Hash-flooding DoS reloaded: attacks and defenses
|
|
|
- Eric Horn
- 10 years ago
- Views:
Transcription
1 Hash-flooding DoS reloaded: attacks and defenses Jean-Philippe Aumasson, Kudelski Group Daniel J. Bernstein, University of Illinois at Chicago Martin Boßlet, freelancer
2 Hash-flooding DoS reloaded: attacks and defenses Jean-Philippe Aumasson, Kudelski Group Daniel J. Bernstein, University of Illinois at Chicago Martin Boßlet, freelancer
3 Jean-Philippe Cryptography expert at the Kudelski Group Applied crypto researcher Martin Independent SW engineer and security expert Ruby core dev team member
4 Hash-flooding DoS reloaded: attacks and defenses
5 Denial-of-Service (DoS) attacks Attempt to make a machine or network resource unavailable to its intended users. Wikipedia
6 Popular DoS techniques are distributed HTTP or TCP SYN flood (DDoS)
7 More subtle techniques exploit properties of TCP-congestion-avoidance algorithms
8 Hash-flooding DoS reloaded: attacks and defenses
9 Hash tables used in many applications to maintain an association between objects Example: Python dictionaries d={} d[12345]=0xc d[ astring ]= foo d[( a, tuple )]=0 print d[ a string ] # empty table # insertion # insertion # insertion # lookup
10 If the table is about as large as the number of elements to be stored (=n), insertion or lookup of n elements takes O(n) operations on average
11 If the table is about as large as the number of elements to be stored (=n), insertion or lookup of n elements takes O(n) operations on average : 0xc d[12345]=0xc, hash(12345)=1
12 If the table is about as large as the number of elements to be stored (=n), insertion or lookup of n elements takes O(n) operations on average astring : foo 12345: 0xc d[ astring ]= foo, hash( astring )=0
13 If the table is about as large as the number of elements to be stored (=n), insertion or lookup of n elements takes O(n) operations on average astring : foo 12345: 0xc ( a, tuple ): 0 d[( a, tuple )=0; hash(( a, tuple ))=2
14 If the table is about as large as the number of elements to be stored (=n), insertion or lookup of n elements takes O(n 2 ) operations in the worst case : 0xc d[12345]=0xc, hash(12345)=1
15 If the table is about as large as the number of elements to be stored (=n), insertion or lookup of n elements takes O(n 2 ) operations in the worst case : 0xc astring : foo d[ astring ]= foo, hash( astring )=0
16 If the table is about as large as the number of elements to be stored (=n), insertion or lookup of n elements takes O(n 2 ) operations in the worst case : 0xc astring : foo ( a, tuple ): foo d[( a, tuple )=0; hash(( a, tuple ))=2
17 Hash flooding: Send to a server many inputs with a same hash (a multicollision) so as to enforce worst-case insert time
18 send 2MB of POST data consisting of colliding 10B strings string comparisons (at least 10s on a 2GHz machine )
19 Previous work Crosby, Wallach. Denial of Service via Algorithmic Complexity Attacks, USENIX Security > attack formalized and applied to Perl, Squid, etc. Klink, Wälde. Efficient Denial of Service Attacks on Web Application Platforms. CCC 28c3 -> application to PHP, Java, Python, Ruby, etc.
20 Previous work Crosby, Wallach. Denial of Service via Algorithmic Complexity Attacks, USENIX Security > attack formalized and applied to Perl, Squid, etc. Klink, Wälde. Efficient Denial of Service Attacks on Web Application Platforms. CCC 28c3 -> application to PHP, Java, Python, Ruby, etc.
