Professional Documents
Culture Documents
Threats
Worms
Talk Outline
What are worms? The life cycle of a simple worm:
scanning
for a victim exploiting the victim cloning itself onto the victim running the clone to further spread infection stealth techniques used to hide itself
Bandwidth consumption Might crash computers they infect Infected computers may be used for other attacks such as DDoS, Phishing attacks etc
Types of worms
Network worms generally exploits a service spreads Email worms use mass emails to spread and either target the email client (Outlook) or rely on user intervention (a click) to spread IRC worms IM worms File sharing worms XSS worms MySpace ??
(2) Victim
Examples of worms
Slammer Worm Code Red worm MyDoom.B
Port Scanning
Three way handshaking Stealth Scan Xmas Scan FIN Scan NULL Scan Ideal Scan
Tools
Nmap Softperfect network scanner Port scanner ActiveX control Acunetix Nessus Etc etc..
Contd..
A denial of service attack (DoS) is an attack through which a person can make a system unusable, or slow it down for users by overloading its resources. If an attacker is unable to gain access to a machine, the attacker most probably will crash the machine to accomplish a denial of service attack.
Authentication
What is Authentication?
Authentication is any process by which a system verifies the identity of a user who wishes to access it. Authentication exists to establish trust between two parties, or authentication entities. These entities consist of an identity and a key.
Types of Authentication
User AuthenticationUser Authentication is the process of determining that a user is who he/she claims to be HTTP Basic, SSL & TLC Entity AuthenticationEntity authentication is the process of determining if an entity is who it claims to be. Cookies etc
Password maintenance
Do NOT share your User ID(s) and password(s) with ANYONE Do NOT store your User ID(s) and password(s) on any loose bits of paper, sticky notes. Do NOT hide your User ID(s) and password(s) under the keyboard, or at any other would be "secret" hiding place. Do change your password(s) after time interval. Before entering your User ID and password, make sure no one is watching you Before using your User ID and password on a third-party computer, make sure it is well protected, and free of trojans and key loggers. - Passwords must be made up of a mixture of lower-case letters, upper case letters, numbers, and at least one special character, such as (!@#$%^&*()_+|) at least 7 characters Do not enter your email id or account no in cyber caf.
Password Vulnerability
Organizational or end-user vulnerabilities: This includes lack of password awareness on the part of end users and the lack of password policies that are enforced within the organization. Technical vulnerabilities: This includes weak encryption methods and insecure storage of passwords on computer systems.
Cracking password
Social engineering Shoulder sniffing Interference Weak authentication Bypassing authentication Password cracking software (Brutus, John the ripper) Dictionary attacks Brute-force attacks
Encrypted passwords
SSL HTTPS SSH/TLS Stelnet
BIOMETRICES
SECURITY POLICY
Virus protection Physical security of computer equipment Access control Lan security Server Specific Security Wide Area Network Security TCP/IP & Internet Security Voice System Security
INTRUSION DETECTION
An IDS inspects all inbound and outbound network activity and identifies suspicious pattern that indicates an attack to compromise a system. Example: Snort, symantic manhunt etc
Firewall
A firewall is simply a program or hardware device that protects the resources of a private network from user of other network.
Honeypot
A honeypot is a device intended to be compromised. The goal of setting up a honeypot is to have the system probed, attack and potentially exploited.
Encryption Basics
Encryption is yet another process by which information is protected from unauthorized access. It is normally accomplished by rendering the original information unreadable by using a reversible technique known only to the authorized entities.
Types of Encryption
Private/Symmetric Key Cryptography : Same key is used for encryption and decryption. Public/Asymmetric Key Cryptography : Different keys are used for encryption and decryption.
RC4 Basics
A symmetric key encryption algo. Invented by Ron Rivest. Normally uses 64 bit and 128 bit key sizes. Most popular implementation is in WEP for 802.11 wireless networks and in SSL. Cryptographically very strong yet very easy to implement. Consists of 2 parts: Key Scheduling Algorithm (KSA) & Pseudo-Random Generation Algorithm
RC4
Keystream
Plain Text
Encrypted Text
RC4 break up
Initialize an array of 256 bytes. Run the KSA on them Run the PRGA on the KSA output to generate keystream. XOR the data with the keystream.
Array Initialization
C Code: char S[256]; Int i; For(i=0; i< 256; i++) S[i] = i; After this the array would like this : S[] = { 0,1,2,3, , 254, 255}