS Hijack Demonstration (Diverting User Application via DNS) Giovanni Marzot, Ólafur Guðmundsson,
Introduction A security scanner is a software which will audit remotely a given network and determine whether bad guys may break into it,or misuse it.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
SMTP / MIME Florin Zidaru.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Employee clicks on fake
Some Practical Security
Secure Software Confidentiality Integrity Data Security Authentication
Onno W. Purbo Cracking Techniques Onno W. Purbo
Remote Control and Advanced Techniques
امنيت اطلاعات: رمز بقاء در عصر اطلاعات
Chapter 27: System Security
Viruses and Virus Protection
الانترنت والبريد الإلكتروني
Lecture 3: Secure Network Architecture
Crisis and Aftermath Morris worm.
Presentation transcript:

Chapter 12: Anatomy of an Attack

Figure 12.1 Network Architecture of Acme Widgets

Figure 12.2 Let the scanning begin!

Figure 12.3 War dialing success

Figure 12.4 Darth installs a B02K backdoor and Nessus

Figure 12.5 Scanning the internal network using Nessus

Figure 12.6 Taking over the internal DNS server

Figure 12.7 Using Reverse WWW Shell for access

Figure 12.8 Hijacking a telnet session to the Web server with root privileges

Figure 12.9 Sniffing the external DNS server’s password via Dsniff

Figure 12.10 Darth’s trap

Figure 12.11 Game over!

Figure 12.12 An attack against Monstrous Software to obtain Foobar source code

Figure 12.13 Nessus Scanning for some weak jump-off points around the world

Figure 12.14 Sending email spam with an enticing offer (game with trojan horse backdoor program created via wrapper)

Figure 12.15 Telecommuter downloads her email

Figure 12.16 Telecommuter takes the bait

Figure 12.17 When the telecommuter uses the VPN again, the Trojan horse backdoor searches for mountable shares on the Monstrous corporate network

Figure 12. 18 When users on the corporate network run notepad Figure 12.18 When users on the corporate network run notepad.exe, the Trojan horse is installed

Figure 12.19 The Trojan horse dumps password hashes and emails them across the Internet

Figure 12.20 The attackers crack the passwords through three levels of indirection

Figure 12.21 The attackers set up a VPN connection using the stolen passwords, and remotely control the Trojan horse on the internal network

Figure 12.22 Bonnie and Clyde get the Foobar source code