SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Attack the [own] Network so you`ll survive




y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
Who Am I
 ●   Founder echo.or.id, e-rdc.org,
     ubuntulinux.or.id
 ●   A Bandwidth hunter
 ●   Security TroubleMaker since 2000
 ●   Not a Celebrity
 ●   y3dips@REMOVEUPPERCASEecho.or.id




y3dips@REMOVEUPPERCASEecho.or.id        UNAS, 27 Desember 2008
Network?
 ●   So, what is Network?
 ●   A collection of host computers together
     with the subnetwork or internetwork
     through which they can exchange data.
 ●   Internet, very popular term in network




y3dips@REMOVEUPPERCASEecho.or.id       UNAS, 27 Desember 2008
Issue
 ●   Spoofing
 ●   Sniffing
 ●   Tunneling
 ●   Denial Of Service/ Botnets




y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
Why attacking?




    “The best defense is a good offense”
          http://www.answers.com/topic/attack-is-the-best-form-of-defence




y3dips@REMOVEUPPERCASEecho.or.id                                       UNAS, 27 Desember 2008
Brief History
 ●   TCP/IP is more than 30 years
 ●   Create withous security considerations,
     eg: FTP, TELNET, SMTP, POP3
 ●   Weakness Lies on IP layer, no auth and
     encryption




y3dips@REMOVEUPPERCASEecho.or.id       UNAS, 27 Desember 2008
Spoofing
 ●   Spoof = Masquerade - rfc4949
 ●   Is a situation in which one person or
     program successfully masquerades as
     another by falsifying data and thereby
     gaining an illegitimate advantage – wikipedia




y3dips@REMOVEUPPERCASEecho.or.id           UNAS, 27 Desember 2008
Spoofing Example
 ●   IP spoofing, e.g: modify source address
     A common misconception is that "IP
     spoofing" can be used to hide your IP
     address while surfing the Internet, chatting
     on-line, sending e-mail, and so forth. This
     is generally not true. Forging the source
     IP address causes the responses to be
     misdirected, meaning you cannot create a
     normal network connection. - iss.net
 ●   Combine with DDOS attack
y3dips@REMOVEUPPERCASEecho.or.id        UNAS, 27 Desember 2008
Spoofing Example
 ●   ARP Spoofing
 ●   Send ‘fake’ or 'spoofed', ARP messages to
     an Ethernet LAN. These frames contain
     false MAC addresses, confusing network
     devices (e.g switches)
 ●   Monkey In the Middle Attack with Cain
 ●   Cain, ettercap, nemesis, dsniff



y3dips@REMOVEUPPERCASEecho.or.id       UNAS, 27 Desember 2008
y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
Sniffing
 ●   "wiretapping"
 ●   Capturing and examining the data packets
     carried on a LAN - rfc4949
 ●   Objectives : Capture credential data
     through network (password, files, video sound, etc)
 ●   Hub (passive) v.s Switch (active)
 ●   Wireshark (ethereal), ettercap, tcpdump
 ●   MITM, Combine with spoofing

y3dips@REMOVEUPPERCASEecho.or.id                      UNAS, 27 Desember 2008
Tunneling
 ●   Tunnel is A communication channel
     created in a computer network by
     encapsulating (i.e., layering) a
     communication protocol's data packets in
     (i.e., above) a second protocol that
     normally would be carried above, or at the
     same layer as, the first one. - rfc4949
 ●   Http, ssh, dns, icmp
 ●   Ssh foo@doo -D port

y3dips@REMOVEUPPERCASEecho.or.id       UNAS, 27 Desember 2008
DOS
 ●   The prevention of authorized access to a
     system resource or the delaying of system
     operations and function – rfc4949
 ●   Famous POD, synflood, new attack (actually
     old, http://it.slashdot.org/article.pl?sid=08/10/01/0127245)

