1 Network Intruders Masquerader: A person who is not authorized to use a computer, but gains access appearing to be someone with authorization (steals.

Slides:



Advertisements
Similar presentations
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Advertisements

Cryptography and Network Security Chapter 20 Intruders
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
1 Ola Flygt Växjö University, Sweden Intruders.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Henric Johnson1 Intruders and Viruses Henric Johnson Blekinge Institute of Technology, Sweden
Computer Security and Penetration Testing
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Network Threat Management Lancope, Inc Royal Drive, Bldg. 100 Alpharetta, GA Presentation to the Georgia Research Alliance June 14, 2002 Chairman.
E0: Unix System Administration AfNOG 2006 Nairobi, Kenya Security introduction Brian Candler Presented by Hervey Allen.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Silberschatz and Galvin  Operating System Concepts Module 20: Security The Security Problem Authentication Program Threats System Threats Threat.
Network Security Fall Dr. Faisal Kakar Office: 01, FICT Building
1 Chapter 9 Intruders. 2 Chapter 9 - Intruders significant issue for networked systems is hostile or unwanted access either via network or local can identify.
Chapter 18 Intruders.
CSCE 815 Network Security Lecture 19 Intruders April 1, 2003.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
CERN’s Computer Security Challenge
Protection & Security Introduction to Operating Systems: Module 16.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
CIS 450 – Network Security Chapter 3 – Information Gathering.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Types of Electronic Infection
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
ECE-8843 Fall Prof. John A. Copeland fax Office:
Linux Networking and Security
INTRUDERS BY VISHAKHA RAUT TE COMP OUTLINE INTRODUCTION TYPES OF INTRUDERS INTRUDER BEHAVIOR PATTERNS INTRUSION TECHNIQUES QUESTIONS ON INTRUDERS.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Information Security in Distributed Systems Distributed Systems1.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Chapter 9 Intruders.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
Intruders and Viruses.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
or call for office visit, or call Kathy Cheek,
Chapter 9 Intruders.
or call for office visit, or call Kathy Cheek,
ECE Spring also see Prof. John A. Copeland fax Office: Klaus 3362
Common Methods Used to Commit Computer Crimes
Secure Software Confidentiality Integrity Data Security Authentication
12: Security The Security Problem Authentication Program Threats
Chapter 9 Intruders.
Security.
Operating System Concepts
Network Security 4/21/2019 Raj Rajarajan.
Intrusion.
Operating System Concepts
Chapter 9 Intruders and Viruses.
Presentation transcript:

1 Network Intruders Masquerader: A person who is not authorized to use a computer, but gains access appearing to be someone with authorization (steals services, violates the right to privacy, destroys data,...) Misfeasor: A person who has limited authorization to use a computer, but misuses that authorization (steals services, violates the right to privacy, destroys data,...) Clandestine User: A person who seizes supervisory control of a computer and proceeds to evade auditing and access controls.

2 Access Control Today almost all systems are protected only by a simple password that is typed in, or sent over a network in the clear.Techniques for guessing passwords: 1. Try default passwords. 2. Try all short words, 1 to 3 characters long. 3. Try all the words in an electronic dictionary(60,000). 4. Collect information about the user’s hobbies, family names, birthday, etc. 5. Try user’s phone number, social security number, street address, etc. 6. Try all license plate numbers (123XYZ). Prevention: Enforce good password selection (c0p31an6)

3 Password Gathering Look under keyboard, telephone etc. Look in the Rolodex under “X” and “Z” Call up pretending to from “micro-support,” and ask for it. “Snoop” a network and watch the plaintext passwords go by. Tap a phone line - but this requires a very special modem. Use a “Trojan Horse” program to record key stokes.

4 UNIX Passwords User’s password ( should be required to have 8 characters, some non-letters) Random 12-bit number (Salt) DES Encrypted to 11 viewable characters User IDSalt ValueHashUser IDSalt ValueHashUser IDSalt ValueHash

Storing UNIX Passwords Until a few years ago, UNIX passwords were kept in in a publicly readable file, /etc/passwords. Now they are kept in a “shadow” directory only visible by “root”. “Salt”: prevents duplicate passwords from being easily seen as such. prevents use of standard reverse-lookup dictionaries ( a different diction would have to be generated for each value of Salt). does not “effectively increase the length of the password.” 5

6 The Stages of a Network Intrusion 1. Scan the network to: locate which IP addresses are in use, what operating system is in use, what TCP or UDP ports are “open” (being listened to by Servers). 2. Run “Exploit” scripts against open ports 3. Get access to Shell program which is “suid” (has “root” privileges). 4. Download from Hacker Web site special versions of systems files that will let Cracker have free access in the future without his cpu time or disk storage space being noticed by auditing programs. 5. Use IRC (Internet Relay Chat) to invite friends to the feast.

