+ All Categories
Home > Documents > Assignment One

Assignment One

Date post: 17-Jan-2016
Category:
Upload: marcie
View: 35 times
Download: 0 times
Share this document with a friend
Description:
Assignment One. Due right NOW. Place your assignment on the table at the front of the room. AdminTrivia. First Exam will be on September 27 Exam will be Open Notes No electronic devices permitted Cell phones off Computers in their cases PDA’s off and in their cases - PowerPoint PPT Presentation
85
Assignment One • Due right NOW. • Place your assignment on the table at the front of the room
Transcript
Page 1: Assignment One

Assignment One

• Due right NOW.

• Place your assignment on the table at the front of the room

Page 2: Assignment One

AdminTrivia

• First Exam will be on September 27• Exam will be Open Notes• No electronic devices permitted

– Cell phones off– Computers in their cases– PDA’s off and in their cases– Anything else that can contain data or

communicate off and out of reach

Page 3: Assignment One

Spyware and Adware

Page 4: Assignment One

Basic Attack Types

Spyware

• Spyware can be considered a kind of Trojan horse software.

• Spyware software is distinguished by having a surveillance function.

Page 5: Assignment One

Basic Attack Types

Spyware

• Various kinds of spyware may– Install a keylogger, which records users’

keystrokes, and can be used to get passwords.

– Turn on webcams or microphones.– Record the web sites a user visits.

Page 6: Assignment One

Basic Attack Types

Adware• A variation on spyware, called adware, is typically

installed with a user’s permission, usually as part of a legitimate software installation.

• The adware spyware is installed in addition to the desired software.

• Often the user authorizes this as part of the licensing agreement for the desired software.

Page 7: Assignment One

Basic Attack Types

Adware

• Adware may reconfigure a user’s computer and web browser to display extra, unwanted advertisements.

• Like spyware, it may collect and report various data.

Page 8: Assignment One

Module Twelve

Modern Attack Types

Page 9: Assignment One

Modern Attack Types

Combination Attacks

• In reality, viruses, Trojan horses, spyware, etc. are not distinct from one another.

• For example, spyware may also– Introduce a backdoor into a user’s

computer so the attacker can access it ,or– Recruit the computer for a zombie network.

Page 10: Assignment One

Modern Attack Types

Blended Threats

• Similarly, modern attacks often use the basic attacks we have described as building blocks.

• These building blocks are simple pieces the attackers combine to make more complex malware.

Page 11: Assignment One

Modern Attack Types

Blended Threats

• These combined, complex, multi-pronged attacks are known as blended threats.– They have several different ways of taking

over a computer.– Once in control, they have several different

illicit activities.

Page 12: Assignment One

A modern blended Threat

The W32.Spybot.KEG worm

Page 13: Assignment One

Modern Attack Types

Blended Threats

• An example of a blended threat is the worm known as W32.Spybot.KEG.

• It combines several of the attack characteristics we have described.

Page 14: Assignment One

Modern Attack Types

Blended Threats

• W32.Spybot.KEG has several ways of attacking a computer:– It has a list of 129 common passwords that it uses

to attempt to access computers.– For example:

• “123”, • “access”, • “changeme”, • “password”, • “qwerty”

Page 15: Assignment One

Modern Attack Types

Blended Threats

• W32.Spybot.KEG has several ways of attacking a computer:– It checks for backdoor entry methods left

by other, earlier attacks (e.g. Beagle, Sasser).

Page 16: Assignment One

Modern Attack Types

Blended Threats

• W32.Spybot.KEG has several ways of attacking a computer:– It checks to see if a computer can be

attacked using about a half dozen different buffer overflow vulnerabilities.

Page 17: Assignment One

Modern Attack Types

Blended Threats

• Once W32.Spybot.KEG has control over a computer, it– Copies itself onto the compromised

computer,– Attempts to attack other computers, and– Creates a back door channel for

commands, turning the computer into part of a zombie network.

Page 18: Assignment One

Modern Attack Types

Blended Threats

• The W32.Spybot.KEG zombie network computers can then receive commands to do (among other things)– Log keystrokes at the computer,– Eavesdrop on the local network,– Start a web or file server,– Capture screenshots and webcam images,– Launch Denial of Service Attacks.

Page 19: Assignment One

Modern Attack Types

Blended Threats• The W32.Spybot.KEG worm is typical of

modern attacks.• It shows show complex modern attacks are.• And how flexible -

– It has multiple ways to take over a computer, and– Once in control, has a wide variety of illicit

activities it can do.

Page 20: Assignment One

Attack Kits

Page 21: Assignment One

Modern Attack Types

Attack Kits

• An important goal of legitimate software developers is to make it easier to write useful, bug-free computer code.

