ethical hacking chapter 3 - network and computer attacks - eric vanderburg

28
Ethical Hacking CHAPTER 3 – NETWORK AND COMPUTER ATTACKS ERIC VANDERBURG

Upload: eric-vanderburg

Post on 02-Nov-2014

53 views

Category:

Technology


2 download

DESCRIPTION

Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg

TRANSCRIPT

Page 1: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

Ethical HackingCHAPTER 3 – NETWORK AND COMPUTER ATTACKS

ERIC VANDERBURG

Page 2: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

2Objectives

Describe the different types of malicious software

Describe methods of protecting against malware attacks

Describe the types of network attacks

Identify physical security attacks and vulnerabilities

Page 3: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

3Malicious Software (Malware)

Network attacks prevent a business from operating Malicious software (Malware) includes

Virus Worms Trojan horses

Goals Destroy data Corrupt data Shutdown a network or system

Page 4: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

4Viruses

Virus attaches itself to an executable file

Can replicate itself through an executable program Does not stand on its own

Needs a host program

No foolproof method of preventing them

Use antivirus programs for detection Detection based on virus signatures

Must update signature database periodically

Use automatic update feature if available

Page 5: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

5Viruses (continued)

Encoding base 64 used to reduce size of e-mail attachments Represents 0 to 63 using six bits

A is 000000 … Z is 011001

Converting base 64 strings to decimal equivalent Create groups of 4 characters, for each group

Convert decimal value of each letter to binary

Rewrite as three groups of eight bits

Convert the binary into decimal

Page 6: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

6Viruses (continued)

Commercial base 64 decoders

Shell Executable piece of programming code

Should not appear in an e-mail attachment

Page 7: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

7Macro Viruses

Virus encoded as a macro Macro

Lists of commands Can be used in destructive ways

Example: Melissa Appeared in 1999

Even nonprogrammers can create macro viruses Instructions posted on Web sites

Security professionals can learn from thinking like attackers

Page 8: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

8Worms

Worm Replicates and propagates without a host

Infamous examples Code Red Nimda

Can infect every computer in the world in a short time At least in theory

Actual examples Cyberattacks against ATM machines Slammer and Nachi worms

Page 9: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

9Trojan Programs

Insidious attack against networks Disguise themselves as useful programs

Hide malicious content in program Backdoors

Rootkits

Allow attackers remote access

Firewalls Identify traffic on uncommon ports Can block this type of attack

Trojan programs can use known ports HTTP (TCP 80) or DNS (UDP 53)

Page 10: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

10Spyware

Sends information from the infected computer to the attacker Confidential financial data Passwords PINs Any other stored data

Can registered each keystroke entered Prevalent technology Educate users about spyware

Page 11: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

11Adware

Similar to spyware Can be installed without the user being aware

Sometimes displays a banner

Main goal Determine user’s online purchasing habits

Tailored advertisement

Main problem Slows down computers

Page 12: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

12Protecting Against Malware Attacks

Difficult task

New viruses, worms, Trojan programs appear daily

Malware detected using antivirus solutions

Educate your users about these types of attacks

Page 13: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

13Educating Your Users

Structural training Most effective measure

Includes all employees and management

E-mail monthly security updates Simple but effective training method

Recommend that users update virus signature database Activate automatic updates

Page 14: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

14Educating Your Users

SpyBot and Ad-Aware Help protect against spyware and adware

Firewalls Hardware (enterprise solution)

Software (personal solution)

Can be combined

Intrusion Detection System (IDS) Monitors your network 24/7

Page 15: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

15Avoiding Fearing Tactics

Avoid scaring users into complying with security measures

Sometimes used by unethical security testers Against the OSSTMM’s Rules of Engagement

Promote awareness rather than instilling fear Users should be aware of potential threats

During training Build on users’ knowledge

Make training easier

Page 16: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

16Intruder Attacks on Networks and Computers

Attack Any attempt by an unauthorized person to access or use network

resources

Network security Concern with security of network resources

Computer security Concerned with the security of a computer not part of a network

infrastructure

Computer crime Fastest growing type of crime worldwide

Page 17: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

17Denial-of-Service Attacks

Denial-of-Service (DoS) attack Prevents legitimate users from accessing network resources

Some forms do not involve computers

Attacks do not attempt to access information Cripple the network

Make it vulnerable to other type of attacks

Performing an attack yourself is not wise Only need to prove attack could be carried out

Page 18: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

18Distributed Denial-of-Service Attacks

Attack on a host from multiple servers or workstations

Network could be flooded with billions of requests Loss of bandwidth

Degradation or loss of speed

Often participants are not aware they are part of the attack Attacking computers could be controlled using Trojan programs

Page 19: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

19Buffer Overflow Attacks

Vulnerability in poorly written code Code does not check predefined size of input field

Goal Fill overflow buffer with executable code

OS executes this code

Code elevates attacker’s permission

Administrator

Owner of running application

Train your programmer in developing applications with security in mind

Page 20: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

20Ping of Death Attacks

Type of DoS attack

Not as common as during the late 1990s

How it works Attacker creates a large ICMP packet

More than 65,535 bytes

Large packet is fragmented at source network

Destination network reassembles large packet

Destination point cannot handle oversize packet and crashes

Page 21: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

21Session Hijacking

Enables attacker to join a TCP session

Attacker makes both parties think he or she is the other party

Page 22: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

Hands-O

n Ethical H

acking and Netw

ork Defense

22Addressing Physical Security

Protecting a network also requires physical security

Inside attacks are more likely than attacks from outside the company

Page 23: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

23Keyloggers

Used to capture keystrokes on a computer Hardware

Software

Software Behaves like Trojan programs

Hardware Easy to install

Goes between the keyboard and the CPU

KeyKatcher and KeyGhost

Page 24: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

24Keyloggers (continued)

Protection Software-based

Antivirus

Hardware-based

Random visual tests

Page 25: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

25Behind Locked Doors

Lock up your servers

Average person can pick deadbolt locks in less than five minutes After only a week or two of practice

Experienced hackers can pick deadbolt locks in under 30 seconds

Rotary locks are harder to pick

Keep a log of who enters and leaves the room

Security cards can be used instead of keys for better security

Page 26: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

26Summary

Be aware of attacks on network infrastructures and standalone computers

Attacks can be perpetrated by insiders or remote attackers

Malicious software Virus

Worm

Trojan programs

Spyware

Adware

Page 27: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

27Summary (continued)

Attacks Denial-of-Service (DoS)

Distributed Denial-of-Service (DDoS)

Buffer overflow

Ping of Death

Session hijacking

Page 28: Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg

28Summary (continued)

Physical security As important as network or computer security

Keyloggers

Software-based

Hardware-based

Locks

Choose hard-to-pick locks

Security cards