The KGB the Computer and Me

Slides:



Advertisements
Similar presentations
The technology develops so quickly that many new things appear in human beings life. Lets guess what they are:
Advertisements

Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Computer Security and Penetration Testing
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Trojan Horse Program Presented by : Lori Agrawal.
Ethical Hacking by Shivam.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Computer Security and Penetration Testing
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
SM3121 Software Technology Mark Green School of Creative Media.
Engineering H192 - Computer Programming The Ohio State University Gateway Engineering Education Coalition Lect 4P. 1Winter Quarter Introduction to UNIX.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Viruses.
ITIS 2110 Class # No home network devices devices devices devices devices devices devices 9.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Drupal Security Securing your Configuration Justin C. Klein Keane University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Communications Before the Internet. Pre-Internet Networks and Protocols: Usenet Usenet was developed to allow regular users to transfer files,
Honeypot and Intrusion Detection System
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Accessing your Files from Home Galloway Township Public Schools The District provides a service for accessing common programs and user’s files from any.
Here you are at your computer, but you don’t have internet connections. Your ISP becomes your link to the internet. In order to get access you need to.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
The SAIC Operation 54 Network and the Internet. Overview The purpose of this brown bag training session is to provide you with an introduction to the.
Click your mouse to continue. Connecting to the Internet To connect to the Internet, your computer must have: A Web browser, such as Microsoft Internet.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Topic 5: Basic Security.
Telnet allows you to log in remotely to other computers connected to the Internet (but only computers that are set up to be logged in to). Once logged.
Cscape EnvisionRV Horner APG, LLC. EnvisionRV - What Does it Do? Allows viewing and interacting with remote OCS controllers. The PC displays screens that.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Computer Security By Duncan Hall.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Group Activity 1.3 Pros and Cons of Computers in the Classroom By: Nancy Scully Kim Robichaud Kim Robichaud Wendy Mclaughlin Wendy Mclaughlin Edward Tracy-Gould.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Group 9. Exploiting Software The exploitation of software is one of the main ways that a users computer can be broken into. It involves exploiting the.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
The types of computers and their functionalities.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Defining Networking Chapter 2.
Presented by: Kevin Regaldo Phillip Dai
Malware and Computer Maintenance
1.4 Wired and Wireless Networks
Wireless Network Security
Virtual Network Computing
Bomgar Remote support software
BP5 – encryption - Fun gym
Fix Bitdefender Error Code 1007 Give a Ring on: Bitdefender Support Number.
Risk of the Internet At Home
BP5 – encryption - Fun gym
Introduction to Computer Concept
Computer Misuse Act 1990 GCSE ICT.
Crisis and Aftermath Morris worm.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
What is keystroke logging?
Presentation transcript:

The KGB the Computer and Me

The KGB the Computer and Me Appeared on the program Nova in the early 90’s Describes an attack on Berkley computers taking place almost exactly 20 years ago and the response to it. Based on the Book, “The Cuckoos Egg”

Computing in the late 80’s Most engineers and Scientists used mainframe computers. Mainframes were accessed locally using terminals Terminal is a keyboard, and screen with no computer. Mainframes were accessed from remote locations using modems, and dial-up connections Mainframes belonging to Universities, Defense Department researchers and some businesses were linked by an early version of the internet

Home Computers Home Computers were available IBM PC Apple Macintosh They were expensive and limited by today’s standards

Home Computers Home computers could communicate to Mainframes using modems and dialup connections. Terminal emulators allowed the home computer to simulate a terminal File transfer software, like Kermit, allowed files to be uploaded and downloaded to the mainframe No World Wide Web yet.

Clifford Stoll Astronomy Student turned Computer Security Expert His book, “The Cuckoo’s Egg”, was the first real exploration of the computer security problem. Currently sells Klein Bottles on the Internet

Clifford Stoll His later books are skeptical of the role of computers in Society “High Tech Heretic: Why computers don’t belong in the classroom and other reflections by a computer contrarian” “Silicon snake oil : second thoughts on the information highway”

Markus Hess Was tried and convicted, and sentenced to 2 to 3 years in prison The sentence was suspended He now works writing networking code for a computer firm in Germany

Some Questions What attack types did the Hacker Use? What were the hacker’s motivations? Do you think this could happen today? How was the hacker detected?

Attack Types Hess originally gained access to systems by gaining access to an existing account (swentec) Its not covered in the film, but he used several methods of password guessing We call this approach Impersonation

Attack Types Once Hess gained access to a system, he became “superuser”, (Unix slang for the administrative user He did this by exploiting a flaw in the email system For the record, this was our old friend, the buffer overflow exploit We call this, “Privilege Escalation”

Attack Types Once superuser, he hid all traces of his attack and created accounts he could use later. He then typically left the system. Later he would log on using one of the accounts he created. From this account, he could launch attacks on other systems without being traced back to his home This is similar to the behavior of modern worms.

What Were Hess’s Motivations? Ideas? Did the motivations of Hess and his companions change as time went on?

How was the attack Detected Ideas?

How was the attack Detected Initial detection was because of a minor accounting error Tracing the activity once detected was extremely difficult Hess passed through many systems The systems were in many legal jurisdictions Many technicians and law enforcement official were ultimately involved.

How was the attack Detected The final technique Stoll used is called today, a “honeypot” Create something the hacker wants Use it to draw him/her to the site, and keep him there while tracing and identifying the hacker This technique is often used today in child pornagraphy investigations

Can it Happen Today Thoughts?

Final Thought This case is still important today because it is one of the few times a hacker has been caught, prosecuted and convicted. It still remains extremely difficult to trace the source of attacks We solve more cases, (%), involving serial killers than hackers. Next case, Mr. McGinnis and the flying saucers