General Unix Security Group A2 Rachit Gupta Roland Hollis E.J. Chambers.

Slides:



Advertisements
Similar presentations
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Advertisements

Lecturer: Fadwa Tlaelan
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Unit 18 Data Security 1.
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Linux’ Security Haifa Linux Club Orr Dunkelman.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Sniffing the sniffers - detecting passive protocol analysers John Baldock, Intel Corp Craig Duffy, Bristol UWE.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
CS 497C – Introduction to UNIX Lecture 35: - TCP/IP Networking Tools Chin-Chih Chang
Voyager Server Security and Monitoring Best practices and tools.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
COEN 252 Computer Forensics
COEN 252 Computer Forensics Collecting Network-based Evidence.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
CVS Client/Server CVS (GNU CVS) –Open source –Cross-platform Designed as a client/server application Remote access –Client cvs: uses rsh or ssh to establish.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 19 TELNET and Rlogin.
Bugs SATAN scans for It is interesting to look at the bugs SATAN scans for. They are easily detected by the scanners and therefore do not pose a threat.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Transmission Control Protocol TCP. Transport layer function.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Account Forwarding ICS100 David Pai Spring 2007.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
CHAPTER 9 Sniffing.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Security CS Introduction to Operating Systems.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Ingredients of Security
Securing the Linux Operating System Erik P. Friebolin.
M ITNICK A TTACK. WHO IS THIS GUY?
SCSC 455 Computer Security Chapter 3 User Security.
Telecommunications Networking II Lecture 41d Denial-of-Service Attacks.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
Gaggle Mail Supervised student Data transfer from home  school.
Telnet  TErminaL NETwork  TELNET is a general-purpose client-server application program  TELNET enables the establishment of a connection to a remote.
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
UNIX/AIX COURSE OUTLINES AND SYLLABUS Document Version: 1.0 Created on: 09/19/2014 Author: Walter Takang Confirmed by: Walter Takang.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
UNIX U.Y: 1435/1436 H Operating System Concept. What is an Operating System?  The operating system (OS) is the program which starts up when you turn.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
Company LOGO Security in Linux PhiHDN - VuongNQ. Contents Introduction 1 Fundamental Concepts 2 Security System Calls in Linux 3 Implementation of Security.
Security Script Kiddies Network Security Port Scans.
Secure services Unit-IV CHAP-1
Port Knocking Benjamin DiYanni.
2. OPERATING SYSTEM 2.1 Operating System Function
SECURE SHELL MONIKA GUPTA COT 4810.
Chapter 2: System Structures
TOPIC 6: SYSTEM START-UP AND CONFIGURATION
Welcome To Outlook Support Number
UNIT 18 Data Security 1.
Lesson 16-Windows NT Security Issues
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Operating System Security
Linux Security.
Mitnick Attack.
Crisis and Aftermath Morris worm.
Presentation transcript:

General Unix Security Group A2 Rachit Gupta Roland Hollis E.J. Chambers

Security is only as good as its weakest link Introduction Physical Security Threats Internal External Detection

General Concepts Turn off any guest/anonymous accounts Make users change passwords frequently Disable well known accounts that do not need direct login Adm, daemon, sys Do not have a “Welcome” message on the login screen Make sure to keep log files

Internal Threats Basic Internal Concepts Make sure you have the permissions set properly Using Group Permissions Correctly Password Security Must use shadow passwords since 20% of passwords on system are hackable

Internal Threats Con’t Virtually every attempt is to gain root access Downfall of Unix, are Setuid Programs Programs that are run by normal users, but change to user 0 (root) to perform the required task level Identify these programs and determine if normal users need it, or if the suid bit enabled

External Threats More common than Internal since these people already do not have access Packet Sniffing is very common method Packing Sniffing is normally done on the system in question This means your system has already been compromised

DoS Attacks Fork Bomb Process continually spawns new children, eating up the system resources Malloc Bomb Process continually makes malloc calls, until all memory is gone SYN Flood When TCP connection is being established, just sending a SYN will leave server in unfinished state Mail Bomb Enormous amount of that slows system and takes up disk space

Continued Disable little or unused TCP/UDP services If not needed, disable all ‘r’ commands I.e. rsh, rlogin There are many programs available to help with keeping your system secure Netmap SATAN Tcpdump Kerberos