Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN 0-07-212773-2.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

Lesson 3-Hacker Techniques
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Hacking Exposed 7 Network Security Secrets & Solutions Chapter 2 Scanning 1.
Sniffing, Spoofing, Hijacking This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
System Security Scanning and Discovery Chapter 14.
Network Security Network Attacks and Mitigation 張晃崚 CCIE #13673, CCSI #31340 區域銷售事業處 副處長 麟瑞科技.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
COEN 252: Computer Forensics Router Investigation.
Hacking Unix/Linux.
Ana Chanaba Robert Huylo
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Copyright © 2002 ProsoftTraining. All rights reserved. Security Auditing, Attacks, and Threat Analysis.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
OS Hardening Justin Whitehead Francisco Robles. ECE Internetwork Security OS Hardening Installing kernel/software patches and configuring a system.
Software Security Testing Vinay Srinivasan cell:
CIS 450 – Network Security Chapter 3 – Information Gathering.
COEN 350 Security Threats. Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Chapter 2 Scanning Last modified Determining If The System Is Alive.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
CHAPTER 9 Sniffing.
Cracking Techniques Onno W. Purbo
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
Footprinting and Scanning
Hands-On Ethical Hacking and Network Defense
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
© SYBEX Inc All Rights Reserved. CompTIA Security+ Study Guide (SY0-201) “Chapter 2: Identifying Potential Risks”
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Network and System Security Risk Assessment
Footprinting and Scanning
Secure Software Confidentiality Integrity Data Security Authentication
Onno W. Purbo Cracking Techniques Onno W. Purbo
Hacking Unix/Linux.
Remote Control and Advanced Techniques
Footprinting and Scanning
Operating System Security
Linux Security.
Crisis and Aftermath Morris worm.
Presentation transcript:

Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN

Looking into Linux Linux security overview Proactive measures and recovering

Stages of hacking – again Mapping your machine and network Social Engineering, Trojans, and other tricks Physical attacks Attacking over the network Abusing the network itself Elevating user privilege Password cracking Maintaining access

Server issues and vulnerabilities Mail and ftp Web servers and dynamic content Access control and firewalls

Linux security overview Porque You are easy You can be used as anonymous access You are Linux and thus open source The OS source is available But the developers are self-policing – developer culture and Bugtraq Access control methods Password security Controls on users Privileged ports Virtual memory gets reclaimed

Proactive measures and recovering Proactive measures Insecurity scanners – finding your own weakness Scan detectors – is someone eyeballing you? Hardening your system Log file analysis File system integrity checks Recovering from being hacked Detecting if you have been hacked What to do after a breakin

Mapping your machine and network Public domain looking Online searches Whois databases Ping sweeps DNS issues Traceroutes Port scanning OS detection Active stack fingerprinting Passive stack fingerprinting

Mapping, continued Enumerating RPC services What authentication level is used What services – NFS, NIS, other PRC NFS file sharing What is exportable – and to what users SNMP possibilities Network insecurity scanners Canned stuff that combines all these approaches

Social Engineering, Trojans, and other tricks Social engineering Trojan horses Viruses and worms IRC backdoors

Physical attacks Attacking the office Sneaky pete installs something Boot access is root access Boot passwords are in the flash ROM Setup helps a little bit Encrypted filesystems

Attacking over the network Using the network itself TCP/IP The public phone system Default or bad configurations NFS mounts Netscape defaults Squid X-Windows system

TCP/IP Structure (header and function) TCP Flag bits (Urgent, Ack, Push, Reset, Syn, Fin) UDP – less structure and functionality ICMP – Control messages – many hacking possibilities IP – Underlies these three protocols – host-to-host

The public phone system Modem attacks Wardialing – mechanized dialing used to find modems Attacks on modem internal protocols – Hayes not-so-smart Modem Idea was to shut off sound, store a new number, disconnect and redial Moldavia Countermeasures One-time-pad login modules Passwording Biometrics

More network attacks Default passwords and password guessing Sniffers How they work Common versions Vulnerabilities Buffer overflows Vulnerable services Vulnerable scripts Unnecessary services and detecting them Using netstat, lsof, nmap How to turn them off – inetd.conf

Abusing the network itself DNS Exploits Routing issues Advanced sniffing and session hijacking Hunt Dsniff Man-in-the-middle attacks Denial of service (DoS) attacks Floods TCP/IP attacks

More abuse and countermeasures Abusing trust relationships Implementing egress filtering

Elevating user privilege Users and privileges Elevation of privilege Trusted paths and trojan horses Password storage and use Special purpose groups and device access Sudo Suid programs Hacker suids on mounted file systems Countering poor programming

Password cracking How they work More advanced algorithms Cracking programs Shadow passwords Pluggable modules, etc.

Maintaining access Using the r commands, rsh, rexe, etc. Passwordless access using ssh Network accessible root shells Trojaned system programs Back doors Trail hiding Kernel hacks

Remote access methods - Unix Primary methods Exploiting a listening service (TCP/IP) System must be running services listening on some port First enumerate, then specific exploit for that service Using source routing to cross firewall or router Router must have source routing disabled, or at least protected User-triggered traps Example: browsing as root and encountering malicious code Exploiting system with network interface in promiscuous mode Sniffer can sniff a malicious packet that was put there to catch any victim

Brute force attacks Password attacks These can use any service that uses a logname/password for access Many utilities exist for automating Countermeasures are improved password analyzers, delay in login on incorrect passwords, detecting repeated login attempts User password education – don’t use same password everywhere Data driven attacks Buffer and stack overflows work because of weak C libraries Basic idea is to send an “egg” with code that goes on stack (used for local variables and return address)