MIS 5211.001 Week 13 Site:

Slides:



Advertisements
Similar presentations
JQuery MessageBoard. Lets use jQuery and AJAX in combination with a database to update and retrieve information without refreshing the page. Here we will.
Advertisements

Basics Creating an account What do you need An name for yourself. An address looks like this:
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
What is identity theft, and how can you protect yourself from it?
This week is anti-bullying week.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Computer Networks IGCSE ICT Section 4.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Fundamentals of Networking Discovery 1, Chapter 9 Troubleshooting.
How To Protect Your Privacy and Avoid Identity Theft Online.
1 Computer Security: Protect your PC and Protect Yourself.
CONNECTION SETTINGS FOR USE WITH THE MOTION COMPUTING MODEL-F5 TABLET COMPUTER AKA: SIMON October 8, 2011 (And other useful information.)
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Web server and web browser It’s a take and give policy in between client and server through HTTP(Hyper Text Transport Protocol) Server takes a request.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Information guide.
Staying Safe Online Keep your Information Secure.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Security at NCAR David Mitchell February 20th, 2007.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Downloading and Installing Autodesk Revit 2016
Forms and Server Side Includes. What are Forms? Forms are used to get user input We’ve all used them before. For example, ever had to sign up for courses.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Unit 12 Additional Evidence catelyn. 1.1 I can describe what types of information are needed. For the business card, I included the name of the company.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Go to your school’s web locker site Your user name is the first letter of your first name, the first four letters of.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
TCP/IP (Transmission Control Protocol / Internet Protocol)
9: Troubleshooting Your Network
MIS Week 13 Site:
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Computer Security By Duncan Hall.
MIS Week 7 Site:
science/internet-intro
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Sessions and cookies (part 2) MIS 3501, Fall 2015 Brad N Greenwood, PhD Department of MIS Fox School of Business Temple University 11/19/2015.
MIS Week 5 Site:
COOKIES AND SESSIONS.
GOOGLE PLAY By William Cook April 14, GOOGLE PLAY Marketplace for apps for android Androids “app store” You must make an account on the developer.
Online Job Applications Workshop Coordinators Sharon Feeney – Andrea Reynolds –
Downloading and Installing GRASP-AF Workshop Ian Robson Information Analyst, North of England Cardiovascular Network.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Intro to Ethical Hacking
Intro to Ethical Hacking
Intro to Ethical Hacking
Information Security Awareness 101
Topic 5: Communication and the Internet
Intro to Ethical Hacking
Intro to Ethical Hacking
A Student & Parent Guide
Week 7 - Wednesday CS363.
Presentation transcript:

MIS Week 13 Site:

 In the news  Answers to Questions  Evasion  Next Week 2MIS

 Submitted  breaches/deconstructing-the-cyber-kill-chain/a/d- id/ breaches/deconstructing-the-cyber-kill-chain/a/d- id/  finally-fixes-19-year-old-windows html finally-fixes-19-year-old-windows html  blind-data-breach-network/ blind-data-breach-network/  public-key-pinning-for-internet-explorer/ public-key-pinning-for-internet-explorer/ MIS

 More  breaches/bashlite-malware-leverages-shellshock-in- busybox-attack/d/d-id/ breaches/bashlite-malware-leverages-shellshock-in- busybox-attack/d/d-id/  more-secure-credit-cards-but-signature-still- required/ more-secure-credit-cards-but-signature-still- required/  phone-81-hacked.html phone-81-hacked.html  magazine.com/news/coca-cola-in-the-dock-laptop- theft/ magazine.com/news/coca-cola-in-the-dock-laptop- theft/ MIS

 What I noted  us/library/security/ms14-nov.aspx (MS Critical Kerberos Vulnerability) us/library/security/ms14-nov.aspx  agrees-that-googles-search-results-qualify-as-free- speech/ agrees-that-googles-search-results-qualify-as-free- speech/  implement-digital-tokens/ implement-digital-tokens/  broken-md5-really-is/ broken-md5-really-is/  /cracking-the-cve nutshell.aspx /cracking-the-cve nutshell.aspx MIS

 A question was raised around which WiFi card to use for testing wireless systems  The card that I use, and the one recommended by the testers I know is from the Alfa line  I have these two:  AWUS051NH b a g-Wireless  AWUS036H g  Both are high power (1000mw) and work with wireless pen testing tools MIS

 What is Tor Onion Routing?  Tor is a distributed overlay network which anonymizes TCP-based applications (e.g. web browsing, secure shell, instant messaging applications.)  Clients choose the circuit paths  Message are put in cells and unwrapped at each node or onion router with a symmetric key.  The ORs only know the successor or predecessor but not any other Onion Router. MIS

 Tor is an overlay network  Each router has a user-level process w/o special privileges.  Each onion router maintains a TLS connection to every other onion router.  Each user runs local software called onion proxy (OP) to fetch directories, establish circuits across the network, and handle connections from users.  Each router maintains a long-term & short term onion identity key. These are used to sign TLS certificates which sign the OR’s router descriptor(summary of keys, address, bandwidth,etc.) MIS

