Server Forensics: Linux

Size: px
Start display at page:

Download "Server Forensics: Linux"

Transcription

1 Server Forensics: Linux Part II.A. Techniques and Tools: Computer Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos

2 Summary } Linux forensics } Overview of Linux (Unix) systems } System subversion with rootkits } Rootkit detection techniques 2

3 Operating systems we will be focusing on } Desktop platforms: Windows Previous class } Server platforms: Linux Today! } Mobile platforms: Android 3

4 Our main focus when analyzing a server s OS } On desktops, we were mostly concerned about evidence left by local users activities } On servers, we will look for evidence left by external agents that resulted in security violations to the OS attack } Such external agents typically consist of stealthy malware called rootkits rootkit 4

5 Overview of Linux systems 5

6 Linux belongs to the big family of Unix systems 6

7 Unix systems bootstrap sequence } At a high-level, Unix systems have same boot sequence 7

8 Unix systems architecture } Unix systems also have same arch, at a high-level } The kernel can be extended with loadable modules 8

9 System subversion with rootkits 9

10 What s wrong with this picture? [root@dobro bin]# ls - a. dd igawk nisdomainname tar.. df ipcalc pgawk tcsh.. dmesg kbd_mode ping touch alsaunmute dnsdomainname kill ping6 tracepath arch doexec ksh ps tracepath6 ash domainname link pwd traceroute ash.static dumpkeys ln red traceroute6 aumix- minimal echo loadkeys rm true awk ed login rmdir umount 10

11 Let s take a closer look [root@dobro]# ls - a. dd igawk nisdomainname tar.. df ipcalc pgawk tcsh.. dmesg kbd_mode ping touch How can there be two.. directories?... 11

12 How did this happen? bin]# mkdir..\ } This is actually: mkdir <dot><dot><backslash><space><enter> } It creates a directory named dot-dot-space 12

13 What s in this mystery directory? [root@dobro bin]# cd..\ [root@dobro.. ]# ls - l total 24 - rw- r- - r- - 1 root root 0 Dec 15 12:19 rootkit_file_01 - rw- r- - r- - 1 root root 0 Dec 15 12:19 rootkit_file_02 - rw- r- - r- - 1 root root 0 Dec 15 12:19 rootkit_file_03 - rw- r- - r- - 1 root root 0 Dec 15 12:19 rootkit_file_04 - rw- r- - r- - 1 root root 0 Dec 15 12:19 rootkit_file_05 - rw- r- - r- - 1 root root 0 Dec 15 12:19 rootkit_file_06 Here s a simple trick to hide malicious files in plain sight 13

14 Rootkits } The behavior of the operating system can be affected by the presence of rootkits } Rootkits are a category of malware which has the ability to hide itself and cover up traces of activities 14

15 Sample scenario } A rootkit runs a password logger on a compromised system Password Logger Compromised system with sniffed passwords encoded using some text-based steganography techniques 15

16 Another example } A rootkit installs a backdoor on the compromised system Shell Backdoor Compromised system communication with backdoor (covert channel in HTTP or DNS) 16

17 Rootkit goals 1. Remove evidence of original attack and activity that led to rootkit installation 2. Hide future attacker activity (files, net connections, processes) and prevent it from being logged 3. Enable future access to system by attacker 4. Install tools to widen scope of penetration 5. Secure system so other attackers can t take control of system from original attacker 17

18 Rootkits include several attacker tools } Attack tools installed after an intruder gained access: } Backdoor programs } Network sniffers } Log cleaners } File / process / user hiding tools } etc. 18

19 Rootkit tools: Backdoor programs } Backdoor is an unauthorized way of gaining access to a program, online service or an entire computer system } Let attackers log in to the hacked system w/o using an exploit again Examples Login Backdoor Telnetd Backdoor Services Backdoor Description Modify login.c to look backdoor password before stored password Trojaned the in.telnetd to allow attacker gain access with backdoor password Replacing and manipulate services like ftp, rlogin, even inetd as backdoor to gain access Cronjob backdoor Backdoor could also be added in crontjob to run on specific time for example at 12 midnight to 1 am Library backdoors Kernel backdoors Shared libraries can be backdoor to do malicious activity including giving a root or administrator access This backdoor is basically exploiting the kernel 19

