After studying this chapter you should be able to differentiate among various systems’ security threats: Privilege escalation, virus, Worm, Trojan, Spyware, Spam, Adware, Rootkits, Botnets, Logic bomb,... For further information, inviting you to refer lecture.
Trang 1
Identifying Potential Risks
Trang 33
Trang 1010
Trang 1111
Trang 12v Implement security applications
v Differentiate between the different ports and protocols, their respective threats and mitigation techniques
Trang 14v Attack Strategies
v Recognizing Common Attacks
v Identifying TCP/IP Security Concerns
v Understanding Software Exploitation
v Surviving Malicious Code
v Other Attacks and Frauds
Trang 15Attack Strategies
v Access attack, someone who should not be able to
wants to access your resources Its purpose is to gain access to information that the attacker isn’t authorized to have
v Modification and repudiation attack, someone wants
to modify information in your systems
v Denial-of-service (DoS) attack
Trang 16Access Attack Types
v Eavesdropping
v Eavesdropping is the process of listening in on or overhearing parts of a conversation, including listening in on your network traffic
v This type of attack is generally passive
Trang 17Access Attack Types
v Interception can be either an active or a passive process
v Intercept (v): to stop something or someone that is going from
one place to another before they get there
v In a networked environment, a passive interception would involve someone who routinely monitors network traffic.
v Active interception might include putting a computer system between the sender and receiver to capture information as it’s sent The process is usually covert
v Intercept missions can occur for years without the knowledge of the parties being monitored.
Trang 18Modification & Repudiation Attacks
v Modification attacks involve the deletion, insertion, or alteration of information in an unauthorized manner that
is intended to appear genuine to the user
v They’re similar to access attacks in that the attacker must first get to the data on the servers, but they differ from that point on
v The motivation for this type of attack may be to plant information, change grades in a class, fraudulently alter credit card records, or something similar.
v Website defacements are a common form of
modification attack
Trang 19Modification & Repudiation Attacks
v Repudiation attack is a variation of modification attacks
v repudiate / rɪpjudieɪt /
v to refuse to accept or continue with something
v to state or show that something is not true or correct
v Repudiation attacks make data or information appear to
be invalid or misleading
v Repudiation attacks are fairly easy to accomplish because most e-mail systems don’t check outbound mail for validity
v Repudiation attacks, like modification attacks, usually begin as access attacks
Trang 20DoS Attacks
v Denial-of-Service
v DoS attacks prevent access to resources by users authorized to use those resources
v Most simple DoS attacks occur from a single system
v Types of DoS attacks:
v ping of death
v buffer overflow
Trang 21DoS Attacks
Trang 22Wireless DoS
v Requires a powerful transmitter
Trang 23An Easier Wireless DoS
Trang 24DDoS Attacks
v Distributed Denial-of-Service Attacks
v Multiple computer systems used to conduct the attack
v Botnet: the malicious software running on a zombie
Trang 25DDoS Attacks
Trang 26v How to face with Denial attacks?
Trang 27v Attack Strategies
v Recognizing Common Attacks
v Identifying TCP/IP Security Concerns
v Understanding Software Exploitation
v Surviving Malicious Code
v Other Attacks and Frauds
Trang 28Back Door Attacks
v Back doors?
Trang 31Replay Attacks
v The attacker captures the information and replay it later
v The information can be username, passwords, certificates from authentication systems such as Kerboros
Trang 32Wall of Sheep
Captured passwords projected on the wall
at DEFCON
Trang 33Replay Attacks
v Solutions: Certificates usually contain a unique session identifier and a time stamp
Trang 34v Records cookies and replays them
v This technique breaks into Gmail accounts
v Technical name: Cross Site Request Forgery
v Almost all social networking sites are vulnerable to this attack
v Facebook, MySpace, Yahoo, etc.