9 vacy/r ers/onionrouting/

MIS vacy/r ers/onionrouting/

MIS vacy/r ers/onionrouting/

  r ers/onionrouting/ r ers/onionrouting/  MIS

 This was covered when we talked about nmap  There are tools that just do a ping of a list of addresses  However:  Be careful if you look for one of these tools  Lots of “free” download sites  Can be done straight from command line:  Try: C:\> FOR /L %i in (1,1,255) -n %i | find "Reply“  Pings all addresses in range MIS

 Yet another “Free” POS (piece of software)  See remarks from previous page MIS

 Old school technique of calling successive phone numbers to see if a modem answers  If modem does answer, some tools will attempt to try basic attacks to see if they work  Tools are still used, but generally don’t find much as they are ineffective in modern VOIP phone networks MIS

 Short answer, never heard of em, till I looked em up!  As best I can tell, they repackaged open source tools and scripts and are asking $348 for it.  If I really needed a tool in this space, it would probably be from Fluke:  network/network-testing/OneTouch-AT-Network- Assistant network/network-testing/OneTouch-AT-Network- Assistant MIS

 Little better: I do recall hearing about this  There web site says all you need to know  Also, all links for download are dead and they are not in the repositories for Linux MIS

 Basically, same comment as two slides back. Never heard of em!  And probably wouldn’t risk downloading are installing MIS

 Maltego is a whole different story  Definitely heard of them. Automates portions of the Recon process  Used by some companies to “research” prospective hires  Here’s a pretty interesting example:  use-maltego-in-kali-linux.html use-maltego-in-kali-linux.html MIS

 An application testing tool used for load testing  I have not seen this used in pen testing  However, I have seen application developers use this and similar tools to stress test their applications  Lots of info here:  MIS

 You are the attacker, you made it in. Now what?  We’ll cover some basics of what an attacker might do once inside MIS

 The first thing an attacker wants to do after getting in is to ensure they can get back in  Can you create a new privileged account for yourself?  Can you fix the vulnerability you used to get in  Don’t want another attacker stepping on top of you MIS

 Is logging even turned on?  No, you are in luck  Yes, more work to do  Is logging kept on the box?  Yes, great. Delete it.  No. Check for syslog services sending data out  This tells you there is a logging server somewhere  Also gives you the starting address for the logging server  Maybe you can get in and delete records there MIS

 Even if you can’t delete records it’s still a gold mine. Every machine worth protecting is sending logs to the service  If you can read the stored data or listen to the data coming in you can grab UserIDs and maybe even passwords MIS

 The box you break in on should not be the box you launch attacks from  Just like outside, pivot through boxes to use another machine for your attack  If detected, likely only the attacking machine is taken down, not you gateway in to the network MIS

 Don’t keep the data you steal on your attack machine or your gateway machine  Look for an open file share or a desktop to store what you steal  Don’t use box for anything else, don’t want to call attention to your loot! MIS

 Break your data up in to blocks  Consider RAR or PAR with error correction  If you lose part of your traffic, you might be able to reconstruct  Don’t be in a hurry  Volume traffic attracts attention  Don’t go to slow  The driver doing exactly the speed limit looks very suspicious  You want your activity to blend in MIS

 Small volume of data?  it  Post to a website  Drop box  Need to worry about Data Loss Protection systems  They look for data matching patterns  SSNs  Account numbers  PII MIS

 Sensitive data?  Obfuscation  Encryption  Larger volumes?  Fragmentation  Redundancy MIS

 Can I do some simple data manipulation  Substitute letters for numbers and vice versa  Might confuse DLP  Can I use code words?  Answers depend on what data I’m trying to get out MIS

 Large volumes of data need to be packaged and broken in to manageable chunks  Compression is your friend as well  In short  Package  Zip  Break in to pieces (RAR)  Here’s a link for RAR if you want to play with it:  Also available in Linux  If you do look a RAR, also look at CRC options MIS

 Do I need to go to full blown encryption?  Might need to if a robust DLP solution is in place  Can also do encryption as part of fragmentation process MIS

 Recall from beginning of course when we talked about TCP/IP, ping, etc…  Ping can carry data  Replies can carry data  DNS can carry data MIS

 If you can get physical access consider:  Cellular data connection  Point to Point WiFi  Printing  Your own SAN Storage MIS

 First off, almost everything I present here started at:  MIS

 Similar to Linux, try these:  “type test.txt”  Or “type *.txt” MIS

 Try: “ipconfig /displaydns  I added “| more” to avoid overflow MIS

 Try “arp –a” MIS

 Try “sc query” MIS

 Try “sc query state=all” MIS

 Try “sc qc [service_name] MIS

 Try “sc start [service_name]” or “sc stop [service_name]  Remember, you can use “sc query state= all” to find the service names  If you have access to a similar machine, you could also look at the GUI MIS

 For Loops  FOR /L -> Counter  FOR /F - > Iterates through a file MIS

 Example  FOR /L %i in ([Start],[Step],[Stop]) do [command]  Translates to  FOR /L %i in (1,1,5) do echo %i MIS

 FOR /F (“options”) %i in ([text_file]) do [command]  Translates to:  FOR /F %i in count.txt do echo %i MIS

 Can add “ >> output.txt” to redirect to an output file  Try “FOR /F %i in (count.txt) do echo %i >> output.txt” MIS

 Lots more at:  MIS

 No class next week  Test 2 in two weeks  Only material from Evasion will be testable  If there are “Any” questions between now and then write, text, or call. MIS

? MIS