20 } Packet sniffers Rootkit tools: Sniffers and wipers } Packet Sniffer is a program and/or device that monitor data traveling over a network, TCP/IP or other network protocol } Used to listen or to steal valuable information off a network; many services such as ftp and telnet transfer their password in plain text and it is easily capture by sniffer } Log-wiping utilities } Log file are the lists actions that have occurred, e.g., in UNIX, wtmp logs time and date user log in into the system } Log file enable admins to monitor, review system performance and detect any suspicious activities } Deleting intrusion records helps prevent detection of the intrusion 20

21 Rootkit tools: Miscellaneous attacker tools } DDOS program } To turn the compromised server into a DDOS client such as, trinoo } IRC program } Connects to some remote server waiting for the attacker to issue a command (e.g., to trigger a distributed denial of service attack) } System patch } Attacker may patch the system after successful attack; this will prevent other attacker to gain access into the system again } Password cracker } Vulnerability scanners } Hiding utilities } Utilities to conceal the rootkit files on compromised system 21

22 Rootkit types } Command-level rootkits } Replace user-level programs } Library-level rootkits } Replace system libraries } Kernel-level rootkits } Modify the kernel itself 22

23 Command-level subversion } Command-level rootkits hide the presence of malware by making changes to system commands } Based on principle: To suppress bad news, silence the messenger } Table shows typical command-level rootkit modifications 23

24 Evolution of command-level rootkits } First rootkits came with network sniffers to collect user names and passwords, e.g., the esniff program } Later versions came with remotely controlled agents for distributed denial-of-service attacks, e.g., T0rn 24

25 Command-level rootkit evasion } To evade detection, early rootkits not only replaced system utility sw but also erased records in system logs } Some rootkits even gave modified system utilities the same file time stamps and cyclic redundancy check (CRC) values as the original files } Later command-level rootkits simply install modified programs that hide the presence of malware 25

26 Installation concealment } Use a subdirectory of a busy system directory like /dev, / etc, /lib, or /usr/lib } Use dot files, which aren t in ls output } Use spaces to make filenames look like expected dot files:. and.. } Use filenames that system might use } /dev/hdd (if no 4 th IDE disk exists) } /usr/lib/libx.a (libx11 is real Sun X-Windows) } Delete rootkit install directory once installation is complete 26

27 Rootkit types } Command-level rootkits } Library-level rootkits } Kernel-level rootkits 27

28 Library-level subversion } Instead of replacing system utilities, rootkits can hide their existence by making changes at the next level down in the system architecture: the system run-time library } A good example is redirecting the open() and stat() calls } The purpose of these modifications is to fool file-integrity-checking software that examines executable file contents and attributes } By redirecting the open() and stat() calls to the original file, the rootkit makes it appear as if the file is still intact } However, execve() executes the subverted file 28

29 Example of library-level subversion } Redirect specific open() system calls real_syscall3() is a macro (not entirely shown) that modifies the standard _syscall13() macro real_syscall3 is defines our real_open() function that invokes Sys_open system call 29

30 Rootkit types } Command-level rootkits } Library-level rootkits } Kernel-level rootkits 30

31 Kernel-level subversion } Just like user-level rootkits, kernel-level rootkits are installed after a system s security has been breached } Kernel-level rootkits compromise the kernel } Kernel runs in supervisor processor mode } Thus, the rootkit gains complete control over the machine } Advantage: stealth, e.g., } Runtime integrity checkers cannot see rootkit changes } All programs in the system can be affected by the rootkit } Open backdoors/sniff network without running processes 31

32 Kernel rootkit operation } The purpose of many kernel rootkits is to hide malware processes, files, and network ports (& the rootkit itself) } There are to sides to information hiding } Output: the kernel must censor the output from system calls that produce a list of processes, files, network ports, etc. } Input: any attempts to manipulate a hidden process, file, network port, and so on must fail as if the object did not exist } May also redirect system calls to subvert operation of software that checks integrity of executable files 32