Trang 36Privilege Escalation
v Privilege escalation can be the result of an error on an administrator’s part in assigning too high a permission set to a user, but it’s more often associated with bugs left
in software
v Cheat codes in video games
Trang 37v Attack Strategies
v Recognizing Common Attacks
v Identifying TCP/IP Security Concerns
v Understanding Software Exploitation
v Surviving Malicious Code
v Other Attacks and Frauds
Trang 38OSI vs TCP/IP
Trang 39TCP/IP model
v Network Access = OSI layers 1 & 2, defines LAN communication, what do I mean by that?
v Network = OSI layer 3 – defines addressing and routing
v Transport/Host to Host = OSI layer 4, 5 – defines a communication session between two applications on one
or two hosts
v Application = OSI layers 6,7 the application data that is being sent across a network
Trang 40Network Access Layer
v Maps to Layer 1 and 2 of the OSI model
v The Level that a Network Interface Card Works on
v Source and Destination MAC addresses are used defining communications endpoints
v Protocols include
v Ethernet
v Token Ring
v FDDI
Trang 41Network Layer
v Routing, IP addressing, and packaging
v Internet Protocol (IP) is a routable protocol, and it’s responsible for:
v IP addressing.
v fragments and reassembles message packets
v only routes information; doesn’t verify it for accuracy(Accuracy checking is the responsibility of TCP)
Trang 42Host-to-Host or Transport Layer
v Maps to layer 4 and 5 of the OSI model
v Concerned with establishing sessions between two applications
v Source and destination endpoints are defined by port
numbers
v The two transport protocols in TCP/IP are TCP and UDP
Trang 43TCP – Transmission Control Protocol
v Connection oriented “guaranteed” delivery
v Advantages
v Easier to program with
v Truly implements a “session”
v Adds security
v Disadvantages
v More overhead / slower
Trang 44UDP - User Datagram Protocol
v Connectionless, non-guaranteed delivery (best effort)
Trang 45Application Layer
v Most programs, such as web browsers, interface with TCP/IP at this level
v Protocols:
v Hypertext Transfer Protocol (HTTP)
v File Transfer Protocol (FTP)
v Simple Mail Transfer Protocol (SMTP)
v Telnet
v Domain Name Service (DNS)
v Routing Information Protocol (RIP)
v Post Office Protocol (POP3)
Trang 46v Encapsulate
v to express or show something in a short way
v to completely cover something with something else, especially in order to prevent a substance getting out
Trang 47v State Transition Keying
v Phase Shift Keying (PSK)
v Modulation and Demodulation
v Used in modems and in transfering data units among OSI layers
Trang 48Recognizing TCP/IP Attacks
v Port Mirroring
v Sniffing the Network
v TCP Attacks
Trang 49Port Mirroring
Trang 50v A device that captures and displays network traffic
Trang 51TCP SYN or TCP ACK Flood Attack
v The client and server exchange information in TCP packets
v The TCP client sends an ACK packet to the server
v ACK packets tell the server that a connection is requested
v Server responds with an ACK packet
v The TCP Client sends another packet to open the connection
v Instead of opening the connection, the TCP client continues to send ACK packet to the server
Trang 52TCP SYN or TCP ACK Flood Attack
Trang 53TCP Sequence Number Attack
v TCP sequence number attacks occur when an attacker takes control of one end of a TCP session
v Each time a TCP message is sent, either the client or the server generates a sequence number
v The attacker intercepts and then responds with a sequence number similar to the one used in the original session
v Disrupt or hijack a valid session
Trang 54Wireless Attacks
v Rogue access points
v Rogue: not behaving in the usual or accepted way and often causing trouble
v Employees often set up home wireless routers for convenience
Trang 55Wireless Attacks
Trang 56v War driving
v Beaconing
v At regular intervals, a wireless AP sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network
v Scanning
v Each wireless device looks for those beacon frames
v Unapproved wireless devices can likewise pick up the beaconing
RF transmission
v Formally known as wireless location mapping
Trang 57Wireless Attacks
v Bluetooth
v A wireless technology that uses short-range RF transmissions
v Provides for rapid “on the fly” and ad hoc connections between devices
v Bluesnarfing
v Stealing data through a Bluetooth connection
v E-mails, calendars, contact lists, and cell phone pictures and videos, …
Trang 58v Attack Strategies
v Recognizing Common Attacks
v Identifying TCP/IP Security Concerns
v Understanding Software Exploitation
v Surviving Malicious Code
v Other Attacks and Frauds
Trang 59Software Exploitations
v Database exploitation
v If a client session can be hijacked or spoofed, the attacker can formulate queries against the database that disclose unauthorized information.
