Targeted Break-in, DoS, & Malware attacks (I) (February 18, 2015) © Abdou Illia – Spring 2015.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Network Security Testing Techniques Presented By:- Sachin Vador.
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Information Security & Privacy November 13, 2014.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Computer & Network Forensics Xinwen Fu Chapter 13 Investigations.
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Port Scanning.
Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
Forensic and Investigative Accounting
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
1 Final Exam Review (Part 2) BUS Abdou Illia, Fall 2007 (Thursday 12/6/2007)
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
CERN’s Computer Security Challenge
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (March 2, 2015)
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Software Security Testing Vinay Srinivasan cell:
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Attack Methods Chapter 4 Corporate IT Security Copyright 2002 Prentice-Hall.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 14, Thursday 4/12/2007) (Week 15, Monday 4/16/2007)
بسم الله الرحمن الرحيم Islamic University of Gaza Electrical & Computer Engineering Department Prepared By : Eman Khaled El-mashharawi Miriam Mofeed El-Mukhallalati.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Linux Networking and Security
Security (Part 1) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Tuesday 4/3/2007)
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
TCP/IP Concepts (Part 1) January 14 and 19, 2010 MIS © Abdou Illia.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Hands-On Ethical Hacking and Network Defense
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Filip Chytrý Everyone of you in here can help us improve online security....
Review Exam 2 Spring 2016.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
ETHICAL HACKING
Port Scanning James Tate II
Review Exam 2 Spring 2013.
Footprinting and Scanning
TCP/IP Internetworking
TCP/IP Internetworking
Footprinting and Scanning
Attack Methods Chapter 4
SECURING INFORMATION SYSTEMS
Targeted Break-in, DoS, & Malware attacks (I)
Information Security & Privacy
The Internet School of Business Eastern Illinois University
EVAPI - Enumeration Auburn Hacking club
Presentation transcript:

Targeted Break-in, DoS, & Malware attacks (I) (February 18, 2015) © Abdou Illia – Spring 2015

2 Learning Objectives Understand Targeted attacks’ preparation Discuss Break-in attacks

3 Targeted attacks’ preparation Before launching targeted attacks, attackers engage in: Unobtrusive info gathering Host scanning Port scanning Network scanning Fingerprinting

4 Unobtrusive Information Collection Sending packets into a network is “noisy” Need to do unobtrusive info gathering, first, by Visiting target corporate website for  Employees’ names and s  Officers names and organizational structure, etc. Reading trade press (often online & searchable) for  Info about products under development  Firms’ financial prospects, etc. Searching U.S. EDGAR* system online for  Ownership, shareholder information, etc. Searching the Whois database at: NetworkSolutions.com/whhois/index.jsp, internic.net/whois.html, etc. NetworkSolutions.com/whhois/index.jspinternic.net/whois.html * Electronic Data Gathering, Analysis, and Retrieval

5 Sample of Whois entries Domain Name: PUKANUI.COM Administrative Contact : Panko, Ray 1456 KALANIIKI ST HONOLULU, HI US Phone: (808) Domain servers in listed order: NS75.WORLDNIC.COMNS75.WORLDNIC.COM NS76.WORLDNIC.COMNS76.WORLDNIC.COM DNS Servers

6 Attacks preps: examining headers Received: from hotmail.com (bay103-f21.bay103.hotmail.com [ ]) by barracuda1.eiu.edu (Spam Firewall) with ESMTP id B10BA1F52DC for ; Wed, 8 Feb :14: (CST) Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Wed, 8 Feb :14: Message-ID: Received: from by by103fd.bay103.hotmail.msn.com with HTTP; Thu, 09 Feb :14:58 GMT X-Originating-IP: [ ] X-Originating- X-Sender: In-Reply-To: X-PH: From: To: X-ASG-Orig-Subj: RE: FW: Same cell# Subject: RE: FW: Same cell# Date: Thu, 09 Feb :14: Mime-Version: 1.0 Content-Type: text/plain; format=flowed X-OriginalArrivalTime: 09 Feb :14: (UTC) FILETIME=[DCA31D60:01C62D0D] X-Virus-Scanned: by Barracuda Spam Firewall at eiu.edu X-Barracuda-Spam-Score: IP Address Locator: Display headers in Gmail, Yahoo!, Hotmail: Source IP Address

