SlideShare a Scribd company logo
1 of 60
Download to read offline
Hands-On Ethical Hacking
and Network Defense
Chapter 3
Network and Computer Attacks
Last modified 2-3-18
Objectives
Describe the different types of malicious
software
Describe methods of protecting against
malware attacks
Describe the types of network attacks
Identify physical security attacks and
vulnerabilities
Malicious Software (Malware)
Network attacks prevent a business from
operating
Malicious software (Malware) includes
■ Virus
■ Worms
■ Trojan horses
Goals
■ Destroy data
■ Corrupt data
■ Shutdown a network or system
Viruses
Virus attaches itself to an executable file
Can replicate itself through an executable
program
■ Needs a host program to replicate
No foolproof method of preventing them
Antivirus Software
Detects and removes viruses
Detection based on virus signatures
Must update signature database periodically
Use automatic update feature
Common Viruses
Base 64 Encoding
Used to evade anti-spam tools, and to
obscure passwords
Encodes six bits at a time (0 – 63) with a
single ASCII character
■ A - Z: 0 – 25
■ a – z: 26 – 51
■ 1 – 9: 52 – 61
■ + and - 62 and 63
See links Ch 3a, 3b
Base64 Example
ORACLE -> T1JBQ0xF
■ Link Ch 3r
Viruses (continued)
Commercial base 64 decoders
Shell
■ Executable piece of programming code
■ Should not appear in an e-mail attachment
Macro Viruses
Virus encoded as a macro
Macro
■ Lists of commands
■ Can be used in destructive ways
Example: Melissa
■ Appeared in 1999
■ It is very simple – see link Ch 3c for source
code
Writing Viruses
Even nonprogrammers

