Presentation is loading. Please wait.

Presentation is loading. Please wait.

Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.

Similar presentations


Presentation on theme: "Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC."— Presentation transcript:

1

2 Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC

3 Security+ Chapter 6 – Predicting and Mitigating Threats Brian E. Brzezicki

4 Malware (291) malware – mal (bad) ware (software) Software you would NEVER intentionally install or execute on your computer. Type of malware we will discuss Viruses Worms Trojans Logic Bombs Rootkits Spyware

5 Virus

6 Virus Characteristics (291) Code that attaches itself to other VALID software Harmful code gets run when you run the valid application When run viri generally replicates into other software on the system, infecting it with the virus. Virus usually also takes some unwanted actions when the host application is executed. Viruses have signatures (the bad code) that can be searched for and detected.

7 Virus replication Methods (292) Email Infected removable media – Floppies – USB drives – Even some published software on CDROM Downloaded software Network Shares

8 Virus Hoaxes What is a hoax? How can a hoax cause damage? What is the best countermeasure for hoaxes?

9 Worms (295) Worms – work differently than viruses Self-propagate Do damage Counter measures Remove un-necessary services Patch OS and applications Beware of code sent in email

10 Trojan Horses

11 Trojan (296) Like the Trojan Horse of greek Mythology a Trojan program seems like a “gift”. Disguised as a useful program. It might even might do something useful to keep up the disguise. But will cause you harm. Countermeasures User Education Don’t run software that you are not familiar with and that you don’t have “real distribution” media for. Software Digital Signing Anti-virus software to detect known Trojans

12 Logic Bombs (296) Logic Bomb – Code or applications embedded into a system that waits for a specific time or event then goes off doing some type of damage. Countermeasures Inventory all software and keep checksums. Tripwire is a popular program that provides file integrity verification.

13 Rootkits (297) Software installed on a system to hide the presence of an attacker. Can consist of Replaced system software Loadable kernel modules

14 Adware and Spyware (298) Adware - Software put on a system that tracks a users usage, may cause pop ups to occur. Spyware – Dangerous software that is install on a system to have much more malicious impact. keystroke loggers are a very dangerous type of spyware.

15 Protection against Malware User Education File Integrity Verification Software Signing Anti-Virus software – Signature Based – Heuristic Anti Spyware software – Lavasoft’s Ad-aware – Windows Defender – Spybot – Spybot Search and Destroy

16 Attacks

17 Privilege Escalation (n/b) Once you have “user” access to a system trying to use system tools and programs in ways that allow you to raise your privileges beyond your normal access levels. Buffer Overflows

18 Denial of Service Attacks

19 Ping of Death (n/b) Old bug in Microsoft TCP/IP stack that caused a computer to “blue screen” / crash when an oversized ping packet was received. Even though the bug was fixed in re-appeared on later versions of Windows.

20 SYN Flood

21 SYN Flood (302) Attack – Forge IP SYN packet from downed system – Server responds to fake downed address, which never responds – Connections are “half-open” and use up limited listen queue slots – Stops real new connections from establishing

22 SYN Flood (302) Countermeasures Stop forged packets at ingress/egress routers Patch OS Decrease 3 way handshake timeout values Increase 3 way handshake max connections Use a firewall as a middleman Set registry settings \HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TCPIP\SynAttack Protect = 1 \HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\TCPIP\TcpMaxCo nnectResponseRetransmissions >= 2 Mor information regarding SYN flood registry settings at http://technet.microsoft.com/en-us/library/cc938202.aspx

23 Smurf Attack (303)

24 How would a Smurf attack someone? (see next slide) 1.Find site to attack, say www.ebay.comwww.ebay.com 2.Forge Ping packet from www.ebay.com to a BROADCAST network addresswww.ebay.com 3.Watch as the computers on the network all start pinging back www.ebay.comwww.ebay.com Countermeasures Drop forged packets at routers Drop directed broadcasts Drop pings to broadcast addresses

25 Smurf Attack (303)

26 Tear Drop (n/b)

27 Distributed Denial of Service

28 DDoS (304) Distributed Denial of Service – Overwhelm the victim by sheer numbers. Take over computers (bots/zombies) Build a command and control network using masters and slaves. – Often using IRC or other pubic services Control hundreds or thousands of computers and attack another.

29 DDoS (304)

30 Spoofing (304) One entity pretends to be another IP spoofing Email spoofing

31 Man in the Middle (307)

32 Replay Attacks (308) Capturing authentication or session credentials and resending them to gain access. Countermeasures Do not allow credentials to be reused – Time stamps – Counters

33 TCP/IP Hijacking (309) When you cannot steal someone elses passwords or break into a system, steal someone elses connection. 1.Wait for a user to authenticate 2.Determine sequence numbers 3.Knock valid user off network 4.Steal their authenticated connection

34 ARP poisoning (309) ARP poisoning is an attack against a network, where one computer sends a fake ARP reply, in the attempt to trick another computer on the same network to communicate with it instead of the real machine. This can be used as a man in the middle attack, or a straight hijacking attack.

35 DNS Poisoning (n/b) Faking DNS responses in order to trick a computer into going to an attackers site rather than a real site. Example. If I can “poison” your DNS cache and redirect www.bankofamerica.com to my IP address, I could put up a fake site and steal your banking information! (or setup a MiM attack)www.bankofamerica.com

36 Reconnaissance (310) Learning as much as you can about your target you plan on attacking. This is the first step in the hacking process. IP address identification DNS probing PING scanning OS fingerprinting Port Scanning Vulnerability identification

37 Null Sessions (311) In early versions of Windows, un-authenticated users could “browse” the network to see what resources existed on the network. This browsing made use of “Null Sessions” which are network connections allowed without any type of authentication. Hackers can use Null Sessions and browsing to learn about the network and Null sessions should be disabled or limited in their functionality. To fight NULL sessions on windows HKLM\SYSTEM\CurrentControlSet\Control\LSA\RestrictAnonymous = 1 See http://support.microsoft.com/?kbid=246261http://support.microsoft.com/?kbid=246261

38 Domain Name Tasting and Kiting Tasting – registering a domain for 5 days for “free” Kiting – deleting the domain in the 5 day grace period then re-registering it

39 Social Engineering (314 – 318) Trying to trick people into giving you access to a system. Phishing Piggybacking/tailgating Impersonation Dumpster Diving Shoulder Surfing

40 Importance of User Education (318) No security program can be successful if the users are not properly trained on security issues and procedures. Some attacks such as social engineering attacks are best defended by education rather than technical means. Some methods of user education are Training Classes Login banners Centralized email/information dispersal Policies and procedures


Download ppt "Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC."

Similar presentations


Ads by Google