Title: Identifying Potential Risks
1Identifying Potential Risks
2Contents
- Differentiate among various systems security
threats - Privilege escalation
- Virus
- Worm
- Trojan
- Spyware
- Spam
- Adware
- Rootkits
- Botnets
- Logic bomb
3Contents
- Implement security applications.
- Differentiate between the different ports and
protocols, their respective threats and
mitigation techniques. - Antiquated protocols
- TCP/IP hijacking
- Null sessions
- Spoofing
- Man-in-the-middle
- Replay
- DoS
- DDoS
- Domain Name Kiting
- DNS poisoning
4Contents
- Explain the vulnerabilities and mitigations
associated with network devices. - Privilege escalation
- Weak passwords
- Back doors
- DoS
- Carry out vulnerability assessments using common
tools. - Vulnerability scanners
- Password crackers
5Index
- Attack Strategies
- Recognizing Common Attacks
- Identifying TCP/IP Security Concerns
- Understanding Software Exploitation
- Surviving Malicious Code
- Other Attacks and Frauds
6Attack Strategies
- Access attack, someone who should not be able to
wants to access your resources. Its purpose is to
gain access to information that the attacker
isnt authorized to have - Modification and repudiation attack, someone
wants to modify information in your systems - Denial-of-service (DoS) attack
7Access Attack Types
- Eavesdropping
- Eavesdropping is the process of listening in on
or overhearing parts of a conversation, including
listening in on your network traffic - This type of attack is generally passive
- Snooping
- Occurs when someone looks through your files
hoping to find something interesting - The files may be either electronic or on paper
8Access Attack Types
- Interception can be either an active or a passive
process - Intercept (v) to stop something or someone that
is going from one place to another before they
get there - In a networked environment, a passive
interception would involve someone who routinely
monitors network traffic. - Active interception might include putting a
computer system between the sender and receiver
to capture information as its sent. The process
is usually covert. - Intercept missions can occur for years without
the knowledge of the parties being monitored.
9Modification Repudiation Attacks
- Modification attacks involve the deletion,
insertion, or alteration of information in an
unauthorized manner that is intended to appear
genuine to the user - Theyre similar to access attacks in that the
attacker must first get to the data on the
servers, but they differ from that point on. - The motivation for this type of attack may be to
plant information, change grades in a class,
fraudulently alter credit card records, or
something similar. - Website defacements are a common form of
modification attack.
10Modification Repudiation Attacks
- Repudiation attack is a variation of modification
attacks - repudiate / r?pjudie?t /
- to refuse to accept or continue with something
- to state or show that something is not true or
correct - Repudiation attacks make data or information
appear to be invalid or misleading. - Repudiation attacks are fairly easy to accomplish
because most e-mail systems dont check outbound
mail for validity. - Repudiation attacks, like modification attacks,
usually begin as access attacks.
11DoS Attacks
- Denial-of-Service
- DoS attacks prevent access to resources by users
authorized to use those resources - Most simple DoS attacks occur from a single
system - Types of DoS attacks
- ping of death
- buffer overflow
12DoS Attacks
13Wireless DoS
- Requires a powerful transmitter
14An Easier Wireless DoS
15DDoS Attacks
- Distributed Denial-of-Service Attacks
- Multiple computer systems used to conduct the
attack - Zombies
- Botnet the malicious software running on a zombie
16DDoS Attacks
17DDoS Attacks
- How to face with Denial attacks?
18Index
- Attack Strategies
- Recognizing Common Attacks
- Identifying TCP/IP Security Concerns
- Understanding Software Exploitation
- Surviving Malicious Code
- Other Attacks and Frauds
19Back Door Attacks
20Spoofing Attacks
- A spoofing attack is an attempt by someone or
something to masquerade as someone else. - IP spoofing and DNS spoofing
21Man-in-the-Middle Attacks
- This type of attack is also an access attack, but
it can be used as the starting point for a
modification attack - Places a piece of software between a server and
the user.
22Replay Attacks
- The attacker captures the information and replay
it later. - The information can be username, passwords,
certificates from authentication systems such as
Kerboros.
23Wall of Sheep
- Captured passwords projected on the wall at DEFCON
24Replay Attacks
- Solutions Certificates usually contain a unique
session identifier and a time stamp.
25Sidejacking
- Records cookies and replays them
- This technique breaks into Gmail accounts
- Technical name Cross Site Request Forgery
- Almost all social networking sites are vulnerable
to this attack - Facebook, MySpace, Yahoo, etc.
26Password-Guessing Attacks
- Brute-force attack.