can create macro viruses
■ Instructions posted on 

Web sites
■ Virus creation kits available for download (see
link Ch 3d)
Security professionals can learn from
thinking like attackers
■ But don’t create and release a virus! People
get long prison terms for that.
Angler Exploit Kit
Link
Ch 3z
Link Ch 3za, 3zb
Worms
Worm
■ Replicates and propagates without a host,
often through email
Infamous examples
■ Code Red
■ Nimda
Can infect every computer in the world in
a short time
■ At least in theory
Spread of Code Red Worm
See link Ch 3u
ATM Machine Worms
■ Cyberattacks against ATM machines
■ Slammer and Nachi worms
■ Trend produces antivirus for ATM machines
See links Ch 3g, 3h, 3i
■ Nachi was written to clean up damage caused
by the Blaster worm, but it got out of control
See link Ch 3j
■ Diebold was criticized for using Windows for
ATM machines, which they also use on voting
machines
Important Worms
Trojan Programs
Insidious attack against networks
Disguise themselves as useful programs
■ Hide malicious content in program
Backdoors
Rootkits
■ Allow attackers remote access
Firewalls
Identify traffic on uncommon ports
Can block this type of attack, if your
firewall filters outgoing traffic
■ Windows Firewall in XP SP2, Vista, and Win 7
does not filter outgoing traffic by default
Trojan programs can use known ports to
get through firewalls
■ HTTP (TCP 80) or DNS (UDP 53)
Windows DLL Hijacking
Vulnerability
DLL files are loaded
from the incorrect
directory
Affects over 200
applications on
every version of
Windows
No good patch yet
(8-31-2010)
■ Link Ch 3s, 3t, 3w
Spyware
Sends information from the infected computer to
the attacker
■ Confidential financial data
■ Passwords
■ PINs
■ Any other stored data
Can register each keystroke entered (keylogger)
Prevalent technology
Educate users about spyware
Deceptive Dialog Box
Adware
Similar to spyware
■ Can be installed without the user being aware
Sometimes displays a banner
Main goal
■ Determine user’s online purchasing habits
■ Tailored advertisement
Main problem
■ Slows down computers
Protecting Against Malware Attacks
Difficult task
New viruses, worms, Trojan programs
appear daily
Antivirus programs offer a lot of protection
Educate your users about these types of
attacks
Virus Alert
Binary
Educating Your Users
Structural training
■ Includes all employees and management
■ E-mail monthly security updates
Update virus signature database
automatically
Educating Your Users
SpyBot and Ad-Aware
■ Help protect against spyware and adware
■ Windows Defender is excellent too
Firewalls
■ Hardware (enterprise solution)
■ Software (personal solution)
■ Can be combined
Intrusion Detection System (IDS)
■ Monitors your network 24/7
FUD
Fear, Uncertainty and Doubt
■ Avoid scaring users into complying with security
measures
■ Sometimes used by unethical security testers
■ Against the OSSTMM’s Rules of Engagement
Promote awareness rather than instilling
fear
■ Users should be aware of potential threats
■ Build on users’ knowledge
Link Ch 3v
Intruder Attacks on Networks and
Computers
Attack
■ Any attempt by an unauthorized person to access or use
network resources
Network security
■ Security of computers and other devices in a network
Computer security
■ Securing a standalone computer--not part of a network
infrastructure
Computer crime
■ Fastest growing type of crime worldwide
Denial-of-Service Attacks
Denial-of-Service (DoS) attack
■ Prevents legitimate users from accessing
network resources
■ Some forms do not involve computers, like
feeding a paper loop through a fax machine
DoS attacks do not attempt to access
information
■ Cripple the network
■ Make it vulnerable to other type of attacks
Testing for DoS Vulnerabilities
Performing an attack yourself is not wise
■ You only need to prove that an attack could be
carried out
Distributed Denial-of-Service Attacks
Attack on a host from multiple servers or
workstations
Network could be flooded with billions of
requests
■ Loss of bandwidth
■ Degradation or loss of speed
Often participants are not aware they are
part of the attack
■ They are remote-controlled "zombies"
CloudFlare
Stops DDoS attacks for free
Buffer Overflow Attacks
Vulnerability in poorly written code
■ Code does not check predefined size of input
field
Goal
■ Fill overflow buffer with executable code
■ OS executes this code
■ Can elevate attacker’s permission to
Administrator or even Kernel
Programmers need special training to write
secure code
Ping of Death Attacks
Type of DoS attack
Not as common as during the late 1990s
How it works
■ Attacker creates a large ICMP packet
More than 65,535 bytes
■ Large packet is fragmented at source network
■ Destination network reassembles large packet
■ Destination point cannot handle oversize packet and
crashes
■ Modern systems are protected from this (Link Ch 3n)
Link Ch3x
Ping Fragmentation Example
Fragrouter Demo
Kali Linux
■ fragrouter –F 1
Another VM on same network, set default
route to Kali's IP address
All network traffic will be fragmented at
layer 3 into 8-byte packets
Often bypasses IDS
Session Hijacking
Enables attacker to interrupt a TCP
session
Taking over another user's session
Addressing Physical Security
Protecting a network also requires
physical security
Inside attacks are more likely than attacks
from outside the company
Insider Threats
CCSF's CTO
San Francisco's NetAdmin
Cyber-Bullying Accusation
Insider Threats
¾ of the serious attacks on me were from
industry insiders
Anonymous attacked one of my servers,
but failed
■ Because an Anonymous insider warned me
Keyloggers
Used to capture keystrokes on a computer
■ Hardware
■ Software
Software
■ Behaves like Trojan programs
Hardware
■ Easy to install
■ Goes between the keyboard and the CPU
■ KeyKatcher and KeyGhost
Keyloggers (continued)
Protection
■ Software-based
Antivirus
■ Hardware-based
Random visual tests
Look for added hardware
Superglue keyboard connectors in
Behind Locked Doors
Lock up your servers
■ Physical access means they can hack in
■ Consider Ophcrack – booting to a CD-based
OS will bypass almost any security
Lockpicking
Average person can pick deadbolt locks in
less than five minutes
■ After 30 min. of practice
Experienced hackers can pick deadbolt
locks in under 30 seconds
Bump keys are even easier (Link Ch 3o)
Card Reader Locks
Keep a log of who
enters and leaves the
room
Security cards can be
used instead of keys
for better security
■ Image from link Ch 3p
Binary

More Related Content

What's hot

Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessLeon Teale
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonBen Boyd
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksSam Bowne
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attackKaustubh Padwad
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web ServersSam Bowne
 
CNIT 123 Ch 10: Hacking Web Servers
CNIT 123 Ch 10: Hacking Web ServersCNIT 123 Ch 10: Hacking Web Servers
CNIT 123 Ch 10: Hacking Web ServersSam Bowne
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for BeginnersSKMohamedKasim
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And PreventionNicholas Davis
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghOWASP Delhi
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual Vivek Kumar Sinha
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewSam Bowne
 

What's hot (20)

Reconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awarenessReconnaissance - For pentesting and user awareness
Reconnaissance - For pentesting and user awareness
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
NMAP
NMAPNMAP
NMAP
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
 
DNS Attacks
DNS AttacksDNS Attacks
DNS Attacks
 
CNIT 123 Ch 10: Hacking Web Servers
CNIT 123 Ch 10: Hacking Web ServersCNIT 123 Ch 10: Hacking Web Servers
CNIT 123 Ch 10: Hacking Web Servers
 
