You are on page 1of 55

INFORMATION SECURITY

101 – STUDENT GUIDE


Information Security 101

Copyright© 2017 AlienVault. All rights reserved 1


Information Security 101
What motivates attackers?
Review common system vulnerabilities.
Examine how attacks are delivered.
Consider attack types.

Copyright© 2017 AlienVault. All rights reserved 2




INFORMATION SECURITY 101 – STUDENT GUIDE


What motivates attackers?

Criminals Governments Activists


Credit Cards Surveillance Further Cause
Personal Data Steal Secrets Steal Data
Resources Cause Harm Cause Harm

Copyright© 2017 AlienVault. All rights reserved 3

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Common System Vulnerabilities

WWW

Internet

Copyright© 2017 AlienVault. All rights reserved 4

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
How Attacks are Delivered

Direct Botnets People / Social

Internet

Copyright© 2017 AlienVault. All rights reserved 5

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Types of attack

Malware Attacks **** Brute force Attacks

WWW Web Application Attacks Network Attacks

Denial of Service Attacks Cryptographic Attacks


****

Copyright© 2017 AlienVault. All rights reserved 6

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Malware Attacks

Copyright© 2017 AlienVault. All rights reserved 7

INFORMATION SECURITY 101 – STUDENT GUIDE


What is a Virus?
Code injected into programs and files.
User intervention is required.
Spread through sharing.

Copy with File or EXE

Copyright© 2017 AlienVault. All rights reserved 8

INFORMATION SECURITY 101 – STUDENT GUIDE


What is a Worm?
Exploits operating system vulnerabilities.
No user interaction is required.
Reproduce/duplicate and spreads by itself.

Copy over Network

Copyright© 2017 AlienVault. All rights reserved 9

INFORMATION SECURITY 101 – STUDENT GUIDE


What is a Trojan?
Masquerades as a not-malicious application.
User intervention is required.
Can cause damage but often stealthy.

Free Word Processor

Copyright© 2017 AlienVault. All rights reserved 10

INFORMATION SECURITY 101 – STUDENT GUIDE


Malware Attacks
Rootkit / Backdoor Adware / Spyware
/ Keylogger

Botnet Ransomware

Copyright© 2017 AlienVault. All rights reserved 11

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Web Application Attacks

Copyright© 2017 AlienVault. All rights reserved 12

INFORMATION SECURITY 101 – STUDENT GUIDE


Web Application Attacks (SQL Injection)

Exploits of a Mom: https://xkcd.com/327/

Copyright© 2017 AlienVault. All rights reserved 13

INFORMATION SECURITY 101 – STUDENT GUIDE


Web Application Attacks (SQL Injection)

SQL – Structured Query Language

Copyright© 2017 AlienVault. All rights reserved 14

INFORMATION SECURITY 101 – STUDENT GUIDE


Web Application Attacks (SQL Injection)

Steal Information Delete Database / Data


Execute Server Commands

Copyright© 2017 AlienVault. All rights reserved 15

INFORMATION SECURITY 101 – STUDENT GUIDE


Web Application Attacks (Cross Site Scripting)
Cross Site Scripting is also known as XSS.
Reflected XSS: Link is crafted, the user is tricked into clicking it.
Stored XSS: Impacts all visitors to an exploited page.

Reflected Stored

Non-Persistent Persistent

Copyright© 2017 AlienVault. All rights reserved 16

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Web Application Attacks (Cross Site Scripting)

Cookies

Copyright© 2017 AlienVault. All rights reserved 17

INFORMATION SECURITY 101 – STUDENT GUIDE


Web Application Attacks (Cross Site Scripting)

Impersonate Users Browser Exploits


Collect Information

Copyright© 2017 AlienVault. All rights reserved 18

INFORMATION SECURITY 101 – STUDENT GUIDE


Web Application Attacks (Broken Authentication)
Unencrypted Connection
Session values don’t expire
Session IDs in the URL

Username / Password / Session ID

Copyright© 2017 AlienVault. All rights reserved 19

INFORMATION SECURITY 101 – STUDENT GUIDE


Web Application Attacks (Broken Authentication)

http://www.mytestsite.com/login.jsp?sessionid=XXXXXX

Username / Password / Session ID

Copyright© 2017 AlienVault. All rights reserved 20

INFORMATION SECURITY 101 – STUDENT GUIDE


Denial of Service Attacks

Copyright© 2017 AlienVault. All rights reserved 21

INFORMATION SECURITY 101 – STUDENT GUIDE


Denial of Service Attacks
Denial of Service

Distributed Denial of Service

Copyright© 2017 AlienVault. All rights reserved 22

INFORMATION SECURITY 101 – STUDENT GUIDE


Denial of Service Attacks
ICMP Flood Attack
Smurf Attack
TCP SYN Flood Attack

CPU
Memory
Network

Copyright© 2017 AlienVault. All rights reserved 23

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Brute Force Attack

Copyright© 2017 AlienVault. All rights reserved 24

INFORMATION SECURITY 101 – STUDENT GUIDE


Brute Force Attack
Attempts every combination
Time-consuming
Guaranteed to work given enough time

