Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any sin
Trang 1IMIodule l6
Engineered by Presented by Professionals
CỊIERH Certified Ethical Hacker
Trang 2
SECURITY NEWS
—
k PT Te DIG 1 Wikileaks works on a model that allows whistleblowers to submit leaked
documents through internet or postal mail, ensuring that the sender's identity is
concealed and trails cleared
The network used by Wikileaks is similar to a technology called The Onion Router
or Tor Tor is open-source software and its website states that it is currently used
by a branch of U.S Navy for gathering intelligence
It is a system used to outflank filtering and censors enabling users to evade
“ blockers keeping their identity anonymous To evade online traffic analysis Tor
“distributes transactions over several places on the Internet, so no single point can
link you to your destination The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you - and then periodically erasing your footprints Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays
that cover your tracks so no observer at any single point can tell where the data
came from or where it's going.”
http://uk.ibtimes.com
eee OR Adee |
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 3IModule < -
Intrusion Detection Systems (IDS)
r
How to Set up a Honeypot?
Ways to Detect an Intrusion IDS, Firewall and Honeypot System Types of Intrusion Detection Systems
Firewall ani, Types of Firewall | Firewall Identification Techniques
Honeypot Countermeasures
Types of Honeypot Firewall and IDS Penetration Testing
Copyright © by
All Rights Reserved Reproduction is Strictly Prohibited
Trang 5Intrusion Detection Systems (IDS)
An intrusion detection system (IDS) gathers and analyzes information from within a computer or a network, to identify the possible violations of security policy, including unauthorized access, as well as misuse
An IDS is also referred to as a “packet-sniffer,” which intercepts packets traveling along various communication mediums and protocols, usually TCP/IP
vì
=2
Ws The packets are analyzed after they are captured
J An IDS evaluates a suspected intrusion once it has taken place and signals an alarm
Copyright © by Ê All Rights Reserved Reproduction is Strictly Prohibited
Trang 6How IDS Works?
Alarm notifies admin and packet
Trang 7Siønature It is also known as misuse bao,
1 Signature recognition tries to identify events
Trang 8Types of Intrusion Detection Systems
~— Network-based | Host-based
Intrusion Detection 4 Intrusion Detection
© These mechanisms typically consist of a black These mechanisms usually include auditing for
box that is placed on the network in the events that occur on a specific host
promiscuous mode, listening for patterns © These are not as common, due to the overhead
indicative of an intrusion they incur by having to monitor each system
@ These mechanisms are typically programs @ These mechanisms check for Trojan horses,
that parse log files after an event has already or files that have otherwise been modified,
occurred, such as failed log in attempts indicating an intruder has already been there,
for example, Tripwire
Copyright © by EE-beuncw All Rights Reserved Reproduction is Strictly Prohibited
: —— _
TRUNG TAM DAO TAO AN NINH MANG & QUAN TRI MANG
WWW.ATHENA.EDU.VN
Trang 9System Integrity Verifiers (SIV)
Trang 10
General Indications of Intrusions
©@ Unexplained changes in the file’s size
© Rogue files on the system that do not correspond to your master list of signed files
(D Unfamiliar file names in directories
Repeated probes of the available
services on your machines
Connections from unusual locations
Repeated log in attempts from remote hosts
Arbitrary data in log files, indicating
an attempt at creating either a Denial of Service, or a crash service
Trang 11General Indications of System Intrusions
Modifications to system software and configuration files
Gaps in the system accounting
Unusually slow system performance System crashes or reboots
Short or incomplete logs Missing logs or logs with incorrect permissions or ownership Unfamiliar processes
Unusual graphic displays or text messages
Copyright © by Ê
All Rights Reserved Reproduction is Strictly Prohibited
Trang 12Firewall
© Firewall is a hardware or software or combination of © Firewall examines all messages entering or
both designed to prevent unauthorized accesstoor ? leaving the intranet and blocks those that do from a private network : not meet the specified security criteria
© Itis placed at the junction point, or gateway © Firewalls may be concerned with the type of
between the two networks, which is usually a private traffic or with the source or destination
2 network and a public network such as the Internet : addresses and ports ©
