COEN 252 Security Threats. Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks.

Slides:



Advertisements
Similar presentations
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Advertisements

 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Lesson 3-Hacker Techniques
Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
SYSTEM ADMINISTRATION Chapter 19
Cryptography and Network Security Chapter 20 Intruders
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
System Security Scanning and Discovery Chapter 14.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Forces that Have Brought the world to it’s knees over the centuries.
Types of Attacks, Hackers Motivations and Methods
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
System and Network Security Practices COEN 351 E-Commerce Security.
Network Security Testing Techniques Presented By:- Sachin Vador.
Sniffing the sniffers - detecting passive protocol analysers John Baldock, Intel Corp Craig Duffy, Bristol UWE.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Computer Security and Penetration Testing
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Port Scanning.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Software Security Testing Vinay Srinivasan cell:
CIS 450 – Network Security Chapter 3 – Information Gathering.
COEN 350 Security Threats. Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
Information Systems Security Operations Security Domain #9.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
CHAPTER 9 Sniffing.
COEN 250 Security Threats. Network Based Exploits Phases of an Attack Reconnaissance Scanning Gaining Access Expanding Access Covering Tracks.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Topic 5: Basic Security.
Footprinting and Scanning
Hands-On Ethical Hacking and Network Defense
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Filip Chytrý Everyone of you in here can help us improve online security....
COEN 252 Security Threats. Network Based Exploits Phases of an Attack Reconnaissance Scanning Gaining Access Expanding Access Covering Tracks.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
An Introduction To ARP Spoofing & Other Attacks
Introduction to Information Security
Seminar On Ethical Hacking Submitted To: Submitted By:
Chapter 7: Identifying Advanced Attacks
Footprinting and Scanning
Presentation transcript:

COEN 252 Security Threats

Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks

Reconnaissance  Social Engineering “I cannot access my . What do I do?” Dumpster Diving (especially useful when people move)  Search the Web Sam Spade ( CyberKit, NetScanTools,... Search Engine Usenet postings Whois

Reconnaissance Databases  To research.com,.net, and.org domain names:InterNIC whois feature: allwhois, network soultions,...  ARIN: American Registry for Interent Numbers ( whois.html) whois.html  RIPE (Europe)  APNIC (Asia Pacific)

Reconnaissance: Scanning Once we have a target, we need to get to know it better. Methods:  War Dialing (to find out modem access)  Network Mapping  Vulnerability Scanning  War Driving

Scanning: War Dialing Purpose: Find a modem connection.  Many users in a company install remote PC software such as PCAnywhere without setting the software up correctly.  War Dialer finds these numbers by going through a range of phone numbers listening for a modem.  Demon Dialer tries a brute force password attack on a found connection.  Typically: war dialing will find an unsecured connection.

Scanning: Network Mapping Ping:  ping is implemented using the Internet Control Message Protocol (ICMP) Echo Request.  A receiving station answers back to the sender.  Used by system administrators to check status of machines and connections.

Scanning: Network Mapping Traceroute:  Pings a system with ICMP echo requests with varying life spans (= # of hops allowed).  A system that receives a package with expired numbers of hops sends an error message back to sender.  Traceroute uses this to find the route to a given system.  Useful for System Administration

Scanning: Network Mapping Cheops: Network Scanner (UNIX based) (Uses traceroute and other tools to map a network.) Cheops et Co. are the reason that firewalls intercept pings.

Reconnaissance: Port Scans  Applications on a system use ports to listen for network traffic or send it out.  2 16 ports available, some for known services such as http (80), ftp,...  Port scans send various type of IP packages to target on different ports.  Reaction tells them whether the port is open (an application listens).

Reconnaissance: Nmap  Uses different types of packets to check for open ports.  Can tell from the reaction what OS is running, including patch levels.  Can run in stealth mode, in which it is not detected by many firewalls.

Gaining Access  Gain access using application and OS attacks.  Gain access using network attack.

Gaining Access through Apps and OS  Stack-Based Overflow Attacks Stack is the area where function arguments and return addresses are saved.  Password Attacks  Web Application Attacks

Gaining Access: Web Application Attacks  The URL not only contains the web address of a site, but also input: 8&q=web+application+attack  A poorly written webpage allows the viewer to input data in an uncontrolled fashion. If the webpage contains SQL, the user might execute SQL commands.

Gaining Access through Network Attacks:Sniffing  Sniffer: Gathers traffic from a LAN.  Examples: Snort Sniffit reptile.rug.ac.be/~coder/sniffit/sniffit.htmlwww.snort.org  To gain access to packages, use spoofed ARP (Address Resolution Protocol) to reroute traffic.

Gaining Access through Network Attacks:Sniffing  Sniffing through a hub: Hub broadcasts all traffic. HUB Sender Listener

Gaining Access through Network Attacks:Sniffing  Sniffing through a hub: Switch only forwards to the link with the correct MAC address. Switch Sender Listener

Gaining Access through Network Attacks:Sniffing  Sniffing through a hub: MAC flooding:  Switches store MAC addresses in a cache.  Switches accept MAC advertising.  Attacker sends a flood of MAC advertisings.  Switch’s cache fills up.  Switch moves into promiscuous mode. Spoofed ARP messages

Gaining Access through Network Attacks:Sniffing  Sniffing through a hub: Spoofed ARP messages:  ARP resolves between IP addresses and MAC addresses.  Step 1: Attacker sets up IP Forwarding to the default router on LAN.  Step 2: Send a faked ARP reply to victims machine to reroute default router IP to attackers MAC address.  Step 3: Victim sends out a message to the outside world. This is routed to the default router IP, i.e. to the attackers machine.  Step 4: Attacker reads traffic.  Step 5: Because of forwarding, packet is forwarded to actual default router.

