CNT4406/5412 Network Security Introduction



Similar documents
CS5008: Internet Computing

The Anonymous attack on HBGary. Jarib Rahman March 19 th, 2012

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CSC 474 Information Systems Security

COSC 472 Network Security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Client Server Registration Protocol

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

What is Web Security? Motivation

Firewalls and Intrusion Detection

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Network Security: Introduction

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Security Goals Services

Secure Software Programming and Vulnerability Analysis

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Taxonomic Modeling of Security Threats in Software Defined Networking

CPSC 467: Cryptography and Computer Security

Abstract. Introduction. Section I. What is Denial of Service Attack?

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Network Security Fundamentals

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Thick Client Application Security

Security: Attack and Defense

Security vulnerabilities in the Internet and possible solutions

CSCI 4541/6541: NETWORK SECURITY

True False questions (25 points + 5 points extra credit)

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks


Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Frequent Denial of Service Attacks

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

CPSC 467b: Cryptography and Computer Security

Certified Ethical Hacker (CEH)

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Lecture 1 - Overview

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

Module 4 Protection of Information Systems Infrastructure and Information Assets. Chapter 6: Network Security

Weighted Total Mark. Weighted Exam Mark

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Chapter 6: Fundamental Cloud Security

Application Intrusion Detection

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

SECURITY FLAWS IN INTERNET VOTING SYSTEM

How To Classify A Dnet Attack

How To Protect Your Data From Attack

General Network Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 8 Security Pt 2

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

Securing Cisco Network Devices (SND)

Chapter 7: Network security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network Security. Network Security Hierarchy. CISCO Security Curriculum

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

information security and its Describe what drives the need for information security.

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Detailed Description about course module wise:

CSC574 - Computer and Network Security Module: Introduction

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Chapter 7 Transport-Level Security

Juniper Networks Secure

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Security: Focus of Control. Authentication

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

CS 356 Lecture 16 Denial of Service. Spring 2013

Module: Introduction. Professor Trent Jaeger Fall CSE543 - Introduction to Computer and Network Security

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Taxonomic Modeling of Security Threats in Software Defined Networking. Jennia Hizver PhD in Computer Science

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

CS 3251: Computer Networking 1 Security Protocols I

CYBERTRON NETWORK SOLUTIONS

Acquia Cloud Edge Protect Powered by CloudFlare

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Protocol Rollback and Network Security

A S B

Passing PCI Compliance How to Address the Application Security Mandates

A Decision Maker s Guide to Securing an IT Infrastructure

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Cloud Security Lecture

CSE343/443 Lehigh University Fall Course Overview. Presenter: Yinzhi Cao Lehigh University

The Top Web Application Attacks: Are you vulnerable?

Transcription:

CNT4406/5412 Network Security Introduction Zhi Wang Florida State University Fall 2014 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 35

Introduction What is Security? Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 2 / 35

Introduction Integrity Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity e.g., data integrity, code integrity Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 35

Introduction Confidentiality Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information e.g., secrecy, privacy Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 4 / 35

Introduction Availability Ensuring timely and reliable access to and use of information Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 35

Introduction Security and CIA Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 35

VS. Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 7 / 35

Who is Anonymous Anonymous is a loosely associated hacktivist group originated on the imageboard 4chan in 2003 associated with collaborative hacktivism since 2008 responsible for many high-profile attacks: DDOS attacks against IFPI, MPAA for file sharing site closure, VISA, MasterCard and PayPal to support WikiLeaks named by Time as one of the most influential people in 2012 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 8 / 35

Who is HBGary HBGary is a security company founded by Greg Hoglund (rootkit.com) in 2003 it had two firms, HBGary and HBGary Federal HBF was led by Aaron Barr focusing on the U.S federal government Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 35

Who is HBGary HBGary is a security company founded by Greg Hoglund (rootkit.com) in 2003 it had two firms, HBGary and HBGary Federal HBF was led by Aaron Barr focusing on the U.S federal government HBGary was sold to ManTech after being hacked Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 35

What Happened Anonymous poses serious security threats Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 10 / 35

What Happened Anonymous poses serious security threats Aaron claimed to have unmasked Anonymous members by correlating social media in early 2011 proposed a talk titled who needs NSA when we have social media? at the B-Sides conference to sell his idea intended to sell his list to FBI Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 10 / 35

What Happened Anonymous poses serious security threats Aaron claimed to have unmasked Anonymous members by correlating social media in early 2011 proposed a talk titled who needs NSA when we have social media? at the B-Sides conference to sell his idea intended to sell his list to FBI Anonymous compromised the HBGary in Feb 2011 compromised the websites posted lots of documents and emails online usurped Aaron s Twitter Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 10 / 35

Steps of an Attack Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Steps of an Attack Reconnoiter to identify vulnerabilities Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Exploit vulnerabilities to take over (own) systems Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Exploit vulnerabilities to take over (own) systems SQL injection, buffer overflow, format string vulnerability... Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Exploit vulnerabilities to take over (own) systems SQL injection, buffer overflow, format string vulnerability... Harvest information, install malware/backdoors document, design, email... Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

Steps of an Attack Reconnoiter to identify vulnerabilities software configuration, network topologic, servers... Exploit vulnerabilities to take over (own) systems SQL injection, buffer overflow, format string vulnerability... Harvest information, install malware/backdoors document, design, email... Cover it up: files, logs... Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 35

The HBGary Hacking: Reconnaissance Hbgaryfederal.com was powered by a third-party CMS with SQL injection vulnerabilities an example of the SQL inject vulnerability: statement = SELECT * FROM users WHERE name = + username + ; username = or 1 = 1 - - SELECT * FROM users WHERE name = OR 1 = 1 - - ; Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 35

The HBGary Hacking: Reconnaissance Hbgaryfederal.com was powered by a third-party CMS with SQL injection vulnerabilities an example of the SQL inject vulnerability: statement = SELECT * FROM users WHERE name = + username + ; username = or 1 = 1 - - SELECT * FROM users WHERE name = OR 1 = 1 - - ; The vulnerable URL is: http://www.hbgaryfederal.com/pages.php?pagenav=2&page=27 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 35

The HBGary Hacking: Reconnaissance Hbgaryfederal.com was powered by a third-party CMS with SQL injection vulnerabilities an example of the SQL inject vulnerability: statement = SELECT * FROM users WHERE name = + username + ; username = or 1 = 1 - - SELECT * FROM users WHERE name = OR 1 = 1 - - ; The vulnerable URL is: http://www.hbgaryfederal.com/pages.php?pagenav=2&page=27 User database was retrieved from CMS: CMS admins usernames, email addresses, and password hashes Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 35

The HBGary Hacking: Password Cracking Three properties of an ideal cryptographic hash function: one-way property: given h, it s infeasible to find m with h = H(m) Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 35

The HBGary Hacking: Password Cracking Three properties of an ideal cryptographic hash function: one-way property: given h, it s infeasible to find m with h = H(m) weak collision resistance: given m 1, it s infeasible to find m 2 with H(m 1 ) = H(m 2 ) Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 35

The HBGary Hacking: Password Cracking Three properties of an ideal cryptographic hash function: one-way property: given h, it s infeasible to find m with h = H(m) weak collision resistance: given m 1, it s infeasible to find m 2 with H(m 1 ) = H(m 2 ) strong collision resistance: it s infeasible to find m 1 and m 2 with H(m 1 ) = H(m 2 ) Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 35

The HBGary Hacking: Password Cracking Three properties of an ideal cryptographic hash function: one-way property: given h, it s infeasible to find m with h = H(m) weak collision resistance: given m 1, it s infeasible to find m 2 with H(m 1 ) = H(m 2 ) strong collision resistance: it s infeasible to find m 1 and m 2 with H(m 1 ) = H(m 2 ) Brutal force is the main method to guess passwords Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 35

The HBGary Hacking: Password Cracking Brute-forcing passwords has never been easier more than 100 million real-world passwords are leaked real-world passwords instead of words in a dictionary patterns in password construction Rainbow tables, pre-computed hashes, are widely available super computing power is cheap and available: cloud, GPGPU Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 14 / 35

The HBGary Hacking: Password Insecurity Weak passwords CEO and COO of HBF uses weak passwords in a rainbow table Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 35

The HBGary Hacking: Password Insecurity Weak passwords CEO and COO of HBF uses weak passwords in a rainbow table Password reuse average web user has 25 accounts, but uses just 6.5 passwords both CEO and COO reuse the passwords across their accounts Aaron (CEO) is the Google Apps (email) administrator access to anyone s email, including Greg Hoglund Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 35

The HBGary Hacking: Password Insecurity Weak passwords CEO and COO of HBF uses weak passwords in a rainbow table Password reuse average web user has 25 accounts, but uses just 6.5 passwords both CEO and COO reuse the passwords across their accounts Aaron (CEO) is the Google Apps (email) administrator access to anyone s email, including Greg Hoglund Public key authentication is not used for SSH by Aaron Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 35

The HBGary Hacking: Host Insecurity Privilege-escalation vulnerabilities the attacker owned an unprivileged account by a reused password he then owned the system by exploiting such a vulnerability: GNU dynamic linker expands $ORIGIN in library search path for setuid applications Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 35