Secure Private Local Area Network Public Network
Ww = Specified traffic allowed x< = Restricted unknown traffic
Trang 13Firewall Architecture
the firewall, it has two interfaces:
public interface directly connected to the Internet Sia daiease a inteereitieiele Gail
private interface connected to the intranet ' Intranet
Bastion Host: Á “,/ứẰ “& ae see
configured to protect network resources from attack wv = : :
Screened subnet: 7
© The screened subnet or DMZ (additional zone) contains
hosts that offer public services
~ @aeaesqgseeee
Intranet
© Public zone is directly connected to the Internet and
has no hosts controlled by the organization f “ ` ‘
® Inthis case, more than three interfaces are
present that allow for further subdividing the ae sie oe
systems based upon the specific security r⁄⁄ | > :
objectives of the organization , Internet ) >
Trang 14DeMiulitarized Zone (DMZ)
Se
© DMZ is a network that serves as a buffer between the internal secure network and insecure
internet
© It is created using firewall with three or more network interfaces assigned with specific roles
such as Internal trusted network, DMZ network, and External un-trusted network (Internet)
Trang 15
Inspection Leve Firewalls Gateways
Level ps Gateways : +
3 ccrcRiectevcicviiSsTedps.=e eve a ates
Trang 16Packet Filtering Firewall
Depending on the packet and the criteria, the firewall can:
Packet filtering firewalls work at the network level
of the OSI model (or the IP layer of TCP/IP), they are
usually a part of a router * Drop the packet
* Forward it, or send a message to the originator
J Rules can include the source and the destination IP address,
the source and the destination port number, and the
protocol used
© Ina packet filtering firewall, each packet is
compared to a set of criteria before it is forwarded
Trang 17Circuit-Level Gateway Firewall
WVWWW
Circuit-level gateways work at the session layer of
the OSI model or the TCP layer of TCP/IP
They monitor TCP handshaking between packets to
determine whether a requested session is legitimate
Circuit-level gateways hide information about the private network they protect, but they do not filter individual
Trang 18Application-Level Firewall
Application-level gateways (proxies) can filter > > An application-level gateway that is configured to be a packets at the application layer of the OSI model: web proxy will not allow any FTP, gopher, telnet, or other
: traffic
Incoming or outgoing packets cannot access
: \ Asan application-level gateway examines packets at an
services for which there is no proxy application layer, it can filter application specific
commands such as http:post and get
Trang 19stateful Multilayer Inspection Firewall
W Stateful multilayer inspection firewalls combine the aspects of the other three types of firewalls They filter packets at the network layer, to determine whether session packets are legitimate,
and they evaluate the contents of packets at the application layer
eT SSSSSR ESE ESSER SERS SEES SEETHER ERE Eee eee ee
Trang 20Firewall Identification: Port Scanning
Port scan helps the ;
Sa ace The kind of response
ports are available (i.e., received indicates what service might be whether the port is
listening to a port);it used and can
consists of sending a therefore be probed
message to each port, further for weakness
one atatime
For example: Check Point's FireWall-1 listens on TCP ports
uniquely identify 256, 257, 258, and 259
themselves using and Microsoft's Proxy simple port scans Server usually listens
Trang 21Firewall Identification:
Firewalking
Firewalking is similar to tracerouting and works by sending TCP or UDP packets into the firewall that have a TTL set at one hop greater than the targeted firewall
Trang 23system resource that is
expressly set up to attract and
trap people who attempt to
keystrokes This could send early warnings of a more concerted attack
Trang 24Low-interaction honeypot
They work by emulating services and programs that would be found on an individual's system
If the attacker does something that the emulation does not expect, the honeypot will simply generate an error
Captures limited amounts of information, mainly transactional data and some limited interaction
Ex: Specter, Honeyd, and KFSensor
including new tools, communications,
Trang 25How to Set Up a Honeypot?
> EJ đề
“———
® Download or purchase a
honeypot software s Install the software on your
© Log in as an administrator computer
~ Tiny Honeypot, LaBrea, and on the computer to install
programs available for Linux computer to make sure every feature
systems of the program is installed
© KFSensor is one software
that works with Windows
Trang 26How to Set Up a Honeypot?