21
22 Patches released consisting of a stronger hash with randomization (to make colliding values impossible to find)
23 MurmurHash2 used in code by Google, Microsoft, Yahoo, and many others CRuby, JRuby
24 MurmurHash3 successor to MurmurHash2 Oracle s Java SE, Rubinius
25 Hash-flooding DoS reloaded: attacks and defenses
26 1. Theory
27 MurmurHash3 core Processes the input per blocks of 4 bytes for (i=0;i<nblocks;i++) { uint32_t k1 = getblock(blocks, i); k1 *= 0xcc9e2d51 ; k1 = ROTL32(k1,15); k1 *= 0x1b873593; h1 ^= k1; h1 = ROTL32 ( h1,13); h1 = h1 *5+0 xe6546b64;}
28 Differential cryptanalysis strategy 1/ introduce a difference in the state h1 via the input k1 2/ cancel this difference with a second well chosen difference for (i=0;i<nblocks;i++) { uint32_t k1 = getblock(blocks, i); k1 *= 0xcc9e2d51 ; k1 = ROTL32(k1,15); k1 *= 0x1b873593; h1 ^= k1; h1 = ROTL32 ( h1,13); h1 = h1 *5+0 xe6546b64;}
29 Differential cryptanalysis strategy 1/ introduce a difference in the state h1 via the input k1 2/ cancel this difference with a second well chosen difference for (i=0;i<nblocks;i++) { uint32_t k1 = getblock(blocks, i); k1 *= 0xcc9e2d51 ; inject difference D1 k1 = ROTL32(k1,15); k1 *= 0x1b873593; h1 ^= k1; h1 = ROTL32 ( h1,13); h1 = h1 *5+0 xe6546b64;} i=0 diff in k1:0x
30 Differential cryptanalysis strategy 1/ introduce a difference in the state h1 via the input k1 2/ cancel this difference with a second well chosen difference for (i=0;i<nblocks;i++) { uint32_t k1 = getblock(blocks, i); k1 *= 0xcc9e2d51 ; inject difference D1 k1 = ROTL32(k1,15); k1 *= 0x1b873593; h1 ^= k1; h1 = ROTL32 ( h1,13); h1 = h1 *5+0 xe6546b64;} i=0 diff in k1:0x diff in h1 0x
31 Differential cryptanalysis strategy 1/ introduce a difference in the state h1 via the input k1 2/ cancel this difference with a second well chosen difference for (i=0;i<nblocks;i++) { uint32_t k1 = getblock(blocks, i); k1 *= 0xcc9e2d51 ; inject difference D1 k1 = ROTL32(k1,15); k1 *= 0x1b873593; h1 ^= k1; h1 = ROTL32 ( h1,13); h1 = h1 *5+0 xe6546b64;} i=0 diff in k1:0x diff in h1 0x x x
32 Differential cryptanalysis strategy 1/ introduce a difference in the state h1 via the input k1 2/ cancel this difference with a second well chosen difference for (i=0;i<nblocks;i++) { uint32_t k1 = getblock(blocks, i); k1 *= 0xcc9e2d51 ; inject difference D2 k1 = ROTL32(k1,15); k1 *= 0x1b873593; h1 ^= k1; h1 = ROTL32 ( h1,13); h1 = h1 *5+0 xe6546b64;} i=1
33 Differential cryptanalysis strategy 1/ introduce a difference in the state h1 via the input k1 2/ cancel this difference with a second well chosen difference for (i=0;i<nblocks;i++) { uint32_t k1 = getblock(blocks, i); k1 *= 0xcc9e2d51 ; inject difference D2 k1 = ROTL32(k1,15); k1 *= 0x1b873593; h1 ^= k1; h1 = ROTL32 ( h1,13); h1 = h1 *5+0 xe6546b64;} i=1 diff in k1:0x
34 Differential cryptanalysis strategy 1/ introduce a difference in the state h1 via the input k1 2/ cancel this difference with a second well chosen difference for (i=0;i<nblocks;i++) { uint32_t k1 = getblock(blocks, i); k1 *= 0xcc9e2d51 ; inject difference D2 k1 = ROTL32(k1,15); k1 *= 0x1b873593; diff in h1: 0x ^ 0x = 0 h1 ^= k1; h1 = ROTL32 ( h1,13); h1 = h1 *5+0 xe6546b64;} i=1 diff in k1:0x COLLISION!