Page 22: Assignment One

Modern Attack Types

Attack Kits

• This is also true in the world of attack software, where “kits” are available where non-experts can piece together custom made attack programs.

Page 23: Assignment One

Modern Attack Types

Attack Kits

• This is an important development.• It allows amateur attackers (script

kiddies) to mount attacks that they could not if they had to write the code themselves.

• This increases the number of attacks enormously.

Page 24: Assignment One

Unit Two

Operating Systems

Page 25: Assignment One

Operating Systems

Unit OutlineModule 1: Operating System BasicsModule 2: Attacking Operating Systems: ImpersonationModule 3: Attacking Operating Systems: Exploits

Page 26: Assignment One

Module One

Operating System Basics

Page 27: Assignment One

Operating System Basics

Introduction

• A Computer’s Operating System typically does two major things.

1. It controls access to the various resources of the computer, and

2. It provides an interface - a way for the user to communicate with the computer.

Page 28: Assignment One

Operating System Basics

Introduction

• From a computer security perspective, we are mostly interested in the first part:

1. It controls access to the various resources of the computer.

2. It provides an interface - a way for the user to communicate with the computer.

Page 29: Assignment One

Operating System Basics

Resources

• The operating system is the computer program responsible for making the various parts of the computer available and useful to the user.

Page 30: Assignment One

Operating System Basics

Resources

• For example, the magnetic data on a disk drive is available to the user as directories and files.

Page 31: Assignment One

Operating System Basics

File Systems

• The way the computer organizes the – disks, CDs, and other storage media

as – files and folders

is known as the computer’s file system.

Page 32: Assignment One

Operating System Basics

File Systems

• The – design and – maintenance

of a file system is one of the operating system’s primary responsibilities.

Page 33: Assignment One
Page 34: Assignment One

Operating System Basics

Access

• In addition to presenting data as files and folders, the operating system is responsible for controlling access to the parts of the file system.

Page 35: Assignment One

Operating System Basics

Access

• For instance, computers can have multiple users, and the computer has to ensure that users only access files, folders, etc. to which they have legitimate rights.

Page 36: Assignment One

Operating System Basics

Access Control

• Here we begin to see how operating systems relate to security.

Page 37: Assignment One

Operating System Basics

Access Control

• An operating system is responsible for ensuring that– A user cannot read or write files belonging

to another user who wishes to keep them private.

– A user cannot access sensitive files used to administer the computer, e.g. a file containing all the users’ password information.

Page 38: Assignment One

Operating System Basics

Controlling Access• Operating systems security can be thought of as

simultaneously – Sharing, and – protecting

the resources of the computers, such as:– Memory,– Input/Output devices,– Printers,– Programs,– Data, and– Networks.

Page 39: Assignment One

Operating System Basics

Privileges and Permissions

• Controlling access to resources is done using the concepts of – Privileges, and – Permissions.

Page 40: Assignment One

Operating System Basics

Privileges and Permissions

• Files, directories, and other resources on a computer have permissions associated with them.

• These permissions determine what privileges the various users on a computer have to read, write or otherwise access those resources.

Page 41: Assignment One

Operating System Basics

Privileges and Permissions

• For example, – User A can set the permissions on most of

her files and directories so that only she can read or write them.

Page 42: Assignment One

Operating System Basics

Privileges and Permissions

• For example, – However, she may set up a directory,

perhaps called Public, with permissions allowing anyone to read its contents.

Page 43: Assignment One

Operating System Basics

Privileges and Permissions

• For example, – She might also set up a directory, called

Dropbox, where others can put copies of files.

Page 44: Assignment One

Operating System Basics

Privileges and Permissions

• The idea is that she can control the access others have over her files and folders.

Page 45: Assignment One
Page 46: Assignment One

Operating System Basics

Privileges and Permissions• The operating system enforces these

permission and privileges.• Whenever a user requests access to a file or

directory, that request goes through the operating system, which checks to see if the user has permission to access that file before it is granted.

Page 47: Assignment One

Operating System Basics

Administrative Users• Most operating systems recognize a

distinction between the privileges of ordinary users, and one or more users that are allowed to administer the computer.

• This prevents ordinary users from accessing critical system functions– Prevents accidentally damaging the system– Limits the damage done if an ordinary users

account is compromised

Page 48: Assignment One

Operating System Basics

Administrative Users• These administrative users, known as

– Superusers, – Admins, or – Root

have complete control over the machine.– Read and Modify any users files– Control any system resource– Create and destroy file systems on disks– Control network access to the machine

Page 49: Assignment One

Administrative Users

• Very attractive to hackers to become the Administrative User on a machine

• Most modern operating systems have ways of distributing administrative functions over other uses– Called roles– Often, “root” or “admin” logins disallowed

Page 50: Assignment One

Attacking Operating Systems: Impersonation

Authentication

• In order to have accounts for individual users, there must be methods to ensure that only the authorized people can use the accounts.

