SlideShare a Scribd company logo
Hands-On EthicalHands-On Ethical
Hacking and NetworkHacking and Network
DefenseDefense
Chapter 3Chapter 3
Network and Computer AttacksNetwork and Computer Attacks
2
ObjectivesObjectives
Describe the different types of maliciousDescribe the different types of malicious
softwaresoftware
Describe methods of protecting againstDescribe methods of protecting against
malware attacksmalware attacks
Describe the types of network attacksDescribe the types of network attacks
Identify physical security attacks andIdentify physical security attacks and
vulnerabilitiesvulnerabilities
3
Malicious Software (Malware)Malicious Software (Malware)
Network attacks prevent a business fromNetwork attacks prevent a business from
operatingoperating
Malicious software (Malware) includesMalicious software (Malware) includes

VirusVirus

WormsWorms

Trojan horsesTrojan horses
GoalsGoals

Destroy dataDestroy data

Corrupt dataCorrupt data

Shutdown a network or systemShutdown a network or system
4
VirusesViruses
Virus attaches itself to an executable fileVirus attaches itself to an executable file
Can replicate itself through an executableCan replicate itself through an executable
programprogram

Needs a host program to replicateNeeds a host program to replicate
No foolproof method of preventing themNo foolproof method of preventing them
5
Antivirus SoftwareAntivirus Software
Detects and removes virusesDetects and removes viruses
Detection based on virus signaturesDetection based on virus signatures
Must update signature database periodicallyMust update signature database periodically
Use automatic update featureUse automatic update feature
6
7
Base 64 EncodingBase 64 Encoding
Used to evade anti-spam tools, and toUsed to evade anti-spam tools, and to
obscure passwordsobscure passwords
Encodes six bits at a time (0 – 64) with aEncodes six bits at a time (0 – 64) with a
single ASCII charactersingle ASCII character

A - Z:A - Z: 0 – 250 – 25

a – z:a – z: 26 – 5126 – 51

1 – 9:1 – 9: 52 – 6152 – 61

+ and -+ and - 62 and 6362 and 63
See links Ch 3a, 3bSee links Ch 3a, 3b
8
Viruses (continued)Viruses (continued)
Commercial base 64 decodersCommercial base 64 decoders
ShellShell

Executable piece of programming codeExecutable piece of programming code

Should not appear in an e-mail attachmentShould not appear in an e-mail attachment
9
Macro VirusesMacro Viruses
Virus encoded as a macroVirus encoded as a macro
MacroMacro

Lists of commandsLists of commands

Can be used in destructive waysCan be used in destructive ways
Example: MelissaExample: Melissa

Appeared in 1999Appeared in 1999

It is very simple – see link Ch 3c for sourceIt is very simple – see link Ch 3c for source
codecode
10
Writing VirusesWriting Viruses
Even nonprogrammersEven nonprogrammers
can create macro virusescan create macro viruses

Instructions posted onInstructions posted on
Web sitesWeb sites

Virus creation kits available forVirus creation kits available for
download (see link Ch 3d)download (see link Ch 3d)
Security professionals can learnSecurity professionals can learn
from thinking like attackersfrom thinking like attackers

But don’t create and release a virus!But don’t create and release a virus!
People get long prison terms for that.People get long prison terms for that.
11
WormsWorms
WormWorm

Replicates and propagates without a hostReplicates and propagates without a host
Infamous examplesInfamous examples

Code RedCode Red

NimdaNimda
Can infect every computer in the world inCan infect every computer in the world in
a short timea short time

At least in theoryAt least in theory
12
ATM Machine WormsATM Machine Worms

Cyberattacks against ATM machinesCyberattacks against ATM machines

Slammer and Nachi wormsSlammer and Nachi worms

Trend produces antivirus for ATM machinesTrend produces antivirus for ATM machines
See links Ch 3g, 3h, 3iSee links Ch 3g, 3h, 3i

Nachi was written to clean up damage causedNachi was written to clean up damage caused
by the Blaster worm, but it got out of controlby the Blaster worm, but it got out of control
See link Ch 3jSee link Ch 3j