- Dictionary attack
- Hybrids mixing the two above techniques
27Privilege Escalation
- Privilege escalation can be the result of an
error on an administrators part in assigning too
high a permission set to a user, but its more
often associated with bugs left in software. - Cheat codes in video games.
28Index
- Attack Strategies
- Recognizing Common Attacks
- Identifying TCP/IP Security Concerns
- Understanding Software Exploitation
- Surviving Malicious Code
- Other Attacks and Frauds
29OSI vs TCP/IP
30TCP/IP model
- Network Access OSI layers 1 2, defines LAN
communication, what do I mean by that? - Network OSI layer 3 defines addressing and
routing - Transport/Host to Host OSI layer 4, 5 defines
a communication session between two applications
on one or two hosts - Application OSI layers 6,7 the application
data that is being sent across a network
31Network Access Layer
- Maps to Layer 1 and 2 of the OSI model
- The Level that a Network Interface Card Works on
- Source and Destination MAC addresses are used
defining communications endpoints - Protocols include
- Ethernet
- Token Ring
- FDDI
32Network Layer
- Routing, IP addressing, and packaging
- Internet Protocol (IP) is a routable protocol,
and its responsible for - IP addressing.
- fragments and reassembles message packets
- only routes information doesnt verify it for
accuracy(Accuracy checking is the responsibility
of TCP)
33Host-to-Host or Transport Layer
- Maps to layer 4 and 5 of the OSI model
- Concerned with establishing sessions between two
applications - Source and destination endpoints are defined by
port numbers - The two transport protocols in TCP/IP are TCP and
UDP
34TCP Transmission Control Protocol
- Connection oriented guaranteed delivery.
- Advantages
- Easier to program with
- Truly implements a session
- Adds security
- Disadvantages
- More overhead / slower
35UDP - User Datagram Protocol
- Connectionless, non-guaranteed delivery (best
effort) - Advantages
- Fast / low overhead
- Disadvantages
- Harder to program with
- No true sessions
- Less security
- A pain to firewall (due to no connections)
36Application Layer
- Most programs, such as web browsers, interface
with TCP/IP at this level - Protocols
- Hypertext Transfer Protocol (HTTP)
- File Transfer Protocol (FTP)
- Simple Mail Transfer Protocol (SMTP)
- Telnet
- Domain Name Service (DNS)
- Routing Information Protocol (RIP)
- Post Office Protocol (POP3)
37Encapsulation
- Encapsulate
- to express or show something in a short way
- to completely cover something with something
else, especially in order to prevent a substance
getting out
38Modulation Ði?u ch?
- To change data from a form to another
- AM (Amplitude Modulation)
- FM (Frequency Modulation)
- PM (Phase Modulation)
- Keying methods
- Current State Keying
- ASK
- FSK
- State Transition Keying
- Phase Shift Keying (PSK)
- Modulation and Demodulation
- Used in modems and in transfering data units
among OSI layers
39Recognizing TCP/IP Attacks
- Port Mirroring
- Sniffing the Network
- TCP Attacks
40Port Mirroring
41Sniffers
- A device that captures and displays network
traffic
42TCP SYN or TCP ACK Flood Attack
- The client and server exchange information in TCP
packets - The TCP client sends an ACK packet to the server
- ACK packets tell the server that a connection is
requested - Server responds with an ACK packet
- The TCP Client sends another packet to open the
connection - Instead of opening the connection, the TCP client
continues to send ACK packet to the server.