• The methods to do this are known as authentication.

• This is especially important for administrator accounts.

Page 51: Assignment One

Attacking Operating Systems: Impersonation

Passwords• There are many different ways of

authenticating users.• The most common method is user IDs and

passwords.• A user ID is the identifier for the user

(typically a variation on their name or role).• A password is some sequence of characters

(e.g. a word or phrase, a word-like nonsense sequence, a random sequence of keyboard characters).

Page 52: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Don’t change passwords given them to start an account, or those provided with a new computer or software package

Page 53: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Choose passwords that are easy to guess (c.f. the list of passwords used by the W32.Spybot.KEG worm)

Page 54: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• An Internet search can easily find lists of common passwords.• One such list is at

http://geodsoft.com/howto/password/common.htm

Page 55: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Share them with others

Page 56: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Leave them written down in insecure locations

Page 57: Assignment One
Page 58: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Use the same passwords for multiple accounts or uses

Page 59: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Are willing to give them to people impersonating system administrators.

Page 60: Assignment One

Attacking Operating Systems: Impersonation

Password Problems

• Because of these types of problems, passwords are an imperfect method of authentication.

Page 61: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• In addition there are other problems with

password authentication:– Eavesdropping or wiretapping to find passwords.

Page 62: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• In addition there are other problems with

password authentication:– Guest or anonymous accounts on computers with

no password or easy to guess passwords.

Page 63: Assignment One

Cracking Passwords

Page 64: Assignment One

Attacking Operating Systems: Impersonation

Cracking Passwords

• There is a series of programs, L0phtcrack, that attempt to find all of the passwords on a computer system.

• How L0phtcrack and similar programs work shows how weak passwords can be exploited.

Page 65: Assignment One

Attacking Operating Systems: Impersonation

Storing Passwords

• In general, computers do not store the actual user passwords on the computer.

Page 66: Assignment One

Attacking Operating Systems: Impersonation

Storing Passwords

• Instead, they are encoded.• The encoded versions are stored on the

computer.– The encoded version are called one-way

hashes.

Page 67: Assignment One

Attacking Operating Systems: Impersonation

Storing Passwords

• When a user types a password, it is – Encoded, and – Compared to the stored version.

• If the new and stored hashes match, the user is allowed access to the computer.

Page 68: Assignment One

A Successful Password Match

Page 69: Assignment One
Page 70: Assignment One

A Failed Password Match

Page 71: Assignment One
Page 72: Assignment One

Attacking Operating Systems: Impersonation

Attacking Passwords

• This method is more secure than storing a list of actual passwords on the computer.

Page 73: Assignment One

Attacking Operating Systems: Impersonation

Attacking Passwords

• However, if an attacker can read the list of hashes, they can often use them to find the original passwords.

Page 74: Assignment One

Attacking Operating Systems: Impersonation

Attacking Passwords

• Modern computers are fast enough that attackers can try a brute force approach.

• A brute force approach consists of trying all possible passwords.– More or less.

Page 75: Assignment One

Attacking Operating Systems: Impersonation

Brute Force

• The brute force approach is very simple.• For each guess at a password,

generate its hash.– If it matches the stored hash, the attacker

now knows that password.– If it does not match, try the next guess.

Page 76: Assignment One

Module Two

Attacking Operating Systems: Impersonation

Page 77: Assignment One

Attacking Operating Systems: Impersonation

Introduction

• One of the goals of attackers is to gain administrative access to computers.

• This allows them to access all of the files and other resources on those systems.

• This access gives them almost absolute control of a computer and any information on it.

Page 78: Assignment One

Attacking Operating Systems: Impersonation

Ways of Attack

• There are two primary ways for an attacker to get administrative access to a computer– Impersonation,– Exploit weaknesses in the operating

system.

Page 79: Assignment One

Attacking Operating Systems: Impersonation

Passwords• Passwords are a common authentication

method because– It is low-cost

• The software to compare passwords is well-known and easy to implement.

• Users can change their own passwords, minimizing overhead.

– It is relatively convenient• Users can memorize their passwords, or keep a copy in

a secured location.• There is no extra hardware used in authentication.

Page 80: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Don’t change passwords given them to start an account, or those provided with a new computer or software package

Page 81: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Choose passwords that are easy to guess (c.f. the list of passwords used by the W32.Spybot.KEG worm)

Page 82: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Share them with others

Page 83: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Leave them written down in insecure locations

Page 84: Assignment One
Page 85: Assignment One

Attacking Operating Systems: Impersonation

Password Problems• However, passwords are often an insecure method of

authentication.• For example, users often

– Use the same passwords for multiple accounts or uses


Recommended