Diebold was criticized for using Windows forDiebold was criticized for using Windows for
ATM machines, which they also use on votingATM machines, which they also use on voting
machinesmachines
13
14
15
Trojan ProgramsTrojan Programs
Insidious attack against networksInsidious attack against networks
Disguise themselves as useful programsDisguise themselves as useful programs

Hide malicious content in programHide malicious content in program
BackdoorsBackdoors
RootkitsRootkits

Allow attackers remote accessAllow attackers remote access
16
FirewallsFirewalls
Identify traffic on uncommon portsIdentify traffic on uncommon ports
Can block this type of attack, if yourCan block this type of attack, if your
firewall filters outgoing trafficfirewall filters outgoing traffic

Windows XP SP2’s firewall does not filterWindows XP SP2’s firewall does not filter
outgoing trafficoutgoing traffic

Vista’s firewall doesn’t either (by default),Vista’s firewall doesn’t either (by default),
according to link Ch 3l and 3maccording to link Ch 3l and 3m
Trojan programs can use known ports toTrojan programs can use known ports to
get through firewallsget through firewalls

HTTP (TCP 80) or DNS (UDP 53)HTTP (TCP 80) or DNS (UDP 53)
17
18
Trojan DemonstrationTrojan Demonstration
Make a file withMake a file with
command-line Windowscommand-line Windows
commandscommands
Save it asSave it as
C:Documents and SettingsC:Documents and Settings
usernameusernamecmd.batcmd.bat
Start, Run, CMD will execute this fileStart, Run, CMD will execute this file
instead ofinstead of
C:WindowsSystem32Cmd.exeC:WindowsSystem32Cmd.exe
19
Improved TrojanImproved Trojan
Resets the administrator passwordResets the administrator password
Almost invisible to userAlmost invisible to user
Works in Win XP, but not so easy in VistaWorks in Win XP, but not so easy in Vista
20
SpywareSpyware
Sends information from the infected computer toSends information from the infected computer to
the attackerthe attacker

Confidential financial dataConfidential financial data

PasswordsPasswords

PINsPINs

Any other stored dataAny other stored data
Can register each keystroke entered (keylogger)Can register each keystroke entered (keylogger)
Prevalent technologyPrevalent technology
Educate users about spywareEducate users about spyware
21
Deceptive Dialog BoxDeceptive Dialog Box
22
AdwareAdware
Similar to spywareSimilar to spyware

Can be installed without the user being awareCan be installed without the user being aware
Sometimes displays a bannerSometimes displays a banner
Main goalMain goal

Determine user’s online purchasing habitsDetermine user’s online purchasing habits

Tailored advertisementTailored advertisement
Main problemMain problem

Slows down computersSlows down computers
23
Protecting Against MalwareProtecting Against Malware
AttacksAttacks
Difficult taskDifficult task
New viruses, worms, Trojan programsNew viruses, worms, Trojan programs
appear dailyappear daily
Antivirus programs offer a lot of protectionAntivirus programs offer a lot of protection
Educate your users about these types ofEducate your users about these types of
attacksattacks
24
25
26
Educating Your UsersEducating Your Users
Structural trainingStructural training

Most effective measureMost effective measure

Includes all employees and managementIncludes all employees and management
E-mail monthly security updatesE-mail monthly security updates

Simple but effective training methodSimple but effective training method
Update virus signature databaseUpdate virus signature database
automaticallyautomatically
27
Educating Your UsersEducating Your Users
SpyBot and Ad-AwareSpyBot and Ad-Aware

Help protect against spyware and adwareHelp protect against spyware and adware

Windows Defender is excellent tooWindows Defender is excellent too
FirewallsFirewalls

Hardware (enterprise solution)Hardware (enterprise solution)

Software (personal solution)Software (personal solution)

Can be combinedCan be combined
Intrusion Detection System (IDS)Intrusion Detection System (IDS)

Monitors your network 24/7Monitors your network 24/7
28
FUDFUD
Fear, Uncertainty and DoubtFear, Uncertainty and Doubt

Avoid scaring users into complying with securityAvoid scaring users into complying with security
measuresmeasures

Sometimes used by unethical security testersSometimes used by unethical security testers

Against the OSSTMM’s Rules of EngagementAgainst the OSSTMM’s Rules of Engagement
Promote awareness rather than instillingPromote awareness rather than instilling
fearfear