Ceh v5 module 04 enumeration
Ceh v5 module 04 enumerationCeh v5 module 04 enumeration
Ceh v5 module 04 enumeration
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
Network security Lab manual
Network security Lab manual Network security Lab manual
Network security Lab manual
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
 
Ransomware
RansomwareRansomware
Ransomware
 
Supply chain-attack
Supply chain-attackSupply chain-attack
Supply chain-attack
 

Similar to CNIT 123: Ch 3: Network and Computer Attacks

CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksSam Bowne
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric VanderburgEric Vanderburg
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITYKak Yong
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfAsmaaLafi1
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewareAJAY VISHKARMA
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacksphanleson
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsCSCJournals
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptxKarthikShivanand
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Securityxsy
 

Similar to CNIT 123: Ch 3: Network and Computer Attacks (20)

CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
 
Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Lecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdfLecture 3 Security terminologies.pdf
Lecture 3 Security terminologies.pdf
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Communication security
Communication securityCommunication security
Communication security
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 

More from Sam Bowne

3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

CNIT 123: Ch 3: Network and Computer Attacks

  • 1. Hands-On Ethical Hacking and Network Defense Chapter 3 Network and Computer Attacks Last modified 2-3-18
  • 2. Objectives Describe the different types of malicious software Describe methods of protecting against malware attacks Describe the types of network attacks Identify physical security attacks and vulnerabilities
  • 3. Malicious Software (Malware) Network attacks prevent a business from operating Malicious software (Malware) includes ■ Virus ■ Worms ■ Trojan horses Goals ■ Destroy data ■ Corrupt data ■ Shutdown a network or system
  • 4. Viruses Virus attaches itself to an executable file Can replicate itself through an executable program ■ Needs a host program to replicate No foolproof method of preventing them
  • 5. Antivirus Software Detects and removes viruses Detection based on virus signatures Must update signature database periodically Use automatic update feature
  • 7. Base 64 Encoding Used to evade anti-spam tools, and to obscure passwords Encodes six bits at a time (0 – 63) with a single ASCII character ■ A - Z: 0 – 25 ■ a – z: 26 – 51 ■ 1 – 9: 52 – 61 ■ + and - 62 and 63 See links Ch 3a, 3b
  • 8. Base64 Example ORACLE -> T1JBQ0xF ■ Link Ch 3r
  • 9. Viruses (continued) Commercial base 64 decoders Shell ■ Executable piece of programming code ■ Should not appear in an e-mail attachment
  • 10. Macro Viruses Virus encoded as a macro Macro ■ Lists of commands ■ Can be used in destructive ways Example: Melissa ■ Appeared in 1999 ■ It is very simple – see link Ch 3c for source code
  • 11. Writing Viruses Even nonprogrammers
 can create macro viruses ■ Instructions posted on 
 Web sites ■ Virus creation kits available for download (see link Ch 3d) Security professionals can learn from thinking like attackers ■ But don’t create and release a virus! People get long prison terms for that.
  • 14. Worms Worm ■ Replicates and propagates without a host, often through email Infamous examples ■ Code Red ■ Nimda Can infect every computer in the world in a short time ■ At least in theory
  • 15. Spread of Code Red Worm See link Ch 3u
  • 16. ATM Machine Worms ■ Cyberattacks against ATM machines ■ Slammer and Nachi worms ■ Trend produces antivirus for ATM machines See links Ch 3g, 3h, 3i ■ Nachi was written to clean up damage caused by the Blaster worm, but it got out of control See link Ch 3j ■ Diebold was criticized for using Windows for ATM machines, which they also use on voting machines
  • 18. Trojan Programs Insidious attack against networks Disguise themselves as useful programs ■ Hide malicious content in program Backdoors Rootkits ■ Allow attackers remote access
  • 19. Firewalls Identify traffic on uncommon ports Can block this type of attack, if your firewall filters outgoing traffic ■ Windows Firewall in XP SP2, Vista, and Win 7 does not filter outgoing traffic by default Trojan programs can use known ports to get through firewalls ■ HTTP (TCP 80) or DNS (UDP 53)
  • 20.
  • 21. Windows DLL Hijacking Vulnerability DLL files are loaded from the incorrect directory Affects over 200 applications on every version of Windows No good patch yet (8-31-2010) ■ Link Ch 3s, 3t, 3w
