Presentation is loading. Please wait.

Presentation is loading. Please wait.

FORESEC Academy FORESEC Academy Security Essentials (III)

Similar presentations


Presentation on theme: "FORESEC Academy FORESEC Academy Security Essentials (III)"— Presentation transcript:

1 FORESEC Academy FORESEC Academy Security Essentials (III)

2 FORESEC Academy Internet Security Technologies Agenda  Chapter 13 : Attack Strategies and Mitigation  Chapter 14 : Firewalls and Honeypots  Chapter 15 : Vulnerability Scanning  Chapter 16 : Host-Based Intrusion Detection  Chapter 17 : Network-Based Intrusion Detection  Chapter 18 : Risk Management and Auditing

3 FORESEC Academy Attack Strategies and Mitigation Chapter Outline  Mitnick-Shimomura Attack Analysis  Preventive Techniques  Methods of Attack  Chapter Summary

4 FORESEC Academy K. Mitnick vs. T. Shimomura  Confidentiality, integrity and availability attack  Reconnaissance probing to determine trust relationship (“r utilities”)  IP spoofing to act as one side of trust relationship  Lack of site or system perimeter defenses to retard or defeat attack

5 FORESEC Academy Two Systems, Trust Relationship Unix, Apple Computers, and Windows all have built-in trust relationship capabilities. If one party in a two- way trust relationship is compromised or spoofed, the other party is in great danger.

6 FORESEC Academy Enter the BadGuy (TM) Reconnaissance is often the first phase of an attack

7 FORESEC Academy Silence B With DoS Attacker is going to Pretend he is B, so B Must be silenced so it Cannot signal an alarm SYN Flood Attack to B renders B unable To reply to A

8 FORESEC Academy Attacker Probes for a Weakness in A.s TCP Stack Each time A is stimulated, the SYN/ACK response is predictable.

9 FORESEC Academy Attacker Pretends to be B The attacker, pretending to be B, uses the predictable response to open a connection.

10 FORESEC Academy Make “A” Defenseless Attacker sends expected ACK with fake SRC IP ADDRESS to establish a connection.

11 FORESEC Academy Finish the Job B sends rshell packet ‘”echo ++”>/.rhosts’ to open A to attack Attacker uses # rlogin – I root to takeover ‘A’ Attacker

12 FORESEC Academy What Common Techniques Could Have Prevented The Attack?

13 FORESEC Academy What Risk Management Techniques Could Have Detected The Attack?

14 FORESEC Academy Patching Systems  Although not relevant to Mitnick’s attack, per se, still very important.  Timely patching can often prevent the majority of attack vectors from being successfully executed.  Patches are often available before or very soon after exploits are announced.

15 FORESEC Academy Disabling Unused Services

16 FORESEC Academy Host-based Intrusion Detection

17 FORESEC Academy Network-based Intrusion Detection

18 FORESEC Academy Network Vulnerability Scanner Scanner Warning: A trust B A has potential rshell vulnerability

19 FORESEC Academy Firewalls Many attack attempts fail to penetrate well – configured firewalls, especially if they have a “deny everything not specifically allowed” policy.


Download ppt "FORESEC Academy FORESEC Academy Security Essentials (III)"

Similar presentations


Ads by Google