CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.

Slides:



Advertisements
Similar presentations
1. Reasons for logging on as a root •Most people are familiar with Windows systems with regard to administrative privileges. Many user running windows.
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Security Issues and Challenges in Cloud Computing
System and Network Security Practices COEN 351 E-Commerce Security.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Website Hardening HUIT IT Security | Sep
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Module 4: Add Client Computers and Devices to the Network.
N ETWORKED & D ISTRIBUTED COMPUTING S YSTEMS L AB Programming Assignments EE323 Computer Networks.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Computer & Network Security
Honeypot and Intrusion Detection System
Module 14: Configuring Server Security Compliance
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
W2K Server Installation It is very important that before you begin to install Windows 2000 Server, you must prepare for the installation by gathering specific.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
Security at NCAR David Mitchell February 20th, 2007.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA About the Hands-on Lab.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Unix Security Assessing vulnerabilities. Classifying vulnerability types Several models have been proposed to classify vulnerabilities in UNIX-type Oses.
Game Mark Shtern. Game Objectives Secure your infrastructure using IDS, application firewalls, or honeypots Plant your flag on opponent’s machine Prevent.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Module 10: Windows Firewall and Caching Fundamentals.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Critical Security Controls
Chapter 6 Application Hardening
CIS 332 Course Experience Tradition / snaptutorial.com
Secure Software Confidentiality Integrity Data Security Authentication
Dynamic Web Page A dynamic web page is a kind of web page that has been prepared with fresh information (content and/or layout), for each individual viewing.
CIS 332 Course Experience Tradition / snaptutorial.com
Welcome To : Group 1 VC Presentation
IS4550 Security Policies and Implementation
CIS 332 Competitive Success-- snaptutorial.com
CIS 332 Education for Service-- snaptutorial.com
CIS 332 Teaching Effectively-- snaptutorial.com
CIS 332 Education for Service-- tutorialrank.com
CIS 332 Inspiring Innovation-- snaptutorial.com
Unit 27: Network Operating Systems
Game Mark Shtern.
Game Mark Shtern.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Web Servers (IIS and Apache)
Presentation transcript:

CSE 4481 Computer Security Lab Mark Shtern

INTRODUCTION

Security Our life depends on computer systems – Traffic control – Banking – Medical equipment – Internet – Social networks Growing number of attacks on computer systems

Security Results from malicious attack – Financial loss – Loss of reputation – A drop in the value of a company’s stock – Legal issues Hacker may not be a computer expert – Numerous attacking scripts / tools available – Hacker training material also available

Movie

Statistics (2009) 85% of attacks were not considered highly difficult 96% of breaches were avoidable through simple or intermediate control 48% involved privileges misuse 86% of victims had evidence of the breach in their log files

Course Objectives Hands on experience in various security topics – Execution of popular attacks – Attack prevention and risk mitigation

Attack Examples Network (sniffing, session hijacking) Password Cracking Web Code injection Overflows (Buffer, Number)

Defence Techniques Auditing Vulnerability scanners Firewalls (Network and application) Intrusion Preventions and Detections Honeypots

ATTACK LAB Orientation

Attack Lab Isolated Lab accessed through an IP KVM Attack Lab consists of – Physical equipment, such as servers, workstations and network switches – Virtual equipment, such as virtual machines and virtual switches Attack Lab has monitoring software that audits student activity

Attack Lab Policies Physical lab equipment, such as servers, routers, workstations and switches are not to be configured, attacked or modified in any manner Data in the attack lab can not be copied out of the attack lab The attack lab user password should not be reused in other systems

Attack Lab Policies Students are allowed to modify, configure, or attack their private Virtual Machines only within the scope of the lab exercises Violation of the Attack Lab policies may be considered an Academic Integrity offence

Access to attack lab Sign the security lab agreement to get your password Login at – User name is CSE user name Click on vSphereClient Select “Use Windows session credentials” Click Login button

vLab

How to use a VM CD-ROM Click on CD-ROM icon Select CD/DVD Drive 1 Select “Connect to ISO image on local disk” Browse to “C:\ISOs” folder or your private folder Select CD-ROM image Access to CDROM from VM

How to transfer files into the lab (1) Create an ISO file that contains your files first.iso Create an ISO file that contains first.iso second.iso Click on Virtual Media and select second.iso Click on CDROM in Attack Lab machine and copy first.iso into Private Directory

How to transfer files into the lab (2) Start vSphere Client Select Virtual Machine Connect CDROM (the media name is first.iso) Copy files from CDROM into Virtual Machine

Add/Remove application Software package in Linux OS – apt-get install – apt-get remove Windows component – Insert Windows CD into Virtual Machine – Click on Add/Remove Program – Select/Deselect windows component

ADMINISTRIVIA

Marking Scheme The performance of the students will be evaluated as a combination of –7 labs ( 50 %) – Term Project (35%) – Project presentation ( 5 %) – Game ( 5 % + bonus) – Participation ( 5 %) One week labs are worth 5 % Two week labs are worth 10 %

Labs Lab reports and source code must be submitted before 11:59pm on the day the lab is due The lab report must be a short, precise and professional document (title, table of contents, page numbering etc) The lab report must contain sufficient evidence that you completed the lab exercise Code developed during the labs is expected to be simple Developed applications are prototypes

Report antipattern Screenshots are attached – Figure number? Figure description? “I verified DNS configuration using nslookup” – How? Evidence? “I created a folder named ‘xxx’ and gave read/write and execute permission...” – How? Evidence? “I developed a script...” – Evidence? Script source code?

Term Project Teams – Teams are constructed by instructor Project consists of four phases – Implementation – Security testing – Fixing security bugs – QA phase Developed application is a final product The project report must be a detailed, precise and professional document (title, table of contents, page numbering etc) Submission by team’s lead only

Report Antipattern Design is just a list of functions Design justification : “The design is flexible” – Why is the design flexible? Test case : “Run the application” – What are the user inputs? What are the expected results?

Game Development Team – Project presentation QA Team – Review project design – Penetrate other teams’ projects IT Security – Secure infrastructure

Project Plan

LAB 1

Lab 1 Read Lab 1 Ask questions

Lab 1 Plan – Develop naming schema – Configure Windows 2003 server – Promote server to Domain Controller

Lab 1 Plan – Test Connectivity – Test DNS – Join Workstation to Domain – Configure users – Review how to develop setuid Linux application

Lab 1 Plan – Security Tests Find passwords Two ways of hiding files Develop two attacks

QUESTIONS?

Linux Repositories Configure static IP address cat /etc/apt/sources.list – # Karmic deb karmic main restricted universe multiverse deb karmic-security main restricted universe multiverse deb karmic-updates main restricted universe multiverse

Linux Repositories (Cont) cat /etc/apt/sources.list – # Breezy deb breezy main restricted universe multiverse