130 likes | 249 Views
Hacking and Network Defense. Introduction. With the media attention covering security breaches at even the most tightly controlled organization, it is more important than ever to learn about hackers. Hacker Profile.
E N D
Introduction • With the media attention covering security breaches at even the most tightly controlled organization, it is more important than ever to learn about hackers.
Hacker Profile • “Hacker” can be ranged from the computer programmer you work with who hacks in the evening , to a high school student who plays on the computer after he/she gets out of school, to almost anyone in between. • Why? • Enjoy the game of discovering the vulnerabilities • Criminal intent • Revenge
Enterprise Risks • Disruption of Services • Damaged Reputation • Exposure of Confidential information • Corruption of Data • Liability
Anatomy of an Attack • Profiling • Gathering information about target • Scanning • Identify what systems are active • Enumerating • Determining valid user account and shares
Anatomy of an Attack • Enumerating (Cont.) • How? • Social Engineering • Observation • Eavesdropping • Exploiting • Gain unlawful entry to a system
Different Kind of Exploits • Buffer Overflows • Result of poor programming • Privilege Escalation • Unsecured lower privilege account • Brute Force Attacks • Password guessing game • Unexpected Input • Username: jdoe; rm –rf /
Different Kind of Exploits • Defacements • Surprise on Web sites • Denial of Service (DoS) • A fleet attack • Launch Pad Attacks • A victim attacked by other victim
The Hackers Toolkit • Web Scanner • Port Scanner • Password Crackers • Password Grinders • War Dialers • Program Password Recovery • Credit Card Number Generators • Vulnerability Scanners • Packet Sniffers • Net BIOS Auditing Tools • Virus, Trojans, Worms
Defending Against the Hack • Keep patched up to date • Shut down unnecessary services/ports • Change default passwords • Control physical access to system • Curtail unexpected input
Defending Against the Hack • Perform backups the test them • Educate people about social engineering • Encrypt and password-protect sensitive data • Implement security hardware and software • Develop a written security policy for the company
More Hacking • Hacker tools • http://www.insecure.org/tools.html • Wireless Networks • Wireless LAN Analyzers • Viruses and Worms • http://www.nai.com • Terrorism • Security Advisory • http://www.microsoft.com/security