cnt4406/5412 network security - computer science,...

57
CNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 35

Upload: others

Post on 19-Jun-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

CNT4406/5412 Network SecurityIntroduction

Zhi Wang

Florida State University

Fall 2014

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 35

Page 2: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Introduction

What is Security?

Protecting information and information systems from unauthorized access,use, disclosure, disruption, modification, or destruction in order to provideintegrity, confidentiality, and availability

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 2 / 35

Page 3: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Introduction

Integrity

Guarding against improper information modification or destruction,and includes ensuring information nonrepudiation and authenticityà e.g., data integrity, code integrity

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 35

Page 4: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Introduction

Confidentiality

Preserving authorized restrictions on access and disclosure, includingmeans for protecting personal privacy and proprietary informationà e.g., secrecy, privacy

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 4 / 35

Page 5: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Introduction

Availability

Ensuring timely and reliable access to and use of information

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 35

Page 6: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Introduction

Security and CIA

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 35

Page 7: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking Saga

VS.

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 7 / 35

Page 8: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Who is Anonymous

Anonymous is a loosely associated hacktivist groupà originated on the imageboard 4chan in 2003à associated with collaborative hacktivism since 2008à responsible for many high-profile attacks:

DDOS attacks against IFPI, MPAA for file sharing site closure,VISA, MasterCard and PayPal to support WikiLeaks

à named by Time as one of the most influential people in 2012

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 8 / 35

Page 9: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Who is HBGary

HBGary is a security companyà founded by Greg Hoglund (rootkit.com) in 2003à it had two firms, HBGary and HBGary Federalà HBF was led by Aaron Barr focusing on the U.S federal government

HBGary was sold to ManTech after being hacked

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 35

Page 10: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Who is HBGary

HBGary is a security companyà founded by Greg Hoglund (rootkit.com) in 2003à it had two firms, HBGary and HBGary Federalà HBF was led by Aaron Barr focusing on the U.S federal governmentHBGary was sold to ManTech after being hacked

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 35

Page 11: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

What Happened

Anonymous poses serious security threats

Aaron claimed to have unmasked Anonymous “members” bycorrelating social media in early 2011à proposed a talk titled “who needs NSA when we have socialmedia?” at the B-Sides conference to sell his ideaà intended to sell his list to FBIAnonymous compromised the HBGary in Feb 2011à compromised the websitesà posted lots of documents and emails onlineà usurped Aaron’s Twitter

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 10 / 35

Page 12: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

What Happened

Anonymous poses serious security threatsAaron claimed to have unmasked Anonymous “members” bycorrelating social media in early 2011à proposed a talk titled “who needs NSA when we have socialmedia?” at the B-Sides conference to sell his ideaà intended to sell his list to FBI

Anonymous compromised the HBGary in Feb 2011à compromised the websitesà posted lots of documents and emails onlineà usurped Aaron’s Twitter

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 10 / 35

Page 13: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

What Happened

Anonymous poses serious security threatsAaron claimed to have unmasked Anonymous “members” bycorrelating social media in early 2011à proposed a talk titled “who needs NSA when we have socialmedia?” at the B-Sides conference to sell his ideaà intended to sell his list to FBIAnonymous compromised the HBGary in Feb 2011à compromised the websitesà posted lots of documents and emails onlineà usurped Aaron’s Twitter

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 10 / 35

Page 14: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Steps of an Attack

Reconnoiter to identify vulnerabilitiesà software configuration, network topologic, servers...Exploit vulnerabilities to take over (own) systemsà SQL injection, buffer overflow, format string vulnerability...Harvest information, install malware/backdoorsà document, design, email...Cover it up: files, logs...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Page 15: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Steps of an Attack

Reconnoiter to identify vulnerabilities

à software configuration, network topologic, servers...Exploit vulnerabilities to take over (own) systemsà SQL injection, buffer overflow, format string vulnerability...Harvest information, install malware/backdoorsà document, design, email...Cover it up: files, logs...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Page 16: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Steps of an Attack

Reconnoiter to identify vulnerabilitiesà software configuration, network topologic, servers...

