hans hedbom attacks on computer systems. attacks “non-technical” attacks example social...

29
Hans Hedbom Attacks on Computer Systems

Upload: drusilla-dennis

Post on 11-Jan-2016

229 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Hans Hedbom

Attacks on Computer Systems

Page 2: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Attacks

“Non-Technical” attacksExample

Social engineeringPhishing

CauseLow user awareness or missing policies/routines

Technical attacksExample

See following slides

CauseTransitive trustBugs and configuration errors in apps and OSVulnerabilities in protocols and Network Infrastructure2

Page 3: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Threats to confidentiality

Table from: Symantec Global Internet Security Threat Report Trends for 2009Volume XV, Published April 2010

Page 4: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

NETWORK ATTACKS

Page 5: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

SYN-Attacks

The attacker sends a large amount of SYN-packets to the serverfills-up the SYN-bufferserver is unable to accept more connections Denial of

Service

5

Client ServerSYN

SYN,ACK

ACK

Timeout ~4 min.

TCP event diagram

Page 6: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

IP Fragmentation Attack

Intentional fragmentation of IP-packets may confuse routers, firewalls and servers

6

Data

IP-packet

Header

Fragment 1 Fragment 2Header Data DataH

Offset 0 Offset 20 Offset 16

Data

IP-packet

Header

Original

Fragmented

Assembled

Overlap!

Page 7: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Sniffer Attacks

Eavesdropping on a network segment.

7

TelnetClient

Telnet ServerIP Network

Attacker

Telnet (password in the clear)

Telnet

Page 8: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Passwords over the Net

8

Telnet FTP

Rlogin Rexec

POP SNMP

NFS SMB

HTTP

Page 9: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

IP-Spoofing

Counterfeiting of IP-sender-addresses when using UDP and TCP

9

NFSClient

NFSServerIP Network

Attacker

NFS-request

NFS-response SYN-attack

Page 10: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Session Hijacking

Attacker hijacks a session between a client and a serverit could for example be an administrator using telnet for remote

login

10

Telnet client

Telnet serverIP Network

Attacker

Telnet traffic

SYN-attack IP-Spoofing

Page 11: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

DNS Cache Poisoning

DNS = Domain Name Serviceis primarily used to translate names into IP-addresses

e.g. ”www.sunet.se” to ”192.36.125.18”

data injection into the DNS server

cross checking an address might help

11

Page 12: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

OS (SOFTWARE) ATTACKS

Page 13: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Race Condition Attacks

Explores software that performs operations in an improper sequence. e.g. psrace (Solaris 2.x).

13

Application Create file

Store data

Use data

Set SUID

Remove file

Create link/usr/bin/ps

/tmp/ps_data

/tmp/sh

Page 14: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Buffer overflows

Buffer overflow accounts for 50 % of the security bugs (Viega and McGraw)

Data is stored in allocated memory called buffer. If too much data need to be stored the additional bytes have to go somewhere. The buffer overflows and data are written past the bounds.

Page 15: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

WEB ATTACKS

Page 16: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Browser Vulnerabillities

Table from: Symantec Global Internet Security Threat Report Trends for 2009Volume XV, Published April 2010

Page 17: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Window of Exposure

Table from: Symantec Global Internet Security Threat Report Trends for 2009Volume XV, Published April 2010

Page 18: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Phishing

Phishing (only works with predictable or time invariant values)Trick the user to access a forged web page.

1. Username

2. Ask for login credentials

3. Give login credentials

4.Ok alt Deny (error code)

SSL/TLS Forged Web Page

Page 19: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Phishing

Table from: Symantec Global Internet Security Threat Report Trends for 2009Volume XV, Published April 2010

Page 20: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Phishing

Table from: Symantec Global Internet Security Threat Report Trends for 2009Volume XV, Published April 2010

Page 21: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Pharming

2.Username

3.Chalange

5.Chalange

6. Responce

8.Responce

9.Ok alt Deny

1.Username

4.Chalange

7 .Responce

9.Ok alt Deny

Page 22: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

XSS

xss_selling_platform_v2.0.swf

Page 23: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

What is SQL Injection?

$name = $HTTP_POST_VARS["name"];

$passwd = $HTTP_POST_VARS[“passwd"];

$query = “select name from users where name = ‘”.$name.”’ and passwd = ‘”.$passwd.”’” ;

$result = mysql_query($query);

Page 24: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

What is SQL Injection?

Page 25: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

BOT-NETS

Page 26: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Bot-nets

A bot-net is a large collection of compromised computers under the control of a command and control server.A bot-net consists of bots (the malicious program), drones (the hijacked computers) and (one or more) C&C server.A bot is usually a combination of a worm and a backdoor.IRC and HTTP are the primary communication protocols in today's bot-nets.Bots are usually self spreding and modular.

26

Page 27: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Uses of bot-nets

Bot-nets could be used for the following:Click Fraud

Making drones click on specific advertisements on the web.DDoS

For financial gain or blackmail.Keyloging

For financial gain and identity theft.Warez

Collecting, spreading and storingSpam

For financial gain.

And of course as a private communication network.27

Page 28: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Detecting and preventing bot-nets

Detection is all about finding the C&C server.Look for suspicious traffic patterns in firewall logs and other logs.Take note of servers whit a high number of incoming connections.Monitor the suspicious C&C and inform the owner and the authorities when you are sure that it is a bot-net controller.

PreventionAll the usual rules apply: patch and protect. Do egress filtering in firewalls as well as ingress. This will stop infections from spreading and could block outgoing traffic from drones within the intranet.

ProblemsSome bot-nets are encrypted.Tracking the C&C to the real bot-net owner can be hard.

28

Page 29: Hans Hedbom Attacks on Computer Systems. Attacks “Non-Technical” attacks Example Social engineering Phishing Cause Low user awareness or missing policies/routines

Bot activity

Table from: Symantec Global Internet Security Threat Report Trends for 2009Volume XV, Published April 2010