 ●   DDOS attack
 ●   BotNet




y3dips@REMOVEUPPERCASEecho.or.id                                    UNAS, 27 Desember 2008
DOS attacker may
 ●   Attempt to flood a network, thereby
     preventing legitimate network traffic
 ●   Attempt to disrupt connections between
     two machines, thereby preventing access
     to a service
 ●   Attempt to prevent a particular individual
     from accessing a service
 ●   Attempt to disrupt service to a specific
     system or person

y3dips@REMOVEUPPERCASEecho.or.id        UNAS, 27 Desember 2008
y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
Survive




    “Security is a process, not a product”




y3dips@REMOVEUPPERCASEecho.or.id    UNAS, 27 Desember 2008
Survive (cont`d)
 ●   Firewall, IDS, IPS just a tool
 ●   Educate the user
 ●   Implement the Best policy
 ●   Regularly Audit




y3dips@REMOVEUPPERCASEecho.or.id      UNAS, 27 Desember 2008
Thanks All.
                         Q&A ?




y3dips@REMOVEUPPERCASEecho.or.id     UNAS, 27 Desember 2008

Weitere ähnliche Inhalte

Andere mochten auch

phpbb worm explanation
phpbb worm explanationphpbb worm explanation
phpbb worm explanationAmmar WK
 
webhacking
webhackingwebhacking
webhackingAmmar WK
 
behind the book
behind the bookbehind the book
behind the bookAmmar WK
 
Playin with Password
Playin with PasswordPlayin with Password
Playin with PasswordAmmar WK
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet SecurityAmmar WK
 
Art of Thinking [Re-write]
Art of Thinking [Re-write]Art of Thinking [Re-write]
Art of Thinking [Re-write]Ammar WK
 
Denial Of services
Denial Of servicesDenial Of services
Denial Of servicesAmmar WK
 
Attacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAttacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAmmar WK
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security ProfessionalAmmar WK
 
Arpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofingArpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofingAmmar WK
 
Burp suite
Burp suiteBurp suite
Burp suiteAmmar WK
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?Ammar WK
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingAmmar WK
 
Art of Backdooring: Technique and Practice
Art of Backdooring: Technique and PracticeArt of Backdooring: Technique and Practice
Art of Backdooring: Technique and PracticeAmmar WK
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationAmmar WK
 
bluetooth [in]security [2]
bluetooth [in]security [2]bluetooth [in]security [2]
bluetooth [in]security [2]Ammar WK
 
password series
password seriespassword series
password seriesAmmar WK
 
from 33 to 0 - A journey to be root
from 33 to 0 - A journey to be rootfrom 33 to 0 - A journey to be root
from 33 to 0 - A journey to be rootAmmar WK
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linuxAmmar WK
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Ammar WK
 

Andere mochten auch (20)

phpbb worm explanation
phpbb worm explanationphpbb worm explanation
phpbb worm explanation
 
webhacking
webhackingwebhacking
webhacking
 
behind the book
behind the bookbehind the book
behind the book
 
Playin with Password
Playin with PasswordPlayin with Password
Playin with Password
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Art of Thinking [Re-write]
Art of Thinking [Re-write]Art of Thinking [Re-write]
Art of Thinking [Re-write]
 
Denial Of services
Denial Of servicesDenial Of services
Denial Of services
 
Attacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAttacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and Profit
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security Professional
 
Arpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofingArpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofing
 
Burp suite
Burp suiteBurp suite
Burp suite
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
 
Art of Backdooring: Technique and Practice
Art of Backdooring: Technique and PracticeArt of Backdooring: Technique and Practice
Art of Backdooring: Technique and Practice
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
 
bluetooth [in]security [2]
bluetooth [in]security [2]bluetooth [in]security [2]
bluetooth [in]security [2]
 
password series
password seriespassword series
password series
 
from 33 to 0 - A journey to be root
from 33 to 0 - A journey to be rootfrom 33 to 0 - A journey to be root
from 33 to 0 - A journey to be root
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008
 

Ähnlich wie Attack the (Own) Network so You'll Survive

How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves SecurityWilliam Norton
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...HackIT Ukraine
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsA Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsIRJET Journal
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdingershawn_merdinger
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksGeekNightHyderabad
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxAde John Gestole
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksAtif Shahzad
 

Ähnlich wie Attack the (Own) Network so You'll Survive (20)