Users should be aware of potential threatsUsers should be aware of potential threats

Build on users’ knowledgeBuild on users’ knowledge
29
Intruder Attacks on NetworksIntruder Attacks on Networks
and Computersand Computers
AttackAttack

Any attempt by an unauthorized person to access orAny attempt by an unauthorized person to access or
use network resourcesuse network resources
Network securityNetwork security

Security of computers and other devices in a networkSecurity of computers and other devices in a network
Computer securityComputer security

Securing a standalone computer--not part of a networkSecuring a standalone computer--not part of a network
infrastructureinfrastructure
Computer crimeComputer crime

Fastest growing type of crime worldwideFastest growing type of crime worldwide
30
Denial-of-Service AttacksDenial-of-Service Attacks
Denial-of-Service (DoS) attackDenial-of-Service (DoS) attack

Prevents legitimate users from accessingPrevents legitimate users from accessing
network resourcesnetwork resources

Some forms do not involve computers, likeSome forms do not involve computers, like
feeding a paper loop through a fax machinefeeding a paper loop through a fax machine
DoS attacks do not attempt to accessDoS attacks do not attempt to access
informationinformation

Cripple the networkCripple the network

Make it vulnerable to other type of attacksMake it vulnerable to other type of attacks
31
Testing for DoS VulnerabilitiesTesting for DoS Vulnerabilities
Performing an attack yourself is not wisePerforming an attack yourself is not wise

You only need to prove that an attack couldYou only need to prove that an attack could
be carried outbe carried out
32
Distributed Denial-of-ServiceDistributed Denial-of-Service
AttacksAttacks
Attack on a host from multiple servers orAttack on a host from multiple servers or
workstationsworkstations
Network could be flooded with billions ofNetwork could be flooded with billions of
requestsrequests

Loss of bandwidthLoss of bandwidth

Degradation or loss of speedDegradation or loss of speed
Often participants are not aware they areOften participants are not aware they are
part of the attackpart of the attack

Attacking computers could be controlled usingAttacking computers could be controlled using
Trojan programsTrojan programs
33
Buffer Overflow AttacksBuffer Overflow Attacks
Vulnerability in poorly written codeVulnerability in poorly written code

Code does not check predefined size of inputCode does not check predefined size of input
fieldfield
GoalGoal

Fill overflow buffer with executable codeFill overflow buffer with executable code

OS executes this codeOS executes this code

Can elevate attacker’s permission toCan elevate attacker’s permission to
Administrator or even KernelAdministrator or even Kernel
Programmers need special training toProgrammers need special training to
write secure codewrite secure code
34
35
36
Ping of Death AttacksPing of Death Attacks
Type of DoS attackType of DoS attack
Not as common as during the late 1990sNot as common as during the late 1990s
How it worksHow it works

Attacker creates a large ICMP packetAttacker creates a large ICMP packet
More than 65,535 bytesMore than 65,535 bytes

Large packet is fragmented at source networkLarge packet is fragmented at source network

Destination network reassembles large packetDestination network reassembles large packet

Destination point cannot handle oversize packet andDestination point cannot handle oversize packet and
crashescrashes

Modern systems are protected from this (Link Ch 3n)Modern systems are protected from this (Link Ch 3n)
37
Session HijackingSession Hijacking
Enables attacker to join a TCP sessionEnables attacker to join a TCP session
Attacker makes both parties think he orAttacker makes both parties think he or
she is the other partyshe is the other party
38
Addressing Physical SecurityAddressing Physical Security
Protecting a network also requiresProtecting a network also requires
physical securityphysical security
Inside attacks are more likely than attacksInside attacks are more likely than attacks
from outside the companyfrom outside the company
39
KeyloggersKeyloggers
Used to capture keystrokes on a computerUsed to capture keystrokes on a computer

HardwareHardware

SoftwareSoftware
SoftwareSoftware

Behaves like Trojan programsBehaves like Trojan programs
HardwareHardware

Easy to installEasy to install

Goes between the keyboard and the CPUGoes between the keyboard and the CPU

KeyKatcher and KeyGhostKeyKatcher and KeyGhost
40
41
42
Keyloggers (continued)Keyloggers (continued)
ProtectionProtection