Gaining Access through Network Attacks:Sniffing  Man in the Middle Attack with DSniff: Step 1: Send fake DNS response with IP address for the web site to be attacked to the victim. Step 2: Victim connects to website. Step 3: DNS resolves to the attacker’s machine, request send there. Step 4: Attacker’s site receives request, acts as proxy, forwards it to real website. Step 5: Real website answers, attackers site forwards to victim. …

Gaining Access: Session Hijacking  IP Address Spoofing: Send out IP packages with false IP addresses.  If an attacker sits on a link through which traffic between two sites flows, the attacker can inject spoofed packages to “hijack the session”.  Attacker inserts commands into the connection.  Details omitted.

Exploiting and Maintaining Address After successful intrusion, an attacker should:  Use other tools to gain root or administrator privileges.  Erase traces (e.g. change log entries).  Take measures to maintain access.  Erase security holes so that no-one else can gain illicit access and do something stupid to wake up the sys. ad.

Maintaining Access: Trojans  A program with an additional, evil payload. Running MS Word also reinstalls a backdoor. ps does not display the installed sniffer.

Maintaining Access: Backdoors  Bypass normal security measures. Example: netcat  Install netcat on victim with the GAPING_SECURITY_HOLE option. C:\ nc -1 –p –e cmd.sh  In the future: connect to port and start typing commands.

Maintaining Access: Backdoors  BO2K (Back Orifice 2000) runs in stealth mode (you cannot discover it by looking at the processes tab in the TASK MANAGER.  Otherwise, it is a remote control program like pcAnyWhere, that allows accessing a computer over the net.

Maintaining Access: Backdoors  RootKit: A backdoor built as a Trojan of system executables such as ipconfig.  Kernel-Level RootKit: Changes the OS, not only system executables.

Covering Tracks:  Altering logs.  Create difficult to find files and directories.  Covert Channels through Networks: Loki uses ICMP messages as the carrier. Use WWW traffic. Use unused fields in TCP/IP headers.

Hacker Profile  Internal Hacker Disgruntled employee Contracted employee  Targets for corporate espionage.  Are not bound by employee policies and procedures. Indirectly contracted employee  Perform shared or subcontracted services

Hacker Profile  External Hacker Recreational Hacker  85% 90% male.  Between 12 and 25.  Highly intelligent low-achiever.  Typically from dysfunctional families. Professional Hacker  Hackers for hire.  Electronic warfare, corporate espionage.  “Security Consultants”  Security Consultants

Hacker Profile  Virus writers 1 Teenagers, College Students, Professionals Drop out of the scene as adults or have social problems. Intelligent, educated, male. Study by Sarah Gordon, IBM, in Beiser, Vince, “Inside the Virus Writer’s Mind”

Hacker Profile  Script Kiddy Uses scripts of programs written by others to exploit known vulnerabilities Goal is bragging rights, defacing web sites Sweep IP addresses for vulnerability Typically not explicitly malicious, but can cause damage inadvertently

Hacker Profile  Dedicated Hacker Does research. Knows in and outs of OS, system, auditing and security tools. Writes or modifies programs and shell scripts Reads security bulletins (CERT, NIST) Searches the underground.

Hacker Profile  Skilled Hacker Thorough understanding of system at the level of Sys Ad or above. Can read OS source code. Understands network protocols.  Superhacker Does not brag or post. Can enter or bring down any system.

Hacker Motives  Intellectually Motivated Educational experimentation  28 year old computer expert diverted 2585 US West computers to search for a new prime number.  Used years of computer time.  Lengthened telephone number lookup to 5 minutes  Almost shut down the Phoenix Service Delivery Center “Harmless Fun”  Web defacing Wake-up Call  Free-lance security consultant (still illegal)

Hacker Motives  Personally motivated Disgruntled employee. Cyber-stalking  E.g. to show of superiority to someone they feel / are inferior to.  Danger of escalation to physical attack.  A 50-year old security guard used the internet to solicit the rape of a 28-year old woman who rejected him.  Impersonated her in chat rooms and online bulletins.  Impersonated rape fantasies.  At least six man knocked at her door at night offering to rape her.  Six years in prison.

Hacker Motives  Socially motivated Cyber-activism Politically motivated  Hacking KKK or NAACP websites Cyber-Terrorism  Threatens serious disruption of the infrastructure  Power  Water  Transportation  Communication  1988: Israeli Virus and logic bomb in Israeli government computers Cyber-warfare

Hacker Motives Financially Motivated  Personal profit.  Two Cisco Systems consultants issued almost $8 M Cisco stock to themselves.  Accessed a system used to manage stock option disbursals to find control numbers for forged authorization forms.  Damage to the organization.  British internet provider, Cloud Nine, went out of business after crippling series of DOS attacks. Ego Motivated

Hacker Damage  Releasing Information  Releasing Software By circumventing copying protection. Through IP theft  Consuming Unused(?) Resources  Discover and Document Vulnerabilities  Compromise Systems and Increase their Vulnerabilities  Website Vandalism