COEN 350 Security Threats. Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

Lesson 3-Hacker Techniques
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
SYSTEM ADMINISTRATION Chapter 19
System Security Scanning and Discovery Chapter 14.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Forces that Have Brought the world to it’s knees over the centuries.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
System and Network Security Practices COEN 351 E-Commerce Security.
Network Security Testing Techniques Presented By:- Sachin Vador.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
Computer Security and Penetration Testing
Port Scanning.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Ana Chanaba Robert Huylo
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network Security Kevin Diep. Outline The five phrases of network penetration How to prevent exploitations and network vulnerability Ethical issues behind.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Port Scanning 0x470~0x480 Presenter SangDuk Seo 1.
Attack Lifecycle Many attacks against information systems follow a standard lifecycle: –Stage 1: Info. gathering (reconnaissance) –Stage 2: Penetration.
Software Security Testing Vinay Srinivasan cell:
CIS 450 – Network Security Chapter 3 – Information Gathering.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
COEN 252 Security Threats. Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Information Systems Security Operations Security Domain #9.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Lab 1: Reconnaissance, Network Mapping, and Vulnerability Assessment Reconnaissance Scanning Network Mapping Port Scanning OS detection Vulnerability.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
CHAPTER 9 Sniffing.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
COEN 250 Security Threats. Network Based Exploits Phases of an Attack Reconnaissance Scanning Gaining Access Expanding Access Covering Tracks.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Footprinting and Scanning
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Hands-On Ethical Hacking and Network Defense
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Filip Chytrý Everyone of you in here can help us improve online security....
COEN 252 Security Threats. Network Based Exploits Phases of an Attack Reconnaissance Scanning Gaining Access Expanding Access Covering Tracks.
 Terms:  “Security”: is a system’s ability to provide services while maintaining the five IA pillars  “Attack”: an action that violates one of the.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Network security Vlasov Illia
Port Scanning James Tate II
Footprinting and Scanning
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Footprinting and Scanning
Presentation transcript:

COEN 350 Security Threats

Network Based Exploits Phases of an Attack  Reconnaissance  Scanning  Gaining Access  Expanding Access  Covering Tracks

Reconnaissance  Social Engineering “I cannot access my . What do I do?” Dumpster Diving (especially useful when people move)  Search the Web Sam Spade ( CyberKit, NetScanTools,... Search Engine Usenet postings Whois

Reconnaissance Databases  To research.com,.net, and.org domain names:InterNIC whois feature: allwhois, network soultions,...  ARIN: American Registry for Interent Numbers ( whois.html) whois.html  RIPE (Europe)  APNIC (Asia Pacific)

Scanning Once we have a target, we need to get to know it better. Methods:  War Dialing (to find out modem access)  Network Mapping  Vulnerability Scanning  War Driving

Scanning: War Dialing Purpose: Find a modem connection.  Many users in a company install remote PC software such as PCAnywhere without setting the software up correctly.  War Dialer finds these numbers by going through a range of phone numbers listening for a modem.  Demon Dialer tries a brute force password attack on a found connection.  Typically: war dialing will find an unsecured connection.

Scanning: Network Mapping Ping:  ping is implemented using the Internet Control Message Protocol (ICMP) Echo Request.  A receiving station answers back to the sender.  Used by system administrators to check status of machines and connections.

Scanning: Network Mapping Traceroute:  Pings a system with ICMP echo requests with varying life spans (= # of hops allowed).  A system that receives a package with expired numbers of hops sends an error message back to sender.  Traceroute uses this to find the route to a given system.  Useful for System Administration

Scanning: Network Mapping Cheops: Network Scanner (UNIX based) (Uses traceroute and other tools to map a network.) Cheops et Co. are the reason that firewalls intercept pings.

Scanning: Port Scans  Applications on a system use ports to listen for network traffic or send it out.  2 16 ports available, some for known services such as http (80), ftp,...  Port scans send various type of IP packages to target on different ports.  Reaction tells them whether the port is open (an application listens).

Scanning: Nmap  Uses different types of packets to check for open ports.  Can tell from the reaction what OS is running, including patch levels.  Can run in stealth mode, in which it is not detected by many firewalls.

Gaining Access  Gain access using application and OS attacks.  Gain access using network attack.

Gaining Access through Apps and OS  Stack-Based Overflow Attacks Stack is the area where function arguments and return addresses are saved.  Password Attacks  Web Application Attacks

Stack Based Attacks If a function is called, then the registers are saved on the stack, followed by the arguments, followed by the return address. At the end of the function execution, the registers are restored from stack.

Stack Based Attack If a function takes string arguments for inputs and is poorly written, then a long string input leads to the stack to be unwound incorrectly. As a consequence, some of the input ends up as register values. You can use this to execute short code snippets.

Stack Based Attacks (How to do it?)  Take a popular application, install it on your machine, and see whether you can crash it by giving it long inputs.  If it does, use the debug function to find out what register values get loaded. Any debugger installed on your system will tell you.  Fine-tune the input to let you do something interesting  Ready to go and wreck havoc.

Buffer Attack Example  On a Unix system, use a buffer overflow in a network accessible program (running at root level) to execute: /bin/sh –c “echo stream tcp nowait root /bin/sh sh –i” >> /etc/inetd.conf; killall –HUP inetd  This shell adds a network service at port that spawns a command shell with full privileges.

Web Application Attacks  The URL not only contains the web address of a site, but also input: 8&q=web+application+attack  A poorly written webpage allows the viewer to input data in an uncontrolled fashion. If the webpage contains SQL, the user might execute SQL commands.

Gaining Access through Network Attacks:Sniffing  Sniffer: Gathers traffic from a LAN.  Examples: Snort Sniffit reptile.rug.ac.be/~coder/sniffit/sniffit.htmlwww.snort.org  To gain access to packages, use spoofed ARP (Address Resolution Protocol) to reroute traffic.

Session Hijacking  IP Address Spoofing: Send out IP packages with false IP addresses.  If an attacker sits on a link through which traffic between two sites flows, the attacker can inject spoofed packages to “hijack the session”.  Details omitted.

Exploiting and Maintaining Address After successful intrusion, an attacker should:  Use other tools to gain root or administrator privileges.  Erase traces (e.g. change log entries).  Take measures to maintain access.  Erase security holes so that no-one else can gain illicit access and do something stupid to wake up the sys. ad.

Trojans  A program with an additional, evil payload.  E.g. Running MS Word also reinstalls a backdoor.

Backdoors  Bypass normal security measures. Example: netcat  Install netcat on victim with the GAPING_SECURITY_HOLE option. C:\ nc -1 –p –e cmd.sh  In the future: connect to port and start typing commands.

Backdoors  BO2K (Back Orifice 2000) runs in stealth mode (you cannot discover it by looking at the processes tab in the TASK MANAGER.  Otherwise, it is a remote control program like pcAnyWhere, that allows accessing a computer over the net.

Backdoors  RootKit: A backdoor built as a Trojan of system executables such as ipconfig.  Kernel-Level RootKit: Changes the OS, not only system executables.

Responses  Filter Internet Connections.  Run Security Audits. (E.g. try to use hacking tools to break into your own system.)  Backup all data and prepare for complete reinstall after an incident.  Log on write-only media.  For commercial sites: Develop a comprehensive security policy.