Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Tech Behind Cyber Security October 31 | Part 1: From Packets to IP and the “Ping of Death”: An Introduction to Cyber November ? |Part 2: Case Study:

Similar presentations


Presentation on theme: "The Tech Behind Cyber Security October 31 | Part 1: From Packets to IP and the “Ping of Death”: An Introduction to Cyber November ? |Part 2: Case Study:"— Presentation transcript:

1 The Tech Behind Cyber Security October 31 | Part 1: From Packets to IP and the “Ping of Death”: An Introduction to Cyber November ? |Part 2: Case Study: Distributed Denial, the Tech of Cyber Attack in the Russo- Georgian War of 2008

2 0 1

3 bits and bytes bit: ( b inary dig it ) bit The basic unit of information in computing, the amount of information stored by a digital device in one of two possible distinct states, not 1 and 2, off/on digital value of 1 = positive voltage, up to 5 volts digital value of 0 = 0 volts 8 bits = 1 byte, usually, but depends on hardware byte : the number of bits needed to encode a single character of text in a computer

4 binary to letter

5 01110000 = p 01101001 = i 01111010 = z 01100001 = a

6 data and packets data : binary files, 01010010010010010… etc. packet : a unit of data from binary to text or image packet: control information and payload control information: data the network needs to deliver the payload, ex. address, error control payload: the content of your “digital letter”

7 hosts on networks who has the data? who doesn’t … hosts going global and mobile networks: start local, LANs, wireless LANs, AirBears client-server model addresses, what’s your unique network address? Type: ipconfig, find IPv4 numerical address ping www.wikipedia.orgwww.wikipedia.org ping ist.berkeley.eduist.berkeley.edu ping www.ca.govwww.ca.gov ping www.usa.govwww.usa.gov ping, an echo request from host to host

8 ping, an echo request

9 ping, the payload

10 OSI model

11 Network Ports 21: File Transfer Protocol (FTP)File Transfer Protocol 22: Secure Shell (SSH)Secure Shell 23: Telnet remote login serviceTelnet 25: Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol 53: Domain Name System (DNS) serviceDomain Name System 80: Hypertext Transfer Protocol (HTTP) used in the World Wide WebHypertext Transfer ProtocolWorld Wide Web 110: Post Office Protocol (POP)Post Office Protocol 119: Network News Transfer Protocol (NNTP)Network News Transfer Protocol 143: Internet Message Access Protocol (IMAP)Internet Message Access Protocol 161: Simple Network Management Protocol (SNMP)Simple Network Management Protocol 443: HTTP Secure (HTTPS)HTTP Secure

12 OSI model

13

14 internet and the web internet : network of networks, millions of networks web : system of interlinked hypertext documents ports: http 80 Try it: http://www.techcomfort.com:81http://www.techcomfort.com:81 Try it: http://www.techcomfort.com:80http://www.techcomfort.com:80

15 ping, nslookup traceroute how does the traffic flow? network devices: hubs, routers, switches using nslookup, names and numbers nslookup www.berkeley.eduwww.berkeley.edu nslookup www.usa.gov using traceroute tracert www.techcomfort.comwww.techcomfort.com tracert www.berkeley.eduwww.berkeley.edu tracert www.ca.govwww.ca.gov

16 attack! Professor Nacht has left instructions for you to build and launch a cyber attack on the nation state of Vulgaria. You have everything you need to build it. How would you do it?

17 attack! Step 0 : Recall that an echo request is an ICMP (ping) message whose data is expected to be received back in an echo reply. The host must respond to all echo requests with an echo reply containing the exact data received in the request message Step 1 : Create a list of Vulgarian military and civil servers that should be targeted Step 2 : Write a simple script (program) that repeats your ping request many times a second Step 3 : Plant this script on computers across the globe Step 4 : “Flood” the Vulgarian servers with ping requests from multiple hosts…to which it cannot keep up…the result...

18 attack! server failure 

19 attack! You have just conceptualized the opening cyber salvo used in the Russo-Georgia War of 2008. July 19, 2008: The First Salvo of Cyber Attack o flood http www.president.gov.gewww.president.gov.ge o flood tcp www.president.gov.gewww.president.gov.ge o flood icmp www.president.gov.gewww.president.gov.ge

20 next time: Part 2: The Cyber of the Russo-Georgian War of 2008 Case Study: Distributed Denial: the Tech of Cyber Attack in the Russo-Georgian Conflict of August 2008

21 voltage Ethernet cable: 2.0 volts Composite video: 2.5 volts Wall socket in US, Canada: 120 volts, sometimes 240


Download ppt "The Tech Behind Cyber Security October 31 | Part 1: From Packets to IP and the “Ping of Death”: An Introduction to Cyber November ? |Part 2: Case Study:"

Similar presentations


Ads by Google