33 Methods to inject rootkit code into a kernel 1. Loading kernel module into a running kernel } Uses official LKM interface, hence it s easier to use } Hide module names from external (/proc/ksyms) & internal tables } Might also intercept syscalls that report on status of kernel modules 2. Injecting code into the memory of a running kernel that has no support for module loading } Involves writing new code to unused kernel memory via /dev/kmem and activating the new code by redirecting, e.g., a system call 3. Injecting code into the kernel file or a kernel module file } These changes are persistent across boot, but require that the system is rebooted to activate the subverted code 33

34 Early kernel rootkit architecture } Based on system-call interposition: Early kernel rootkits subvert syscalls close to the process-kernel boundary 34

35 Rootkit interposition code } To prevent access to a hidden file, process, and so on, rootkits redirect specific system calls to wrapper code } To prevent rootkit disclosure, syscalls that produce lists of files, etc., are intercepted to suppress info to be hidden 35

36 System-call interposition: good and bad } Advantage: The code is easy to understand } The change is made at a point that is close to the user of those system calls } Disadvantage: Many system calls need to be intercepted } E.g., to hide the existence of a file, need to intercept all system calls that have file name arguments, about 50 syscalls } Alternative: subvert the kernel at a level that is closer to the information being hidden 36

37 Later kernel rootkit architectures } Based on file system interposition: Rootkits based on interposition at object interfaces subvert several FS methods 37

38 Hiding file names } Of all the operations provided by the VFS interface the lookup() operation is of particular interest } lookup() translates the pathname into underlying FS object } Redirect can hide a file from all syscalls that access a file by name } Doesn t work for syscalls that create a new directory entry } E.g., link(), mkdir(), socket(), etc. } Unless the malware does not handle this, operation will fail 38

39 Rootkit detection techniques 39

40 Detection techniques for each rootkit type } Command-level rootkits } Library-level rootkits } Kernel-level rootkits 40

41 Approaches to detecting command-level rootkits 1. If a rootkit listens for connections, the network port will be visible to an external network port scanner 2. Some tools can reveal the names of all directory entries, including hidden or deleted files 3. Corrupted versions of ps and similar hide malware processes, but these can still be found using, e.g., the /proc file system 4. Deleted login/logout records in the wtmp file leave behind holes that can be detected using an appropriate tool 5. Ifconfig might report that a network interface is not in sniffer mode, but we can query the kernel for the interface status 6. CRC checksums reported by compromised cksum, can be detected using MD5 or SHA1 7. When examining a low-level copy of the file system on a trusted machine, all hidden files and modifications will be visible 41

42 Example of exposing a command-level rootkit 1/7 } We examine two utilities of the T0rn rootkit for Linux } This rootkit was in widespread use in 2001 } First, search the /bin/ls executable file using strings and grep } The file name /usr/src/.puta/.1file looks very suspicious 42

43 Example of exposing a command-level rootkit 2/7 } If we try to list the /usr/src/.puta directory, the ls command hides the name, as we would expect: } However, the directory name still shows up when we use the echo command, together with the.* wildcard expansion feature that is built into the command shell 43

44 Example of exposing a command-level rootkit 3/7 } File.puta/.1file is a rootkit configuration file } Has list of file and directory names that must remain hidden } Contain the malware program files, config files, and data files 44

45 Example of exposing a command-level rootkit 4/7 } To detect modified process status check against /proc } Table shows that ps command is hiding with ID

46 Example of exposing a command-level rootkit 5/7 } The system utilities that were replaced by the rootkit do a good job of hiding process 153 } Not only it is censored by process status tools like ps, but also it does not show up with network status tools such as netstat } However, it does not replace the lsof command, which can help reveal the purpose of process

47 Example of exposing a command-level rootkit 6/7 } File name /usr/sbin/nscd suggests that it is a system program, but comparison with uncompromised systems shows this program exists only in later Linux versions } nscd: name service cache daemon 47

48 Example of exposing a command-level rootkit 7/7 } Connecting with telnet to TCP port on the local machine confirms it is a backdoor process } In this case we are welcomed by the opening banner of what appears to be an SSH server } Find more about the T0rn rootkit at: 48

