SlideShare a Scribd company logo
1 of 94
Yahia Kandeel
GCIH, GSEC, RHCE, CEH, CCNA, MCP
Information Security Engineer
Raya IT
 SecurityTerminologies
 DiD Security Model
 Authentication systems
 Cryptography
 How Attackers Do It ..!!
 Network & Host Security
 Wireless Security
 Its an technique for ensuring that data stored in a
computer cannot be read or compromised by any
individuals without authorization.
 CIA
 Confidentiality
 Integrity
 Availability
Integrity
A
A
A  AAA
 Authorization
 AccessControl
 Authentication
 Asset: is what we’re trying to protect.
 Vulnerability: a weakness that may lead to
undesirable consequences.
 Threat: anything that can exploit a vulnerability
 Risk: a potential problem
Risk =Vulnerability *Threat
 Physical access to the computer system and
networks is restricted to only authorized
users.
 Access Controls,
 Physical barriers, etc…
In network security, an emphasis is placed on:
 Network segmentation between different
systems from different security level or
categories.
 Controlling access to internal computers from
external entities.
 This can be done by:
 Firewalls between different zones.
 Virtual LANs (Vlans)
 AccessControls on network devices
 Vulnerability Scanners
 Host security takes a granular view of security by
focusing on protecting each computer and device
individually instead of addressing protection of the
network as a whole:
 Authentication and Logging Mechanisms
 Host based IDS
 File Integrity Checkers
 For Client Security:
 NAC
 Antivirus
 AWeb application is an application,
generally comprised of a collection of
scripts, that reside on aWeb server and
interact with databases or other sources of
dynamic content.
 Examples ofWeb applications include search
engines, Webmail, shopping carts and portal
systems
 Application attacks are the latest trend when it comes
to hacking.
 On average, 90% of all dynamic content sites have
vulnerabilities associated with them.
 No single web server and
database server combination
has been found to be
immune!
“Today over 70% of attacks against a company’s network come
at the ‘Application Layer’ not the Network or System layer -
Gartner
 How to secure a resource?
 Authentication
 Authorization
 Accounting
 Something you know
 Something you have
 Something you are
One-factor authentication
Two-factor authentication
 Memorize password
 Use different passwords
 Use longer passwords
 Use upper- and lower-case letters, numbers and
special characters
 Change frequently
 Avoid reusing passwords
 Encryption = convert to unreadable format
 Decryption = convert back to readable format
 Algorithm = procedure for encrypting or
decrypting
 Cipher = encryption & decryption algorithm
pair
 Hash (digest) = fixed-length derivation of a
plaintext
 One-way operation
 Unique value / significant change with even
single-bit changes in plaintext
 Data verification
 Secure password storage
 Secure password transmission
 Examples:
 md5
 sha1
 DES
 Triple DES
 AES
 Rijndael
 Blowfish
 RCn (RC5, RC6, etc.)
 OTP
 Advantages ?
 Speed
 Disadvantages!!
 Key distribution
 Advantages ?
 Key distribution
 Disadvantages!!
 Very slow
 Key distribution
 Provides an increased level of confidence for
exchanging information over an increasingly
insecure Internet.
 By using a Certificate Authority..
 Identification information
 Public key
 Hash of the public key
 Signed by trusted third-party
Reconnaissance
Scanning
Exploitation
Maintain
Access
Covering
Tracks
 Finding out as much as possible information
about the target.
 This can be done by:
1. 'whois' look-up
2. ViewingVictim's current & old website
3. IP Addresses
4. Available e-mails on the internet
5. Metadata of All published documents
6. DNS Enumeration
• Registrar.
• Domain status.
• Expiration date, and name servers.
• Contact information for the owner of a domain
name or IP.
• IP and IP location information
• Web server information,
• Related domain availability, premium domain
listings, and more.
Using whois we can know:
• All available information of the target’s web
sites in the past..!!
Using archive.org we can know:
• All publicity available Info about target’s
infrastructure & personal including their
mails, phone numbers ..etc
Using Meltego we can Gather :
• More than you imagine !!
Using Google we can know:
• Analyze all targets Documents to know email
addresses, user names, software versions,
operating systems, internal server names,
mapped drive share information, etc.
Using FOCA we can :
 In scanning phase, we’ll scan the entire
network and the publicity accessible systems
to gain more information about the target.
 This phase includes:
1. Port scanning
2. Vulnerability scanning
3. Open shares
4. Firewall’s implemented rules
5. War driving
• Live hosts, the open ports, listening
applications and OS on the target system.
Using nmap we can know:
• Existing vulnerabilities associated with each
running services, missed configurations, and
default users & passwords.
Using Nessus we can know:
• The firewall implemented rules..
Using firewalk we can know:
• The existingWeb application vulnerabilities.
Using wa3f we can know:
• Open wireless access points, wardriving, also we can find
hidden AP and its associated SSID, channel #, signal power
Using Netstumpler  kismt we can know:
Nmap supports:
 Multi-Scanning types:
 Full Scan
 SYN Scan
 XMAX Scan
 Ideal Scan
 UDP Scan
 Ping Scan
 OS fingerprinting
 Application fingerprinting
 Nessus provides a simple, yet powerful
interface for managing vulnerability-scanning
activity.
 To use Nuesses:
1. Creating a Policy
I. Define scan type
II. Optional, add taget’s credentials
III. Chose the appropriate plug-ins
2. Creating and Launching a Scan
3. The output will be in the Reports tab
 wa3f provides a flexible framework for finding and
exploiting web applicationVulnerabilities. It is easy
to use and extend and features dozens of web
assessment and exploitation plug-ins.