7 Protection from a Network Intrusion 1. Use a “Firewall” between the local area network and the world- wide Internet to limit access (Chapter 10). 2. Use an IDS (Intrusion Detection System) to detect Cracker during the scanning stage (lock out the IP address, or monitor and prosecute). 3. Use a program like TripWire on each host to detect when systems files are altered, and an alert to Sys Admin. 4. On Microsoft PC’s, a program like BlackIce is easier to install than learning how to reset default parameters to make the system safe (and fun besides).

8

9

10

Type "A" Probes The first three UDP probes, which started my investigation, had a single character in the data field, an 'A'. The UDP port numbers were identical, > They stimulate the 1500-byte ICMP Echo-Request packet and the normal 58-byte ICMP Destination_Unreachable-Port Packets. The Echo-Request is never answered. Date Time EST Source IP (Place) Destination (Place) : (Italy) to (Atlanta, GA) : ( AOL ) to (Atlanta, GA) : (Saudi Arabia) to (Atlanta, GA) UDP packets with an empty data field, like those generated by the "nmap" scan program, do not stimulate the 1500-byte ICMP packets from an OS-9 Macintosh. 11

Type "Double-zero" Probes (James Bond, 007, "00" -> "license to kill") I have now seen 3 UDP type "00" probes, and had another "00" probe reported from Kansas. These probes use a single UDP packet, two bytes of data (ascii zeroes) and identical UDP port numbers, >2140. They stimulate the 1500-byte ICMP Echo-Request packet and the normal 58-byte ICMP Destination_Unreachable-Port Packets. The Echo-Request is never answered : (Arab Emirates*) to (Atlanta, GA) : (Arab Emirates*) to (Atlanta, GA) *DNS name: cwa129.emirates.net.ae : (Turkey) to xxx.xxx (Wichita, Kansas) *DNS: none : (Manchester, UK*) to xx.xx (Atlanta, GA) *DNS name: manchester_nas11.ida.bt.net : (Road Runner, Hawaii) to xxx.xxx (Wichita, Kansas) *DNS name: a24b94n80client152.hawaii.rr.com : (cwnet, NJ) to xx.xxx (Atlanta, GA) *DNS name: ad11-s cwci.net 12

Start: 11/21/99 11:07:40 PM Find route from: to: ( ), Max 30 hops, 40 byte packets Host Names truncated to 32 bytes ( ): 17ms 17ms 16ms ( ): 18ms 19ms 18ms ( ): 17ms 18ms 17ms ( ): 19ms 17ms 18ms ( ): 25ms 25ms 23ms 6 sgarden-sa-gsr.carolina.rr.com. ( ): 26ms 27ms 27ms 7 roc-gsr-greensboro-gsr.carolina. ( ): 28ms 28ms 30ms 8 roc-asbr-roc-gsr.carolina.rr.com ( ): 30ms 32ms 30ms ( ): 40ms 39ms 39ms 10 gbr2-a30s1.wswdc.ip.att.net. ( ): 38ms 40ms 39ms 11 gr2-p3110.wswdc.ip.att.net. ( ): 278ms 40ms 39ms 12 att-gw.washdc.teleglobe.net. ( ): 41ms 43ms 42ms 13 if-7-2.core1.newyork.teleglobe.n ( ): 45ms 46ms 45ms 14 if bb3.newyork.teleglobe.n ( ): 45ms 47ms 49ms 15 ix bb3.newyork.teleglobe.n ( ): 50ms 46ms 50ms ( ): 44ms 48ms 45ms 17 fe0-0.cr3.ndf.iafrica.net. ( ): 635ms 632ms 633ms 18 atm6-0sub300.cr1.vic.iafrica.net ( ): 641ms 640ms 644ms ( ): 643ms 640ms 643ms ( ): 662ms 659ms 664ms 21 ( ): 663ms 658ms 664ms Trace completed 11/21/99 11:08:25 PM Traceroute to find location of IP Address 13