49 Automated approaches for detection } Each rootkit differs slightly in its approach to hiding the presence of malware and therefore requires us to take a slightly different approach to detect it } An example of software that automates the search for known rootkits is the Chkrootkit toolkit } } } Runs on a dozen different UNIX platforms Recognizes more that fifty different rootkits Looks for deleted login / logout records, signatures of replaced system utilities, rootkit configuration files and directories, missing processes, and signs of kernel-level subversion 49

50 Detection techniques for each rootkit type } Command-level rootkits } Library-level rootkits } Kernel-level rootkits 50

51 Detection of library-level rootkits } Strawman: check library hashes. But, would an MD5 or SHA-1 hash reveal library modifications? } Not necessarily: while the runtime linker uses the lowlevel open() system call when it accesses the modified library file, md5sum use the fopen() library routine } Therefore, can be redirected to the unmodified library file } Workaround: rootkit detection tools need to carry their own trusted copy of the system library routines 51

52 Detection techniques for each rootkit type } Command-level rootkits } Library-level rootkits } Kernel-level rootkits 52

53 Detection of kernel-level rootkits } Kernel rootkits may be exposed because they introduce little inconsistencies into a system } Some may show up externally, in the results from system calls that manipulate processes, files, kernel modules, etc. } Others show up only internally, in the contents of kernel data structures } E.g., hidden objects occupy some storage even though the storage does not appear in kernel symbol tables 53

54 Inconsistencies that may reveal kernel rootkits } Output of tools that bypass the file system can reveal information that is hidden by compromised FS code } E.g., TSK } Oversight } E.g., the modification time of an important system directory is changed, not to the contents of that directory } Inconsistencies in the results from process-manipulating system calls and from the /proc file system } E.g., in reporting a process as not found ) 54

55 Inconsistencies that may reveal kernel rootkits } Unexpected behavior of some system calls } E.g., when the Adore rootkit is installed, setuid() change process privileges will report success for some parameter value even though the user does not have sufficient privileges } E.g., when the Knark rootkit is installed, settimeofday() set the system clock will report suffess for some parameter values even though is should always fail when invoked by an unprivileged user } Directory hard link count inconsistencies } The hard link count of a directory, as reported by stat(), should equal the number of subdirectories, as reported by getdents() } If a directory is being hidden, it may show up as a missing hard link 55

56 Inconsistencies that may reveal kernel rootkits } Modifications to kernel tables, such as system call table or the virtual FS table } May be detected after the fact by reading kernel memory via /dev/kmem } Or by examining kernel memory from inside with a forensic kernel module such as Carbonite } Modifications to kernel tables or kernel code may be detected using a kernel module that samples critical data structures periodically 56

57 Inconsistencies that may reveal kernel rootkits } Checking against raw data sources } Modifications that hide files can show up as inconsistencies between information from the raw disc device and information returned by the kernel file system code } Modifications that hide network ports, processes, or kernel modules may be exposed by reading kernel memory and comparing the contents of kernel data structures with results from system calls 57

58 Example of kernel toolkit detector tool } Findrootkit: examines kernel mem through /dev/kmem and checks consistency from multiple sources: } The /dev/ksyms symbol table, with kernel function and data addresses and sizes } The in-kernel module list, with executable code and data segment addresses and sizes of loaded kernel modules } The in-kernel text arena table, with executable code segment addresses and sizes } The function addresses in the system call jump tables and in file system operation jump tables } The executable code and data segment sizes, as specified in the symbol tables of kernel module files 58

59 Example of kernel toolkit detector tool } Findrootkit can produce modification reports } Report example for a Solaris kernel } Changes to (a) the file system operations table, and (b) the systemcall jump table 59

60 Conclusions } Many attacks to operating systems are performed through rootkit software } There are three different types of rootkits depending on the OS layer targeted by the rootkit: command-, library-, and kernel-level rootkits } Depending on the rootkit, the forensic analyst needs to employ different rootkit-detection techniques 60

61 References } Primary bibliography } Dan Farmer, Wietse Venema, Forensic Discovery, Chapter 5 61

62 Next class } Mobile forensics: Android 62

Unix/Linux Forensics 1

Unix/Linux Forensics 1 Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,

More information

Rootkit: Analysis, Detection and Protection

Rootkit: Analysis, Detection and Protection Rootkit: Analysis, Detection and Protection Igor Neri Sicurezza Informatica Prof. Bistarelli 1/34 Definition of Rootkit A rootkit is malware which consists of a set of programs designed to hide or obscure