 Gain access to the OS, applications on the
computer or victim’s network !!
 This can be done by:
1. IP Address Spoofing
2. Password Cracking
3. MiTM Attack
4. Sniffing
5. DoS Attacks
6. Viruses &Worms
 In addition, exploiting systems can be done
by:
1. Trojans & Backdoor
2. Social Engineering
3. DHCP & DNS Attacks
4. Web Hacking
5. Wireless Hacking
6. Buffer Overflow
 How ?
 Normal IP address configurations.
 Packet crafting.
 Using proxies.
 When ?
 Access based on IP address
 Hide identity
 Use it to recover passwords from computer
systems.
-- System Admins—
 Use it to gain unauthorized access to vulnerable
system
--Hackers --
 Password racking Methods :
▪ Dictionary Attack
▪ Brutforce Attack
▪ Hybrid Attack
▪ rainbow table attacks
Do you know ARP problem ?
Why ARP ?
When a machine needs to
talk to another, it should
know:
1. Destination IP
2. Destination MAC
Problem!!
 Some Sniffers have add-on
features:
1. Analyzes network traffic
2. Decoding network protocols
 A sniffer is a piece of software that grabs all of
the traffic flowing into and out of a computer
attached to a network.
 Is an attempt to make a computer or network
resource unavailable to its intended users.
--Wikipedia --
 What is a virus?
 Malicious SW needs a carrier
 Needs user Interaction
 Needs a trigger
 What is a worm ?
 Don’t need a carrier
 Self replicated
 Used to conquer new targets
 DHCP
 Starvation attack
 DNS
 Cash Poisoning
 “All input is evil until proven otherwise!”
 Due to bad filtration on user inputs, the web
application may be vulnerable to:
 SQL Injection
 XSS
 DirectoryTraversal
 Session Hijacking
 Account Harvesting
 Shared media
 Broadcast
 Vulnerable Encryption Algorithms
▪ To be continued ….
void foo (char *bar)
{
char c[12];
strcpy(c, bar); // no bounds checking...
}
int main (int argc, char **argv)
{
foo(argv[1]);
}
 Trying to retain the ownership of the
compromised system.
 This phase include:
1. Install Backdoors
2. Using RootKits
 In this phase, the attacker will try to hide his activities
on the system and on the network.
 Attacks !!
 Mitigation:
 Access control lists
▪ Essentially white or black list
▪ MAC or network address
▪ Layer 2 or layer 3
 VLANs
▪ Virtual network segments
▪ “Distinct broadcast domain”
 Attacks !!
 Mitigations:
 Use access controls.
 Secure routing configuration.
 Use any kind of prevention techniques
Preventive , Detective or Reactive
 A firewall is a hardware or software system
that prevents unauthorized access to or from
a network.
 Types of Firewall:
 Network layer
▪ Packet filters
▪ Stateful Inspection
 Application layer
 Proxy
 Device or software application that monitors
network and/or system activities for malicious
activities or policy violations and produces alerts
 Terminologies:
 Alert/Alarm
 True Positive
 False Positive
 False Negative
 True Negative
 Signature-Based Detection
 Statistical anomaly-based detection.
 Stateful Protocol Analysis Detection
 Types:
 Network-based IDS
 Wireless IDS
 Host-based IDS
 An Intrusion Prevention System works similar to an
IDS. In addition it can block, prevent or drop the
malicious or unwanted traffic in real-time.
 Placed in-line
 Modes
 Learning mode
 Active mode
 Network regions of similar level of trust
 Trusted
 Semi-trusted
 Untrusted
 Defense in depth,
Security is Layers …
 Filter packets entering network
 Turn off directed broadcasts
 Block packets for any source address not
permitted on the Internet
 Block ports or protocols not used on your
network for Internet access
 Block packets with source addresses
originating from inside your network
 Block counterfeit source addresses from
leaving your network
 Command line terminal connection tool
 Replacement for rsh, rcp, telnet, and others
 All traffic encrypted
 Both ends authenticate themselves to the other end
 Ability to carry and encrypt non-terminal traffic
 Computers installed out of the box have
known vulnerabilities
 Not just Windows computers
 All services are vulnerable by default …
 Hackers can take them over easily
 They must be hardened—a complex process
that involves many actions
 System/application (Vendors) design errors.
 System/application mis-configuration errors.
 In-house applications !!
 Secure installation and configuration
 CIS benchmark
 Vendor Documentations
 SANS Reading Room
 Turn off unnecessary services (applications)
 Harden all remaining applications
 Manage users and groups
 Default accounts …!!
 Manage access permissions
 For individual files and directories, assign access
permissions specific users and groups
 Back up the server regularly
 KnownVulnerabilities
 Most programs have known vulnerabilities
 Exploits are programs that take advantage of
known vulnerabilities.
 Regularly check missing patches
 Using Nessus you can do this task easily
 InstallAnti-Virus/Firewalls on all Servers
 Reading Event Logs
 The importance of logging to diagnose problems
▪ Failed logins, changing permissions, starting
programs, kernel messages, etc.
 File Encryption
 File Integrity Checker
 Monitoring Running Services & Processes &
NetworkTraffic.
 Nessus
 Work-around: A series of actions to be
taken; no new software
 Patches: New software to be added to the
operating system
 Upgrades: Newer versions of programs
usually fix older vulnerabilities.
 Wireless networking
 2.4 – 2.5 GHz
 Data Link layer specifications
 Access Point
 Family:
 802.11a
 802.11b
 802.11g
 802.11n
 PhysicalAccess
 Rouge access point
 Firmware vulnerabilities
 Protocol vulnerabilities
 Default accounts
 Some vendors hardcode admin accounts on AP
 Physical devices
 Laptop software
 Airsnort
 NetStumbler
 War driving
What a lovely symbols …
 Wired Equivalent Privacy (WEP)
 Wi-Fi Protected Access (WPA)
 WPA2
 Physical Barriers..
 Strong Encryption
 Mac filtering
 Static IP addressing
 Restricted access networks 802.1X
 Service Set Identifier (SSID) No.
 Regularly scan for rouge AP
Bruce Schneier