35 M1 M2 32-bit 32-bit h1=x h1=f(x)=h M1^D1 M2^D2 32-bit 32-bit h1=x^d3 h1=f(x^d3^d3)=h 2 colliding 8-byte inputs
36 M1 M2 M3 M4 M5 M6 collision collision collision Chain collisions => multicollisions 8n bytes => 2 n colliding inputs
37 A multicollision works for any seed h1=seed; => Universal multicollisions for (i=0;i<nblocks;i++) { uint32_t k1 = getblock(blocks, i); k1 *= 0xcc9e2d51 ; k1 = ROTL32(k1,15); k1 *= 0x1b873593; // transform of k1 independent of the seed! h1 ^= k1; h1 = ROTL32 ( h1,13); h1 = h1 *5+0 xe6546b64;}
38 Even simpler for MurmurHash2
39 Consequence: Systems using MurmurHash2/3 remain vulnerable to hash-flooding
40 Other hash attacked
41 Even weaker than MurmurHash2 Also vulnerable to hash flooding
42 CityHash64( BU9[85WWp/ HASH!, 16 ) = b82e7612e6933d2f CityHash64( 8{YDLn;d.2 HASH!, 16 ) = b82e7612e6933d2f CityHash64( d+nkk&t?yr HASH!, 16 ) = b82e7612e6933d2f CityHash64( {A.#v5i]V{ HASH!, 16 ) = b82e7612e6933d2f CityHash64( FBC=/\hJeA!HASH!, 16 ) = b82e7612e6933d2f CityHash64( $03$=K1.-H!HASH!, 16 ) = b82e7612e6933d2f CityHash64( 3o'L'Piw\\!HASH!, 16 ) = b82e7612e6933d2f CityHash64( dudu%qaus@"hash!, 16 ) = b82e7612e6933d2f CityHash64( IZVo 0S=BX"HASH!, 16 ) = b82e7612e6933d2f CityHash64( X2V P=<u,=#HASH!, 16 ) = b82e7612e6933d2f CityHash64( 9<%45yG]qG#HASH!, 16 ) = b82e7612e6933d2f CityHash64( 6?4O:'<Vho#HASH!, 16 ) = b82e7612e6933d2f CityHash64( 2u 2}7g^>3$HASH!, 16 ) = b82e7612e6933d2f CityHash64( kqwnzh=ckg$hash!, 16 ) = b82e7612e6933d2f CityHash64( Nl+:rtvw}K$HASH!, 16 ) = b82e7612e6933d2f CityHash64( s/pi!<5u*]$hash!, 16 ) = b82e7612e6933d2f CityHash64( f P~n*<xPc$HASH!, 16 ) = b82e7612e6933d2f CityHash64( Cj7TCG G}}$HASH!, 16 ) = b82e7612e6933d2f CityHash64( a4$>jf3pf'%hash!, 16 ) = b82e7612e6933d2f
43 2. Practice
44 Breaking Murmur: We ve got the recipe Now all we need is the (hash) cake
45 Where are hashes used?
46 Internally vs. Externally
47 Parser symbol tables Method lookup tables Attributes / Instance variables IP Addresses Transaction IDs Database Indexing Session IDs HTTP Headers JSON Representation URL-encoded POST form data Deduplication (HashSet) A* search algorithm Dictionaries
48 => Where aren t they used?
49 Can t we use something different?
50 We could, but amortized constant time is just too sexy
51 Possible real-life attacks
52 Attack internal use?
53 Elegant, but low impact
54 Need a high-profile target
55 Web Application
56 Example #1 Rails
57 First: Attacking MurmurHash in Ruby
58 Straight-forward with a few quirks
59 Apply the recipe
60 Demo
61 Should work with Rails out of the box, no?
62 Unfortunately, no
63 Demo
64 def = parse_query(form_vars) end
65 def parse_query(qs) end Utils.parse_nested_query(qs)
66 def parse_nested_query(qs, d = nil) params = KeySpaceConstrainedParams.new (qs '').split(d? /[#{d}] */n : DEFAULT_SEP).each do p end k, v = p.split('=', 2).map { s unescape(s) } normalize_params(params, k, v) return params.to_params_hash end
67 def unescape(s, encoding = Encoding::UTF_8) end URI.decode_www_form_component(s, encoding)
68 def self.decode_www_form_component(str, enc=encoding::utf_8) end raise ArgumentError, "invalid %-encoding (#{str})" unless /\A[^%]*(?:%\h\h[^%]*)*\z/ =~ str str.gsub(/\+ %\h\h/, TBLDECWWWCOMP_).force_encoding(enc)
69 /\A[^%]*(?:%\h\h[^%]*)*\z/???
