1.68k likes | 1.96k Views
Welcome to All Participants. Prof NB Venkateswarlu HOD, IT, GVPCOE Visakhapatnam venkat_ritch@yahoo.com. Let Me first Congratulate all the Organizers. First, You may have to Excuse me!!. May be, I am the only odd man out!.
E N D
Welcome to All Participants Prof NB Venkateswarlu HOD, IT, GVPCOE Visakhapatnam venkat_ritch@yahoo.com
First, You may have to Excuse me!!. May be, I am the only odd man out!.
However, I am helpless. My Talk is a last minute adjustment. Neverthless, I am sure you will Enjoy.
What I am going to Cover? • Briefing general security threats SQL Injections Physhing DNS hacking SPAMS BOTNETS • Linux Security Aspects • CERT-In Initiation under Ministry of Information Technology, Govt of India.
Most Noted Reasons • Buffer overflows • Format String problems • Integer Overflows • SQL Injections • Command Injection • Failure to handle errors • Cross-site scripting
Most Noted Reasons - Cont • Failure to protect network traffic • Use of magic URL’s and hidden forms • Improper use of SSL • Use of weak password based systems • Failure to store and protect data securely • Information leakage • Trusting network address resolution
Most Noted Reasons - Cont • Improper file access • Race conditions • Unauthorised key exchange • Failure to use cryptographically strng random numbers • Poor usability
Cyber Insurance – US Statistics • Premium Paid $100 millions • Claims Paid $14 millions
How did he do it? Social Engineering Ex: Our Mumbai server is down. Please click the standby server
SQL Injections Let us consider the following line in an ASP script Query=“select count(*) from users where UserName=‘” &userName&” ‘ and userPass=‘ “&password&”’”
Let Username as Ram and password as ‘ or 1=1 – Now created SQL statement becomes: Select count(*) from users where userName=‘Ram’ and userPass=‘’ or 1=1 –’ Thus checks for empty password
Similarly let username as: ‘having 1=1 – Dsiplays users.UserName is invalid indicating table name and attribute name
Now username is ‘or users.userName like ‘admin%’ – Now he can login as Admin!!
May give chance to run multiple SQL statements; For example username as: ‘or 1=1; drop table users; -- ‘; shutdown with nowait; -- May give chance to run extended scripts: ‘exec master .. Xp_cmdshell ‘iisreset’; --
Monitoring bounced emails, account activity, call volumes, password eqnuiries
SPAMS • Search engines • Addresses posted in public areas such as USENET • Email directories, Yellow Pages • Readymade lists (for sale!) • Chat rooms • Bruteforce attacks
How to tackle SPAMS • Content based filtering Pattern Matching Hash Matching Bayesian filtering • Source address based filtering
Source Address Filtering • White lists • Block lists • Reputation analysis • Real time block hole lists • Challenge-Response
How to STOP SPAM -Cont • SMTP server Implementing • Should not relay unauthorized mails • Separate ports for submission and relay • Implement client authentication • Disable SMTP commands like VRFY • Prevent remote mails to local groups • Define max no of receipients per message • Reject NULL sender identity • Digital signatures
DNS Components of DNS • DNS Zones • DNS Name Space • Resource Records • Name Servers