Download presentation
Presentation is loading. Please wait.
1
CEG 429: Internet Security Last Lecture
Prabhaker Mateti
2
Random Quote “ Restrictions of free thought and free speech is the most dangerous of all subversions. It is the one un-American act that could most easily defeat us.” - William O. Douglas, US Supreme Court,
4
Top Ten Web Sites in Security
CERT is a center of Internet security expertise. It is a federally funded research and development center. A comprehensive computer and network security portal with many tutorials. An electronic magazine that publishes excellent, in-depth technical articles on security exploits whose authors rarely reveal their true names. If we can put aside our prejudices regarding who and what hackers are, we will see that this site is a source of solid technical information that can be used by bad guys for malicious purposes, and the good guys to protect their own computer systems. Now (2006) inactive. collects the images of defaced web sites, such as CIA. Recently (2002), stopped this activity. Slogan: "The leading provider of Security Intelligence Service for Business" Hosts BUGTRAQ. The site has a comprehensive collection of security tools. It also highlights current incidents in internet security. This is a white-hat site. This is a security portal. It archives security tools and exploits. No, it is not a site promoting against the use of online activity. It is similar to the Security Focus site. takes a broader view of security and has articles about how countries can get affected. Underground News is one of the few security sites which does not restrict or censor news or information. Microsoft Technical bulletins, advisories, updates, tools, and prescriptive guidance designed to help IT pros keep Microsoft servers, desktops, and applications up-to-date and secure.
5
Top Internet Security Vulnerabilities
Top Vulnerabilities in Windows Systems W1. Windows Services W2. Internet Explorer W3. Windows Libraries W4. Microsoft Office and Outlook Express W5. Windows Configuration Weaknesses Top Vulnerabilities in Cross-Platform Applications C1. Backup Software C2. Anti-virus Software C3. PHP-based Applications C4. Database Software C5. File Sharing Applications C6. DNS Software C7. Media Players C8. Instant Messaging Applications C9. Mozilla and Firefox Browsers C10. Other Cross-platform Applications Top Vulnerabilities in UNIX Systems U1. UNIX Configuration Weaknesses U2. Mac OS X Top Vulnerabilities in Networking Products N1. Cisco IOS and non-IOS Products N2. Juniper, CheckPoint and Symantec Products N3. Cisco Devices Configuration Weaknesses Source:
6
Top Ten Security Tools The list follows …
Top 75 Security Tools, May 2003 Each respondent could list up to 8. No votes for the Nmap Security Scanner were counted. The list is slightly biased toward "attack" tools rather than defensive ones.
7
Top Ten Security Tools Nessus is a remote security scanner for Unix. It performs over 1200 remote security checks. (It was open source for many years, but they turned proprietary in late 2005.) Ethereal is a free network protocol analyzer for Unix and Windows. You can interactively browse each packet. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. Snort is a free intrusion detection system (IDS) capable of performing real-time traffic analysis and packet logging. It can be used to detect buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rule based language. Many people also suggested that the Analysis Console for Intrusion Databases (ACID) be used with Snort.
8
Top Ten Security Tools Netcat is the network swiss army knife! It reads and writes data across network connections.. It is designed to be a reliable "back-end" tool. TCPDump is the classic sniffer for network monitoring and data acquisition There is a separate Windows port named WinDump. TCPDump is also the source of the Libpcap/WinPcap packet capture library. Hping2 is like ping on steroids. hping2 assembles and sends custom ICMP/UDP/TCP packets and displays any replies. It also has a traceroute mode and supports IP fragmentation. This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. DSniff is a suite of network auditing and penetration-testing tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, , files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.
9
Top Ten Security Tools GFI LANguard: A commercial tool for Windows. LANguard scans networks and reports information such as service pack level of each machine, missing security patches, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Ettercap: In case you still thought switched LANs provide much extra security Ettercap is a sniffer/interceptor/logger. It supports active and passive dissection of protocols (even ciphered ones, like SSH and HTTPS). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. OpenSSH / SSH: (Secure Shell) is a program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. Windows users may want to try the free PuTTY SSH Client.
10
Black Hat Sites/Conferences
Suspend all judgments (other than technical quality). DEF CON is an annual conference held in Las Vegas. Excellent presentations by “hackers”. Conferences and training! “Brain Required. Liver Optional.” “ … helping define cyberwarfare, and publicizing hacktivism” Exploits beyond computers and networks. “one of the most popular and well known hacking/security/cracks related web site in the world since 1997.”
11
Controversies
12
Being Able to Read the Source
Enables exploits Reverse Engineering not required Internal Structure is understood Weaknesses can be seen at the design level Enables fast fixes Intellectual Property Rights and Privileges Not (very) relevant in this course Think: Why do we make laws that let patents expire?
13
Security Through Obscurity
Use secrecy (of design, implementation, etc.) to ensure security. May have theoretical or actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them. We really mean "security implemented solely through obscurity." Obscurity is not always bad. Is Obscurity Ever Good? Read an opinion: blog_sectionid=326&WT.svl=blogger1_1
14
Course Specific Items
15
Course Title? Other titles for the Course
Internet Security Network Security Computer Security System Security Integrated View of Security Issues Selection of Most Relevant Topics Narrowest Title that Covers the Topics
16
Ethics: A Personal Opinion
Ethics violations on small scale DOES NOT NECESSARILY IMPLY violations on large scale. Cf. The recent movie: Crash
17
Big Issues
18
Will Internet ever be trustworthy?
More precise version(s) of the question Predictions Analysis
19
Will Internet ever be trustworthy?
Non-Answers Equate the question with: “Will the world ever be trustworthy?” Internet is a man-made entity. Trustworthy = … ? Ok if cost is high? Will users get educated?
20
Trustworthy = No Cheating + …
User authentication Host authentication Access authentication Message/Transaction authentication No repudiation
21
Trustworthy = … + Reliable + …
Transactions/Operations/Services/… Availability correctly execute Terminate Successfully Failures Computer Resource consumption CPU time Memory …
22
Trustworthy = + …?
23
Will Internet ever be trustworthy?
Predictions
24
Will Internet ever be trustworthy?
Analysis
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.