Software-basedSoftware-based
AntivirusAntivirus

Hardware-basedHardware-based
Random visual testsRandom visual tests
Look for added hardwareLook for added hardware
Superglue keyboard connectors inSuperglue keyboard connectors in
43
Behind Locked DoorsBehind Locked Doors
Lock up your serversLock up your servers

Physical access means they can hack inPhysical access means they can hack in

Consider Ophcrack – booting to a CD-basedConsider Ophcrack – booting to a CD-based
OS will bypass almost any securityOS will bypass almost any security
44
LockpickingLockpicking
Average person can pick deadbolt locks inAverage person can pick deadbolt locks in
less than five minutesless than five minutes

After only a week or two of practiceAfter only a week or two of practice
Experienced hackers can pick deadboltExperienced hackers can pick deadbolt
locks in under 30 secondslocks in under 30 seconds
Bump keys are even easier (Link Ch 3o)Bump keys are even easier (Link Ch 3o)
45
Card Reader LocksCard Reader Locks
Keep a log of whoKeep a log of who
enters and leaves theenters and leaves the
roomroom
Security cards can beSecurity cards can be
used instead of keysused instead of keys
for better securityfor better security

Image from link Ch 3pImage from link Ch 3p

More Related Content

PPT
Network security and protocols
PPTX
Web security
PPTX
Introduction to IDS & IPS - Part 1
PPTX
Intrusion detection and prevention system
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPTX
Network attacks
PDF
VULNERABILITY ( CYBER SECURITY )
PPTX
Cyber security
Network security and protocols
Web security
Introduction to IDS & IPS - Part 1
Intrusion detection and prevention system
Computer Security and Intrusion Detection(IDS/IPS)
Network attacks
VULNERABILITY ( CYBER SECURITY )
Cyber security

What's hot (20)

PPT
Web security ppt sniper corporation
PPTX
Logging, monitoring and auditing
PPTX
CYBER SECURITY
PPTX
Cross Site Scripting ( XSS)
PPTX
CYBER SECURITY
PPS
Security testing
PPT
Introduction to Cyber Security
PDF
Access Control Presentation
PDF
Cyber Security and Cloud Computing
PPTX
Man in The Middle Attack
PPTX
DDoS - Distributed Denial of Service
PPT
DDOS Attack
PPTX
Malware Classification and Analysis
PPTX
Introduction to Cyber Security
PPT
Web Security
PPTX
Network security
PPTX
DDoS ATTACKS
PPT
DDoS Attacks
PPTX
Network security and viruses
Web security ppt sniper corporation
Logging, monitoring and auditing
CYBER SECURITY
Cross Site Scripting ( XSS)
CYBER SECURITY
Security testing
Introduction to Cyber Security
Access Control Presentation
Cyber Security and Cloud Computing
Man in The Middle Attack
DDoS - Distributed Denial of Service
DDOS Attack
Malware Classification and Analysis
Introduction to Cyber Security
Web Security
Network security
DDoS ATTACKS
DDoS Attacks
Network security and viruses
Ad

Similar to Ch03 Network and Computer Attacks (20)

PPT
Network Attacks
PPT
a documentation of final year SRS for AI drons.ppt
PPTX
Lecture 1-2.pptx
PPTX
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
PPT
list of Deception as well as detection techniques for maleware
PPTX
Basics of hacking
PPT
PDF
Lecture #12,#13 : Program and OS Security -Part I
PPTX
Computer security threats & prevention
PPTX
PPTX
(Training) Malware - To the Realm of Malicious Code
PDF
Form4 cd2
PPTX
Dickmaster
PDF
Identifying, Monitoring, and Reporting Malware
PPTX
Spyware presentation by mangesh wadibhasme
PPT
Lecture 5
PDF
IJSRED-V2I3P69
PPTX
Data security
PPT
easttom_ppt_05_final fundamentals (1).ppt
PPT
fundamental of security.is there any security problems..2024.ppt
Network Attacks
a documentation of final year SRS for AI drons.ppt
Lecture 1-2.pptx
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
list of Deception as well as detection techniques for maleware
Basics of hacking
Lecture #12,#13 : Program and OS Security -Part I
Computer security threats & prevention
(Training) Malware - To the Realm of Malicious Code
Form4 cd2
Dickmaster
Identifying, Monitoring, and Reporting Malware
Spyware presentation by mangesh wadibhasme
Lecture 5
IJSRED-V2I3P69
Data security
easttom_ppt_05_final fundamentals (1).ppt
fundamental of security.is there any security problems..2024.ppt
Ad

