Computer Security SEGC-00 - Overview



Similar documents
CS5008: Internet Computing

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Learn Ethical Hacking, Become a Pentester

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access


Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Summary of the SEED Labs For Authors and Publishers

Linux Network Security

Security: Attack and Defense

Certified Ethical Hacker (CEH)

Malicious Network Traffic Analysis

CYBERTRON NETWORK SOLUTIONS

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Network Security: A Practical Approach. Jan L. Harrington

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

NETWORK SECURITY (W/LAB) Course Syllabus

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Course Title: Penetration Testing: Security Analysis

Chapter 8 Security Pt 2

CIT 380: Securing Computer Systems

INFORMATION SECURITY TRAINING CATALOG (2015)

Network Security and Firewall 1

NETWORK SECURITY WITH OPENSOURCE FIREWALL

General Network Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Securing Cisco Network Devices (SND)

IINS Implementing Cisco Network Security 3.0 (IINS)

Chapter 8 Network Security

CEH Version8 Course Outline

Vulnerability Assessment and Penetration Testing

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Ethical Hacking and Attack Tools

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

2016 TÜBİTAK BİLGEM Cyber Security Institute

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

INFORMATION SECURITY TRAINING CATALOG (2016)

Information Security. Training

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

CSCE 465 Computer & Network Security

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

A Very Incomplete Diagram of Network Attacks

April 11, (Revision 2)

Implementing Cisco IOS Network Security

1. Firewall Configuration

Post-Class Quiz: Telecommunication & Network Security Domain

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Networking: EC Council Network Security Administrator NSA

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

CIS 4204 Ethical Hacking Fall, 2014

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

A Systems Engineering Approach to Developing Cyber Security Professionals

Solution of Exercise Sheet 5

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Penetration Testing with Kali Linux

Description: Objective: Attending students will learn:

Firewalls. Ahmad Almulhem March 10, 2012

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

How To Classify A Dnet Attack

Application Security Best Practices. Wally LEE Principal Consultant

FIREWALLS & CBAC. philip.heimer@hh.se

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

My FreeScan Vulnerabilities Report

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

information security and its Describe what drives the need for information security.

TCP/IP Security Problems. History that still teaches

Chapter 8 Phase3: Gaining Access Using Network Attacks

INFORMATION SECURITY TRAINING

LINUX NETWORK SECURITY

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

[CEH]: Ethical Hacking and Countermeasures

IxLoad-Attack: Network Security Testing

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

CompTIA Security+ (Exam SY0-410)

Firewall. User Manual

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Network Access Security. Lesson 10

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Using Nessus In Web Application Vulnerability Assessments

Transcription:

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 1 / 14 Computer Security SEGC-00 - Overview Paulo Lício de Geus LASCA-IC-Unicamp Laboratory of Security and Cryptography Institute of Computing University of Campinas March 3, 2015

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 2 / 14 MO639/MC942 Summary This course is about computer security, both from the network view as well as the machine, its OS and applications point of view. Students shall demonstrate ability in research and programming and shall acquire both overall compreehension and specific abilities. Lecture and Office Hours Lectures: 3:19 21, 5:21 23; Room: 351 (IC3.5) Office hours: 3:18, 5:20; Room: 26 full mailing list (professor + TAs + students): segc@lasca.ic.unicamp.br instructors list (professor + TAs): segc-staff@lasca.ic.unicamp.br

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 3 / 14 Topics Introduction Basic Knowledge Network Security Protocol Analysis Network Defenses Planned, but probably only on a follow-up course: Machine Defenses Application Security Web Vulnerabilities

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 4 / 14 References Nakamura-deGeus - Segurança de Redes em Ambientes Cooperativos, Novatec, 2010 ( more or less 3rd ed) Garfinkel-Schwartz-Spafford - Practical Unix and Internet Security 3rd ed, 2003 Zwicky-Cooper-Chapman - Building Internet Firewalls, 2nd ed, 2000 Mann-Mitchell-Krell - Linux System Security 2nd ed, 2002 Hoglund-McGraw - Exploiting Software: How to Break Code 1st ed, 2002 Howard-LeBlanc - Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World, 1st ed, 2002 Anley-Heasman-Lindner-Richarte - The Shellcoder s Handbook: Discovering and Exploiting Security Holes, 1st ed, 2007 Davis-Bodmer-LeMasters - Hacking Exposed: Malware and Rootkits, 1st ed, 2009

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 5 / 14 Prerequisites Computer Networks, strong emphasis on TCP/IP C, Python, Assembly Programming Linux system level knowledge Autonomy to research methods/solutions

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 6 / 14 Evaluation n written Exams: 2/4 of grade p practical Experiments: 1/4 k extra Assignments: 1/4 Note: the extra assignments factor on the grade may vary in the 0 100% range. Exams are individual: plagiarism not accepted Practical experiences in teams of 1 2 students

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 7 / 14 Introduction Failures and vulnerabilities, common practices and excuses, threats Vulnerabilities in general, risks, Internet history Increase of vulnerabilities and incidents, hacking history Classical incidents, parlance, ethics, policies (penetration testing)

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 8 / 14 Basic, assumed knowledge Unix services: rc scripts, Unix and TCP/IP sockets, xinetd, users/permissions Filesystems, suid, PAM, OTP, ACLs, capabilities Cryptography: basic functions, algorithms, secure communications, man-in-the-middle key management, certificates, PKI, OpenPGP

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 9 / 14 Network Security TCP/IP: protocols, addressing, CIDR, Ethernet, ARP, sniffing tools IP routing, IP spoofing, hijacking, MITM, ARP spoofing IP: attacks, fragmentation, Ping of Death ICMP: ping, attacjs, smurf, redirect, dest unreachable, time exceeded, traceroute UDP: header, spoofing, hijacking, NIS, NFS, portscan TCP: sequence, windows, flags, portscan, OS fingerprinting, spoofing/mitnick ISN, hijacking, hunt, ACK storm, SYN flooding/cookies, states IPSec: AH, ESP, modes, IKE, IPv6 Wireless: link level, CSMC/CA, modes, associations, energy, WEP/WPA, attacks sniffing, crypto attacks, DoS, injection, MITM, protections, 802.1x, wardriving

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 10 / 14 Protocol Analysis FTP: vulnerabilities, attacks/scan through bounce DNS: resolving, zone transfer, spoofing, hijacking, contamination, Kaminsky, Birthday Botnets: history, Drive-by downloads, architectures, evolution, uses

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 11 / 14 Network Defenses IDS, architectures, classification, abuse/anomaly, precision, IDMEF, NIDS/HIDS Sniffing: injection, evasion, dessynchronization, defragmentation TCP reassembly: alert and component correlation, normalization, pre-processing alert recombination, verification, attack sequence reconstruction packet filtering, secure channels, e-mail, VPN, https

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 12 / 14 Machine Defenses Software installation, backup, system accounting Event logging and monitoring, auditing, password scan file integrity, TCPWrapper, SELinux, VM

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 13 / 14 Application Security local and remote attacks, Unix processes, parameters, filesystems TOCTOU attacks, open files, assembly, memory addressing x86 registers, data sizes, signals, instructions, execution levels stack, frames, prologue/epilogue Object files:.com, a.out, PE, ELF. process data structures, gdb Buffer overflows: stack, shell code, syscalls, execve, string, egg, overrun Advanced attacks: setjmp/longjmp, off-by-one, array/integer/heap overflow teardrop, return-to-libc, chunk management, memory allocation, unlink macro, double free, C++ Vtables, format string, locale Solutions to overflow: static/dynamic analysis, libc replacement, confining, StackGuard, StackShield, Propolice, Windows, PaX, Armor

Paulo Lício de Geus SEGC-00 - Overview Detailed program March 3, 2015 14 / 14 Web Vulnerabilities Architecture, http, methods, status, headers, URI/URL/URN, authentication State, attached info, CGI, ASP, Servlets, PHP, Java Applets, ActiveX Scriptting languages, JavaScript, AJAX, XML, Mashups Authentication and authorization attacks, injection: PHP, HTML, SQL. XPath, LDAP XSS, reflection, solutions, CSRF/XSRF, HTTP attacks, scanners, crawling