 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
System Security Scanning and Discovery Chapter 14.
Forces that Have Brought the world to it’s knees over the centuries.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
System and Network Security Practices COEN 351 E-Commerce Security.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Computer Security and Penetration Testing
COEN 252: Computer Forensics Router Investigation.
Department Of Computer Engineering
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Penetration Testing.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Forensic and Investigative Accounting
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
The Microsoft Baseline Security Analyzer A practical look….
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
CHAPTER 9 Sniffing.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Footprinting and Scanning
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Footprinting/Scanning/ Enumeration Lesson 9. Footprinting External attack: Enables attackers to create a profile of an organization’s security posture.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Filip Chytrý Everyone of you in here can help us improve online security....
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
1 NETWORKS Lecture Review – Last Lecture Computer Crimes Typical Vulnerabilities Typical Attack Protocols.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Seminar On Ethical Hacking Submitted To: Submitted By:
Enumeration.
Footprinting and Scanning
Secure Software Confidentiality Integrity Data Security Authentication
Port Scanning (based on nmap tool)
Footprinting and Scanning
Network Security and Monitoring
FootPrinting CS391.
Learning objectives By the end of this unit you should: Explain
Lecture 3: Secure Network Architecture
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the IA pillars  Examples Phases of a Cyber Attack2 GoalPillar Violated Steal a fileConfidentiality Deface a webpageIntegrity Bring down DNS serverAvailability Send an from someone else’s accountNon-redpudiation Steal login credentialsAuthentication

 Ex 1: George from Accounting keeps the secret recipe for his award-winning chili on his office computer, and your goal is to steal the recipe. What's stopping you?  Password authentication! You need his username and password to login to his computer and access the recipe. Phases of a Cyber Attack3

 Ex 2: You want to view a webpage with secret planning information housed on your competitor's internal webserver. What's stopping you?  A firewall! Your competitor's network sits behind a firewall that doesn't allow port 80 bound traffic in. Phases of a Cyber Attack4

 Ex 3: There's a guy on your WiFi network whom you want to discredit. You want to snoop in on his browser traffic to see what banking pages he's looking at. What's stopping you?  Encryption! He's accessing sites via HTTPS and all the traffic is AES encrypted!  Bottom Line: If you want to attack a system, you need to violate a pillar. In order to (successfully) violate a pillar, you need to defeat the tools employed to protect the pillars. Phases of a Cyber Attack5

 Multiple layers of defense  Each layer presents a new set of challenges to an attacker Phases of a Cyber Attack6 Firewall Open Ports Host Firewall File Permissions

Phases of a Cyber Attack7

8 2. We use this to make an SSH connection from the webserver to the target host, which is allowed since both parties are inside the firewall. 3. Now we have some some degree of access to our target host. Subsequent steps in the attack would have to take advantage of that to pursue the ultimate goal of stealing a copy of the file secret.txt. Notional Attack: 1.We send port 80 traffic into the network (which the firewall allows) to the webserver with some carefully crafted content that exploits a bug in the webserver, ultimately allowing us to execute commands on it.

 Reconnaissance  Discover the information necessary to gain access to the target  Infiltration  Gain the accesses necessary to achieve your goal  Conclusion  Carry out steps necessary to achieve your goal  Takes steps necessary to cover your tracks Phases of a Cyber Attack9

 Goal: identify possible targets and vulnerabilities  Any information gathered may prove crucial to discovering a critical vulnerability  Two methods  Passive  Gathering information without alerting the subject of the surveillance  Active  Gathering information using techniques that may alert the target Phases of a Cyber Attack10

 Passive reconnaissance  Minimize interactions with the target network that may raise flags  Build a target profile  Open source research  Determine  Domain names  Network address blocks  Organization  Employees and system administrators  Affiliates  Public information pertaining to  Network infrastructure  Security policies  Systems / technologies used  Service providers  Any other information that may prove useful Phases of a Cyber Attack11

 Target's website  Public DNS servers  Internet registry (WHOIS)  Phonebook  Personal blogs  Social media  News articles  Discarded trash  Many, many others Phases of a Cyber Attack12

 Active reconnaissance  Build a picture of the target network  IP addresses of Internet-connected systems  Network protocols used  Operating systems in use  Architecture  x86, x64, SPARC, …  Services running  HTTP, FTP, SMTP, DNS, etc.  Remote access systems  RAS, VPN, dial-up modems, etc.  Security posture  Access control mechanisms, intrusion detection / prevention systems (IDS/IPS), security responses Phases of a Cyber Attack13

 Ping sweep  Ping all IP addresses in a given range  Record addresses that respond  Port scanning  Attempt to connect to all ports or specific list of ports on a host  Determine if port is open, closed, or filtered  nmap is a powerful tool used for both ping sweeps and port scans  Use tools such as traceroute to discover network topology Phases of a Cyber Attack14

 Banner grabbing  Connect to remote service and observe output  Can be VERY informative  netcat and telnet can be used to interact with a service for banner grabbing  Operating system fingerprinting  Determine which OS is running  Can be based on  Open ports / services running  Certain ports are OS-specific  Server software/version can indicate a particular OS  How target responds to certain data packets  How target sets certain fields in data packets  Service specific techniques  Pick a protocol…  There’s a tool/technique to enumerate Phases of a Cyber Attack15

 Network reconnaissance is a legal “grey area”  Footprinting makes use of information that is publicly available  Many scanning and enumeration tools use public accesses  No authentication  Guest / publicly known accounts  Is collecting information or connecting to a host with public accesses a crime?  What is the threshold? Phases of a Cyber Attack16

 Goal: gain control of a host on the target's network  Typically gaining remote access to a shell or terminal with administrator privileges  Knowledge of a vulnerability is not enough  Must have the ability to exploit the vulnerability  Does not necessarily require advance knowledge or skill  Many tools openly available  Including automated tools Phases of a Cyber Attack17

 Goal: achieve the intended objective and eliminate traces of the attack  Set up data exfiltration paths  Hide tools and programs uploaded to the target  Eliminate logs  Logon, logoff  Startup, shutdown  Network connections  Program execution  Privilege uses  Errors  Terminate connections  May create a backdoor for future access Phases of a Cyber Attack18

Phases of a Cyber Attack19