More from phanleson (20)

PDF
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Firewall - Network Defense in Depth Firewalls
PPT
Mobile Security - Wireless hacking
PPT
Authentication in wireless - Security in Wireless Protocols
PPT
E-Commerce Security - Application attacks - Server Attacks
PPT
Hacking web applications
PPTX
HBase In Action - Chapter 04: HBase table design
PPT
HBase In Action - Chapter 10 - Operations
PPT
Hbase in action - Chapter 09: Deploying HBase
PPTX
Learning spark ch11 - Machine Learning with MLlib
PPTX
Learning spark ch10 - Spark Streaming
PPTX
Learning spark ch09 - Spark SQL
PPT
Learning spark ch07 - Running on a Cluster
PPTX
Learning spark ch06 - Advanced Spark Programming
PPTX
Learning spark ch05 - Loading and Saving Your Data
PPTX
Learning spark ch04 - Working with Key/Value Pairs
PPTX
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
PPT
Lecture 1 - Getting to know XML
PPTX
Lecture 4 - Adding XTHML for the Web
Learning spark ch01 - Introduction to Data Analysis with Spark
Firewall - Network Defense in Depth Firewalls
Mobile Security - Wireless hacking
Authentication in wireless - Security in Wireless Protocols
E-Commerce Security - Application attacks - Server Attacks
Hacking web applications
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 10 - Operations
Hbase in action - Chapter 09: Deploying HBase
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch10 - Spark Streaming
Learning spark ch09 - Spark SQL
Learning spark ch07 - Running on a Cluster
Learning spark ch06 - Advanced Spark Programming
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch01 - Introduction to Data Analysis with Spark
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Lecture 1 - Getting to know XML
Lecture 4 - Adding XTHML for the Web

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
RMMM.pdf make it easy to upload and study
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
01-Introduction-to-Information-Management.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial diseases, their pathogenesis and prophylaxis
Abdominal Access Techniques with Prof. Dr. R K Mishra
RMMM.pdf make it easy to upload and study
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
human mycosis Human fungal infections are called human mycosis..pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Chinmaya Tiranga quiz Grand Finale.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
GDM (1) (1).pptx small presentation for students
Anesthesia in Laparoscopic Surgery in India
01-Introduction-to-Information-Management.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
O5-L3 Freight Transport Ops (International) V1.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF

Ch03 Network and Computer Attacks

  • 1. Hands-On EthicalHands-On Ethical Hacking and NetworkHacking and Network DefenseDefense Chapter 3Chapter 3 Network and Computer AttacksNetwork and Computer Attacks
  • 2. 2 ObjectivesObjectives Describe the different types of maliciousDescribe the different types of malicious softwaresoftware Describe methods of protecting againstDescribe methods of protecting against malware attacksmalware attacks Describe the types of network attacksDescribe the types of network attacks Identify physical security attacks andIdentify physical security attacks and vulnerabilitiesvulnerabilities
  • 3. 3 Malicious Software (Malware)Malicious Software (Malware) Network attacks prevent a business fromNetwork attacks prevent a business from operatingoperating Malicious software (Malware) includesMalicious software (Malware) includes  VirusVirus  WormsWorms  Trojan horsesTrojan horses GoalsGoals  Destroy dataDestroy data  Corrupt dataCorrupt data  Shutdown a network or systemShutdown a network or system
  • 4. 4 VirusesViruses Virus attaches itself to an executable fileVirus attaches itself to an executable file Can replicate itself through an executableCan replicate itself through an executable programprogram  Needs a host program to replicateNeeds a host program to replicate No foolproof method of preventing themNo foolproof method of preventing them
  • 5. 5 Antivirus SoftwareAntivirus Software Detects and removes virusesDetects and removes viruses Detection based on virus signaturesDetection based on virus signatures Must update signature database periodicallyMust update signature database periodically Use automatic update featureUse automatic update feature
  • 6. 6
  • 7. 7 Base 64 EncodingBase 64 Encoding Used to evade anti-spam tools, and toUsed to evade anti-spam tools, and to obscure passwordsobscure passwords Encodes six bits at a time (0 – 64) with aEncodes six bits at a time (0 – 64) with a single ASCII charactersingle ASCII character  A - Z:A - Z: 0 – 250 – 25  a – z:a – z: 26 – 5126 – 51  1 – 9:1 – 9: 52 – 6152 – 61  + and -+ and - 62 and 6362 and 63 See links Ch 3a, 3bSee links Ch 3a, 3b
  • 8. 8 Viruses (continued)Viruses (continued) Commercial base 64 decodersCommercial base 64 decoders ShellShell  Executable piece of programming codeExecutable piece of programming code  Should not appear in an e-mail attachmentShould not appear in an e-mail attachment
  • 9. 9 Macro VirusesMacro Viruses Virus encoded as a macroVirus encoded as a macro MacroMacro  Lists of commandsLists of commands  Can be used in destructive waysCan be used in destructive ways Example: MelissaExample: Melissa  Appeared in 1999Appeared in 1999  It is very simple – see link Ch 3c for sourceIt is very simple – see link Ch 3c for source codecode
  • 10. 10 Writing VirusesWriting Viruses Even nonprogrammersEven nonprogrammers can create macro virusescan create macro viruses  Instructions posted onInstructions posted on Web sitesWeb sites  Virus creation kits available forVirus creation kits available for download (see link Ch 3d)download (see link Ch 3d) Security professionals can learnSecurity professionals can learn from thinking like attackersfrom thinking like attackers  But don’t create and release a virus!But don’t create and release a virus! People get long prison terms for that.People get long prison terms for that.
  • 11. 11 WormsWorms WormWorm  Replicates and propagates without a hostReplicates and propagates without a host Infamous examplesInfamous examples  Code RedCode Red  NimdaNimda Can infect every computer in the world inCan infect every computer in the world in a short timea short time  At least in theoryAt least in theory
  • 12. 12 ATM Machine WormsATM Machine Worms  Cyberattacks against ATM machinesCyberattacks against ATM machines  Slammer and Nachi wormsSlammer and Nachi worms  Trend produces antivirus for ATM machinesTrend produces antivirus for ATM machines See links Ch 3g, 3h, 3iSee links Ch 3g, 3h, 3i  Nachi was written to clean up damage causedNachi was written to clean up damage caused by the Blaster worm, but it got out of controlby the Blaster worm, but it got out of control See link Ch 3jSee link Ch 3j  Diebold was criticized for using Windows forDiebold was criticized for using Windows for ATM machines, which they also use on votingATM machines, which they also use on voting machinesmachines
  • 13. 13
  • 14. 14
  • 15. 15 Trojan ProgramsTrojan Programs Insidious attack against networksInsidious attack against networks Disguise themselves as useful programsDisguise themselves as useful programs  Hide malicious content in programHide malicious content in program BackdoorsBackdoors RootkitsRootkits  Allow attackers remote accessAllow attackers remote access
