MIS 5211.001 Week 13 Site:

Slides:



Advertisements
Similar presentations
Accessing electronic journals from off- campus This causes lots of headaches, but dont despair, heres how to do it! (Please note – this presentation is.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Toolbox Mirror -Overview Effective Distributed Learning.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Computer Networks IGCSE ICT Section 4.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
1 Computer Security: Protect your PC and Protect Yourself.
MIS Week 7 Site:
How to make it easy for you customers to find and research you and your services!
CONNECTION SETTINGS FOR USE WITH THE MOTION COMPUTING MODEL-F5 TABLET COMPUTER AKA: SIMON October 8, 2011 (And other useful information.)
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Web server and web browser It’s a take and give policy in between client and server through HTTP(Hyper Text Transport Protocol) Server takes a request.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Information guide.
MIS Week 13 Site:
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
CIS 450 – Network Security Chapter 3 – Information Gathering.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
© 2003 Everett Public Schools Information Systems and Technology Department Getting Started with FirstClass October 10, 2015.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Security at NCAR David Mitchell February 20th, 2007.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Go to your school’s web locker site Your user name is the first letter of your first name, the first four letters of.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
TCP/IP (Transmission Control Protocol / Internet Protocol)
9: Troubleshooting Your Network
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
Getting Started Introduction Section 0 Lecture 1 Slide 1 Section 0 Slide 1 INTRODUCTION TO Modern Physics PHYX 2710 Fall 2004 Intermediate Lab Fall.
What is the Internet? A world-wide computer network made up of tens of thousands of smaller networks. It’s the biggest network of all! So, what is a network?
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Computer Security By Duncan Hall.
science/internet-intro
Securing A Wireless Home Network. Simple home wired LAN.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Tor Bruce Maggs relying on materials from
MIS Week 5 Site:
COOKIES AND SESSIONS.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Tor Bruce Maggs relying on materials from
Downloading and Installing GRASP-AF Workshop Ian Robson Information Analyst, North of England Cardiovascular Network.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Intro to Ethical Hacking
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Intro to Ethical Hacking
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Topic 5: Communication and the Internet
Bruce Maggs relying on materials from
Protocol Application TCP/IP Layer Model
Bruce Maggs relying on materials from
Presentation transcript:

MIS Week 13 Site:

 In the news  Evasion  Odds and Ends  Next Week 2MIS

 Submitted  isis/?xid=soc_socialflow_twitter_FORTUNE isis/?xid=soc_socialflow_twitter_FORTUNE   and-banks.html and-banks.html  future-moment_b_ html?utm_hp_ref=cybersecurity future-moment_b_ html?utm_hp_ref=cybersecurity  mud/ mud/  phones/major-android-exploit-could-make-millions-of-phones- vulnerable phones/major-android-exploit-could-make-millions-of-phones- vulnerable  encrypting-drives-are-little-better-than-software-based-encryption.html encrypting-drives-are-little-better-than-software-based-encryption.html  for-more-chase-like-breaches-i for-more-chase-like-breaches-i MIS

 More  bunch/115362/ bunch/115362/  us/windows/forum/windows_10-security/windows-10-and- hipaa-compliance/037e3f2e eb e856645?auth=1 us/windows/forum/windows_10-security/windows-10-and- hipaa-compliance/037e3f2e eb e856645?auth=1  hipaa-steve-hoffenberg hipaa-steve-hoffenberg  breached-anti-fraud-vendor-g2-web-services/ breached-anti-fraud-vendor-g2-web-services/  detection/114948/ detection/114948/  y-researchers-find-metropcs-coding-issue-that-could-have- exposed-customer-data-or-worse.htm y-researchers-find-metropcs-coding-issue-that-could-have- exposed-customer-data-or-worse.htm MIS

 What I noted  billion-in-holistic-security-strategy/d/d-id/ ? billion-in-holistic-security-strategy/d/d-id/  ain/ ain/  f44762bf9896.html#axzz3rrxc7rTK (? – Cyber Jobs) f44762bf9896.html#axzz3rrxc7rTK  tech/news/paris-attacks-anonymous-operation-isis-activists- begin-leaking-details-of-suspected-extremist-a html tech/news/paris-attacks-anonymous-operation-isis-activists- begin-leaking-details-of-suspected-extremist-a html  exposed-user-passwords exposed-user-passwords  accusations-fbi-funding-tor-hack accusations-fbi-funding-tor-hack MIS

