Documente Academic
Documente Profesional
Documente Cultură
Hackers
Topics
Crisis Computer Crimes Hacker Attacks Modes of Computer Security
Password Security Network Security Web Security Distributed Systems Security Database Security
Crisis
Internet as !rown "ery fast and security as #a!!ed be ind$ %e!ions of ackers a"e emer!ed as impedance to enterin! t e ackers c#ub is #ow$ It is ard to trace t e perpetrator of cyber attacks since t e rea# identities are camouf#a!ed It is "ery ard to track down peop#e because of t e ubi&uity of t e network$ %ar!e sca#e fai#ures of internet can a"e a catastrop ic impact on t e economy w ic re#ies ea"i#y on e#ectronic transactions
In '()) a *worm pro!ram* written by a co##e!e student s ut down about '+ percent of computers connected to t e Internet$ , is was t e be!innin! of t e era of cyber attacks$ ,oday we a"e about '+-+++ incidents of cyber attacks w ic are reported and t e number !rows$
Why Security?
Some of the sites which have been compromised
U.S. Department of Commerce NASA CIA Greenpeace Motorola UNIC ! Ch"rch of Christ # $ahoo Microsoft Ama%on #
*assive Attac&s
Sniffin(
*asswords Networ& +raffic Sensitive Information
Information Gatherin(
Spoo#ing
Definition/
An attac&er alters his identit. so that some one thin&s he is some one else mail0 User ID0 I* Address0 # Attac&er e1ploits tr"st relation between "ser and networ&ed machines to (ain access to machines
+.pes of Spoofin(/
2. I* Spoofin(/ 3. mail Spoofin( 4. 5eb Spoofin(
Definition/ Attac&er "ses I* address of another comp"ter to ac6"ire information or (ain access
Replies sent back to 10.10.20.30
Attac&er chan(es his own I* address to spoofed address Attac&er can send messa(es to a machine mas6"eradin( as spoofed machine Attac&er can not receive messa(es from that machine
Attacker 10.10.50.50
Definition/ Attac&er spoofs the address of another machine and inserts itself between the attac&ed machine and the spoofed machine to intercept replies
Attacker intercepts packets as the !o to 10.10.20.30 From Address: 10.10.20.30 To Address: 10.10.5.5 Replies sent back to 10.10.20.30 Spoofed Address 10.10.20.30 Attacker 10.10.50.50 John 10.10.5.5
+he path a pac&et ma. chan(e can var. over time +o ens"re that he sta.s in the loop the attac&er "ses so"rce ro"tin( to ens"re that the pac&et passes thro"(h certain nodes on the networ&
*m i( Spoo#ing
Definition/
Attac&er sends messa(es mas6"eradin( as some one else 5hat can be the reperc"ssions7
2. +elnet to port 3:
We+ Spoo#ing
'asic
Attac&er re(isters a web address matchin( an entit. e.(. voteb"sh.com0 (eprod"cts.com0 (es"c&s.com Attac&er acts as a pro1. between the web server and the client Attac&er has to compromise the ro"ter or a node thro"(h which the relevant traffic flows Attac&er redirects web traffic to another site that is controlled b. the attac&er Attac&er writes his own web site address before the le(itimate lin& 5hen a "ser lo(s on to a site a persistent a"thentication is maintained +his a"thentication can be stolen for mas6"eradin( as the "ser
Man;in;the;Middle Attac&
U)- )ewritin(
+rac&in( State
5eb Site maintains a"thentication so that the "ser does not have to a"thenticate repeatedl. +hree t.pes of trac&in( methods are "sed/
2. Coo&ies/ -ine of te1t with ID on the "sers coo&ie file
Attac&er can read the ID from "sers coo&ie file
2. U)- Session +rac&in(/ An id is appended to all the lin&s in the website web pa(es.
Attac&er can ("ess or read this id and mas6"erade as "ser ID is hidden in form elements which are not visible to "ser <ac&er can modif. these to mas6"erade as another "ser
Mod"s ,perandi/
2. User ma&es a connection to the server b. a"thenticatin( "sin( his "ser ID and password. 3. After the "sers a"thenticate0 the. have access to the server as lon( as the session lasts. 4. <ac&er ta&es the "ser offline b. denial of service =. <ac&er (ains access to the "ser b. impersonatin( the "ser
Attacker
Attac&er can
monitor the session periodicall. in8ect commands into session la"nch passive and active attac&s from the session
)eceiver and Sender have their own se6"ence n"mbers 5hen two parties comm"nicate the followin( are needed/
I* addresses *ort N"mbers Se6"ence N"mber
I* addresses and port n"mbers are easil. available so once the attac&er (ets the server to accept his ("esses se6"ence n"mber he can hi8ac& the session.
Definition/
+.pes/
2.
2.
2.
Distrib"ted D,S attac&s are coordinated denial of service attac&s involvin( several people and>or machines to la"nch attac&s
An attac&er tries to store more information on the stac& than the si%e of the b"ffer
)
Buffer 2 Local Variable 2 Buffer 1 Local Variable 1 Return Pointer Function Call Arguments
Fill Direction
Bottom of Memory
)
Buffer 2 Local Variable 2 Mac#ine Co$e% e&ec'e()bin)s#* e+ Pointer to ,&ec Co$e Function Call Arguments
Fill Direction
Top of Memory
)
ormal !tac"
Top of Memory
)
!mas#e$ !tac"
Can be "sed for espiona(e0 denial of service or compromisin( the inte(rit. of the data 1amples
NetMeetin( '"ffer ,verflow ,"tloo& '"ffer ,verflow A,- Instant Messen(er '"ffer ,verflow SF- Server 3DDD 1tended Stored *roced"re '"ffer ,verflow
%acker gets the phone number of a company %acker runs !ar ialer program
&f original number is '''('')* he runs all numbers in the '''(''"" range +hen mo em ans!ers he recor s the phone number of mo em
!er'er
,ompare 1ass!or %ashe 1ass!or
Fin a vali user &3 ,reate a list of possible pass!or s 4ank the pass!or s from high probability to lo! Type in each pass!or &f the system allo!s you in success 5 &f not. try again. being careful not to e"cee pass!or lockout 6the number of times you can guess a !rong pass!or before the system shuts o!n an !on7t let you try any more8
Brute Force Attack %ybri Attack $ocial Engineering $houl er $urfing 3umpster 3iving
Conc(usions
,omputer $ecurity is a continuous battle
As computer security gets tighter hackers are getting smarter