  • 16. 16 FirewallsFirewalls Identify traffic on uncommon portsIdentify traffic on uncommon ports Can block this type of attack, if yourCan block this type of attack, if your firewall filters outgoing trafficfirewall filters outgoing traffic  Windows XP SP2’s firewall does not filterWindows XP SP2’s firewall does not filter outgoing trafficoutgoing traffic  Vista’s firewall doesn’t either (by default),Vista’s firewall doesn’t either (by default), according to link Ch 3l and 3maccording to link Ch 3l and 3m Trojan programs can use known ports toTrojan programs can use known ports to get through firewallsget through firewalls  HTTP (TCP 80) or DNS (UDP 53)HTTP (TCP 80) or DNS (UDP 53)
  • 17. 17
  • 18. 18 Trojan DemonstrationTrojan Demonstration Make a file withMake a file with command-line Windowscommand-line Windows commandscommands Save it asSave it as C:Documents and SettingsC:Documents and Settings usernameusernamecmd.batcmd.bat Start, Run, CMD will execute this fileStart, Run, CMD will execute this file instead ofinstead of C:WindowsSystem32Cmd.exeC:WindowsSystem32Cmd.exe
  • 19. 19 Improved TrojanImproved Trojan Resets the administrator passwordResets the administrator password Almost invisible to userAlmost invisible to user Works in Win XP, but not so easy in VistaWorks in Win XP, but not so easy in Vista
  • 20. 20 SpywareSpyware Sends information from the infected computer toSends information from the infected computer to the attackerthe attacker  Confidential financial dataConfidential financial data  PasswordsPasswords  PINsPINs  Any other stored dataAny other stored data Can register each keystroke entered (keylogger)Can register each keystroke entered (keylogger) Prevalent technologyPrevalent technology Educate users about spywareEducate users about spyware
  • 22. 22 AdwareAdware Similar to spywareSimilar to spyware  Can be installed without the user being awareCan be installed without the user being aware Sometimes displays a bannerSometimes displays a banner Main goalMain goal  Determine user’s online purchasing habitsDetermine user’s online purchasing habits  Tailored advertisementTailored advertisement Main problemMain problem  Slows down computersSlows down computers
  • 23. 23 Protecting Against MalwareProtecting Against Malware AttacksAttacks Difficult taskDifficult task New viruses, worms, Trojan programsNew viruses, worms, Trojan programs appear dailyappear daily Antivirus programs offer a lot of protectionAntivirus programs offer a lot of protection Educate your users about these types ofEducate your users about these types of attacksattacks
  • 24. 24
  • 25. 25
  • 26. 26 Educating Your UsersEducating Your Users Structural trainingStructural training  Most effective measureMost effective measure  Includes all employees and managementIncludes all employees and management E-mail monthly security updatesE-mail monthly security updates  Simple but effective training methodSimple but effective training method Update virus signature databaseUpdate virus signature database automaticallyautomatically
  • 27. 27 Educating Your UsersEducating Your Users SpyBot and Ad-AwareSpyBot and Ad-Aware  Help protect against spyware and adwareHelp protect against spyware and adware  Windows Defender is excellent tooWindows Defender is excellent too FirewallsFirewalls  Hardware (enterprise solution)Hardware (enterprise solution)  Software (personal solution)Software (personal solution)  Can be combinedCan be combined Intrusion Detection System (IDS)Intrusion Detection System (IDS)  Monitors your network 24/7Monitors your network 24/7
  • 28. 28 FUDFUD Fear, Uncertainty and DoubtFear, Uncertainty and Doubt  Avoid scaring users into complying with securityAvoid scaring users into complying with security measuresmeasures  Sometimes used by unethical security testersSometimes used by unethical security testers  Against the OSSTMM’s Rules of EngagementAgainst the OSSTMM’s Rules of Engagement Promote awareness rather than instillingPromote awareness rather than instilling fearfear  Users should be aware of potential threatsUsers should be aware of potential threats  Build on users’ knowledgeBuild on users’ knowledge
  • 29. 29 Intruder Attacks on NetworksIntruder Attacks on Networks and Computersand Computers AttackAttack  Any attempt by an unauthorized person to access orAny attempt by an unauthorized person to access or use network resourcesuse network resources Network securityNetwork security  Security of computers and other devices in a networkSecurity of computers and other devices in a network Computer securityComputer security  Securing a standalone computer--not part of a networkSecuring a standalone computer--not part of a network infrastructureinfrastructure Computer crimeComputer crime  Fastest growing type of crime worldwideFastest growing type of crime worldwide