More Related Content

What's hot

Intruders detection
Intruders detectionIntruders detection
Intruders detectionEhtisham Ali
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Intruders
IntrudersIntruders
Intruderstechn
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Jowin John Chemban
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Miigaa Mine
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric VanderburgEric Vanderburg
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)Netwax Lab
 

What's hot (17)

Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Intruders
IntrudersIntruders
Intruders
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01Computersystemssecurity 090529105555-phpapp01
Computersystemssecurity 090529105555-phpapp01
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Windows network
Windows networkWindows network
Windows network
 
IPS (intrusion prevention system)
IPS (intrusion prevention system)IPS (intrusion prevention system)
IPS (intrusion prevention system)
 
Ids(final)
Ids(final)Ids(final)
Ids(final)
 
Ips and ids
Ips and idsIps and ids
Ips and ids
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 

Viewers also liked

Feedback PR 2009
Feedback PR 2009Feedback PR 2009
Feedback PR 2009DamianML
 
Pluggable authentication modules
Pluggable authentication modulesPluggable authentication modules
Pluggable authentication modulesYahia Kandeel
 
How to get started with the Pluggable Authentication System
How to get started with the Pluggable Authentication SystemHow to get started with the Pluggable Authentication System
How to get started with the Pluggable Authentication SystemMatt Hamilton
 
