Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.

Slides:



Advertisements
Similar presentations
Chapter 17: WEB COMPONENTS
Advertisements

Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
Introduction to Security Computer Networks Computer Networks Term B10.
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Computer Security and Penetration Testing
Threats and Attacks Principles of Information Security, 2nd Edition
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
University of Calgary – CPSC 441.  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
OSI and TCP/IP Models And Some Vulnerabilities AfNOG th May 2011 – 10 th June 2011 Tanzania By Marcus K. G. Adomey.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Security at NCAR David Mitchell February 20th, 2007.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Presented by Teererai Marange. Background Open SSL Hearbeat extension Heartbleed vulnerability Description of work Methodology Summary of results Vulnerable.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Computer Security By Duncan Hall.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Network Security 1. Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures Firewalls & Intrusion.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
SQL Injection.
Chapter 7: Identifying Advanced Attacks
WEB APPLICATION TESTING
Protecting Memory What is there to protect in memory?
Answer the questions to reveal the blocks and guess the picture.
Unit 1.6 Systems security Lesson 2
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
The Heartbleed Bug and Attack
Presentation transcript:

Security

Security Flaws Errors that can be exploited by attackers Constantly exploited

Database Breaches Sony PSN (2011) ~77 million users Target (2013) Reports of million customers affected JP Morgan Chase (2014) ~76 million users Many others

SQL Allow anyone to get information about any user by UID $query = “SELECT name, FROM user WHERE uid=‘” + $_POST[“UID”] + “’”; $query = “SELECT name, FROM user WHERE uid=‘ ’”; … “Jesse Hartloff”,

SQL Attack Attacker wants all s to send spam Needs to know every UID Can brute force UID’s – Easy to detect – Stop taking requests from same IP $query = “SELECT name, FROM user WHERE uid=‘” + $_POST[“UID”] + “’”;

SQL Injection “Uh oh” Returns every users’ name and address Spammers rejoice! $query = “SELECT name, FROM user WHERE uid=‘” + $_POST[“UID”] + “’”; $query = “SELECT name, FROM user WHERE uid=‘’ OR ‘12’=‘12’”;

SQL Injection $query = “SELECT name, FROM user WHERE uid=‘” + $_POST[“UID”] + “’”; $query = “SELECT name, FROM user WHERE uid=‘’; DROP TABLE users; SELECT * FROM passwords WHERE ‘12’=‘12’”

SQL Injection - Prevention Validate user inputs Use language functions to clean inputs Prevents most attacks Still one of the most common software attacks

SQL Injection

Buffer Overflow “In every sufficiently large C program” char values[80]; values = inputFromUser(); Intended functionality – User can input any data in the array User can input data larger than 80 char’s – Very bad! User can write anything in the memory after the end of the array – Control statement that runs malicious code

More C Code … memcpy(bp, pl, payload); … User supplies pl and payload – pl : User supplied data – payload: size of pl Copy payload bytes of data from pl to bp Send bp back to the user

More C Code memcpy(bp, pl, payload); User supplies – pl = “information”; – payload = 11; User receives 11 bytes of data containing “information”

More C Code memcpy(bp, pl, payload); User supplies – pl = “”; – payload = 2000; User receives 2000 bytes of server data – Whatever happened to be sitting in bp when its memory was allocated

Heartbleed memcpy(bp, pl, payload); This line of code was found in OpenSSL – Security protocol used extensively across the internet This line was in a function called heartbeat – Heartbleed bug

Secure Communication RSA – Public key encryption – Factoring is hard We hope SSH – Setting up git without HTTPS – Need to upload public key – Used to connect to CSE servers – Not built into Windows (PuTTY)

Secure Hashing One way function Easy to compute hash Computationally infeasible to inverse Small input space leads to lack of security – Weak passwords – Brute force search Dictionary attack Rainbow table Avalanche effect

Passwords and Hashing SHA256 hash of my password 1906bc7c801f03c41551b06e2fd406e8f c51357e8731ec61dd599f04c8 SHA256 hash of my password with 1 edit 6410ef0d3a6d3324fcba02131e c a75457a27ac89dffb5f Inputs must match exactly

Network Attacks Man-in-the-middle – Where does security start? – What if someone replaces your public key while you’re uploading – Intercept all communication and replace with their own Replay attack – Resend observed network traffic

Virus - Biology Needs a host to reproduce Contains DNA or RNA Protective coating of proteins

Virus - Computer Needs a host to reproduce Contains code (not genetic) Packaged as a program

Computer Viruses Once it finds a host – Reproduce and spread – Often has a mission Motivation – Senseless destruction? A good virus does not kill it’s host – Revenge? Sometimes – Challenge? Seems legit – Financial? BotNet

BotNet Scenario Legit company hires an ad agency – Pays per click – Pays for traffic Ad agency maliciously controls a BotNet Puts BotNet to work spreading spam and clicking links Ad agency cashes big checks Motivation to keep hosts alive and healthy

DoS – Denial of Service Attack Spam a site to shut it down Simplest version is easy to detect – Many requests from a single IP – Stop taking requests from that IP More dangerous with IP-SpoofingIP-Spoofing – Spoofing detection is possible With a BotNet – Distributed DoS (DDos)

Social Engineering The most vulnerable point in a well-designed security system? – Humans

Challenge HTML/PHP code injection