Exploit vulnerabilities to take over (own) systemsà SQL injection, buffer overflow, format string vulnerability...Harvest information, install malware/backdoorsà document, design, email...Cover it up: files, logs...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Page 17: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Steps of an Attack

Reconnoiter to identify vulnerabilitiesà software configuration, network topologic, servers...Exploit vulnerabilities to take over (own) systems

à SQL injection, buffer overflow, format string vulnerability...Harvest information, install malware/backdoorsà document, design, email...Cover it up: files, logs...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Page 18: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Steps of an Attack

Reconnoiter to identify vulnerabilitiesà software configuration, network topologic, servers...Exploit vulnerabilities to take over (own) systemsà SQL injection, buffer overflow, format string vulnerability...

Harvest information, install malware/backdoorsà document, design, email...Cover it up: files, logs...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Page 19: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Steps of an Attack

Reconnoiter to identify vulnerabilitiesà software configuration, network topologic, servers...Exploit vulnerabilities to take over (own) systemsà SQL injection, buffer overflow, format string vulnerability...Harvest information, install malware/backdoorsà document, design, email...

Cover it up: files, logs...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Page 20: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Steps of an Attack

Reconnoiter to identify vulnerabilitiesà software configuration, network topologic, servers...Exploit vulnerabilities to take over (own) systemsà SQL injection, buffer overflow, format string vulnerability...Harvest information, install malware/backdoorsà document, design, email...Cover it up: files, logs...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Page 21: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Reconnaissance

Hbgaryfederal.com was powered by a third-party CMS with SQLinjection vulnerabilitiesà an example of the SQL inject vulnerability:

statement = “SELECT * FROM users WHERE name = ‘” + userName + “’;”userName = “’ or ‘1’=‘1’ - - ’”→ SELECT * FROM users WHERE name = ‘’ OR ’1’=’1’ - - ’;

à The vulnerable URL is:http://www.hbgaryfederal.com/pages.php?pageNav=2&page=27User database was retrieved from CMS:à CMS admins’ usernames, email addresses, and password hashes

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 35

Page 22: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Reconnaissance

Hbgaryfederal.com was powered by a third-party CMS with SQLinjection vulnerabilitiesà an example of the SQL inject vulnerability:

statement = “SELECT * FROM users WHERE name = ‘” + userName + “’;”userName = “’ or ‘1’=‘1’ - - ’”→ SELECT * FROM users WHERE name = ‘’ OR ’1’=’1’ - - ’;

à The vulnerable URL is:http://www.hbgaryfederal.com/pages.php?pageNav=2&page=27

User database was retrieved from CMS:à CMS admins’ usernames, email addresses, and password hashes

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 35

Page 23: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Reconnaissance

Hbgaryfederal.com was powered by a third-party CMS with SQLinjection vulnerabilitiesà an example of the SQL inject vulnerability:

statement = “SELECT * FROM users WHERE name = ‘” + userName + “’;”userName = “’ or ‘1’=‘1’ - - ’”→ SELECT * FROM users WHERE name = ‘’ OR ’1’=’1’ - - ’;

à The vulnerable URL is:http://www.hbgaryfederal.com/pages.php?pageNav=2&page=27User database was retrieved from CMS:à CMS admins’ usernames, email addresses, and password hashes

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 35

Page 24: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Password Cracking

Three properties of an ideal cryptographic hash function:à one-way property:

given h, it’s infeasible to find m with h = H(m)

à weak collision resistance:given m1, it’s infeasible to find m2 with H(m1) = H(m2)

à strong collision resistance:it’s infeasible to find m1 and m2 with H(m1) = H(m2)

Brutal force is the main method to guess passwords

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 35

Page 25: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Password Cracking

Three properties of an ideal cryptographic hash function:à one-way property:

given h, it’s infeasible to find m with h = H(m)à weak collision resistance:

given m1, it’s infeasible to find m2 with H(m1) = H(m2)

à strong collision resistance:it’s infeasible to find m1 and m2 with H(m1) = H(m2)

Brutal force is the main method to guess passwords

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 35

Page 26: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Password Cracking

Three properties of an ideal cryptographic hash function:à one-way property:

given h, it’s infeasible to find m with h = H(m)à weak collision resistance:

given m1, it’s infeasible to find m2 with H(m1) = H(m2)à strong collision resistance:

it’s infeasible to find m1 and m2 with H(m1) = H(m2)

