36
Threats to network 1 All Rights Reserved @ www.q4points.com

Threats to network

Embed Size (px)

DESCRIPTION

A Comprehensive slide from Q4Points.com about network attacks and virus bombs.

Citation preview

Page 1: Threats to network

Threats to network

1All Rights Reserved @ www.q4points.com

Page 2: Threats to network

A Brief History of the World

16 MAY 2011

2

All Rights Reserved @ www.q4points.com

Page 3: Threats to network

Overview3

What is security?Why do we need security?Who is vulnerable?Common security attacks and

countermeasures

All Rights Reserved @ www.q4points.com

Page 4: Threats to network

What is “Security”4

Dictionary.com says:• 1. Freedom from risk or danger; safety.• 2. Freedom from doubt, anxiety, or fear; confidence.• 3. Something that gives or assures safety, as:

• 1. A group or department of private guards: Call building security if a visitor acts suspicious.

• 2. Measures adopted by a government to prevent espionage, sabotage, or attack.• 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary

or assault: Security was lax at the firm's smaller plant.

…etc.

All Rights Reserved @ www.q4points.com

Page 5: Threats to network

What is “Security”

All Rights Reserved @ www.q4points.com

5

Dictionary.com says:• 1. Freedom from risk or danger; safety.• 2. Freedom from doubt, anxiety, or fear; confidence.• 3. Something that gives or assures safety, as:

• 1. A group or department of private guards: Call building security if a visitor acts suspicious.

• 2. Measures adopted by a government to prevent espionage, sabotage, or attack.• 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary

or assault: Security was lax at the firm's smaller plant.

…etc.

Page 6: Threats to network

What is “Security”6

Dictionary.com says:• 1. Freedom from risk or danger; safety.• 2. Freedom from doubt, anxiety, or fear; confidence.• 3. Something that gives or assures safety, as:

• 1. A group or department of private guards: Call building security if a visitor acts suspicious.

• 2. Measures adopted by a government to prevent espionage, sabotage, or attack.• 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary

or assault: Security was lax at the firm's smaller plant.

…etc.

All Rights Reserved @ www.q4points.com

Page 7: Threats to network

What is “Security”7

Dictionary.com says:• 1. Freedom from risk or danger; safety.• 2. Freedom from doubt, anxiety, or fear; confidence.• 3. Something that gives or assures safety, as:

• 1. A group or department of private guards: Call building security if a visitor acts suspicious.

• 2. Measures adopted by a government to prevent espionage, sabotage, or attack.• 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary

or assault: Security was lax at the firm's smaller plant.

…etc.

All Rights Reserved @ www.q4points.com

Page 8: Threats to network

Why do we need security?8

Protect vital information while still allowing access to those who need it• Trade secrets, medical records, etc.

Provide authentication and access control for resources• Ex: AFS

Guarantee availability of resources• Ex: 5 9’s (99.999% reliability)

All Rights Reserved @ www.q4points.com

Page 9: Threats to network

Who is vulnerable?9

Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK

All Rights Reserved @ www.q4points.com

Page 10: Threats to network

Threats to network

Dictionary attackDenial of serviceTCP attacksConnection hi-jacking and replayPacket sniffingVirus attacksEavesdroppingFaults in software

All Rights Reserved @ www.q4points.com

Page 11: Threats to network

Dictionary Attack11

We can run a dictionary attack on the passwords• The passwords in /etc/passwd are encrypted with the crypt(3) function (one-

way hash)• Can take a dictionary of words, crypt() them all, and compare with the hashed

passwords

This is why your passwords should be meaningless random junk!• For example, “sdfo839f” is a good password

• That is not my andrew password• Please don’t try it either

All Rights Reserved @ www.q4points.com

Page 12: Threats to network

Denial of Service12

Purpose: Make a network service unusable, usually by overloading the server or network

Many different kinds of DoS attacks• SYN flooding• SMURF• Distributed attacks• Mini Case Study: Code-Red

All Rights Reserved @ www.q4points.com

Page 13: Threats to network

Denial of Service13

All Rights Reserved @ www.q4points.com

Page 14: Threats to network

Denial of Service14

SMURF• Source IP address of a broadcast ping is forged• Large number of machines respond back to victim, overloading it

All Rights Reserved @ www.q4points.com

Page 15: Threats to network

Denial of Service15

Internet

Perpetrator Victim

ICMP echo (spoofed source address of victim)Sent to IP broadcast address

ICMP echo reply

All Rights Reserved @ www.q4points.com

Page 16: Threats to network

TCP Attacks16

Recall how IP works…• End hosts create IP packets and routers process them purely based on destination

address alone

Problem: End hosts may lie about other fields which do not affect delivery• Source address – host may trick destination into believing that the packet is from a

trusted source• Especially applications which use IP addresses as a simple authentication method• Solution – use better authentication methods

All Rights Reserved @ www.q4points.com

Page 17: Threats to network

TCP Attacks17

TCP connections have associated state• Starting sequence numbers, port numbers

Problem – what if an attacker learns these values?• Port numbers are sometimes well known to begin with (ex. HTTP uses port 80)• Sequence numbers are sometimes chosen in very predictable ways

All Rights Reserved @ www.q4points.com

Page 18: Threats to network

TCP Attacks18

If an attacker learns the associated TCP state for the connection, then the connection can be hijacked!

Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source• Ex. Instead of downloading and running new program, you download a virus and

execute it

All Rights Reserved @ www.q4points.com

Page 19: Threats to network

TCP Attacks19

Say hello to Alice, Bob and Mr. Big Ears

All Rights Reserved @ www.q4points.com

Page 20: Threats to network

TCP Attacks20

Alice and Bob have an established TCP connection

All Rights Reserved @ www.q4points.com

Page 21: Threats to network

TCP Attacks21

Mr. Big Ears lies on the path between Alice and Bob on the network• He can intercept all of their packets

All Rights Reserved @ www.q4points.com

Page 22: Threats to network

TCP Attacks22

First, Mr. Big Ears must drop all of Alice’s packets since they must not be delivered to Bob (why?)

Packets

The Void

All Rights Reserved @ www.q4points.com

Page 23: Threats to network

TCP Attacks23

Why are these types of TCP attacks so dangerous?

Web server

Malicious user

Trusting web client

All Rights Reserved @ www.q4points.com

Page 24: Threats to network

Connection hi-jacking and replay

TCP connections can be captured and used– One end of the connection is told that the connection isshut down, and the attacker takes its place– The other end of the connection still thinks it iscommunicating with the original party– Software to do this is commercially available– Telnet and X Window system are typical targets• Encrypted messages can be recorded and sent

All Rights Reserved @ www.q4points.com

Page 25: Threats to network

Connection hi-jacking and replay

again at later time– Attacker does not see the actual contents, but can makean educated guess– E.g. electronic payments– Very serious threat to e-commerce– Can be countered by protocol design

All Rights Reserved @ www.q4points.com

Page 26: Threats to network

Packet Sniffing26

Recall how Ethernet works … When someone wants to send a packet to some else … They put the bits on the wire with the destination MAC address … And remember that other hosts are listening on the wire to detect for

collisions … It couldn’t get any easier to figure out what data is being transmitted

over the network!

All Rights Reserved @ www.q4points.com

Page 27: Threats to network

Packet Sniffing27

This works for wireless too! In fact, it works for any broadcast-based medium

All Rights Reserved @ www.q4points.com

Page 28: Threats to network

Packet Sniffing28

What kinds of data can we get? Asked another way, what kind of information would be most useful to a

malicious user? Answer: Anything in plain text

• Passwords are the most popular

All Rights Reserved @ www.q4points.com

Page 29: Threats to network

Virus attacks

Hackers distributes virus into networkAttack software and database of organizationDestroys important documents of organization

All Rights Reserved @ www.q4points.com

Page 30: Threats to network

Eavesdropping

Requires access to the network media– Via a host on the network– Via access to the physical network• Especially easy on most LANs– On hub-based and coaxial Ethernets all hosts can listen to alltraffic on that LAN segment– Switches usually give each host only their own traffic, making

All Rights Reserved @ www.q4points.com

Page 31: Threats to network

Eavesdropping

eavesdropping more difficult– Switches can be forced to operate in a hub-like fashion,making eavesdropping possible Getting access to Internet backbone networks is moredifficult but not impossible Traffic can be selected based on IP and port addresses

All Rights Reserved @ www.q4points.com

Page 32: Threats to network

Faults in software

Both in operating system’s TCP/IP stack and in

application servers Attacker can get full or partial control of software

– From denial of service to

– Preforming system commands

All Rights Reserved @ www.q4points.com

Page 33: Threats to network

Social Problems33

People can be just as dangerous as unprotected computer systems• People can be lied to, manipulated, bribed, threatened, harmed, tortured, etc. to give

up valuable information• Most humans will breakdown once they are at the “harmed” stage, unless they have

been specially trained• Think government here…

All Rights Reserved @ www.q4points.com

Page 34: Threats to network

Social Problems34

Fun Example 2:• Someone calls you in the middle of the night

• “Have you been calling Egypt for the last six hours?”• “No”• “Well, we have a call that’s actually active right now, it’s on your calling card and it’s to

Egypt and as a matter of fact, you’ve got about $2000 worth of charges on your card and … read off your AT&T card number and PIN and then I’ll get rid of the charge for you”

All Rights Reserved @ www.q4points.com

Page 35: Threats to network

Conclusions35

The Internet works only because we implicitly trust one another It is very easy to exploit this trust The same holds true for software It is important to stay on top of the latest CERT security advisories to

know how to patch any security holes

All Rights Reserved @ www.q4points.com

Page 36: Threats to network

Thank you

All Rights Reserved @ www.q4points.com