70 Catches invalid % encodings (e.g. %ZV, %%1 instead of %2F)
71 def parse_nested_query(qs, d = nil) params = KeySpaceConstrainedParams.new (qs '').split(d? /[#{d}] */n : DEFAULT_SEP).each do p end k, v = p.split('=', 2).map { s unescape(s) } normalize_params(params, k, v) return params.to_params_hash end
72 def normalize_params(params, name, v = nil) end name =~ %r(\a[\[\]]*([^\[\]]+)\]*) k = $1 ''
73 %r(\a[\[\]]*([^\[\]]+)\]*)???
74 helps transform [[]] to []
75 idea: pre-generate matching values
76 create random values passing the regular expressions
77 that should do it, right?
78 Demo
79
80 def parse_nested_query(qs, d = nil) params = KeySpaceConstrainedParams.new (qs '').split(d? /[#{d}] */n : DEFAULT_SEP).each do p end k, v = p.split('=', 2).map { s unescape(s) } normalize_params(params, k, v) return params.to_params_hash end
81 class KeySpaceConstrainedParams def []=(key, value) end += key.size if key raise RangeError, 'exceeded available parameter key space > = value
82
83 What now? Rails is safe?
84 Remember: Hashes are used everywhere
85 So if application/x-www-form-urlencoded doesn't work, how about application/json?
86 Again, with the encoding...
87 Fast-forward...
88 Demo
89 Conclusion Patchwork is not helping
90 too many places
91 code bloat
92 yet another loophole will be found
93 Fix it at the root
94 Example #2 Java
95 String(byte[] bytes)
96 public String(byte bytes[], int offset, int length, Charset charset) { char[] v = StringCoding.decode(charset, bytes, offset, length); }
97 Tough nut to crack
98 What now? Java is safe?
99 String(char[] value)
100 public String(char value[]) { } int size = value.length; this.offset = 0; this.count = size; this.value = Arrays.copyOf(value, size);
101 No decoding!
102 Substitute byte[] operations with equivalent operations on char[]
103 Demo
104 Disclosure Oracle (Java): Sep 11 CRuby, JRuby, Rubinius: Aug 30
105 Hash-flooding DoS reloaded: attacks and defenses
106 SipHash: a fast short-input PRF New crypto algorithm to fix hash-flooding: Rigorous security requirements and analysis Speed competitive with that of weak hashes Peer-reviewed research paper (A., Bernstein). published at DIAC 2012, INDOCRYPT 2012
107 SipHash initialization 256-bit state v0 v1 v2 v3 128-bit key k0 k1 v0 = k0 736f6d v1 = k1 646f72616e646f6d v2 = k0 6c e v3 = k
108 SipHash initialization 256-bit state v0 v1 v2 v3 128-bit key k0 k1 v0 = k0 somepseu v1 = k1 dorandom v2 = k0 lygenera v3 = k1 tedbytes
109 SipHash compression Message parsed as 64-bit words m0, m1, v3 = m0 c iterations of SipRound v0 = m0
110 SipHash compression Message parsed as 64-bit words m0, m1, v3 = m1 c iterations of SipRound v0 = m1
111 SipHash compression Message parsed as 64-bit words m0, m1, v3 = m2 c iterations of SipRound v0 = m2
112 SipHash compression Message parsed as 64-bit words m0, m1, Etc.
113 SipRound
114 SipHash finalization v2 = 255 d iterations of SipRound Return v0 v1 v2 v3
115 SipHash-2-4 hashing 15 bytes
116 Family SipHash-c-d Fast proposal: SipHash-2-4 Conservative proposal: SipHash-4-8 Weaker versions for cryptanalysis: SipHash-1-0, SipHash-2-0, etc. SipHash-1-1, SipHash-2-1, etc. Etc.
117
118 Proof of simplicity June 20: paper published online June 28: 18 third-party implementations C (Floodyberry, Boßlet, Neves); C# (Haynes) Cryptol (Lazar); Erlang, Javascript, PHP (Denis) Go (Chestnykh); Haskell (Hanquez) Java, Ruby (Boßlet); Lisp (Brown); Perl6 (Julin)
119 Who is using SipHash? Soon?
120 Take home message DoS is doable with only small data/bandwidth Java- and Ruby-based web applications vulnerable to DoS (and maybe others ) SipHash offers both security and performance Contact us if you need to check your application
121 Hash-flooding DoS reloaded: attacks and defenses THANK YOU!
Efficient Denial of Service Attacks on Web Application Platforms
Efficient Denial of Service Attacks on Web Application Platforms Alexander alech Klink n.runs AG Julian zeri Wälde TU Darmstadt #hashdos December 28th, 2011. 28th Chaos Communication Congress. Berlin,
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
NETWORK SECURITY: How do servers store passwords?