software in the “Program check the items that you
© Once you have chosen the the honeypot to work for, including services,
folder, click “OK” and the applications and Trojans, and
name your domain
program will install
+
©)
Copyright Ø by Ê All Rights Reserved Reproduction is Strictly Prohibited
WWW.ATHENA.EDU.VN
Trang 27Module Flow
~
IDS, Firewall and Evading Evading
KH Ae te
All Rights Reserved Reproduction is Strictly Prohibited
Trang 28Intrusion Detection Tool:
Snort is an open source network intrusion
detection system, capable of performing Snort C :
rea |-ti me ec: \Snort\bin>snort -c c:\Snort\etc\snort.conf -1 c:\Snort\log -i 2
= Initialization Complete — -*> Snort! <*-
Version 2.9.0.2-ODBC-MySOL-FlexRBSP-WIN3S2 GRE (Build 92)
By Martin Roesch & The Snort Team: http://www snort.org/snort/snort—team
4) It can perform and Copyright (C) 1998-2010 Sourcefire, Inc., et al
and is used to Using PCRE wersion: 6.10 2010-06-25
Using SLIB wersion: 1.2.3
detect a variety of such Rules Engine: SF SNORT DETECTION BNGINB Version 1.12 <Build 18>
_ Preprocessor Object: SP_SSLPP Version 1.1 <Build 4>
as buffer overflows, stealth port scans, CGI Pxepxocexsox bject: SF SSH Version 1.1 <Build 3>
7 Commencing packet processing (pid—5896)
attacks, SMB probes, and OS fingerprinting SS: Session exceeded configured max bytes to queue 1048576 using 1048979 bytes (
attempts client queue) 192.168.168.7 11616 > 92.46.53.163 80 (0) - Liistate Oxl LWPlag=
0x2003
l *** Caught Int-Signal
J It uses a flexible to describe
: : Run time £ ket i 5985 944000 aoe
traffic that it should collect or pass, as well ———-_— a
asa that utilizes a Snort ran for 0 days 1 hours 39 minutes 45 seconds
Pkt=/hr- Sewer’
modular plug-in architecture a —=
Pkt=s/sec: 1 SS: Premed session from cache that was using 1098947 bytes (purge whole cache) -
—J of Snort: 192.168.168.7 11616 > 92.46.53.163 80 (0) : LWstate Oxi LWFlag= 0x222003
= Straight packet sniffer like tcpdump Packet I/O Totals:
Received: 147490 - rs : Analyxe‹dl: 11774
m Packet logger (useful for network traffic a —-
Trang 29_ Engine (acto Works:
Snort Engine poses | Base Detection Engine
: : al W > Decoder: Saves the captured
NIC in Ww ee =") Dynamic Loaded Libraries level protocols, and decodes IP
sniffing oe) bộ H Output Plugins packets against rules previously
Rule Set
: a Rules Files: These are plain text files which ways (console, extern files, : bassus >‹ 3 contain a list of rules with : =o ne a known syntax : databases, etc)
Copyright © by
All Rights Reserved Reproduction is Strictly Prohibited
WWWVW Â '} IENA EDL VN
Trang 30Snort Rules
3 Snort's rule engine enables one to write his/her own rules to meet the needs of the network
Snort rules help in differentiating between normal Internet activities and malicious activities
| Snort rules must be contained on a single line, the Snort rule parser doesn't handle rules on
multiple lines
“ Snort rules come with two logical parts:
» Rule header: Identifies rule’s actions such as alerts, log, pass, activate, dynamic, etc
» Rule options: Identifies rule’s alert messages
WWW.ATHENA.EDU.VN
Trang 31Snort Rules: Rule Actions and IP
Protocols a
ma ( (3 | | © we
2 Rule Actions 2 )— “ IP Protocols CO
© Three available IP protocols that Snort supports for suspicious
Trang 32Snort Rules: The
4 It deals with the for any particular rule
4 Use keyword " "to define any IP address
4 Snort accepts addresses that are formed by a straight numeric IP address and a CIDR block applies netmask to the rule's
address and to incoming packets that are verified against the rule
~ Example IP Address Negation Rule:
alert tcp !192.168.1.0/24 any -> 192.168.1.0/24 111 (content:
"]00 O1 86 a5|"; msg: "external mountd access";)
Copyright © by EÊ-beuaucw
All Rights Reserved Reproduction is Strictly Prohibited