Lucrare de disertatie la comanda
Lucrare de disertatie la comandaLucrare de disertatie la comanda
Lucrare de disertatie la comandaautumnduncanmpx
 
Chapter 09
Chapter 09Chapter 09
Chapter 09cclay3
 
Authentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM ArchitectureAuthentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM ArchitecturePriyank Kapadia
 
Presentación comunicación marketing fundaciones_14032014
Presentación comunicación marketing fundaciones_14032014Presentación comunicación marketing fundaciones_14032014
Presentación comunicación marketing fundaciones_14032014talentosolidario
 
Pluggable Authentication Module
Pluggable Authentication ModulePluggable Authentication Module
Pluggable Authentication ModuleSinarShebl
 
Ferka 19 Suez Canal War October 1973
Ferka 19  Suez Canal War  October 1973Ferka 19  Suez Canal War  October 1973
Ferka 19 Suez Canal War October 1973YosifAffifi
 
Leyes Que Protegen Al Trabajador
Leyes Que Protegen Al TrabajadorLeyes Que Protegen Al Trabajador
Leyes Que Protegen Al TrabajadorELBA VELAZQUEZ
 
Thl sanastotyön toimintamallin luonnos
Thl sanastotyön toimintamallin luonnosThl sanastotyön toimintamallin luonnos
Thl sanastotyön toimintamallin luonnosTimoSimell
 
LEYES LABORALES EN PUERTO RICO
LEYES  LABORALES EN PUERTO RICOLEYES  LABORALES EN PUERTO RICO
LEYES LABORALES EN PUERTO RICOLuis Baquero
 

Viewers also liked (12)

Feedback PR 2009
Feedback PR 2009Feedback PR 2009
Feedback PR 2009
 
Pluggable authentication modules
Pluggable authentication modulesPluggable authentication modules
Pluggable authentication modules
 
How to get started with the Pluggable Authentication System
How to get started with the Pluggable Authentication SystemHow to get started with the Pluggable Authentication System
How to get started with the Pluggable Authentication System
 
Lucrare de disertatie la comanda
Lucrare de disertatie la comandaLucrare de disertatie la comanda
Lucrare de disertatie la comanda
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Authentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM ArchitectureAuthentication Modules For Linux - PAM Architecture
Authentication Modules For Linux - PAM Architecture
 
Presentación comunicación marketing fundaciones_14032014
Presentación comunicación marketing fundaciones_14032014Presentación comunicación marketing fundaciones_14032014
Presentación comunicación marketing fundaciones_14032014
 
Pluggable Authentication Module
Pluggable Authentication ModulePluggable Authentication Module
Pluggable Authentication Module
 
Ferka 19 Suez Canal War October 1973
Ferka 19  Suez Canal War  October 1973Ferka 19  Suez Canal War  October 1973
Ferka 19 Suez Canal War October 1973
 
Leyes Que Protegen Al Trabajador
Leyes Que Protegen Al TrabajadorLeyes Que Protegen Al Trabajador
Leyes Que Protegen Al Trabajador
 
Thl sanastotyön toimintamallin luonnos
Thl sanastotyön toimintamallin luonnosThl sanastotyön toimintamallin luonnos
Thl sanastotyön toimintamallin luonnos
 
LEYES LABORALES EN PUERTO RICO
LEYES  LABORALES EN PUERTO RICOLEYES  LABORALES EN PUERTO RICO
LEYES LABORALES EN PUERTO RICO
 

Similar to Seucrity in a nutshell

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Complete notes security
Complete notes securityComplete notes security
Complete notes securityKitkat Emoo
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OSC.U
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Securitydrkelleher
 
Intruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptxIntruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptxSriK49
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
CyberIgnite.pdf
CyberIgnite.pdfCyberIgnite.pdf
CyberIgnite.pdfGDSCPUP
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainSuvrat Jain
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system securityGary Mendonca
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introductionjagadeesh katla
 

Similar to Seucrity in a nutshell (20)

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
OSCh19
OSCh19OSCh19
OSCh19
 
OS_Ch19
OS_Ch19OS_Ch19
OS_Ch19
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 
Intruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptxIntruders in cns. Various intrusion detection and prevention technique.pptx
Intruders in cns. Various intrusion detection and prevention technique.pptx
 