Trang 60v Attack Strategies
v Recognizing Common Attacks
v Identifying TCP/IP Security Concerns
v Understanding Software Exploitation
v Surviving Malicious Code
v Other Attacks and Frauds
Trang 62v Multipartite Virus: attacks the system in multiple ways
Trang 63v Phage Virus
v Modifies and alters other programs and database
v The only way to remove this virus is to reinstall the programs that are infected
v Polymorphic Virus
v Change form in order to avoid detection
v Frequently, the virus will encrypt parts of itself to avoid detection
Trang 64v Stealth Virus
v Attempts to avoid detection by masking itself from applications
Trang 65Logic Bombs
v Logic bombs are programs or snippets of code that execute when a certain predefined event occurs
Trang 66v Attack Strategies
v Recognizing Common Attacks
v Identifying TCP/IP Security Concerns
v Understanding Software Exploitation
v Surviving Malicious Code
v Other Attacks and Frauds
Trang 67Null Sessions
v Connections to a Microsoft Windows 2000 or Windows
NT computer with a blank username and password
v Attacker can collect a lot of data from a vulnerable system
v Cannot be fixed by patches to the operating systems
v Much less of a problem with modern Windows versions, Win XP SP2, Vista, or Windows 7
Trang 68Domain Name Kiting
v Check kiting
v A type of fraud that involves the unlawful use of checking accounts to gain additional time before the fraud is detected
v Domain Name Kiting
v Registrars are organizations that are approved by ICANN to sell and register Internet domain names
v A five-day Add Grade Period (AGP) permits registrars to delete any newly registered Internet domain names and receive a full refund of the registration fee
Trang 69Domain Name Kiting
v Unscrupulous registrars register thousands of Internet domain names and then delete them
v Recently expired domain names are indexed by search engines
v Visitors are directed to a re-registered site
v Which is usually a single page Web with paid advertisement links
v Visitors who click on these links generate money for the registrar
Trang 70SNMP (Simple Network Management Protocol)
v Used to manage switches, routers, and other network devices
v Early versions did not encrypt passwords, and had other security flaws
v But the old versions are still commonly used
Trang 71DNS (Domain Name System)
v DNS is used to resolve domain names like www.ccsf.edu
to IP addresses like 147.144.1.254
v DNS has many vulnerabilities
v It was never designed to be secure
Trang 72DNS Poisoning
Trang 73Local DNS Poisoning
v Put false entries into the Hosts file
v C:\Windows\System32\Drivers\etc\hosts
Trang 74DNS Cache Poisoning
v Attacker sends many spoofed DNS responses
v Target just accepts the first one it gets
Trang 75Sending Extra DNS Records
Trang 76DNS Transfers
v Intended to let a new DNS server copy the records from
an existing one
v Can be used by attackers to get a list of all the machines
in a company, like a network diagram
v Usually blocked by modern DNS servers
Trang 77Protection from DNS Attacks
v Antispyware software will warn you when the hosts file is modified
v Using updated versions of DNS server software prevents older DNS attacks against the server
v But many DNS flaws cannot be patched
v Eventually: Switch to DNSSEC (Domain Name System Security Extensions)
v But DNSSEC is not widely deployed yet, and it has its own problems
Trang 78ARP (Address Resolution Protocol)
v ARP is used to convert IP addresses like 147.144.1.254 into MAC addresses like 00-30-48-82-11-34
Trang 79ARP Cache Poisoning
v Attacker sends many spoofed ARP responses
v Target just accepts the first one it gets
Trang 80Results of ARP Poisoning Attacks