 You are the attacker, you made it in. Now what?  We’ll cover some basics of what an attacker might do once inside MIS

 The first thing an attacker wants to do after getting in is to ensure they can get back in  Can you create a new privileged account for yourself?  Can you fix the vulnerability you used to get in  Don’t want another attacker stepping on top of you MIS

 Is logging even turned on?  No, you are in luck  Yes, more work to do  Is logging kept on the box?  Yes, great. Delete it.  No. Check for syslog services sending data out  This tells you there is a logging server somewhere  Also gives you the starting address for the logging server  Maybe you can get in and delete records there MIS

 Even if you can’t delete records it’s still a gold mine. Every machine worth protecting is sending logs to the service  If you can read the stored data or listen to the data coming in you can grab UserIDs and maybe even passwords MIS

 The box you break in on should not be the box you launch attacks from  Just like outside, pivot through boxes to use another machine for your attack  If detected, likely only the attacking machine is taken down, not you gateway in to the network MIS

 Don’t keep the data you steal on your attack machine or your gateway machine  Look for an open file share or a desktop to store what you steal  Don’t use box for anything else, don’t want to call attention to your loot! MIS

 Break your data up in to blocks  Consider RAR or PAR with error correction  If you lose part of your traffic, you might be able to reconstruct  Don’t be in a hurry  Volume traffic attracts attention  Don’t go to slow  The driver doing exactly the speed limit looks very suspicious  You want your activity to blend in MIS

 Small volume of data?  it  Post to a website  Drop box  Need to worry about Data Loss Protection systems  They look for data matching patterns  SSNs  Account numbers  PII MIS

 Sensitive data?  Obfuscation  Encryption  Larger volumes?  Fragmentation  Redundancy MIS

 Can I do some simple data manipulation  Substitute letters for numbers and vice versa  Might confuse DLP  Can I use code words?  Answers depend on what data I’m trying to get out MIS

 Large volumes of data need to be packaged and broken in to manageable chunks  Compression is your friend as well  In short  Package  Zip  Break in to pieces (RAR)  Here’s a link for RAR if you want to play with it:  Also available in Linux  If you do look a RAR, also look at CRC options MIS

 Do I need to go to full blown encryption?  Might need to if a robust DLP solution is in place  Can also do encryption as part of fragmentation process MIS

 Recall from beginning of course when we talked about TCP/IP, ping, etc…  Ping can carry data  Replies can carry data  DNS can carry data MIS

 If you can get physical access consider:  Cellular data connection  Point to Point WiFi  Printing  Your own SAN Storage MIS

 The card that I use, and the one recommended by the testers I know is from the Alfa line  I have these two:  AWUS051NH b a g-Wireless  AWUS036H g  Both are high power (1000mw) and work with wireless pen testing tools MIS

 What is Tor Onion Routing?  Tor is a distributed overlay network which anonymizes TCP-based applications (e.g. web browsing, secure shell, instant messaging applications.)  Clients choose the circuit paths  Messages are put in cells and unwrapped at each node or onion router with a symmetric key.  The ORs only know the successor or predecessor but not any other Onion Router. MIS

 Tor is an overlay network  Each router has a user-level process w/o special privileges.  Each onion router maintains a TLS connection to every other onion router.  Each user runs local software called onion proxy (OP) to fetch directories, establish circuits across the network, and handle connections from users.  Each router maintains a long-term & short term onion identity key. These are used to sign TLS certificates which sign the OR’s router descriptor(summary of keys, address, bandwidth,etc.) MIS

MIS vacy/r ers/onionrouting/

MIS vacy/r ers/onionrouting/

MIS vacy/r ers/onionrouting/

  r ers/onionrouting/ r ers/onionrouting/  MIS

 This was covered when we talked about nmap  There are tools that just do a ping of a list of addresses  However:  Be careful if you look for one of these tools  Lots of “free” download sites  Can be done straight from command line:  Try: C:\> FOR /L %i in (1,1,255) -n %i | find "Reply“  Pings all addresses in range MIS

 Yet another “Free” POS (piece of software)  See remarks from previous page MIS

 Old school technique of calling successive phone numbers to see if a modem answers  If modem does answer, some tools will attempt to try basic attacks to see if they work  Tools are still used, but generally don’t find much as they are ineffective in modern VOIP phone networks MIS

 No class next week  Test 2 in two weeks  Only material from Evasion will be testable  If there are “Any” questions between now and then write, text, or call. MIS

? MIS