NETWORK SECURITY: How do servers store passwords? Servers avoid storing the passwords in plaintext on their servers to avoid possible intruders to gain all their users passwords. A hash of each password
Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014
Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Attacking MongoDB. Firstov Mihail
Attacking MongoDB Firstov Mihail What is it? MongoDB is an open source document-oriented database system. Features : 1. Ad hoc queries. 2. Indexing 3. Replication 4. Load balancing 5. File storage 6. Aggregation
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
PHP Magic Tricks: Type Juggling. PHP Magic Tricks: Type Juggling
Who Am I Chris Smith (@chrismsnz) Previously: Polyglot Developer - Python, PHP, Go + more Linux Sysadmin Currently: Pentester, Consultant at Insomnia Security Little bit of research Insomnia Security Group
High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago
High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,
Hash Function JH and the NIST SHA3 Hash Competition
Hash Function JH and the NIST SHA3 Hash Competition Hongjun Wu Nanyang Technological University Presented at ACNS 2012 1 Introduction to Hash Function Hash Function Design Basics Hash function JH Design
CNT4406/5412 Network Security Introduction
CNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 35 Introduction What is Security? Protecting information
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
A Perfect CRIME? TIME Will Tell. Tal Be ery, Web research TL
A Perfect CRIME? TIME Will Tell Tal Be ery, Web research TL Agenda BEAST + Modes of operation CRIME + Gzip compression + Compression + encryption leak data TIME + Timing + compression leak data Attacking
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
SQL injection: Not only AND 1=1. The OWASP Foundation. Bernardo Damele A. G. Penetration Tester Portcullis Computer Security Ltd
SQL injection: Not only AND 1=1 Bernardo Damele A. G. Penetration Tester Portcullis Computer Security Ltd [email protected] +44 7788962949 Copyright Bernardo Damele Assumpcao Guimaraes Permission
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
2013 Ruby on Rails Exploits. CS 558 Allan Wirth
2013 Ruby on Rails Exploits CS 558 Allan Wirth Background: Ruby on Rails Ruby: Dynamic general purpose scripting language similar to Python Ruby on Rails: Popular Web app framework using Ruby Designed
Objects and classes. Objects and classes. Jarkko Toivonen (CS Department) Programming in Python 1
Objects and classes Jarkko Toivonen (CS Department) Programming in Python 1 Programming paradigms of Python Python is an object-oriented programming language like Java and C++ But unlike Java, Python doesn
Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company
Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to
Attack Frameworks and Tools
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet
XML Processing and Web Services. Chapter 17
XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing
Stress Testing and Distributed Denial of Service Testing of Network Infrastructures
Faculty of Electrical Engineering and Communication Brno University of Technology Technická 12, CZ-616 00 Brno, Czechia http://www.six.feec.vutbr.cz Stress Testing and Distributed Denial of Service Testing
Lesson 10: Attacks to the SSL Protocol
Lesson 10: Attacks to the SSL Protocol Luciano Bello - [email protected] Chalmers University Dr. Alfonso Muñoz - [email protected] T>SIC Group. Universidad Politécnica de Madrid Security of the SSL
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution
Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution Today s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
Why File Upload Forms are a Major Security Threat
Why File Upload Forms are a Major Security Threat To allow an end user to upload files to your website, is like opening another door for a malicious user to compromise your server. Even though, in today
1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
Pre-authentication XXE vulnerability in the Services Drupal module
Pre-authentication XXE vulnerability in the Services Drupal module Security advisory 24/04/2015 Renaud Dubourguais www.synacktiv.com 14 rue Mademoiselle 75015 Paris 1. Vulnerability description 1.1. The
M.S. Project Proposal. SAT Based Attacks on SipHash
M.S. Project Proposal SAT Based Attacks on SipHash Santhosh Kantharaju Siddappa Department of Computer Science Rochester Institute of Technology Chair Prof. Alan Kaminsky Reader Prof. Stanisław P. Radziszowski
Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks
Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks Sau Fan LEE (ID: 3484135) Computer Science Department, University of Auckland Email: [email protected] Abstract A denial-of-service
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Steve Gibson Revolutionizing Website Login and Authentication with SQRL SQRL
SQRL A simple & straightforward, open, intellectual property unencumbered, easily explained, provably secure, pseudonymous, 2-party, web domain based, authenticated identity solution for the Internet.
