Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.

Slides:



Advertisements
Similar presentations
IP ADDRESS MANAGEMENT [IPAM]
Advertisements

Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Module 5: Creating and Configuring Group Policy
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Security Issues and Challenges in Cloud Computing
System and Network Security Practices COEN 351 E-Commerce Security.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Network Printing. Printer sharing Saves money by only needing one printer Increases efficiency of managing resources.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Module 4: Add Client Computers and Devices to the Network.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Computer & Network Security
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Module 4: Planning, Optimizing, and Troubleshooting DHCP
W2K Server Installation It is very important that before you begin to install Windows 2000 Server, you must prepare for the installation by gathering specific.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Module 10: Windows Firewall and Caching Fundamentals.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Chapter 7. Identifying Assets and Activities to Be Protected
Critical Security Controls
Chapter 6 Application Hardening
CIS 332 Course Experience Tradition / snaptutorial.com
Secure Software Confidentiality Integrity Data Security Authentication
Dynamic Web Page A dynamic web page is a kind of web page that has been prepared with fresh information (content and/or layout), for each individual viewing.
CIS 332 Course Experience Tradition / snaptutorial.com
IS4550 Security Policies and Implementation
CIS 332 Competitive Success-- snaptutorial.com
CIS 332 Education for Service-- snaptutorial.com
CIS 332 Teaching Effectively-- snaptutorial.com
CIS 332 Education for Service-- tutorialrank.com
CIS 332 Inspiring Innovation-- snaptutorial.com
Unit 27: Network Operating Systems
Game Mark Shtern.
Game Mark Shtern.
Bethesda Cybersecurity Club
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Mark Shtern

 Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of attacks on computer systems

 Hacker may not be a computer expert  Numerous attacking scripts / tools available  Hacker training material also available

 Results from malicious attack  Financial loss  Loss of reputation  A drop in the value of a company’s stock  Legal issues

 85% of attacks were not considered highly difficult  96% of breaches were avoidable through simple or intermediate control  48% involved privileges misuse  86% of victims had evidence of the breach in their log files

 78% of attacks were not considered highly difficult  13% involved privileges misuse  75% of attacks were opportunistic

 47%  Remote Access  26%  SQL Injection  18%  Unknown  2%  Client-Side Attack  2%  Remote File Inclusion  3%  Remote Code Execution  1%  Authorization Flaw  1%  Physical Theft Trustwave 2013 Global Security Report

 5%  >2Years  14%  2Years  25%  Days  20%  Days  27%  Days  4%  Days  5%  <10 Days Trustwave 2013 Global Security Report

 Hands on experience in various security topics  Execution of popular attacks  Attack prevention and risk mitigation

 Network (sniffing, session hijacking)  Password Cracking  Web  Code injection  Overflows (Buffer, Number)

 Auditing  Vulnerability scanners  Firewalls (Network and application)  Intrusion Preventions and Detections  Honeypots

Orientation

 Isolated Lab accessed through an IP KVM  Attack Lab consists of  Physical equipment, such as servers, workstations and network switches  Virtual equipment, such as virtual machines and virtual switches  Attack Lab has monitoring software that audits student activity

 Physical lab equipment, such as servers, routers, workstations and switches are not to be configured, attacked or modified in any manner  Data in the attack lab can not be copied out of the attack lab  The attack lab user password should not be reused in other systems

 Students are allowed to modify, configure, or attack their private Virtual Machines only within the scope of the lab exercises  Violation of the Attack Lab policies may be considered an Academic Integrity offence

 Sign the security lab agreement to get your password  Login at / (  User name is CSE user name  Login at windows workstation  User name is CSE user name  Click on vSphereClient  Name of a vCenter Server is vcent  Select “Use Windows session credentials”  Click Login button

 Click on CD-ROM icon  Select CD/DVD Drive 1  Select “Connect to ISO image on local disk”  Browse to “C:\ISOs” folder or your private folder  Select CD-ROM image  Access to CDROM from VM

 Create an ISO file that contains your files  first.iso  Create an ISO file that contains first.iso  second.iso  Click on Virtual Media and select second.iso  Click on CDROM in Attack Lab machine and copy first.iso into Private Directory

 Start vSphere Client  Select Virtual Machine  Connect CDROM (the media name is first.iso )  Copy files from CDROM into Virtual Machine

 Software package in Linux OS  apt-get install  apt-get remove  Windows component  Insert Windows CD into Virtual Machine  Click on Add/Remove Program  Select/Deselect windows component

 The performance of the students will be evaluated as a combination of  7 labs ( 18 %)  Term Project (67%)  Project presentation ( 5 %)  Game ( 5 % + bonus)  Participation ( 5 %)  Labs are worth 3 %  Lab mark:  1  at least 50% + lab participation  2  at least 75% + lab participation  3  100% + lab participation

 Completed task must be demonstrated to the instructor  Lab reports are optional  The lab report must be a short, precise and professional document (title, table of contents, page numbering etc)  The lab report must contain sufficient evidence that you completed the lab exercise  Code developed during the labs is expected to be simple  Developed applications are prototypes

 Screenshots are attached  Figure number? Figure description?  “I verified DNS configuration using nslookup”  How? Evidence?  “I created a folder named ‘xxx’ and gave read/write and execute permission...”  How? Evidence?  “I developed a script...”  Evidence? Script source code?

 Project consists of four phases  Implementation  Security testing  Fixing security bugs  QA phase  Developed application is a final product  The project report must be a detailed, precise and professional document (title, table of contents, page numbering etc)

 Design is just a list of functions  Design justification : “The design is flexible”  Why is the design flexible?  Test case : “Run the application”  What are the user inputs? What are the expected results?

 Developer  Project presentation  QA  Review project design  Penetrate other projects  IT Security  Secure infrastructure

 Read Lab 1  Ask questions  Add Administrative user

 Plan  Develop naming schema  Configure Windows 2003 server  Promote server to Domain Controller

 Plan  Test Connectivity  Test DNS  Join Workstation to Domain  Configure users

 Plan  Security Test  Find passwords  Two ways of hiding files  Develop two attacks

 Configure static IP address  cat /etc/apt/sources.list  # Karmic  deb karmic main restricted universe multiverse  deb karmic-security main restricted universe multiverse  deb karmic-updates main restricted universe multiverse

 cat /etc/apt/sources.list  # Breezy  deb breezy main restricted universe multiverse