Firewalls-Intro
Firewalls-IntroFirewalls-Intro
Firewalls-Intro
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
CyberIgnite.pdf
CyberIgnite.pdfCyberIgnite.pdf
CyberIgnite.pdf
 
Ethical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jainEthical Hacking n VAPT presentation by Suvrat jain
Ethical Hacking n VAPT presentation by Suvrat jain
 
Cryptography and system security
Cryptography and system securityCryptography and system security
Cryptography and system security
 
Day4
Day4Day4
Day4
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 

Recently uploaded

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Recently uploaded (20)

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

Seucrity in a nutshell

  • 1. Yahia Kandeel GCIH, GSEC, RHCE, CEH, CCNA, MCP Information Security Engineer Raya IT
  • 2.  SecurityTerminologies  DiD Security Model  Authentication systems  Cryptography  How Attackers Do It ..!!  Network & Host Security  Wireless Security
  • 3.
  • 4.  Its an technique for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.
  • 5.  CIA  Confidentiality  Integrity  Availability Integrity A A A  AAA  Authorization  AccessControl  Authentication
  • 6.  Asset: is what we’re trying to protect.  Vulnerability: a weakness that may lead to undesirable consequences.  Threat: anything that can exploit a vulnerability  Risk: a potential problem Risk =Vulnerability *Threat
  • 7.
  • 8.
  • 9.  Physical access to the computer system and networks is restricted to only authorized users.  Access Controls,  Physical barriers, etc…
  • 10. In network security, an emphasis is placed on:  Network segmentation between different systems from different security level or categories.  Controlling access to internal computers from external entities.  This can be done by:  Firewalls between different zones.  Virtual LANs (Vlans)  AccessControls on network devices  Vulnerability Scanners
  • 11.  Host security takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole:  Authentication and Logging Mechanisms  Host based IDS  File Integrity Checkers  For Client Security:  NAC  Antivirus
  • 12.  AWeb application is an application, generally comprised of a collection of scripts, that reside on aWeb server and interact with databases or other sources of dynamic content.  Examples ofWeb applications include search engines, Webmail, shopping carts and portal systems
  • 13.  Application attacks are the latest trend when it comes to hacking.  On average, 90% of all dynamic content sites have vulnerabilities associated with them.  No single web server and database server combination has been found to be immune! “Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer - Gartner
  • 14.
  • 15.  How to secure a resource?  Authentication  Authorization  Accounting
  • 16.  Something you know  Something you have  Something you are
  • 18.  Memorize password  Use different passwords  Use longer passwords  Use upper- and lower-case letters, numbers and special characters  Change frequently  Avoid reusing passwords
  • 19.
  • 20.  Encryption = convert to unreadable format  Decryption = convert back to readable format  Algorithm = procedure for encrypting or decrypting  Cipher = encryption & decryption algorithm pair
  • 21.  Hash (digest) = fixed-length derivation of a plaintext  One-way operation  Unique value / significant change with even single-bit changes in plaintext
  • 22.  Data verification  Secure password storage  Secure password transmission  Examples:  md5  sha1
  • 23.
  • 24.  DES  Triple DES  AES  Rijndael  Blowfish  RCn (RC5, RC6, etc.)  OTP
  • 25.  Advantages ?  Speed  Disadvantages!!  Key distribution
  • 26.
  • 27.
  • 28.  Advantages ?  Key distribution  Disadvantages!!  Very slow  Key distribution
  • 29.  Provides an increased level of confidence for exchanging information over an increasingly insecure Internet.  By using a Certificate Authority..
  • 30.
  • 31.  Identification information  Public key  Hash of the public key  Signed by trusted third-party
  • 32.
  • 34.  Finding out as much as possible information about the target.  This can be done by: 1. 'whois' look-up 2. ViewingVictim's current & old website 3. IP Addresses 4. Available e-mails on the internet 5. Metadata of All published documents 6. DNS Enumeration
  • 35. • Registrar. • Domain status. • Expiration date, and name servers. • Contact information for the owner of a domain name or IP. • IP and IP location information • Web server information, • Related domain availability, premium domain listings, and more. Using whois we can know:
  • 36. • All available information of the target’s web sites in the past..!! Using archive.org we can know: • All publicity available Info about target’s infrastructure & personal including their mails, phone numbers ..etc Using Meltego we can Gather :
  • 37. • More than you imagine !! Using Google we can know: • Analyze all targets Documents to know email addresses, user names, software versions, operating systems, internal server names, mapped drive share information, etc. Using FOCA we can :
  • 38.  In scanning phase, we’ll scan the entire network and the publicity accessible systems to gain more information about the target.  This phase includes: 1. Port scanning 2. Vulnerability scanning 3. Open shares 4. Firewall’s implemented rules 5. War driving
  • 39. • Live hosts, the open ports, listening applications and OS on the target system. Using nmap we can know: • Existing vulnerabilities associated with each running services, missed configurations, and default users & passwords. Using Nessus we can know:
  • 40. • The firewall implemented rules.. Using firewalk we can know: • The existingWeb application vulnerabilities. Using wa3f we can know: • Open wireless access points, wardriving, also we can find hidden AP and its associated SSID, channel #, signal power Using Netstumpler kismt we can know:
  • 41. Nmap supports:  Multi-Scanning types:  Full Scan  SYN Scan  XMAX Scan  Ideal Scan  UDP Scan  Ping Scan  OS fingerprinting  Application fingerprinting
  • 42.  Nessus provides a simple, yet powerful interface for managing vulnerability-scanning activity.  To use Nuesses: 1. Creating a Policy I. Define scan type II. Optional, add taget’s credentials III. Chose the appropriate plug-ins 2. Creating and Launching a Scan 3. The output will be in the Reports tab
  • 43.  wa3f provides a flexible framework for finding and exploiting web applicationVulnerabilities. It is easy to use and extend and features dozens of web assessment and exploitation plug-ins.
  • 44.  Gain access to the OS, applications on the computer or victim’s network !!
  • 45.  This can be done by: 1. IP Address Spoofing 2. Password Cracking 3. MiTM Attack 4. Sniffing 5. DoS Attacks 6. Viruses &Worms
  • 46.  In addition, exploiting systems can be done by: 1. Trojans & Backdoor 2. Social Engineering 3. DHCP & DNS Attacks 4. Web Hacking 5. Wireless Hacking 6. Buffer Overflow
  • 47.  How ?  Normal IP address configurations.  Packet crafting.  Using proxies.  When ?  Access based on IP address  Hide identity
  • 48.  Use it to recover passwords from computer systems. -- System Admins—  Use it to gain unauthorized access to vulnerable system --Hackers --  Password racking Methods : ▪ Dictionary Attack ▪ Brutforce Attack ▪ Hybrid Attack ▪ rainbow table attacks
  • 49. Do you know ARP problem ? Why ARP ? When a machine needs to talk to another, it should know: 1. Destination IP 2. Destination MAC
  • 51.  Some Sniffers have add-on features: 1. Analyzes network traffic 2. Decoding network protocols  A sniffer is a piece of software that grabs all of the traffic flowing into and out of a computer attached to a network.
  • 52.  Is an attempt to make a computer or network resource unavailable to its intended users. --Wikipedia --
  • 53.  What is a virus?  Malicious SW needs a carrier  Needs user Interaction  Needs a trigger  What is a worm ?  Don’t need a carrier  Self replicated  Used to conquer new targets
  • 54.
  • 55.
  • 56.  DHCP  Starvation attack  DNS  Cash Poisoning
  • 57.  “All input is evil until proven otherwise!”  Due to bad filtration on user inputs, the web application may be vulnerable to:  SQL Injection  XSS  DirectoryTraversal  Session Hijacking  Account Harvesting
  • 58.  Shared media  Broadcast  Vulnerable Encryption Algorithms ▪ To be continued ….
  • 59. void foo (char *bar) { char c[12]; strcpy(c, bar); // no bounds checking... } int main (int argc, char **argv) { foo(argv[1]); }
  • 60.  Trying to retain the ownership of the compromised system.  This phase include: 1. Install Backdoors 2. Using RootKits
  • 61.
  • 62.  In this phase, the attacker will try to hide his activities on the system and on the network.
  • 63.
  • 64.  Attacks !!  Mitigation:  Access control lists ▪ Essentially white or black list ▪ MAC or network address ▪ Layer 2 or layer 3  VLANs ▪ Virtual network segments ▪ “Distinct broadcast domain”
  • 65.  Attacks !!  Mitigations:  Use access controls.  Secure routing configuration.  Use any kind of prevention techniques
  • 66. Preventive , Detective or Reactive
  • 67.  A firewall is a hardware or software system that prevents unauthorized access to or from a network.  Types of Firewall:  Network layer ▪ Packet filters ▪ Stateful Inspection  Application layer  Proxy