43TCP SYN or TCP ACK Flood Attack
44TCP Sequence Number Attack
- TCP sequence number attacks occur when an
attacker takes control of one end of a TCP
session - Each time a TCP message is sent, either the
client or the server generates a sequence number - The attacker intercepts and then responds with a
sequence number similar to the one used in the
original session - Disrupt or hijack a valid session
45Wireless Attacks
- Rogue access points
- Rogue not behaving in the usual or accepted way
and often causing trouble - Employees often set up home wireless routers for
convenience at work - This allows attackers to bypass all of the
network security and opens the entire network and
all users to direct attacks - An attacker who can access the network through a
rogue access point is behind the company's
firewall - Can directly attack all devices on the network
46Wireless Attacks
47Wireless Attacks
- War driving
- Beaconing
- At regular intervals, a wireless AP sends a
beacon frame to announce its presence and to
provide the necessary information for devices
that want to join the network - Scanning
- Each wireless device looks for those beacon
frames - Unapproved wireless devices can likewise pick up
the beaconing RF transmission - Formally known as wireless location mapping
48Wireless Attacks
- Bluetooth
- A wireless technology that uses short-range RF
transmissions - Provides for rapid on the fly and ad hoc
connections between devices - Bluesnarfing
- Stealing data through a Bluetooth connection
- E-mails, calendars, contact lists, and cell phone
pictures and videos,
49Index
- Attack Strategies
- Recognizing Common Attacks
- Identifying TCP/IP Security Concerns
- Understanding Software Exploitation
- Surviving Malicious Code
- Other Attacks and Frauds
50Software Exploitations
- Database exploitation
- If a client session can be hijacked or spoofed,
the attacker can formulate queries against the
database that disclose unauthorized information. - Application exploitation
- E-mail exploitation
- Spyware
- Rather than self-replicating, like viruses and
worms, spyware is spread to machines by users who
inadvertently ask for it - Rootkits
- Enables continued privileged access to a
computer, while actively hiding its presence from
administrators by subverting standard operating
system functionality or other applications
51Index
- Attack Strategies
- Recognizing Common Attacks
- Identifying TCP/IP Security Concerns
- Understanding Software Exploitation
- Surviving Malicious Code
- Other Attacks and Frauds
52Viruses
- Armored Virus
- designed to make itself difficult to detect or
analyze - Companion Virus
- A companion virus attaches itself to legitimate
programs and then creates a program with a
different filename extension - Macro Virus
- a set of programming instructions in a language
such as VBScript that commands an application to
perform illicit actions
53Viruses
- Multipartite Virus attacks the system in
multiple ways
54Viruses
- Phage Virus
- Modifies and alters other programs and database
- The only way to remove this virus is to reinstall
the programs that are infected - Polymorphic Virus
- Change form in order to avoid detection
- Frequently, the virus will encrypt parts of
itself to avoid detection
55Viruses
- Stealth Virus
- Attempts to avoid detection by masking itself
from applications
56Logic Bombs
- Logic bombs are programs or snippets of code that
execute when a certain predefined event occurs.
57Index
- Attack Strategies
- Recognizing Common Attacks
- Identifying TCP/IP Security Concerns
- Understanding Software Exploitation
- Surviving Malicious Code
- Other Attacks and Frauds
58Null Sessions
- Connections to a Microsoft Windows 2000 or
Windows NT computer with a blank username and
password - Attacker can collect a lot of data from a
vulnerable system - Cannot be fixed by patches to the operating
systems - Much less of a problem with modern Windows
versions, Win XP SP2, Vista, or Windows 7
59Domain Name Kiting
- Check kiting
- A type of fraud that involves the unlawful use of
checking accounts to gain additional time before
the fraud is detected - Domain Name Kiting
- Registrars are organizations that are approved by
ICANN to sell and register Internet domain names - A five-day Add Grade Period (AGP) permits
registrars to delete any newly registered
Internet domain names and receive a full refund
of the registration fee
60Domain Name Kiting
- Unscrupulous registrars register thousands of
Internet domain names and then delete them - Recently expired domain names are indexed by
search engines - Visitors are directed to a re-registered site
- Which is usually a single page Web with paid
advertisement links - Visitors who click on these links generate money
for the registrar
61SNMP (Simple Network Management Protocol)
- Used to manage switches, routers, and other
network devices - Early versions did not encrypt passwords, and had
other security flaws - But the old versions are still commonly used
62DNS (Domain Name System)
- DNS is used to resolve domain names like
www.ccsf.edu to IP addresses like 147.144.1.254 - DNS has many vulnerabilities
- It was never designed to be secure
63DNS Poisoning
64Local DNS Poisoning
- Put false entries into the Hosts file
- C\Windows\System32\Drivers\etc\hosts
65DNS Cache Poisoning
- Attacker sends many spoofed DNS responses
- Target just accepts the first one it gets
66Sending Extra DNS Records
67DNS Transfers
- Intended to let a new DNS server copy the records
from an existing one - Can be used by attackers to get a list of all the
machines in a company, like a network diagram - Usually blocked by modern DNS servers
68Protection from DNS Attacks
- Antispyware software will warn you when the hosts
file is modified - Using updated versions of DNS server software
prevents older DNS attacks against the server - But many DNS flaws cannot be patched
- Eventually Switch to DNSSEC (Domain Name System
Security Extensions) - But DNSSEC is not widely deployed yet, and it has
its own problems
69ARP (Address Resolution Protocol)
- ARP is used to convert IP addresses like
147.144.1.254 into MAC addresses like
00-30-48-82-11-34
70ARP Cache Poisoning
- Attacker sends many spoofed ARP responses
- Target just accepts the first one it gets
71Results of ARP Poisoning Attacks