Trang 33Snort Rules: Port Numbers
“ Port numbers can be listed in different ways, including "any" ports, static
port definitions, ranges, and by negation Port ranges are indicated with the range operator ":"
“ Example of Port Negation
log tcp any any -> 192.168.1.0/24 !6000:6010
Log UDP traffic coming from any port and destination
Log UDP any any -> 92.168.1.0/24 1:1024 ports ranging from 1 to 1024
Log TCP traffic from any port going to ports less than
Log TCP any any -> 192.168.1.0/24 :5000 or equal to S000
Log TCP traffic from privileged ports less than or
Log TCP any :1024 -> 192.168.1.0/24 400: equal to 1024 going to ports greater than or equal to
400
Copyright © by All Rights Reserved Reproduction is Strictly Prohibited
/VWW A Tk IENA EDL | VN
Trang 34Intrusion Detection System: Tipping Point
- j TippingPoint IPS is inserted
seamlessly and transparently
into the network, it is an in-line
device
J Each packet is thoroughly
inspected to determine whether
they are malicious or legitimate
J It provides performance,
application, and infrastructure
protection at gigabit speeds
through total packet inspection
@ Permitted Last: 27.39 k_ Avg: 13.79 k Max: 40.38 k
@ Blocked Last: 0.00 Avg: 0.00 Max: 0.00 ElDiscarded Invalid Last: 69.38 Avg: 66.91 Max: 81.33
Graph Last Updated: Tue 22 Sep 12:20:02 CEST 2009
XXXXXXXX - Attacks Per Protocol
@ ICMP Last: 3.67 k Avg: 3.90 k Max: 6.06 k
@ UDP Last: 886.08 Avg: 1.04 k Max: 6.61 k E1 TCP Last : 22.90 k Avg: 8.94 k Max: 35.85 k
@MiP-Other Last: 0.00 Avg: 0.00 Max : 0.00 Graph Last Updated: Tue 22 Sep 12:20:02 CEST 2009 http://h10163 www1 hp com
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 35
Intrusion Detection Tools
Security Network Intrusion Prevention System
All Rights Reserved Reproduction is Strictly Prohibited
Trang 36Intrusion Detection Tools
SNARE (System iNtrusion Analysis
Wig eXpert-BSM LS ZR ( : Envi x
= http://www.csl.sri.com ~~? eporting nvironment)
All Rights Reserved Reproduction is Strictly Prohibited
Trang 37Firewall: Sunbelt Personal Firewall
[J rapiregr * deny VP perme deny 7 a4
[] ceappme x deny w perme * deny 2 ask
@ Internet Explorer x deny w perm X đery w perme E3 LSA Shall (Expert Vercion) Mw dary permet M dary x# parm
g Windows NT Logon Appi x deny Ww pormet x deny w perm
[_] Userint Logon Application % deny Ww perme x deny wW perm#
[] Generic Host Processfo 3 deny Ww perme X dery ww perme
GF Microsoft File and Printe X deny Ww perme x dery A perme [=- Any other application x deny ww perme x deny ww perme
Trang 38All Rights Reserved Reproduction is Strictly Prohibited
Trang 39Aitnorizatiory Negotiate YRQegY GH 000000 | OS 00 OB 03 10 00 00 00 48 00 00 00 7F 00
[ eoorded 900 of 9890 bytes.) 000010 ¡ ĐO l6 D0 16 00 00 00 00 01 00 00 00 01
Message iS - RBOT Vvorm propagation N1
Request Data - $599 Bytes : ™ Event Details Text Viewer - oe
networking protocols Export logs in multiple formats Denial Of Service (DOS) attack protection
on a Pe MYMU 2M 8 MILAM TOT MALS
VT IAP VAY LAY { nân iW YUAN IR ANY
WWW.ATHENA.EDU.VN
Copyright © by EC-Ceuncil
All Rights Reserved Reproduction is Strictly Prohibited.
Trang 40Honeypot Tool:
= SPECTER is a smart honeypot-based intrusion detection system that offers common Intern
as SMTP, FTP, POP3, HTTP and TELNET which appear perfectly normal to the attackers but i in fact are traps
= SPECTER provides massive amounts of c
password files, documents and all kinds of nhưng
VV SUB7 802%
24
2 -?J
Host Mame [uhensreteds =f User Contiguation Í 2{
SwwemNee: [OUTPOST ——— 7Í - ngượkCs6gszen | 2Í
Cef@ssesVesea no ` Web Service Configuration) 2Í
Mad Server IP Adaere® F100 169.1 260 Mad Ackhets
fF Une custom waning message 2
[2 Remote Managenert Por: | 28
Expect tiendly connections
Uve custom mad message for POPS
Your schons ae logged etrumon ater! was actvated