Brutal force is the main method to guess passwords

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 35

Page 27: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Password Cracking

Three properties of an ideal cryptographic hash function:à one-way property:

given h, it’s infeasible to find m with h = H(m)à weak collision resistance:

given m1, it’s infeasible to find m2 with H(m1) = H(m2)à strong collision resistance:

it’s infeasible to find m1 and m2 with H(m1) = H(m2)

Brutal force is the main method to guess passwords

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 35

Page 28: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Password Cracking

Brute-forcing passwords has never been easierà more than 100 million real-world passwords are leakedà real-world passwords instead of words in a dictionaryà patterns in password constructionà Rainbow tables, pre-computed hashes, are widely availableà super computing power is cheap and available: cloud, GPGPU

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 14 / 35

Page 29: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Password Insecurity

Weak passwordsà CEO and COO of HBF uses weak passwords in a rainbow table

Password reuseà average web user has 25 accounts, but uses just 6.5 passwordsà both CEO and COO reuse the passwords across their accountsà Aaron (CEO) is the Google Apps (email) administrator→ access to anyone’s email, including Greg Hoglund

Public key authentication is not used for SSH by Aaron

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 35

Page 30: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Password Insecurity

Weak passwordsà CEO and COO of HBF uses weak passwords in a rainbow tablePassword reuseà average web user has 25 accounts, but uses just 6.5 passwordsà both CEO and COO reuse the passwords across their accountsà Aaron (CEO) is the Google Apps (email) administrator→ access to anyone’s email, including Greg Hoglund

Public key authentication is not used for SSH by Aaron

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 35

Page 31: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Password Insecurity

Weak passwordsà CEO and COO of HBF uses weak passwords in a rainbow tablePassword reuseà average web user has 25 accounts, but uses just 6.5 passwordsà both CEO and COO reuse the passwords across their accountsà Aaron (CEO) is the Google Apps (email) administrator→ access to anyone’s email, including Greg Hoglund

Public key authentication is not used for SSH by Aaron

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 35

Page 32: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Host Insecurity

Privilege-escalation vulnerabilitiesà the attacker owned an unprivileged account by a reused passwordà he then owned the system by exploiting such a vulnerability:

GNU dynamic linker expands $ORIGIN in library search pathfor setuid applications

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 35

Page 33: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Social Engineering

Authentic information was used to bypass authenticationà Grey Hoglund is the creator of rootkit.comà Grey’s email is compromised, which allows to impersonate himà His compromised email leaked two pieces of information:

the hashes of the root password in rootkit.comJussi at Nokia has root access to rootkit.com

Jussi was convinced and handed over Grey’s accountà he authenticated “Grey” by shared secretà the attack was claimed to be executed by a teenage girl

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 35

Page 34: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Social Engineering

Authentic information was used to bypass authenticationà Grey Hoglund is the creator of rootkit.comà Grey’s email is compromised, which allows to impersonate himà His compromised email leaked two pieces of information:

the hashes of the root password in rootkit.comJussi at Nokia has root access to rootkit.com

Jussi was convinced and handed over Grey’s accountà he authenticated “Grey” by shared secret

à the attack was claimed to be executed by a teenage girl

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 35

Page 35: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

The HBGary Hacking: Social Engineering

Authentic information was used to bypass authenticationà Grey Hoglund is the creator of rootkit.comà Grey’s email is compromised, which allows to impersonate himà His compromised email leaked two pieces of information:

the hashes of the root password in rootkit.comJussi at Nokia has root access to rootkit.com

Jussi was convinced and handed over Grey’s accountà he authenticated “Grey” by shared secretà the attack was claimed to be executed by a teenage girl

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 35

Page 36: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

More Security Incidents

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 18 / 35

Page 37: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction The HBGary Hacking Saga

Surveillance State

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 19 / 35

Page 38: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Course Mechanisms

In This Course

Explore fundamental issues that cause this insecurity from bothnetwork and systems POV

Explain defense mechanisms that mitigate these issuesCover the topics of: cryptography, hashes and message digests, publickey cryptography, important standards such as PKI, SSL, SSH, andIPSec, operating system security