  • 68.  Device or software application that monitors network and/or system activities for malicious activities or policy violations and produces alerts  Terminologies:  Alert/Alarm  True Positive  False Positive  False Negative  True Negative
  • 69.  Signature-Based Detection  Statistical anomaly-based detection.  Stateful Protocol Analysis Detection  Types:  Network-based IDS  Wireless IDS  Host-based IDS
  • 70.  An Intrusion Prevention System works similar to an IDS. In addition it can block, prevent or drop the malicious or unwanted traffic in real-time.  Placed in-line  Modes  Learning mode  Active mode
  • 71.
  • 72.  Network regions of similar level of trust  Trusted  Semi-trusted  Untrusted  Defense in depth, Security is Layers …
  • 73.  Filter packets entering network  Turn off directed broadcasts  Block packets for any source address not permitted on the Internet  Block ports or protocols not used on your network for Internet access  Block packets with source addresses originating from inside your network  Block counterfeit source addresses from leaving your network
  • 74.  Command line terminal connection tool  Replacement for rsh, rcp, telnet, and others  All traffic encrypted  Both ends authenticate themselves to the other end  Ability to carry and encrypt non-terminal traffic
  • 75.
  • 76.  Computers installed out of the box have known vulnerabilities  Not just Windows computers  All services are vulnerable by default …  Hackers can take them over easily  They must be hardened—a complex process that involves many actions
  • 77.  System/application (Vendors) design errors.  System/application mis-configuration errors.  In-house applications !!
  • 78.  Secure installation and configuration  CIS benchmark  Vendor Documentations  SANS Reading Room  Turn off unnecessary services (applications)  Harden all remaining applications
  • 79.  Manage users and groups  Default accounts …!!  Manage access permissions  For individual files and directories, assign access permissions specific users and groups  Back up the server regularly
  • 80.  KnownVulnerabilities  Most programs have known vulnerabilities  Exploits are programs that take advantage of known vulnerabilities.  Regularly check missing patches  Using Nessus you can do this task easily  InstallAnti-Virus/Firewalls on all Servers
  • 81.  Reading Event Logs  The importance of logging to diagnose problems ▪ Failed logins, changing permissions, starting programs, kernel messages, etc.  File Encryption  File Integrity Checker  Monitoring Running Services & Processes & NetworkTraffic.
  • 83.  Work-around: A series of actions to be taken; no new software  Patches: New software to be added to the operating system  Upgrades: Newer versions of programs usually fix older vulnerabilities.
  • 84.
  • 85.  Wireless networking  2.4 – 2.5 GHz  Data Link layer specifications  Access Point  Family:  802.11a  802.11b  802.11g  802.11n
  • 86.  PhysicalAccess  Rouge access point  Firmware vulnerabilities  Protocol vulnerabilities  Default accounts  Some vendors hardcode admin accounts on AP
  • 87.  Physical devices  Laptop software  Airsnort  NetStumbler  War driving
  • 88. What a lovely symbols …
  • 89.  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  WPA2
  • 90.
  • 91.
  • 92.
  • 93.  Physical Barriers..  Strong Encryption  Mac filtering  Static IP addressing  Restricted access networks 802.1X  Service Set Identifier (SSID) No.  Regularly scan for rouge AP

Editor's Notes

  1. © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
  2. Asset – People, property, and information. Threat – Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset. Vulnerability – Weaknesses or gaps in a security program that can be exploited by threats to gain unauthorized access to an asset. Risk – The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
  3. Maltego: http://www.aldeid.com/wiki/Maltego Archive: http://www.archive.org
  4. Netstumbler Kismit
  5. http://www.openxtra.co.uk/support/howto/nmap-scan-modes
  6. Also, he may use some tricking techniques to communicate with the compromised system.
  7. IDS: Analyzes copies of the traffic stream Does not slow network traffic Allows some malicious traffic into the network IPS: Works inline in real time to monitor Layer 2 through Layer 7 traffic and content Needs to be able to handle network traffic Prevents malicious traffic from entering the network http://www.ciscopress.com/articles/article.asp?p=1336425
  8. Isolate VMs which have diff security level