3 the Malicious Opponents Of

Embed Size (px)

Citation preview

  • 8/7/2019 3 the Malicious Opponents Of

    1/18

    THE MALICIOUS OPPONENTS OFE-BUSINESS

    Hilal H. Nuha

  • 8/7/2019 3 the Malicious Opponents Of

    2/18

    Agenda

    Statistic kejahatan Internet

    Definisi hacker, cracker, dan security

    professional Contoh hacker dan cracker, organisasi cracker

    Cara menangani serangan cracker

  • 8/7/2019 3 the Malicious Opponents Of

    3/18

    Statistic kejahatan Internet

    viruses and the denial-of-service (DoS)

    attacks

    White House, the U.S. Army and Navy, NASA,Ameritech, Bell South, Estee Lauder, Ford MotorCompany, Hewlett Packard, Packard Bell,Microsoft, Amazon.com, eBay, E-Trade, and

    Yahoo theft and unauthorized modifications of

    source code intellectual property

    Microsoft

  • 8/7/2019 3 the Malicious Opponents Of

    4/18

    stats

    Except for the White House, the Department ofDefense, NASA, and Microsoft,the names are largely inconsequential because for every attack that is reportedor uncovered bythe media, hundreds more go unreported.

    The Department ofDefense estimates that only 1 in 500 attacks is reported eachyear. Many others, especially banks, wantto avoid the negative publicity and

    repercussions of such news becoming public. In a 2001 survey commissioned bythe FBI's Computer Intrusion Squad and the

    Computer Security Institute, 91 percent of 538 organizations respondingdetected computer security breaches over the pastyear. Even more alarming,40 percent reported penetration oftheir systems from the outside.

    This number grew in 2001 by 37.5 percent over the previous year. The survey alsoindicated that 186 of the 538 organizations, or the 35 percent willing and/or able,

    reported combined losses from security breaches costing approximately $377.8million. Of these losses, $151.2 million resulted from theft of proprietaryinformation; $93 million, to financial fraud.

    In response to the juggernaut, the market for providing security solutions isexpected to reach an estimated $700 million in 2002, up from $45 million in1998. So the question remains, can hackers be stopped? Depending on whomyou ask, the answer is a qualified no.

  • 8/7/2019 3 the Malicious Opponents Of

    5/18

    Hackers motive

    including malicious intent and financial gains,

    butthey hack mainly because they enjoy it!

    The traditional view is that hackers break infor the sake of improving security.

    There are even written accounts of a

    successful hack that was fully documented bythe hacker and left behind for the benefit of

    the IT managers.

  • 8/7/2019 3 the Malicious Opponents Of

    6/18

    Hacking is simply fun!

    Interestingly enough, a 1999 studycommissioned bythe U.S. military concurredthat most hackers lack malicious intent. For the

    record, the study also revealed that hackers havean inherent interest in technology and aremotivated by ideals. Because this appears to bethe basis ofthe hacker psyche, another

    revelation suggested that hackers don't like thenotion that information is private. The culturalmantra of the hacker underground is that"information wants to be free."

  • 8/7/2019 3 the Malicious Opponents Of

    7/18

    Hackers versus Crackers

    Hacker: In the programming community, where the term originated,this term describes a person who pursues knowledge of computersystems for its own sakesomeone willing to hack through the stepsof putting together a working program.

    More recently, in popular culture at large, the term has come to mean aperson who breaks into other peoples computers with malicious intent(what programmers call a cracker). Many countries now treatconvicted crackers in the same waythattheytreat conventionalbreaking-and-entering criminals.

    Cracker An unauthorized person who breaks into a computer systemplanning to do harm or damage or with criminal intent.

    The popular press often portrays crackers as people with exceptionaltalent for eluding detection, and some ofthem are, but most ofthemuse a set of well-worn tricks to exploit common security weaknesses inthe systems theytarget.

    intruder An unauthorized user of a computer system, usually a personwith malicious intent.

