CIS 450 – Network Security Chapter 16 – Covering the Tracks.

Slides:



Advertisements
Similar presentations
Basic Unix system administration
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Detecting Intruders from log files and traces Special Intruder Detection Systems (IDS) are now a market niche, and there are many products on the market.
Aktueller Status How Hackers Cover Their Tracks ECE 4112 May 1st, 2007 Group 1 Chris Garyet Christopher Smith Introduction Lab Content Conclusions Questions.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
COEN 252: Computer Forensics Router Investigation.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Linux Networking and Security Chapter 10 File Security.
Chapter 11 Phase 5: Covering Tracks and Hiding. Attrition Web Site  Contains an archive of Web vandalism attacks
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Gene Perkins, Lassen High School Networking Academy
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
CIS 450 – Network Security Chapter 15 – Preserving Access.
Honeypot and Intrusion Detection System
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Software.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Security monitoring boxes Andrew McNab University of Manchester.
1 Periodic Processes and the cron Daemon The cron daemon is where all timed events are initiated. The cron system is serviced by the cron daemon. What.
Unix Security.  Security architecture  File system and user accounts  Integrity management  Auditing and intrusion detection.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Computer security By Isabelle Cooper.
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
Rootkits, Backdoors, and Trojans ECE 4112 – Lab 5 Summary – Spring 2006 Group 9 Greg Sheridan Terry Harvey Group 10 Matthew Bowman Laura Silaghi Michael.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Covering the Tracks on Mac OS X Charlie Scott November 2010 GIAC GSEC Gold, GCIH.
SCSC 455 Computer Security Chapter 3 User Security.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
2: Operating Systems Networking for Home & Small Business.
Day 15 Apache. Being a web server Once your system is correctly connected to the network, you could be a web server. –When you go to a web site such as.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Discovering Computers 2012: Chapter 8
Common Methods Used to Commit Computer Crimes
Agenda Basic Unix Commands (Chapters 2 & 3) Miscellaneous Commands:
NET 311 Information Security
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
12: Security The Security Problem Authentication Program Threats
Visit for more Learning Resources
Lesson 16-Windows NT Security Issues
Security.
Operating System Concepts
File System Management
Operating System Concepts
6. Application Software Security
Presentation transcript:

CIS 450 – Network Security Chapter 16 – Covering the Tracks

Hacker’s Perspective Backdoor – a way for an attacker to get back into a network or system without being detected. Attacker wants to maintain his access by hiding the fact that he was ever there.

Four areas that an attacker is concerned with when covering their tracks: Log files – audit trails that list who gained access, and for how long (and possibly what they did and what files they accessed) File Information – since attackers normally have to modify key system files information for these files (date and file size) tend to change Additional Files – attacker usually loads additional files to the system which could take a large amount of space Network traffic – if IDS is utilized attacker has to search and eliminate the IDS records or mask his traffic to appear to be normal network traffic

Log Files Provide a listing of exactly what is done on the system and by whom Logging has to be turned and checked Attacker can delete the entire log file but this will set off a red flag to the administrator Attacker can edit the log files and delete the entries to what the attacker did

Linux Log Files /etc/syslog.conf – main configuration file for the syslogd daemon that controls logging on /var/run/utmp Tracks who is currently logged into the system Entry is added when user logs in and removed when user logs out Binary file that can not be accessed directly but by common programs than come with OS: who; users; and finger

Linux Log Files /var/log/wtmp Tracks all users who have logged in and have logged out of system. Can be created manually if not created by login. Entry is added when user logs in and updated when user logs out The file can grow rapidly on busy systems, so daily or weekly rotation is recommended Binary file that can be accessed by the programs last and aclastac /var/log/btmp Records bad log on attempts Can be created manually if not created by login Should combine the results with those from wtmp to see if an attacker gained access after a failed attempt Binary file that can be accessed by the lastb program

Linux Log Files /var/log/messages Syslog is a utility for tracking and logging all manner of system messages from the merely informational to the extremely critical and can be configured to put most of the messages the file /var/log/messages Syslog File is ASCII text and be looked at with the more, cat, and grep commands /var/log/secure Used to log any attempts to log in as root and attempts to use the su command. This file also contains information on attempts to connect from remote systems and failed attempts to log in as root. File is ASCII text and be looked at with the more, cat, and grep commands

Programs Available to Clean Up Log Files Available from: exploits/log-tools/ exploits/log-tools/

Protecting UNIX Log Files Set proper permissions on log files – read and write access should be limited to root Use a separate server Store your log files on a separate server Use Honey PotsHoney Pots Honey pots are one of the newest methods used in intrusion detection. The idea behind a honey pot is to setup a "decoy" system that has a non- hardened operating system or one that appears to have several vulnerabilities for easy access to its resources. The decoy system should be set up in a similar manner to those of the production servers in the corporation and should be loaded with numerous fake files, directories, and other information that may look real. By making the honey pot appear to be a legitimate machine with legitimate files, it leads the hacker to believe that they have gained access to important information Make regular backups of the log files – backup to several places across the network and some on removable media Use write once media Encrypt the log files Review the log files on a regular basis

System 2000 Logging /windows2000serv/maintain/monitor/03w2kad b.mspx /windows2000serv/maintain/monitor/03w2kad b.mspx

File Information When attacker puts in backdoor he has to modify some key system files If file came with the base OS then it should not be modified in the course of using the system – check modified date Some rootkits have utilities built in to modify file information Protection Against Create cryptographic hash on file - tripwiretripwire

Additional Files Attacker uploads tool to victim’s site so he has access to them when needed Attacker tries to hide the fact that additional files have been added by: Set the hidden attribute for a file Rename the files Create hidden partitions or shares Modify the free space utility

Additional Files Use steganography tools The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.datafilesHTMLfloppy disksplain textcipher text THC Steganographic Challenge

Additional Files Protection Against – Know what’s on your system Run software such as TripwireTripwire

Covering Tracks on the Network Attacker will either try to hide their traffic or make it look like other traffic on the network Loki Reverse WWW Shell Malicious code attacks via HTTP Covert TCP