D do s
D do sD do s
D do s
 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves Security
 
E firewalls
E firewallsE firewalls
E firewalls
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Network security
Network securityNetwork security
Network security
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
Network Security
Network SecurityNetwork Security
Network Security
 
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsA Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptx
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Network Security
Network SecurityNetwork Security
Network Security
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 
Firewalls
FirewallsFirewalls
Firewalls
 
Networking
NetworkingNetworking
Networking
 

Mehr von Ammar WK

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssnAmmar WK
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?Ammar WK
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsAmmar WK
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!Ammar WK
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0dayAmmar WK
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareAmmar WK
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteAmmar WK
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)Ammar WK
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet AnalysisAmmar WK
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)Ammar WK
 
Network security
Network securityNetwork security
Network securityAmmar WK
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsAmmar WK
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A HackerAmmar WK
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkAmmar WK
 

Mehr von Ammar WK (17)

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssn
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0day
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or White
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet Analysis
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)
 
Network security
Network securityNetwork security
Network security
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A Hacker
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 network
 

Kürzlich hochgeladen

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Kürzlich hochgeladen (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Attack the (Own) Network so You'll Survive

  • 1. Attack the [own] Network so you`ll survive y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 2. Who Am I ● Founder echo.or.id, e-rdc.org, ubuntulinux.or.id ● A Bandwidth hunter ● Security TroubleMaker since 2000 ● Not a Celebrity ● y3dips@REMOVEUPPERCASEecho.or.id y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 3. Network? ● So, what is Network? ● A collection of host computers together with the subnetwork or internetwork through which they can exchange data. ● Internet, very popular term in network y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 4. Issue ● Spoofing ● Sniffing ● Tunneling ● Denial Of Service/ Botnets y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 5. Why attacking? “The best defense is a good offense” http://www.answers.com/topic/attack-is-the-best-form-of-defence y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 6. Brief History ● TCP/IP is more than 30 years ● Create withous security considerations, eg: FTP, TELNET, SMTP, POP3 ● Weakness Lies on IP layer, no auth and encryption y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 7. Spoofing ● Spoof = Masquerade - rfc4949 ● Is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage – wikipedia y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 8. Spoofing Example ● IP spoofing, e.g: modify source address A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection. - iss.net ● Combine with DDOS attack y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 9. Spoofing Example ● ARP Spoofing ● Send ‘fake’ or 'spoofed', ARP messages to an Ethernet LAN. These frames contain false MAC addresses, confusing network devices (e.g switches) ● Monkey In the Middle Attack with Cain ● Cain, ettercap, nemesis, dsniff y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 10. y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 11. y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 12. Sniffing ● "wiretapping" ● Capturing and examining the data packets carried on a LAN - rfc4949 ● Objectives : Capture credential data through network (password, files, video sound, etc) ● Hub (passive) v.s Switch (active) ● Wireshark (ethereal), ettercap, tcpdump ● MITM, Combine with spoofing y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 13. Tunneling ● Tunnel is A communication channel created in a computer network by encapsulating (i.e., layering) a communication protocol's data packets in (i.e., above) a second protocol that normally would be carried above, or at the same layer as, the first one. - rfc4949 ● Http, ssh, dns, icmp ● Ssh foo@doo -D port y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 14. DOS ● The prevention of authorized access to a system resource or the delaying of system operations and function – rfc4949 ● Famous POD, synflood, new attack (actually old, http://it.slashdot.org/article.pl?sid=08/10/01/0127245) ● DDOS attack ● BotNet y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 15. DOS attacker may ● Attempt to flood a network, thereby preventing legitimate network traffic ● Attempt to disrupt connections between two machines, thereby preventing access to a service ● Attempt to prevent a particular individual from accessing a service ● Attempt to disrupt service to a specific system or person y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 16. y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 17. y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 18. Survive “Security is a process, not a product” y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 19. Survive (cont`d) ● Firewall, IDS, IPS just a tool ● Educate the user ● Implement the Best policy ● Regularly Audit y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 20. Thanks All. Q&A ? y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008