SSH
FTP
HTTP
…and so on

Copyright© 2017 AlienVault. All rights reserved 25

INFORMATION SECURITY 101 – STUDENT GUIDE


Dictionary Attack
Uses a file with common usernames and passwords
Faster than an exhaustive brute force attack
Not exhaustive and not guaranteed to succeed

SSH
FTP
HTTP
? …and so on

Copyright© 2017 AlienVault. All rights reserved 26

INFORMATION SECURITY 101 – STUDENT GUIDE


Network Attacks

Copyright© 2017 AlienVault. All rights reserved 27

INFORMATION SECURITY 101 – STUDENT GUIDE


Network Attacks (A Brief Introduction)
Network Sniffing
Promiscuous Mode
Hubs, Switches, and Routers

Router Layer 3 (Network) Internet Protocol (IP)


Switch Layer 2 (Data Link) Media Access Control (MAC)
Hub Layer 1 (Physical)

Copyright© 2017 AlienVault. All rights reserved 28

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Network Attacks (ARP Spoofing)
Manipulates the Address Resolution Protocol
ARP Poisoning
Used in a “Man in the middle” attack

Copyright© 2017 AlienVault. All rights reserved 29

INFORMATION SECURITY 101 – STUDENT GUIDE


Network Attacks (ARP Spoofing)
Device IP MAC
Destination 192.168.1.5 ec-08-6b-d1-1e-c4
Victim 192.168.1.10 00-50-56-C0-00-08
Attacker 192.168.1.20 00-50-56-C0-00-01

Copyright© 2017 AlienVault. All rights reserved 30

INFORMATION SECURITY 101 – STUDENT GUIDE


Network Attacks (IP Spoofing)
Source IP modified in the packet header
Trying to gain access by impersonating authorized system
Non-Blind — Uses the TCP handshake
Blind — TCP handshake with modified network packet
Router (L3) Switch (L2)

Blind

Non-Blind
Copyright© 2017 AlienVault. All rights reserved 31

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Network Attacks (IP Spoofing — Non-Blind)
Device IP MAC
Destination 192.168.1.10 00-50-56-C0-00-10
Source 192.168.1.20 00-50-56-C0-00-08
Attacker 192.168.1.30 00-50-56-C0-00-01

SYN
SYN (ACK)

Copyright© 2017 AlienVault. All rights reserved 32

INFORMATION SECURITY 101 – STUDENT GUIDE


Network Attacks (IP Spoofing — Blind)
Device IP MAC
Destination 192.168.1.10 00-50-56-C0-00-10 SYN (ACK)
Source 192.168.1.20 00-50-56-C0-00-08 SYN
Attacker 180.10.10.20 00-50-56-C0-00-01
Gateway 192.168.1.1 ec-08-6b-d1-1e-c4

ACK (Source Routing Flag)

Copyright© 2017 AlienVault. All rights reserved 33

INFORMATION SECURITY 101 – STUDENT GUIDE


Cryptographic Attacks

Copyright© 2017 AlienVault. All rights reserved 34

INFORMATION SECURITY 101 – STUDENT GUIDE


Cryptographic Attacks
1b3afad37f

de9f2c7fd2

? ?
?

Password

SSH WEP / WPA Hash

Copyright© 2017 AlienVault. All rights reserved 35

INFORMATION SECURITY 101 – STUDENT GUIDE


Cryptographic Attacks (Man in the Middle)

A S

Copyright© 2017 AlienVault. All rights reserved 36

INFORMATION SECURITY 101 – STUDENT GUIDE


Cryptographic Attacks (WiFi Cracking)
Wired Equivalent Privacy
WEP is vulnerable to attack due to predictability
Use Wifi Protected Access instead

BSSID Channel Encryption


00:23:69:BB:.. 9 WPA-2
00:1F:33:C9:.. 5 WEP

Deauthentication of Station
Capture frames on reconnect

Copyright© 2017 AlienVault. All rights reserved 37

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Cryptographic Attacks (Password Hash)
Attacker has obtained password files
Used against hashed passwords
Same idea as brute force authentication

SHA-1: 8c599c4256f1dcf620614c8fc87ff4ab91c348e1

passwd

Usernames
Password Hash
shadow

Copyright© 2017 AlienVault. All rights reserved 38

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Cryptographic Attacks (Password Hash)
Dictionary Attack
Rainbow Tables
Salting the Hash

Contains common
Dictionary File passwords and hash

SHA-512

Usernames
Rainbow Table
Password Hash

Copyright© 2017 AlienVault. All rights reserved 39

INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
Summary
We identified what motivates attackers.
We introduced some common system vulnerabilities.
We learned about attack delivery methods.
We saw several attack types.

Copyright© 2017 AlienVault. All rights reserved 40




INFORMATION SECURITY 101 – STUDENT GUIDE


INFORMATION SECURITY 101 – STUDENT GUIDE
INFORMATION SECURITY 101 – STUDENT GUIDE

You might also like