More information

Worms, Trojan Horses and Root Kits

Worms, Trojan Horses and Root Kits Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:

More information

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform

More information

Hacking Database for Owning your Data

Hacking Database for Owning your Data Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

Traditional Rootkits Lrk4 & KNARK

Traditional Rootkits Lrk4 & KNARK Traditional Rootkits Lrk4 & KNARK Based on a paper by John Levine & Julian Grizzard http://users.ece.gatech.edu/~owen/research/conference%20publications/rookit_southeastcon2003.pdf ECE 4883 Internetwork

More information

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Rootkit: Attacker undercover tools By Saliman Manap

Rootkit: Attacker undercover tools By Saliman Manap Rootkit: Attacker undercover tools By Saliman Manap 1.0 Introduction Today, hacker, attacker and intruder are common problem in security threat. Lots of vulnerability discover and publish, make it easier

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

Security: Attack and Defense

Security: Attack and Defense Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Threat Events: Software Attacks (cont.)

Threat Events: Software Attacks (cont.) ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to

More information

Network Incident Report

Network Incident Report To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Linux System Administration on Red Hat

Linux System Administration on Red Hat Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

More information

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002) Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and

More information

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check

More information

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways

More information

Network Forensics: Log Analysis

Network Forensics: Log Analysis Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode

More information

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

A Virtual Machine Introspection Based Architecture for Intrusion Detection

A Virtual Machine Introspection Based Architecture for Intrusion Detection A Virtual Machine Introspection Based Architecture for Intrusion Detection Tal Garfinkel Mendel Rosenblum {talg,mendel}@cs.stanford.edu Computer Science Department, Stanford University Abstract Today s

More information

Chapter 11 Phase 5: Covering Tracks and Hiding

Chapter 11 Phase 5: Covering Tracks and Hiding Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006

Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006 Adjusting Prevention Policy Options Based on Prevention Events Version 1.0 July 2006 Table of Contents 1. WHO SHOULD READ THIS DOCUMENT... 4 2. WHERE TO GET MORE INFORMATION... 4 3. VERIFYING THE OPERATION

More information

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer

More information

Linux Kernel Architecture

Linux Kernel Architecture Linux Kernel Architecture Amir Hossein Payberah [email protected] Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management

More information

Guideline on Auditing and Log Management

Guideline on Auditing and Log Management CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius

More information

Know Your Enemy: A Forensic Analysis

Know Your Enemy: A Forensic Analysis Know Your Enemy: A Forensic Analysis The Study of an Attack Honeynet Project http://project.honeynet.org Last Modified: 23 May 2000 This paper is a continuation of the Know Your Enemy series. The first

More information

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

A candidate following a programme of learning leading to this unit will be able to:

A candidate following a programme of learning leading to this unit will be able to: Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install

More information

IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS

More information

Intrusion Detection System (IDS)

Intrusion Detection System (IDS) Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes

More information

Network Monitoring Tool with LAMP Architecture

Network Monitoring Tool with LAMP Architecture Network Monitoring Tool with LAMP Architecture Shuchi Sharma KIIT College of Engineering Gurgaon, India Dr. Rajesh Kumar Tyagi JIMS, Vasant Kunj New Delhi, India Abstract Network Monitoring Tool enables

More information

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration

More information

The Value of Physical Memory for Incident Response

The Value of Physical Memory for Incident Response The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical

More information

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013 CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information

LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes

LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes LINUX SECURITY COOKBOOK DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes ORELLY Beijing " Cambridge " Farnham " Koln " Paris " Sebastopol " Taipei - Tokyo Table of Contents Preface............,....................................................A

More information

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004 CSE331: Introduction to Networks and Security Lecture 32 Fall 2004 Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider

More information

Computer Security DD2395

Computer Security DD2395 Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare

More information

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger [email protected] Lecture 13, Dec. 6, 2010 Auditing Security Audit an independent review and examination

More information

Foundstone ERS remediation System

Foundstone ERS remediation System Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk

More information

File-system Intrusion Detection by preserving MAC DTS: A Loadable Kernel Module based approach for LINUX Kernel 2.6.x

File-system Intrusion Detection by preserving MAC DTS: A Loadable Kernel Module based approach for LINUX Kernel 2.6.x File-system Intrusion Detection by preserving MAC DTS: A Loadable Kernel Module based approach for LINUX Kernel 2.6.x Suvrojit Das +91-9734294105 [email protected] Arijit Chattopadhayay +91-9474910685

More information

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3

More information

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix

More information

Some Tools for Computer Security Incident Response Team (CSIRT)

Some Tools for Computer Security Incident Response Team (CSIRT) Some Tools for Computer Security Incident Response Team (CSIRT) AfNOG 12 30 th May 2011 10 th June 2011 Tanzania By Marcus K. G. Adomey Overview Some Unix Commands Some Selected Tools Snort AirSnort hping

More information

IDS and Penetration Testing Lab ISA656 (Attacker)

IDS and Penetration Testing Lab ISA656 (Attacker) IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible

More information

Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac

Practical Mac OS X Insecurity. Security Concepts, Problems and Exploits on your Mac Practical Mac OS X Insecurity Security Concepts, Problems and Exploits on your Mac Who am I? Student of physics, mathematics and astronomy in Bonn Mac user since 1995 I love Macs Mac evangelist Intentions

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

My FreeScan Vulnerabilities Report

My FreeScan Vulnerabilities Report Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the

More information

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad OUTLINE Security incident Attack scenario Intrusion detection system Issues and challenges Conclusion

More information

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network. Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006 CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:

More information

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London

More information

Threat Advisory: Accellion File Transfer Appliance Vulnerability

Threat Advisory: Accellion File Transfer Appliance Vulnerability Threat Advisory: Accellion File Transfer Appliance Vulnerability Niara Threat Advisories provide timely information regarding new attacks along with how Niara helps companies quickly detect an attack to

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught

More information

IDS and Penetration Testing Lab ISA 674

IDS and Penetration Testing Lab ISA 674 IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use

More information

Shellshock. Oz Elisyan & Maxim Zavodchik

Shellshock. Oz Elisyan & Maxim Zavodchik Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable

More information

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont. Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org

More information

Israel Aladejebi Computer Forensics Century College Information Technology Department

Israel Aladejebi Computer Forensics Century College Information Technology Department Israel Aladejebi Computer Forensics Century College Information Technology Department Being able to break security doesn t make you a hacker anymore than being able to hotwire cars makes you an automotive

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Network Security: Introduction

Network Security: Introduction Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has

More information

Domain 5.0: Network Tools

Domain 5.0: Network Tools ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 5.0: Network Tools Chapter 5 5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may

More information

Linux Operating System Security

Linux Operating System Security Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall

More information

CIT 380: Securing Computer Systems

CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

Analysis of the Linux Audit System 1

Analysis of the Linux Audit System 1 Analysis of the Linux Audit System 1 Authors Bruno Morisson, MSc (Royal Holloway, 2014) Stephen Wolthusen, ISG, Royal Holloway Overview Audit mechanisms on an operating system (OS) record relevant system

More information

EECS 354 Network Security. Introduction

EECS 354 Network Security. Introduction EECS 354 Network Security Introduction Why Learn To Hack Understanding how to break into computer systems allows you to better defend them Learn how to think like an attacker Defense then becomes second-nature

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Cyber Security Scan Report

Cyber Security Scan Report Scan Customer Information Scan Company Information Company: Example Name Company: SRC Security Research & Consulting GmbH Contact: Mr. Example Contact: Holger von Rhein : : Senior Consultant Telephone:

More information

Get quick control over your Linux server with server commands

Get quick control over your Linux server with server commands Get quick control over your Linux server with server commands by Jack Wallen Linux is a powerful environment for both the desktop and server: Both systems have matured so any action can be managed with

More information

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows) Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network

More information

Securing the system using honeypot in cloud computing environment

Securing the system using honeypot in cloud computing environment Volume: 2, Issue: 4, 172-176 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 M. Phil Research Scholar, Department of Computer Science Vivekanandha College

More information