1. Trang chủ
  2. » Công Nghệ Thông Tin

Concepts in Network Security: LTC Ronald Dodge, Ph.D. United States Military Academy doc

28 351 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 28
Dung lượng 0,93 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Concepts in Network Security... Trends in Network Security... Trends: Another PictureHigh Low Intruder Knowledge Attack Sophistication self-replicating code password guessing password cr

Trang 1

Concepts in Network Security

Trang 2

Trends in Network Security

Trang 3

Trends: Another Picture

High

Low

Intruder Knowledge

Attack Sophistication

self-replicating code password guessing

password cracking exploiting known vulnerabilities burglaries

session high jacking

burglaries

BOTnets

www attacks sweepers

automated probes GUI interfaces

network diagnostics backdoors

disabling audits

cross site scripting

distributed attacks denial of service

packet spoofing

Trang 4

2

Also Convenience Usability

Assumes Fixed Cost

Trang 5

ƒ Motivation

ƒ Virtual Information Assurance Network (VIAN) introduction

ƒ Viruses, Worms and Trojans – Oh My!

ƒ (And don’t forget about SPAM)

Trang 6

USMA VIAN

ƒ Virtual network design

presents students with two internal networks separated

Trang 7

The VMware virtualization layer sites between the hardware and software and allows users to create virtual machines that are the full equivalent of a standard x86 machine

Intel Architecture with VMware

How Does VMware Workstation Work?

Trang 8

USMA VIAN Configuration

ƒ VMware license: Academic $130 each

ƒ OS licenses

ƒ Solaris: $20

ƒ MSDNAA: Deeply discounted

ƒ Applications: Most all open source

ƒ Hardware

ƒ P4 1.8GhZ, 1 GB RAM (512), 60 GB HD

Trang 9

USMA VIAN Operating Systems

ƒ Windows 2003 (all versions)

Trang 10

USMA VIAN Modules

in the Middle

detection using SNORT

detection with monitors

and using virtual machines

and network fundamentals

Trang 11

Viruses, Worms and Trojans – Oh My!

Trang 12

HACKER Pre-test

ƒ Can you read this?

ƒ T1hs iz da h0m3p4g3 0f d4 m0St l33T w4r3z gR0uP th3r3

iz, LWE! W3 f0cUs oN bRiNgIng j0 dA l4t3eSt 0-dAy 313373

w4r3z év3rydAy J0 c4n f1nd aLl 0ur r3l3ases 0n ThIs l33t p4ge!! Ph34r 0ur sKiLlz!!

Trang 13

H4x0r Language Homework

www.google.com

->preferences

Trang 14

Example Malicious Program Types

Trang 16

Hacking, Step-by-Step

ƒ Well, this ain't exactly for beginners, but it'll have to do What all hackers have to know

is that there are 4 steps in hacking

ƒ Step 1: Getting access to site

ƒ Step 2: Hacking r00t

ƒ Step 3: Covering your traces

ƒ Step 4: Keeping that account

http://forbidden.net-security.org/txt/beginner.txt

Trang 19

ƒ Scanning

ƒ A method for discovering exploitable communication channels The idea is to probe as many listeners as possible, and keep track of the ones that are

receptive or useful to your particular need

ƒ SuperScan – NMAP – Nessus

ƒ CORE Impact – Metasploit – WHAX 3.0

(a.k.a WHOPPIX)

Trang 20

ƒ Sniffing

ƒ A packet sniffer is a wire-tap devices that plugs into computer networks and eavesdrops on the network traffic A “sniffing” program lets

someone listen in on computer conversations

ƒ Ethereal FTP/SFTP Demo

Trang 22

ƒ IIS buffer overflow

ƒ DCOM

Trang 24

ƒ Maintain access

ƒ Patch

ƒ Install backdoor

Trang 26

ƒ USMA IWAR and VIAN

ƒ Web: http://www.itoc.usma.edu

ƒ E-mail: itoc@usma.edu

Ngày đăng: 14/03/2014, 22:20

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm