CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004



Similar documents
CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 6

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 21

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CS5008: Internet Computing

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Security: Attack and Defense

Certified Ethical Hacker (CEH)

CMPT 471 Networking II

Network Attacks and Defenses

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Penetration Testing Report Client: Business Solutions June 15 th 2015

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

SCP - Strategic Infrastructure Security

Chapter 11 Phase 5: Covering Tracks and Hiding

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Network Security. Network Packet Analysis

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Windows Remote Access

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Learn Ethical Hacking, Become a Pentester

Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology Xiaoqin Song 1

Network Security in Practice

Firewalls Netasq. Security Management by NETASQ

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Networking: EC Council Network Security Administrator NSA

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Client Server Registration Protocol

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Directory and File Transfer Services. Chapter 7

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

TELE 301 Network Management. Lecture 16: Remote Terminal Services

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Attacks and Defense. Phase 1: Reconnaissance

Stop that Big Hack Attack Protecting Your Network from Hackers.

Network and Host-based Vulnerability Assessment

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Developing Network Security Strategies

Secure Software Programming and Vulnerability Analysis

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

How To Secure An Rsa Authentication Agent

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

8 Steps for Network Security Protection

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Vulnerability Assessment and Penetration Testing

8 Steps For Network Security Protection

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Wireless Encryption Protection

SYSTEM ADMINISTRATION MTAT LECTURE 8 SECURITY

Setting Up Scan to SMB on TaskALFA series MFP s.

Network Security and Firewall 1

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

How To Protect Your Network From Attack From A Hacker On A University Server

McAfee.com Personal Firewall

Topics in Network Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Network Instruments white paper

Payment Card Industry (PCI) Data Security Standard

Linux Network Security

Web Plus Security Features and Recommendations

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Who is Watching You? Video Conferencing Security

Cybernetic Proving Ground

Securing Cisco Network Devices (SND)

Rapid Vulnerability Assessment Report

Assessing Network Security

Barracuda Intrusion Detection and Prevention System

Introduction of Intrusion Detection Systems

Network Threats and Vulnerabilities. Ed Crowley

Project 2: Firewall Design (Phase I)

Network Security Audit. Vulnerability Assessment (VA)

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Project 2: Penetration Testing (Phase II)

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore

Transcription:

CSE331: Introduction to Networks and Security Lecture 32 Fall 2004

Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider attacks Carried out from within Attacker may have an account on the attacked system E.g. Disgruntled employees, spies, knowledgeable former employees Both can make effective use of: Social engineering System vulnerabilities CSE331 Fall 2004 2

External Attacks Attacks usually consist of several stages: Finding software vulnerabilities Exploiting them Hiding/cleaning up the exploit Finding vulnerabilities: What machines are available? What OS / version / patch level are the machines running? What additional software is running? What is the network topology? How detectible will the attack be? How can the attacker cover her tracks? CSE331 Fall 2004 3

Attacker Reconnaissance Network Scanning Existence of machines at IP addresses Attempt to determine network topology ping, tracert Port scanners Try to detect what processes are running on which ports, which ports are open to connections. Typical machine on the internet gets 10-20 port scans per day! Web services Use a browser to search for CGI scripts, Javascript, etc. CSE331 Fall 2004 4

Defenses Disable ping service, unneeded ports Not always possible (you do want some connectivity!) Firewalls and NATs Filter out inappropriate packets Scanners use broadcast, multicast packets, clever port/flag combinations to thwart firewall filters Keep audit logs of requests Generates a lot of data, hard to sift through Clever port scan packages use a drip scan approach, sprinkling their scan packets sparsely across several hours or days CSE331 Fall 2004 5

Determining OS information Gives a lot of information that can help an attacker carry out exploits Exact version of OS code can be correlated with vulnerability databases Sadly, often simple to obtain this information: Just try telnet playground~> telnet hpux.u-aizu.ac.jp Trying 163.143.103.12... Connected to hpux.u-aizu.ac.jp. Escape character is '^]'. HP-UX hpux B.10.01 A 9000/715 (ttyp2) login: CSE331 Fall 2004 6

Determining OS Or ftp: $ ftp ftp.netscape.com 21 Connected to ftp.gftp.netscape.com. 220-36 220 ftpnscp.newaol.com FTP server (SunOS 5.8) ready. Name (ftp.netscape.com:stevez): 331 Password required for stevez. Password: 530 Login incorrect. ftp: Login failed. Remote system type is UNIX. Using binary mode to transfer files. ftp> system 215 UNIX Type: L8 Version: SUNOS ftp> CSE331 Fall 2004 7

Determining OS Exploit different implementations of protocols Different OS s have different behavior in some cases Consider TCP protocol, there are many flags and options, and some unspecified behavior Reply to bogus FIN request for TCP port (should not reply, but some OS s do) Handling of invalid flags in TCP packets (some OS s keep the invalid flags set in reply) Initial values for RWS, pattern in random sequence numbers, etc. Can narrow down the possible OS based on the combination of implementation features Tools can automate this process CSE331 Fall 2004 8

Nmap screen shot http://www.insecure.org/nmap http://www.insecure.org/nmap/nmap-fingerprinting-article.html CSE331 Fall 2004 9

Exploiting Vulnerabilities Format string vulnerabilities Command injection SQL injection against databases Application-level DoS Make use of application knowledge Network-level DoS Look for buffer overflows OS/architecture information is useful to craft appropriate attack data CSE331 Fall 2004 10

Covering tracks Use network topology information to exploit nearby machines Hiding attacker s identity Use uplink to unprotected wireless (802.11) networks Tunnel through multiple administrative domains in different regions (e.g. go Starbucks -> China -> Russia -> U.S.) Distributed ISP s can t easily share audit logs. If exploit is successful use secure software! SSH instead of Telnet (means attacker actions can t be observed) Use root privileges to clean up logs Reboot machines that may have crashed Install rootkit / modify kernel so that further audits won t detect it CSE331 Fall 2004 11

Rootkits Patches or Kernel code that provides attackers a back door Override some kernel behavior Replace WinNT s QueryDirectoryFile() kernel call with one that hides files and directories that begin with a particular string (e.g. _root_ ) Installed as a Device driver Binary patch to kernel code for SeAccessCheck() Critical function for the reference monitor in WinNT A 2 bit change can disable all access controls! Countermeasures? Secure hardware / secure coprocessors Not very common CSE331 Fall 2004 12

Reflections on Trusting Trust If the TCB is compromised, then it is almost impossible to detect it. Ken Thompson article: http://www.acm.org/classics/sep95/ Modify a compiler so that it incorrectly compiles the login program, but otherwise does the right thing Compile the compiler with itself ( bootstrap ) Completely hides the attack inside the executable extremely hard to detect CSE331 Fall 2004 13

Insider Attacks Trojan Horses Planted by successful external attack Purposefully added by internal attacker Out-of-band attacks Simply print the secret document and put it in your briefcase Swap the hardware CSE331 Fall 2004 14

Salami Attacks Programs that compute money are targets of this attack Use subtle rounding errors Often distribute errors among many transactions Accumulate small amounts of money Example: 6.5% (annual) interest on $102.87 for 31 days is $0.5495726 Instead of rounding to $0.55, round to $0.54 Funnel the extra penny somewhere else CSE331 Fall 2004 15

Covert Channels Program that leaks confidential information intentionally via secret channels. Not that hard to leak a small amount of data A 64 bit shared key is quite small! Example channels Adjust the formatting of output: use the \t character for 1 and 8 spaces for 0 Vary timing behavior based on key CSE331 Fall 2004 16

Differential Power Analysis Read the value of a DES password off of a smartcard by watching power consumption! This figure shows simple power analysis of DES encryption. The 16 rounds are clearly visible. CSE331 Fall 2004 17

TEMPEST Security Transient Electromagnetic Pulse Emanation Standard (Or?) Temporary Emanation and Spurious Transmission Emission security (Van Eck phreaking) computer monitors and other devices give off electromagnetic radiation With the right antenna and receiver, these emanations can be intercepted from a remote location, and then be redisplayed (in the case of a monitor screen) or recorded and replayed (such as with a printer or keyboard). CSE331 Fall 2004 18

TEMPEST Policy is set in National Communications Security Committee Directive 4 Guidelines for preventing EM reception Shield the device (expensive) Shield a location (inconvenient?) Not a risk? Most of the guidelines are classified! CSE331 Fall 2004 19

Defenses for Covert Channels Well specified security policies at the human level Auditing mechanisms at the human level Justify prosecution if the attacker is caught Code review This is a form of audit Automated program analysis Type systems that let programmers specify confidentiality labels But, not much you can do against a determined insider CSE331 Fall 2004 20