Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Computer Security and Penetration Testing
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Security MIS 604 – IT Solutions to Business Problems Spring 2002 Hackers.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Network Layer and Transport Layer.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Web server security Dr Jim Briggs WEBP security1.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Computer Networks IGCSE ICT Section 4.
Chapter Threats in Networks Network Security / G. Steffen.
Copyright © Center for Systems Security and Information Assurance
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 9 TCP/IP Layers and Vulnerabilities  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Week 8-1 Week 8: Denial of Service (DoS) What is Denial of Service Attack? –Any attack that causes a system to be unavailability. This is a violation of.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Software Security Testing Vinay Srinivasan cell:
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Security+ Guide to Network Security Fundamentals, Fourth Edition
CIS 450 – Network Security Chapter 7 – Buffer Overflow Attacks.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Network Programming and Network Security Lane Thames Graduate Research Assistant.
McLean HIGHER COMPUTER NETWORKING Lesson 13 Denial of Service Attacks Description of the denial of service attack: effect: disruption or denial of.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Security in network Outline Threats in network Network security controls Firewalls Intrusion detection system Secure Networks and Cryptography Example.
Web Security Firewalls, Buffer overflows and proxy servers.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
Web Spoofing.
Computer Security Hackers.
ETHICAL HACKING Presentation By: FATHIMA SHIMNA S3 ECE ROLL NO: 31 1.
Chapter 7: Identifying Advanced Attacks
Outline Basics of network security Definitions Sample attacks
Hacking Terminologies
Intro to Denial of Serice Attacks
What Makes a Network Vulnerable?
A Distributed DoS in Action
Outline Basics of network security Definitions Sample attacks
Computer Security Hackers by
Computer Security Hackers.
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Lecture 20 Hacking

Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack

Definition: An attacker alters his identity so that some one thinks he is some one else – , User ID, IP Address, … –Attacker exploits trust relation between user and networked machines to gain access to machines Types of Spoofing: 1.IP Spoofing: 2. Spoofing 3.Web Spoofing Spoofing

Definition: Attacker uses IP address of another computer to acquire information or gain access IP Spoofing – Flying-Blind Attack Replies sent back to Spoofed Address Attacker John From Address: To Address: Attacker changes his own IP address to spoofed address Attacker can send messages to a machine masquerading as spoofed machine Attacker can not receive messages from that machine

Definition: Attacker spoofs the address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies IP Spoofing – Source Routing Replies sent back to Spoofed Address Attacker John From Address: To Address: The path a packet may change can vary over time To ensure that he stays in the loop the attacker uses source routing to ensure that the packet passes through certain nodes on the network Attacker intercepts packets as they go to

Definition: Attacker sends messages masquerading as some one else What can be the repercussions? Types of Spoofing: 1.Create an account with similar address A message from this account can perplex the students 2.Modify a mail client –Attacker can put in any return address he wants to in the mail he sends 3.Telnet to port 25 –Most mail servers use port 25 for mails. Attacker logs on to this port and composes a message for the user. Spoofing

Basic –Attacker registers a web address matching an entity e.g. votebush.com, geproducts.com, gesucks.com Man-in-the-Middle Attack –Attacker acts as a proxy between the web server and the client –Attacker has to compromise the router or a node through which the relevant traffic flows URL Rewriting –Attacker redirects web traffic to another site that is controlled by the attacker –Attacker writes his own web site address before the legitimate link Tracking State –When a user logs on to a site a persistent authentication is maintained –This authentication can be stolen for masquerading as the user Web Spoofing

Web Site maintains authentication so that the user does not have to authenticate repeatedly Three types of tracking methods are used: 1.Cookies: Line of text with ID on the users cookie file –Attacker can read the ID from users cookie file 2.URL Session Tracking: An id is appended to all the links in the website web pages. –Attacker can guess or read this id and masquerade as user 3.Hidden Form Elements –ID is hidden in form elements which are not visible to user –Hacker can modify these to masquerade as another user Web Spoofing – Tracking State

Definition: Process of taking over an existing active session Modus Operandi: 1.User makes a connection to the server by authenticating using his user ID and password. 2.After the users authenticate, they have access to the server as long as the session lasts. 3.Hacker takes the user offline by denial of service 4.Hacker gains access to the user by impersonating the user Session Hijacking

Attacker can –monitor the session –periodically inject commands into session –launch passive and active attacks from the session Session Hijacking Bob telnets to Server Bob authenticates to Server Bob Attacker Server Die!Hi! I am Bob

Attackers exploit sequence numbers to hijack sessions Sequence numbers are 32-bit counters used to: –tell receiving machines the correct order of packets –Tell sender which packets are received and which are lost Receiver and Sender have their own sequence numbers When two parties communicate the following are needed: –IP addresses –Port Numbers –Sequence Number IP addresses and port numbers are easily available so once the attacker gets the server to accept his guesses sequence number he can hijack the session. Session Hijacking – How Does it Work?

Definition: Attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the system so that no one else can use it. Types: 1.Crashing the system or network –Send the victim data or packets which will cause system to crash or reboot. 2.Exhausting the resources by flooding the system or network with information –Since all resources are exhausted others are denied access to the resources 3.Distributed DOS attacks are coordinated denial of service attacks involving several people and/or machines to launch attacks Denial of Service (DOS) Attack

Types: 1.Ping of Death 2.SSPing 3.Land 4.Smurf 5.SYN Flood 6.CPU Hog 7.Win Nuke 8.RPC Locator 9.Jolt2 10.Bubonic 11.Microsoft Incomplete TCP/IP Packet Vulnerability 12.HP Openview Node Manager SNMP DOS Vulneability 13.Netscreen Firewall DOS Vulnerability 14.Checkpoint Firewall DOS Vulnerability Denial of Service (DOS) Attack

This attack t akes advantage of the way in which information is stored by computer programs An attacker tries to store more information on the stack than the size of the buffer How does it work? Buffer Overflow Attacks Buffer 2 Local Variable 2 Buffer 1 Local Variable 1 Return Pointer Function Call Arguments Fill Direction Bottom of Memory Top of Memory Normal Stack Buffer 2 Local Variable 2 Machine Code: execve(/bin/sh) New Pointer to Exec Code Function Call Arguments Fill Direction Bottom of Memory Top of Memory Smashed Stack Return Pointer Overwritten Buffer 1 Space Overwritten

Programs which do not do not have a rigorous memory check in the code are vulnerable to this attack Simple weaknesses can be exploited –If memory allocated for name is 50 characters, someone can break the system by sending a fictitious name of more than 50 characters Can be used for espionage, denial of service or compromising the integrity of the data Examples –NetMeeting Buffer Overflow –Outlook Buffer Overflow –AOL Instant Messenger Buffer Overflow –SQL Server 2000 Extended Stored Procedure Buffer Overflow Buffer Overflow Attacks