Chapter 11 Phase 5: Covering Tracks and Hiding. Attrition Web Site  Contains an archive of Web vandalism attacks

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Application Layer PART VI.
Security SIG: Introduction to Tripwire Chris Harwood John Ives.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
Covering Tracks and Hiding 1 Covering Tracks and Hiding.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Network Security CPSC6128 – Lecture 4 Post Exploitation 1.
Telnet/SSH: Connecting to Hosts Internet Technology1.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Forensic and Investigative Accounting
1 Web Server Administration Chapter 9 Extending the Web Environment.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
Honeypot and Intrusion Detection System
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Unix Security.  Security architecture  File system and user accounts  Integrity management  Auditing and intrusion detection.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
Sniffer, tcpdump, Ethereal, ntop
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006 Group 9 Greg Sheridan Terry Harvey Group 10 Matthew Bowman Laura Silaghi Michael.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Role Of Network IDS in Network Perimeter Defense.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Covert Channels.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Telnet/SSH Connecting to Hosts Internet Technology.
Configuring Internet-related services
Chapter 7 Network Applications
Presentation transcript:

Chapter 11 Phase 5: Covering Tracks and Hiding

Attrition Web Site  Contains an archive of Web vandalism attacks  Most attackers, however, wish to keep low profile

Hiding Evidence by Altering Event Logs  Attackers like to remove evidence from logs associated with attacker’s gaining access, elevating privileges,and installing RootKits and backdoors –Login records –Stopped and restarted services –File access/update times

Event Logging in Windows NT/2000  Security-related events such as failed login attempts or failed access to files are stored in file SecEvent.Evt  System events such as inability in starting a system service are stored in file SysEvent.Evt  Application events related to applications such as databases or web servers are stored in file AppEvent.Evt

Figure 11.1 Windows NT Event Viewer

Altering Event Logs in Windows NT/2000  opening or editing event log files cannot be done with a standard file editing tool  Deleting event log files possible but may cause suspicion  WinZapper tool allows attacker to selectively delete security events

Figure 11.2 WinZapper tool lets an attacker selectively delete events from Windows NT/2000 event logs

Altering System Logs in Unix  Unix log files are stored in files specified in /etc/syslog.conf (eg. /var/adm/messages)  Attackers can alter log files via editors such as vi or emacs

Altering Accounting Files in Unix  utmp, wtmp, and lastlog files are the main accounting files in Unix –Written in special binary format –Can be edited using tools such as remove, wtmped, marry, cloak, logwedit, wzap, and zapper Tools included in RootKits

Unix Shell History Files  stores a complete list of all commands entered by the user at the Unix command prompt  Usually stored in users’ home directories  Attacker may configure the length of the shell history file to be zero but may raise suspicion  Careful attacker will remove unwanted lines from the history file via ASCII editor

Defenses for Log and Accounting File Attacks  Activate logging on your critical systems  Set proper permissions on the log files, utmp, wtmp, lastlog, and users’ shell history files  Setup a a separate logging server –Add line “syslog 514/udp” to /etc/services on logging server –Modify /etc/syslog.conf on critical server to redirect desired message types to logging server –Hostname and IP address of logging server should be added to /etc/hosts on critical server to thwart DNS attack –In Windows NT/2000, replace EventLog service with an NT-compatible version of syslog to centralize logging Kiwi syslog for NT

Defenses for Log and Accounting File Attacks (cont.)  Encrypt log files sdi.com/english/freesoft.htmlhttp:// sdi.com/english/freesoft.html  On Linux systems, make log files append only $ chattr +a [log_filename]  Store logs on write-once media such as CD-ROM

Creating Hidden Files and Directories in UNIX

Creating Hidden Files in Windows NT/2000  Right-click on file or directory in Windows Explorer and selecting “properties”

Showing Hidden Files in Windows NT and Windows 2000  On WinNT’s Windows Explorer, click on “view” menu to show all files  in Win2000’s Windows Explorer, click on folder options

Hiding Information in Windows NT/2000  NTFS allows every file to have multiple streams of data associated with it  The normal contents of a file that can be seen and accessed by users is a stream itself  Other data can be attached and hidden as separate stream using “cp” program in Windows NT Resource Kit C:\> cp stuff.txt notepad.exe:data C:\> erase stuff.txt C:\> notepad.exe C:\> cp notepad.exe:data stuff.txt

Defenses from Hidden Files  Use file integrity checking tools such as Tripwire to check contents of files and directories to verify that no additional data, files or directories have been hidden in them  Use host-based IDS tools and anti-virus tools to check for presence of hidden file and generate alert message

Covert Channels  Communication channels that disguises data while it moves across the network to avoid detection  Require a client and server  Can be used to remotely control a machine and to secretly transfer files or applications

Figure 11.5 A covert channel between a client and a server

Techniques Used to Get a Covert Channel Server Installed  Perform a buffer overflow on victim and install a backdoor  an unsuspecting user an executable which installs a covert channel server  Install covert channel as a contractor or employee with administrative privilege

Tunneling  Carrying one protocol inside another protocol –Eg. Tunneling AppleTalk traffic over IP  Any communications protocol can be used to transmit another protocol –SSH protocol used to carry telnet, FTP, or X- Windows session  Used by covert channels –Loki –Reverse WWW Shell

Loki  Covert channel using ICMP as a tunnel to carry interactive communication with a backdoor listener  More stealthy and difficult to detect than other backdoor programs that listen on a given TCP/UDP port  Description and source code available at  Loki client wraps up attacker’s commands in ICMP and transmits them to the Loki server (lokid)  Loki server upwraps the commands, executes them and wraps the responses up in ICMP packets  Lokid must be run with root privilege

Figure 11.6 Loki hides data inside ICMP messages

Loki (cont.)  can only be detected via the presence of Loki daemon process running as root on the victim and the presence of bidirectional ICMP traffic  Can disguise its packets as DNS queries and responses by running over UDP port 53  Supports protocol-switching by typing “/swapt” on client to toggle between ICMP and UDP port 53  Supports encryption of ICMP payload information

Reverse WWW Shell  Uses HHTP as a covert channel  Allows an attacker to remotely access a victim machine with a command-line prompt  A Reverse WWW Shell server and Perl interpreter must be installed on the victim machine  A Reverse WWW Shell master software and Perl interpreter must be installed on the attacker’s machine  Can sneak past firewall  Perl code available at

Reverse WWW Shell (cont.)  Every minute, Reverse WWW Shell server will contact the master to retrieve commands issued by the attacker  Reverse WWW Shell server executes the commands, sends the results to Reverse WWW Shell master (via http request), and retrieves the next command (via http reply)  Victim machine appears to be a web client sending HHTP Get commands while attacker’s machine appears to be a web server

Figure 11.7 Reverse WWW Shell looks like outgoing Web access, but is really incoming shell access

Protocols used for Covert Channels  ICMP  HTTP  Telnet  SMTP  FTP  Streaming audio  SSH

Covert_TCP   Uses TCP and IP headers to create covert channels  Data can be hidden in various fields –IP Identification field One character embedded per packet –TCP sequence number One character embedded per SYN request and Reset packets –TCP acknowledgement number One hidden character per packet is relayed by a “bounce” server  Can send data over any TCP source/destination ports –Can bypass firewall if use ports such as 25 or 53

Figure 11.8 The IP and TCP headers

Figure 11.9 Using Covert_TCP with a bounce server

Defenses against Covert Channels  Don’t let attacker get root or administrator access on hosts –Harden OS –Install latest security patches  Install network IDS –Loki and other covert channels can be detected by Snort