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 20 / 35

Page 39: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Course Mechanisms

In This Course

Explore fundamental issues that cause this insecurity from bothnetwork and systems POVExplain defense mechanisms that mitigate these issues

Cover the topics of: cryptography, hashes and message digests, publickey cryptography, important standards such as PKI, SSL, SSH, andIPSec, operating system security

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 20 / 35

Page 40: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Course Mechanisms

In This Course

Explore fundamental issues that cause this insecurity from bothnetwork and systems POVExplain defense mechanisms that mitigate these issuesCover the topics of: cryptography, hashes and message digests, publickey cryptography, important standards such as PKI, SSL, SSH, andIPSec, operating system security

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 20 / 35

Page 41: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Course Mechanisms

You Should Know

TCP/IP networkingOperating systems architecture and designà e.g., virtual memory, file systems, networking,...Discrete mathematics

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 21 / 35

Page 42: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Course Mechanisms

Course Materials

Course website: http://www.cs.fsu.edu/∼zwang/cnt5412.htmlà course schedules, assignments, slides,Course textbookà Kaufman, C., Perlman, R., and Speciner, M., Network Security: PrivateCommunication in a Public World, 2nd Edition, Prentice Hall 2002

Office hour: Monday 2:30-4:30pm, or by appointmentà come to the office hour for help!

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 22 / 35

Page 43: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Course Mechanisms

Grading

item percentagehomework 30%project 30%midterm 30%quizzes 10%

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 23 / 35

Page 44: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction Course Mechanisms

Course Policy

Academic honor policy: zero-tolerance for cheatinghttp://academichonor.fsu.eduEthics: act responsibly in security practicesDisabilities: contact the instructor for accommodation

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 24 / 35

Page 45: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

OSI Reference Model

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 25 / 35

Page 46: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

Network Security Layers

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 26 / 35

Page 47: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

Data Encapsulation/Fragmentation

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 27 / 35

Page 48: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

IP Header

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 28 / 35

Page 49: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

TCP Header

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 29 / 35

Page 50: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

TCP State Machine

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 30 / 35

Page 51: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

Active and Passive Attack

Passive attack: intruder eavesdrops, but does not modify the messageà unencrypted messages, side channel attacks (tax, health)

Active attack: intruder may transmit, replay, modify, delete messagesà man-in-the-middle, Denial-of-service

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 31 / 35

Page 52: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

Active and Passive Attack

Passive attack: intruder eavesdrops, but does not modify the messageà unencrypted messages, side channel attacks (tax, health)Active attack: intruder may transmit, replay, modify, delete messagesà man-in-the-middle, Denial-of-service

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 31 / 35

Page 53: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

Denial-of-Service (DOS) Attack

Exploit legitimate behavior or vulnerabilities with crafted packetsà E-Mail bomb: sending auto-generated emails to victimà smurf: sending ICMP echo (ping) traffic to IP broadcast addresswith a spoofed source address of a victimà tear drop: overlapping (fragmented) packetsà SYN flood: sending lots of TCP SYN packets

Launch Distributed DOS (DDOS) with botnets

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 32 / 35

Page 54: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

Denial-of-Service (DOS) Attack

Exploit legitimate behavior or vulnerabilities with crafted packetsà E-Mail bomb: sending auto-generated emails to victimà smurf: sending ICMP echo (ping) traffic to IP broadcast addresswith a spoofed source address of a victimà tear drop: overlapping (fragmented) packetsà SYN flood: sending lots of TCP SYN packetsLaunch Distributed DOS (DDOS) with botnets

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 32 / 35

Page 55: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

Personae

Alice: first participantBob, Carol, Dave: second, third, fourth participant

Eve: eavesdropperTrudy: malicious active attacker

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 33 / 35

Page 56: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

Secure Communication

Secrecy: Alice can send a message to Bob only he can readAuthentication: Bob knows for sure that Alice sent itNonrepudiation : Alice can’t deny she sent the message

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 34 / 35

Page 57: CNT4406/5412 Network Security - Computer Science, FSUzwang/files/cnt5412/fall2014/Lec1.pdfCNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi

Introduction A Primer on Networking

Summary

What is securityReal-world attacksCourse mechanismsA primer of networking

Next lecture: Introduction to cryptography

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 35 / 35