  • 22. Spyware Sends information from the infected computer to the attacker ■ Confidential financial data ■ Passwords ■ PINs ■ Any other stored data Can register each keystroke entered (keylogger) Prevalent technology Educate users about spyware
  • 24. Adware Similar to spyware ■ Can be installed without the user being aware Sometimes displays a banner Main goal ■ Determine user’s online purchasing habits ■ Tailored advertisement Main problem ■ Slows down computers
  • 25. Protecting Against Malware Attacks Difficult task New viruses, worms, Trojan programs appear daily Antivirus programs offer a lot of protection Educate your users about these types of attacks
  • 27.
  • 29. Educating Your Users Structural training ■ Includes all employees and management ■ E-mail monthly security updates Update virus signature database automatically
  • 30. Educating Your Users SpyBot and Ad-Aware ■ Help protect against spyware and adware ■ Windows Defender is excellent too Firewalls ■ Hardware (enterprise solution) ■ Software (personal solution) ■ Can be combined Intrusion Detection System (IDS) ■ Monitors your network 24/7
  • 31. FUD Fear, Uncertainty and Doubt ■ Avoid scaring users into complying with security measures ■ Sometimes used by unethical security testers ■ Against the OSSTMM’s Rules of Engagement Promote awareness rather than instilling fear ■ Users should be aware of potential threats ■ Build on users’ knowledge
  • 33. Intruder Attacks on Networks and Computers Attack ■ Any attempt by an unauthorized person to access or use network resources Network security ■ Security of computers and other devices in a network Computer security ■ Securing a standalone computer--not part of a network infrastructure Computer crime ■ Fastest growing type of crime worldwide
  • 34. Denial-of-Service Attacks Denial-of-Service (DoS) attack ■ Prevents legitimate users from accessing network resources ■ Some forms do not involve computers, like feeding a paper loop through a fax machine DoS attacks do not attempt to access information ■ Cripple the network ■ Make it vulnerable to other type of attacks
  • 35. Testing for DoS Vulnerabilities Performing an attack yourself is not wise ■ You only need to prove that an attack could be carried out
  • 36. Distributed Denial-of-Service Attacks Attack on a host from multiple servers or workstations Network could be flooded with billions of requests ■ Loss of bandwidth ■ Degradation or loss of speed Often participants are not aware they are part of the attack ■ They are remote-controlled "zombies"
  • 38. Buffer Overflow Attacks Vulnerability in poorly written code ■ Code does not check predefined size of input field Goal ■ Fill overflow buffer with executable code ■ OS executes this code ■ Can elevate attacker’s permission to Administrator or even Kernel Programmers need special training to write secure code
  • 39.
  • 40. Ping of Death Attacks Type of DoS attack Not as common as during the late 1990s How it works ■ Attacker creates a large ICMP packet More than 65,535 bytes ■ Large packet is fragmented at source network ■ Destination network reassembles large packet ■ Destination point cannot handle oversize packet and crashes ■ Modern systems are protected from this (Link Ch 3n)
  • 43. Fragrouter Demo Kali Linux ■ fragrouter –F 1 Another VM on same network, set default route to Kali's IP address All network traffic will be fragmented at layer 3 into 8-byte packets Often bypasses IDS
  • 44.
  • 45. Session Hijacking Enables attacker to interrupt a TCP session Taking over another user's session
  • 46. Addressing Physical Security Protecting a network also requires physical security Inside attacks are more likely than attacks from outside the company
  • 51. Insider Threats ¾ of the serious attacks on me were from industry insiders Anonymous attacked one of my servers, but failed ■ Because an Anonymous insider warned me
  • 52. Keyloggers Used to capture keystrokes on a computer ■ Hardware ■ Software Software ■ Behaves like Trojan programs Hardware ■ Easy to install ■ Goes between the keyboard and the CPU ■ KeyKatcher and KeyGhost
  • 53.
  • 54.
  • 55. Keyloggers (continued) Protection ■ Software-based Antivirus ■ Hardware-based Random visual tests Look for added hardware Superglue keyboard connectors in
  • 56. Behind Locked Doors Lock up your servers ■ Physical access means they can hack in ■ Consider Ophcrack – booting to a CD-based OS will bypass almost any security
  • 57. Lockpicking Average person can pick deadbolt locks in less than five minutes ■ After 30 min. of practice Experienced hackers can pick deadbolt locks in under 30 seconds Bump keys are even easier (Link Ch 3o)
  • 58. Card Reader Locks Keep a log of who enters and leaves the room Security cards can be used instead of keys for better security ■ Image from link Ch 3p
  • 59.