  • 8/7/2019 3 the Malicious Opponents Of

    8/18

    Security Profesional

    CompTIA Security+

    Cisco Systems CCNA Security CCSP CCIE Security

    EC-Council ENSA CEH CHFI ECSA LPT CNDA ECIH ECSS ECVP EDRP ECSP ECSO

    GIAC

    GSIF GSEC GCFW GCIA GCIH GCUX GCWN GCED GPEN GWAPT

    GAWN GISP GLSC GCPM GLEG G7799 GSSP-NET GSSP-JAVA GCFE

    GCFA GREM GSE

    ISACA CISA CISM CGEIT CRISC

    (ISC) SSCP CAP CSSLP CISSP ISSAP ISSEP ISSMP

    ISECOM OPST OPSA OPSE OWSE CTA

    Offensive Security OSCP OSCE OSWP

    Mile2 CPTEngineer (CPTE) CPTConsultant

    CREST CREST Consultant

    IACRB CPT CEPT

    eLearnSecurity eCPPT

    SCP SCNS SCNP SCNA

    CERT CSIH

    Innobuzz CISE

  • 8/7/2019 3 the Malicious Opponents Of

    9/18

    Contoh hackerdan cracker,

    organisasi cracker Adrian Lamo

    AlbertGonzalez

    Dennis Moran

    Ehud Tenenbaum HD Moore

    Jonathan James

    Kevin Mitnick

    Kevin Poulsen

    KristinaS

    v

    echinskaya Leonard Rose

    RobertTappan Morris

    Tim Berners-Lee

    weev

  • 8/7/2019 3 the Malicious Opponents Of

    10/18

    Cult of the Dead Cow

    known for the development of Back Orifice

    and Back Orifice 2000, designed mainlyto

    expose Microsoft's security weaknesses. Back Orifice is a GUI-driven software utility

    that enables unauthorized users to gain

    remote access to computer systems through

    the back doors of PCs running Microsoft'sWindows 95 or 98.

  • 8/7/2019 3 the Malicious Opponents Of

    11/18

    Global Hell

    Global Hell debuted in the mainstream when

    it hacked into the White House Web site.

    In May 1999, the White House staff wasconfronted with a picture of flowered pantieson its home page.

    Global Hell took credit for defacing the sitefor the whole world to see.

  • 8/7/2019 3 the Malicious Opponents Of

    12/18

    Script Kiddies

    The innocent-soundingScript Kiddies group, bycontrast, is one ofthe most dangerous andmalicious cracker groups wreaking havoc on the

    Internet. For example, two oftheir disciples, California

    teens who go bythe handles Makaveli andTooShort, literally ransacked a group of high-level military servers in 1998.

    In contrastto the altruistic hackers, their goal wasnot to enter and patch up but to enter and tear up.For the most part, Script Kiddies qualify ascrackers, and their modus operandi is destruction.

  • 8/7/2019 3 the Malicious Opponents Of

    13/18

    Hacking for Girlies (HFG)

    Hacking for Girlies (HFG) are the political activists ofthe underground hacker culture. Apparently, onemember ofthe group has been held in custody bythe federal authorities since 1995.

    InSeptember 1998, HFG hacked into the New YorkTimes's Web site in protest and to show discontentwith a Times reporter who wrote a book thatchronicled the comrade's capture.

    The Times's home page was plastered with slogansdemanding the release of the fallen HFG comrade.

    HFG has also hacked into NASA's Jet PropulsionLaboratory and Motorola in support of its incarceratedcolleague.

  • 8/7/2019 3 the Malicious Opponents Of

    14/18

    Why Hackers Love to Target

    Microsoft Consequently, hackers love Microsoft

    because ofthe various classes of

    v

    ulnerabilities presented by its suite ofproducts. If any company can address these

    issues, Microsoft can because of its financial

    muscle.(www.ntbugtraq.com)

    superworms Nimda, Code Red, and Love Bug

    Worm: Love Bug, New Love (Herbie)

  • 8/7/2019 3 the Malicious Opponents Of

    15/18

    Trojan Horse: A type of computer virus that pretends to be a useful program,such as a game or a utility, to entice you to use it, when in reality it containsspecial code that will intentionally damage any system onto which it is loaded.

    Virus: A program intended to damage a computer system withoutthe usersknowledge or permission. A virus clones itself from disk to disk or from system to

    system ov

    er a network. Numbers are hard to come by, but certain authoritiesclaim thatthere are approximately 30,000 known viruses, with 400 new onesappearing each month. A virus may attach itselfto a program or to the partitiontable or boottrack on a hard disk. When a certain event occurs, a date passes, ora specific program executes, the virus is triggered into action.

    worms are programs that reproduce, execute independently and travel acrossthe network connections. The key difference between a virus and worm is themanner in which it reproduces and spreads. A virus is dependent upon the host

    file or boot sector, and the transfer of files between computers to spread,whereas a computer worm can execute completely independently and spread onits own accord through network connections

  • 8/7/2019 3 the Malicious Opponents Of

    16/18

    Handle the Threat

    CERT: Computer Emergency ResponseTeam is a name given to expert groups thathandle computer security incidents. Mostgroups append the abbreviation CERT orCSIRT

    TIM INSIDEN KEAMANAN INTERNET DANINFRASTRUKTUR INDONESIAIndonesia Security Incident ResponseTeamon Internet Infrastructure(ID-SIRTII)

  • 8/7/2019 3 the Malicious Opponents Of

    17/18

    National Security Agency (NSA)tested the

    Pentagon using available program on the

    internet, and successfullytear down thesecurity.

    National Infrastructure Protection Center

    catch the love bug

    Central Intelligence Agency

    FBI

    FIRST

  • 8/7/2019 3 the Malicious Opponents Of

    18/18

    done

    References

    ManagerSecurityGuide(chapter 3)

    CEH Network Dictionary

    Internet