Analyzing the MD5 collision in Flame
Analyzing the MD5 collision in Flame Alex Sotirov Co-Founder and Chief Scientist Trail of Bits, Inc Overview of Flame Discovered sometime in 2012 Active since at least 2010 Complex malware almost 20MB
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore
Top Ten Web Attacks Saumil Shah Net-Square BlackHat Asia 2002, Singapore TodayÕs battleground Ð the Web Web sites and web applications rapidly growing. Complex business applications are now delivered over
ModSecurity as Universal Cross-platform Web Protection Tool
ModSecurity as Universal Cross-platform Web Protection Tool Ryan Barnett Greg Wroblewski Abstract For many years ModSecurity was a number one free open source web application firewall for the Apache web
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
Introduction to Computer Security
Introduction to Computer Security (ECE 458) Vijay Ganesh Spring 2014 Online Resources, Books, Notes,... Books Introduction to Computer Security by Matt Bishop Computer Security: Art and Science by Matt
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 1 SSL/TLS The Secure Socket Layer (SSL) and Transport Layer Security
Java Web Application Security
Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting
SHA3 WHERE WE VE BEEN WHERE WE RE GOING
SHA3 WHERE WE VE BEEN WHERE WE RE GOING Bill Burr May 1, 2013 updated version of John Kelsey s RSA2013 presentation Overview of Talk Where We ve Been: Ancient history 2004 The Competition Where We re Going
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
4 Delivers over 20,000 SSL connections per second (cps), which
April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
The Epic Turla Operation: Information on Command and Control Server infrastructure
The Epic Turla Operation: Information on Command and Control Server infrastructure v1.00 (August 7, 2014) Short Report by Laboratory of Cryptography and System Security (CrySyS Lab) http://www.crysys.hu/
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
How to hack VMware vcenter server in 60 seconds
Invest in security to secure investments How to hack VMware vcenter server in 60 seconds Alexey Sintsov, Alexander Minozhenko #whoami Pen-tester at ERPscan Company Researcher DCG#7812 CTF ERPScan Innovative
Programming Flaws and How to Fix Them
19 ö Programming Flaws and How to Fix Them MICHAEL HOWARD DAVID LEBLANC JOHN VIEGA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City- Milan New Delhi San Juan Seoul Singapore
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 3: Securing applications Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section 8.5)
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
Evaluating the of Network echanisms to Sophisticated DDoS Attacks Udi Ben-Porat Computer Science Dept. Tel-Aviv University, Israel Email: [email protected] Anat Bremler-Barr Computer Science Dept.
COMP28112 Exercise 2: Wedding Planner Duration: 3 sessions
COMP28112 Exercise 2: Wedding Planner Duration: 3 sessions 1 Introduction You need to arrange, for the earliest time possible, a wedding. You are required to make two reservations a hotel to host and a
D&D of malware with exotic C&C
D&D of malware with exotic C&C D&D = Description & Detection C&C = Command & Control Automotive Consumer Energy & Chemicals Paul Rascagneres - @r00tbsd Eric Leblond - @Regiteric Life Sciences & Healthcare
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea Bypass: History Explanation: What Is Going On Process: Things To Look For Demos: alert(1) Done Live (hopefully) CSP: Content Security
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013
University of Wisconsin Platteville SE411 Senior Seminar Web System Attacks Maxwell Friederichs April 18, 2013 Abstract 1 Data driven web applications are at the cutting edge of technology, and changing
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
No SQL! no injection? A talk on the state of NoSQL security
No SQL! no injection? A talk on the state of NoSQL security IBM Cyber Security Center of Excellence Aviv Ron Alexandra Shulman-Peleg Anton Puzanov Aviv Ron Security Researcher for IBM Cyber Security Center
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Big Data & Scripting Part II Streaming Algorithms
Big Data & Scripting Part II Streaming Algorithms 1, Counting Distinct Elements 2, 3, counting distinct elements problem formalization input: stream of elements o from some universe U e.g. ids from a set
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
