720 likes | 819 Views
SYP: Network Security . Security. Why is it important to understand how attacks work ? Golden Age of Hacking How bad is the problem? How did this happen?. Security Breach Example. 2003 group of hackers were “testing” security of various banks and noticed that one was extremely vulnerable
E N D
Security • Why is it important to understand how attacks work ? • Golden Age of Hacking • How bad is the problem? • How did this happen?
Security Breach Example • 2003 group of hackers were “testing” security of various banks and noticed that one was extremely vulnerable • Within a couple of hours, they transferred over $10 million dollars from the bank to a private account • Due to bank’s poor network security, attackers tracks were difficult to find • To ensure no prosecution, hackers contacted bank president and gave two options: • Bank could prosecute, but attackers would deny everything and notify media on bank’s poor security • Sign proposal indicating that hacker’s were forming a security assessment at bank’s request for $5 million dollars and hackers would then return the other $5 million. • What choice do you think the bank president chose?
Organizational Problems • Why companies don’t report attacks • Ignorance • Bad publicity • Cost and ineffectiveness of Fixing Existing Systems • Intangible Nature of Security Benefits
The Attacker’s Process • Many ways an attacker can gain access or exploit a system • Some basic steps that hackers follow: • Passive reconnaissance • Active reconnaissance (scanning) • Exploiting the system • Uploading programs • Downloading data • Keeping access by using backdoors and trojan horses • Covering tracks
Passive Reconnaissance • To exploit a system an attacker must have some general information about the user or company • Information gathering • Sniffing
Active Reconnaissance • At this point, an attacker has enough information to try active probing or scanning against a site. • Key information that an attacker will try to discover: • Hosts that are accessible • Locations of routers and firewalls • Operating systems running on key components • Ports that are open • Services that are running • Versions of applications that are running
Exploiting the System • 3 areas to exploit on a system: • Gaining access • Operating system attacks • Application-level attacks • Scripts and sample program attacks • Misconfiguration attacks • Elevation of privileges • Denial of service
Uploading and Downloading Programs • After an attacker has gained access, they usually perform some set of actions on the server. • Most often, hacker will load some programs to the system. • With some attacks, such as corporate espionage, an attacker is after information
Keeping Access • Most cases, after attacker gains access to a system, he will put a back door so that he can return whenever he wants. • Basic back door: are highly detectable • Sophisticated back door: more difficult to detect • Gaining access to the system and create a back door simultaneously
Covering Tracks • After an attacker compromises a machine and creates a back door, the last thing he does is make certain that he does not get caught • Clean up log files • Turn off logging • To protect against hackers – use a program that makes sure key files on the system have not been changed
Information Gathering • Many companies only concentrate on protecting their systems from a specific exploit when they start building a security infrastructure • Key for a user or organization to know what information an attacker can acquire about them and minimize the potential damage • If the attacker can only gain limited information about the network, they will most likely move on to the next victim
Step 1 Gathering Initial Information • Find out initial information: • Open Source • Whois • Nslookup
Step 2: Discover address range of the network • Find out address range of the network: • ARIN (American Registry for Internet Numbers) • Traceroute
Step 3 Discovering Active Machines • Find active machines: • Ping
Step 4Find Open Ports or Access Points • Applications used to find open ports or access points: • Portscanners • Nmap • ScanPort • War Dialers • THC-Scan
Step 5Figure Out the Operating System • Tools used to determine Operating Systems • Queso • Nmap
Step 6: Figure Out Which Services are Running on Each Port • Tools used to determine which services are running on each port • Default port and OS • Telnet • Vulnerability scanners
Step 7 Map Out the Network • Tools used to map out the network • Traceroute • Visual Ping • Cheops
Types of Spoofing • Types of Spoofing Techniques • IP Spoofing • Email Spoofing • Web Spoofing • Non-Technical Spoofing
IP Spoofing • Basic Address Change • Protection Against Address Changes
IP Spoofing Continued • Source Routing • Allows you to specify the path a packet will take through the Internet • Types: • Loose Source Routing (LSR) • Strict Source Routing (SSR) • Protection Against Source Routing
IP Spoofing Continued • Trust Relationships • Protection Against Trust Relationships
EMAIL Spoofing • Similar Email Address • Protection Against Similar Email Address
EMAIL Spoofing • Modifying a Mail Client • Protection Against Modifying a Mail Client
EMAIL Spoofing • Telnet to Port 25 • Protection Against Telnetting to Port 25
Web Spoofing • Basic Web Spoofing • Protection Against Basic Web Spoofing
Web Spoofing • Man-in-the-Middle Attacks • Protection Against Man-in-the-Middle Attacks
Web Spoofing • URL Rewriting • Protection Against URL Rewriting From Anonymizer.com
Web Spoofing Tracking State: • Cookies • Protection Against Cookies
Web Spoofing Tracking State: • URL Session Tracking • Protection Against URL Session Tracking
Web Spoofing Tracking State: • Hidden Form Elements • Protection Against Hidden Form Elements
General Web Spoofing Protection • Disable JavaScript, ActiveX, etc. • Validate that application is properly tracking users • Make certain users can’t customize their browsers to display important information • Educate the users • Make certain that any form of ID used to track user is long and random
Non-Technical Spoofing • Social Engineering • Reverse Social Engineering • Non-Technical Spoofing Protection
What is a DOS Attack? • Attack through which a person can render a system unusable or significantly reduced by overloading the system’s resources • DOS attacks can be intentional or accidental • Often used by an attacker if they are unable to gain access to a network or machine
Some Types of DOS Attacks • Ping of Death • SSPing • Smurf • CPU Hog
Typical Attack • Two of the most common weaknesses on computer systems: • Weak Passwords • Modems
Current State of Passwords • Current state of passwords in most companies and home systems are poor • Software often has default passwords that are rarely changed • Passwords are often chosen that are trivial to guess or have no password at all • Password intervals are too long
History of Passwords • Users often choose simple passwords • Wife’s name • Favorite sport • Date of user’s birthday • Complex passwords are often written down since they are difficult to remember • Ex: W#hg@5d4%d10
Future of Passwords • Single Sign On (SSO) • One password for user’s various applications • Biometrics • Fingerprint scan • Hand scan • Retinal scan • Facial scan • Voice scan
Strong Passwords • Subject to technology • Strong Password criteria: • Changes every 45 days • Minimum length of 10 characters • Must contain at least on alpha, one number, and one special character • Alpha, number, and special characters must be mixed up and not append to the end • Ex: abdheus#7 = Bad • Ex: fg#g3^hs5gw = Good • Cannot contain dictionary workds • Cannot reuse previous five passwords • Minimum password age of 10 days • After 3 failed logon attempts, password is locked for several hours
Why is Password Cracking Important? • To audit the strength of passwords • To recover forgotten/unknown passwords • To migrate users • To use a checks and balance system
Types of Password Attacks • Dictionary Attacks • Brute Force Attacks • Hybrid Attacks • Social Engineering Attacks
Where Are Passwords Stored in Microsoft? • Password hashes for each account are stored in the Security Account Manager (SAM) • \Windows-directory\system32\config\SAM • \Windows-directory\repair
How Does MS Encrypt Passwords? • 2 hash algorithms • One for regular NT hash • MD4 hash algorithm • One for LANMAN hash • Pad password with 0’s to equal 14 character • Combined to attain 16-byte hash value