  • 30. 30 Denial-of-Service AttacksDenial-of-Service Attacks Denial-of-Service (DoS) attackDenial-of-Service (DoS) attack  Prevents legitimate users from accessingPrevents legitimate users from accessing network resourcesnetwork resources  Some forms do not involve computers, likeSome forms do not involve computers, like feeding a paper loop through a fax machinefeeding a paper loop through a fax machine DoS attacks do not attempt to accessDoS attacks do not attempt to access informationinformation  Cripple the networkCripple the network  Make it vulnerable to other type of attacksMake it vulnerable to other type of attacks
  • 31. 31 Testing for DoS VulnerabilitiesTesting for DoS Vulnerabilities Performing an attack yourself is not wisePerforming an attack yourself is not wise  You only need to prove that an attack couldYou only need to prove that an attack could be carried outbe carried out
  • 32. 32 Distributed Denial-of-ServiceDistributed Denial-of-Service AttacksAttacks Attack on a host from multiple servers orAttack on a host from multiple servers or workstationsworkstations Network could be flooded with billions ofNetwork could be flooded with billions of requestsrequests  Loss of bandwidthLoss of bandwidth  Degradation or loss of speedDegradation or loss of speed Often participants are not aware they areOften participants are not aware they are part of the attackpart of the attack  Attacking computers could be controlled usingAttacking computers could be controlled using Trojan programsTrojan programs
  • 33. 33 Buffer Overflow AttacksBuffer Overflow Attacks Vulnerability in poorly written codeVulnerability in poorly written code  Code does not check predefined size of inputCode does not check predefined size of input fieldfield GoalGoal  Fill overflow buffer with executable codeFill overflow buffer with executable code  OS executes this codeOS executes this code  Can elevate attacker’s permission toCan elevate attacker’s permission to Administrator or even KernelAdministrator or even Kernel Programmers need special training toProgrammers need special training to write secure codewrite secure code
  • 34. 34
  • 35. 35
  • 36. 36 Ping of Death AttacksPing of Death Attacks Type of DoS attackType of DoS attack Not as common as during the late 1990sNot as common as during the late 1990s How it worksHow it works  Attacker creates a large ICMP packetAttacker creates a large ICMP packet More than 65,535 bytesMore than 65,535 bytes  Large packet is fragmented at source networkLarge packet is fragmented at source network  Destination network reassembles large packetDestination network reassembles large packet  Destination point cannot handle oversize packet andDestination point cannot handle oversize packet and crashescrashes  Modern systems are protected from this (Link Ch 3n)Modern systems are protected from this (Link Ch 3n)
  • 37. 37 Session HijackingSession Hijacking Enables attacker to join a TCP sessionEnables attacker to join a TCP session Attacker makes both parties think he orAttacker makes both parties think he or she is the other partyshe is the other party
  • 38. 38 Addressing Physical SecurityAddressing Physical Security Protecting a network also requiresProtecting a network also requires physical securityphysical security Inside attacks are more likely than attacksInside attacks are more likely than attacks from outside the companyfrom outside the company
  • 39. 39 KeyloggersKeyloggers Used to capture keystrokes on a computerUsed to capture keystrokes on a computer  HardwareHardware  SoftwareSoftware SoftwareSoftware  Behaves like Trojan programsBehaves like Trojan programs HardwareHardware  Easy to installEasy to install  Goes between the keyboard and the CPUGoes between the keyboard and the CPU  KeyKatcher and KeyGhostKeyKatcher and KeyGhost
  • 40. 40
  • 41. 41
  • 42. 42 Keyloggers (continued)Keyloggers (continued) ProtectionProtection  Software-basedSoftware-based AntivirusAntivirus  Hardware-basedHardware-based Random visual testsRandom visual tests Look for added hardwareLook for added hardware Superglue keyboard connectors inSuperglue keyboard connectors in
  • 43. 43 Behind Locked DoorsBehind Locked Doors Lock up your serversLock up your servers  Physical access means they can hack inPhysical access means they can hack in  Consider Ophcrack – booting to a CD-basedConsider Ophcrack – booting to a CD-based OS will bypass almost any securityOS will bypass almost any security
  • 44. 44 LockpickingLockpicking Average person can pick deadbolt locks inAverage person can pick deadbolt locks in less than five minutesless than five minutes  After only a week or two of practiceAfter only a week or two of practice Experienced hackers can pick deadboltExperienced hackers can pick deadbolt locks in under 30 secondslocks in under 30 seconds Bump keys are even easier (Link Ch 3o)Bump keys are even easier (Link Ch 3o)
  • 45. 45 Card Reader LocksCard Reader Locks Keep a log of whoKeep a log of who enters and leaves theenters and leaves the roomroom Security cards can beSecurity cards can be used instead of keysused instead of keys for better securityfor better security  Image from link Ch 3pImage from link Ch 3p