Download presentation
Presentation is loading. Please wait.
Published byChrystal Cunningham Modified over 9 years ago
1
Lesson 5 Knowing the Threat
2
Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend
3
Frequency Point of Attack 2000 CSI/FBI Survey Trend
4
Foreign Corporations U.S. Corporations Likely Sources of Attack 2000 CSI/FBI Survey
5
E-Commerce Security Example Breaking an E-Business
6
WEB Server DBA Server Router Investment App servers Network User Clients Email Server Consider this Network How Can A Hacker Attack?
7
ATTACKER WEB Server DBA Server Router Investment App servers Network User Clients Email Server Step 1: Attacker exploits weakness in CGI script to break through firewall and gain shell privileges on host
8
ATTACKER WEB Server DBA Server Router Investment App servers Network User Clients Email Server Step 1: Attacker exploits weakness in CGI script to break through firewall and gain shell privileges on host Step 2: Attacker finds dBase PW in CGI Script and downloads all account numbers and PWs
9
ATTACKER WEB Server DBA Server Router Investment App servers Network User Clients Email Server Step 1: Attacker exploits weakness in CGI script to break through firewall and gain shell privileges on host Step 2: Attacker finds dBase PW in CGI Script and downloads all account numbers and PWs Step 3: Attacker installs NetBus and controls manager’s terminal
10
Going for the Kill! Customer Enters account ID and PW Customer is Authenticated and access is granted Customer Checks portfolio performance Customer updates portfolio tracking preferences Customer buys/sells shares Step 4: Attacker credits account under their control Investment bank debits/credits customer’s cash account and updates portfolios Investment bank notifies customer with confirmation of transaction
11
So What Happens When Computer Security Fails? Incident Response--A Six Step Process –Preparation: Proactive Computer Security –Identification –Containment –Eradication –Recovery –Hot Wash
12
History Lesson The Art of War, Sun Tzu Lesson for you Know the enemy Know yourself…and in a 100 battles you will never be defeated If ignorant both of your enemy and of yourself you are certain in every battle to be in peril
13
History Lesson The Art of War, Sun Tzu Lesson for the Hacker Probe him and learn where his strength is abundant and where deficient To subdue the enemy without fighting is the acme of skill One able to gain victory by modifying his tactics IAW with enemy situation may be said to be divine
14
Hacker Attacks Intent is for you to know your enemy Not intended to make you a hacker Need to know defensive techniques Need to know where to start recovery process Need to assess extent of investigative environment
15
Anatomy of a Hack FOOTPRINTINGSCANNINGENUMERATION GAINING ACCESS ESCALATING PRIVILEGE PILFERING COVERING TRACKS CREATING BACKDOORS DENIAL OF SERVICE Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
16
Anatomy of The Hack FOOTPRINTINGSCANNINGENUMERATION GAINING ACCESS ESCALATING PRIVILEGE PILFERING COVERING TRACKS CREATING BACKDOORS DENIAL OF SERVICE Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
17
Footprinting Objective Target Address Range Acquire Namespace Information Gathering Surgical Attack Don’t Miss Details Technique Open Source Search whois Web Interface to whois ARIN whois DNS Zone Transfer Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
18
Scanning Objective Bulk target assessment Determine Listening Services Focus attack vector Technique Ping Sweep TCP/UDP Scan OS Detection Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
19
Enumeration Objective Intrusive Probing Commences Identify valid accounts Identify poorly protected shares Technique List user accounts List file shares Identify applications Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
20
Gaining Access Objective Informed attempt to access target Typically User level access Technique Password sniffing File share brute forcing File share brute forcing Password file grab Buffer overflows Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
21
Escalating Privilege Objective Gain Root level access Technique Password cracking Known exploits Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
22
Pilfering Objective Info gathering to access trusted systems Technique Evaluate trusts Search for cleartext passwords Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
23
Cover Tracks Objective Ensure highest access Hide access from system administrator or owner Technique Clear logs Hide tools Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
24
Creating Back Doors Objective Deploy trap doors Ensure easy return access Technique Create rogue user accounts Schedule batch jobs Infect startup files Plant remote control services Install monitors Trojanize Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
25
Denial of Service Objective If unable to escalate privilege then kill Build DDOS network Technique SYN Flood ICMP Attacks Identical src/dst SYN requests Out of bounds TCP options DDOS Source: Hacking Exposed, McClure, Sacmbray, and Kurtz
26
Hacker Exploits per SANS RECONNAISSANCESCANNING EXPLOIT SYSTEMS KEEPING ACCESS COVER TRACKS Source: SANs Institute
27
Hacking Summary Hacking on the rise Hacktivism New crime vector Loose international laws Tools automated and readily available Blended Threats Multi-axis attacks Automated Zombies
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.