7 Host Scanning Objective: identify IP addresses of active hosts Pinging individual hosts Ping scanning Pinging a range of IP addresses IP scanning software: fping, gping, Ping Sweep, PingerPing Sweep SYN/ACK scanning used when firewall configured to block pinging from outside

8 Network Scanning Objective: understand a network internal structure including routers, firewalls location Also called network mapping Main tools used Tracert (in Windows) or Traceroute (in Linux) Network scanning software, e.g NetScanner

9 Port Scanning Most break-ins exploit specific services/applications Service Default Port www80 FTP21 SMTP25 Scan target for open ports Send SYN segments to a particular port number Observe SYN/ACK or reset (RST) responses

10 Fingerprinting Determining specific software run by target Identify a particular operating system or application program and (if possible) version For example, Microsoft Windows 2000 Server For example, BSD LINUX 4.2 For example, Microsoft IIS 5.0 Useful because most exploits are specific to particular programs or versions

11 Active vs. Passive fingerprinting Active Fingerprinting Send odd messages and observe replies Different operating systems and application programs respond differently Active fingerprinting may set off alarms Attackers usually use rate of attack messages below IDSs volume thresholds Passive Fingerprinting Read headers (IP-H, TCP-H, etc.) of normal response messages e.g. Windows 2000 uses TTL = 128 and Window Size = Passive Fingerprint difficult b/c Admin could change default values Time To Live (8 bits) Protocol (8 bits) 1=ICMP, 6=TCP,17=UDP Window Size (16 bits)

12 Fingerprinting by reading banners Many programs have preset banners used in initiating communications Using telnet or FTP to connect to a server could display the banner

13 Summary Questions 1 In preparing his attack, the attacker used the ping command to determine whether or not the target computers are connected and responsive. Which of the following did the attacker do? a)Network scanning b)Port scanning c)None of the above

14 Summary Questions 1 (cont.) In preparing his attack, the attacker sent normal HTTP requests to a web server. Then, he spent some time analyzing the protocol-related information in the response received from the web server in order to determine what software are installed on the web server. Which of the following did the attacker do? a)Active learning b)Network scanning c)Passive fingerprinting d)None of the above

15 Break-In Attacks Take advantage of known vulnerabilities that have not been patched Exploits are easy to use Frequently effective Intruder needs User manes and passwords, or Hijack another user’s session

16 Obtaining passwords By using social engineering By intercepting authentication communications With physical access Can install keystroke capture programs Can copy password file and crack it later by password “guessing” Windows 2000, XP: \windows\system32\config Linux: /etc/passwd

17 Password guessing Brute force Generating possible password combinations by changing one character at a time If password is 4 decimal numbers  Start with 0000; next try 0001; then 0002; etc.  How many possible combinations? ___________ If password is 6 alphabetical characters, how many possible combinations? _____________ Brute force password cracking software available

18 Password guessing (cont.) Dictionary attack Does not try all possible combinations Takes each word from a “dictionary”, then Encodes it in the same way the target computer encodes passwords Compares encoded word with password file entries 5%0*agT$ ulo(^7$3 *9%4#Bhg olk&63(0 Pswd file 86^%489 #$56&(8 *89&^%4 nmoY6^% *9%4#Bhg abacus acorn after agree ajar alarm ameliorate Hashing

19 Summary Questions 2 You want to crack the passwords in the SAM file on a Windows XP computer. The Operating system is installed on the C: drive. At what specific location is the SAM file located? a)C:\ b)C:\root c)C:\Windows\system32 d)C:\Windows\system32\config

20 Summary Questions 2 (cont.) Assume that a password is 2 decimal number long. What is the maximum number of passwords that an attacker would have to try in order to crack the password? a)4 b) c)1024 d)None of the above How much time (in minutes) will it take to crack the password if it requires 1.2 second to try each password? Answer: a maximum of ______ minutes.

21 Session Hijacking Exploiting of a valid communication session to gain unauthorized access Many servers use session IDs to continue communication with returned users Session could be hijacked using Session sniffing

22 Session Hijacking (cont.) Session Hijacking could also be done through Theft of session cookie file used for authenticating users by web servers

23 Break-In: Posthack Install rootkit for posthack activities Usually downloaded through trivial file transfer protocol (TFTP) Create backdoors for reentry if original hacking vulnerability is fixed Backdoor accounts Trojanized programs that permit reentry Collect needed info or damage the system Weaken system’s security Delete audit logs