The HBGary Hacking: Social Engineering Authentic information was used to bypass authentication Grey Hoglund is the creator of rootkit.com Grey s email is compromised, which allows to impersonate him His compromised email leaked two pieces of information: the hashes of the root password in rootkit.com Jussi at Nokia has root access to rootkit.com Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 35

The HBGary Hacking: Social Engineering Authentic information was used to bypass authentication Grey Hoglund is the creator of rootkit.com Grey s email is compromised, which allows to impersonate him His compromised email leaked two pieces of information: the hashes of the root password in rootkit.com Jussi at Nokia has root access to rootkit.com Jussi was convinced and handed over Grey s account he authenticated Grey by shared secret Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 35

The HBGary Hacking: Social Engineering Authentic information was used to bypass authentication Grey Hoglund is the creator of rootkit.com Grey s email is compromised, which allows to impersonate him His compromised email leaked two pieces of information: the hashes of the root password in rootkit.com Jussi at Nokia has root access to rootkit.com Jussi was convinced and handed over Grey s account he authenticated Grey by shared secret the attack was claimed to be executed by a teenage girl Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 35

More Security Incidents Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 18 / 35

Surveillance State Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 19 / 35

Course Mechanisms In This Course Explore fundamental issues that cause this insecurity from both network and systems POV Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 20 / 35

Course Mechanisms In This Course Explore fundamental issues that cause this insecurity from both network and systems POV Explain defense mechanisms that mitigate these issues Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 20 / 35

Course Mechanisms In This Course Explore fundamental issues that cause this insecurity from both network and systems POV Explain defense mechanisms that mitigate these issues Cover the topics of: cryptography, hashes and message digests, public key cryptography, important standards such as PKI, SSL, SSH, and IPSec, operating system security Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 20 / 35

Course Mechanisms You Should Know TCP/IP networking Operating systems architecture and design e.g., virtual memory, file systems, networking,... Discrete mathematics Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 21 / 35

Course Mechanisms Course Materials Course website: http://www.cs.fsu.edu/ zwang/cnt5412.html course schedules, assignments, slides, Course textbook Kaufman, C., Perlman, R., and Speciner, M., Network Security: Private Communication in a Public World, 2nd Edition, Prentice Hall 2002 Office hour: Monday 2:30-4:30pm, or by appointment come to the office hour for help! Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 22 / 35

Course Mechanisms Grading item percentage homework 30% project 30% midterm 30% quizzes 10% Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 23 / 35

Course Mechanisms Course Policy Academic honor policy: zero-tolerance for cheating http://academichonor.fsu.edu Ethics: act responsibly in security practices Disabilities: contact the instructor for accommodation Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 24 / 35

A Primer on Networking OSI Reference Model Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 25 / 35

A Primer on Networking Network Security Layers Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 26 / 35

A Primer on Networking Data Encapsulation/Fragmentation Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 27 / 35

A Primer on Networking IP Header Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 28 / 35

A Primer on Networking TCP Header Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 29 / 35

A Primer on Networking TCP State Machine Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 30 / 35

A Primer on Networking Active and Passive Attack Passive attack: intruder eavesdrops, but does not modify the message unencrypted messages, side channel attacks (tax, health) Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 31 / 35

A Primer on Networking Active and Passive Attack Passive attack: intruder eavesdrops, but does not modify the message unencrypted messages, side channel attacks (tax, health) Active attack: intruder may transmit, replay, modify, delete messages man-in-the-middle, Denial-of-service Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 31 / 35

A Primer on Networking Denial-of-Service (DOS) Attack Exploit legitimate behavior or vulnerabilities with crafted packets E-Mail bomb: sending auto-generated emails to victim smurf: sending ICMP echo (ping) traffic to IP broadcast address with a spoofed source address of a victim tear drop: overlapping (fragmented) packets SYN flood: sending lots of TCP SYN packets Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 32 / 35

A Primer on Networking Denial-of-Service (DOS) Attack Exploit legitimate behavior or vulnerabilities with crafted packets E-Mail bomb: sending auto-generated emails to victim smurf: sending ICMP echo (ping) traffic to IP broadcast address with a spoofed source address of a victim tear drop: overlapping (fragmented) packets SYN flood: sending lots of TCP SYN packets Launch Distributed DOS (DDOS) with botnets Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 32 / 35

A Primer on Networking Personae Alice: Bob, Carol, Dave: Eve: Trudy: first participant second, third, fourth participant eavesdropper malicious active attacker Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 33 / 35

A Primer on Networking Secure Communication Secrecy: Alice can send a message to Bob only he can read Authentication: Bob knows for sure that Alice sent it Nonrepudiation : Alice can t deny she sent the message Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 34 / 35

A Primer on Networking Summary What is security Real-world attacks Course mechanisms A primer of networking Next lecture: Introduction to cryptography Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 35 / 35