SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Ethical Hacking 
CHAPTER 3 – NETWORK AND COMPUTER ATTACKS 
ERIC VANDERBURG
Objectives 
 Describe the different types of malicious software 
 Describe methods of protecting against malware attacks 
 Describe the types of network attacks 
 Identify physical security attacks and vulnerabilities
Malicious Software (Malware) 
 Network attacks prevent a business from operating 
 Malicious software (Malware) includes 
 Virus 
 Worms 
 Trojan horses 
 Goals 
 Destroy data 
 Corrupt data 
 Shutdown a network or system
Viruses 
 Virus attaches itself to an executable file 
 Can replicate itself through an executable program 
 Does not stand on its own 
 Needs a host program 
 No foolproof method of preventing them 
 Use antivirus programs for detection 
 Detection based on virus signatures 
 Must update signature database periodically 
 Use automatic update feature if available
Viruses (continued) 
 Encoding base 64 used to reduce size of e-mail attachments 
 Represents 0 to 63 using six bits 
 A is 000000 … Z is 011001 
 Converting base 64 strings to decimal equivalent 
 Create groups of 4 characters, for each group 
 Convert decimal value of each letter to binary 
 Rewrite as three groups of eight bits 
 Convert the binary into decimal
Viruses (continued) 
 Commercial base 64 decoders 
 Shell 
 Executable piece of programming code 
 Should not appear in an e-mail attachment
Macro Viruses 
 Virus encoded as a macro 
 Macro 
 Lists of commands 
 Can be used in destructive ways 
 Example: Melissa 
 Appeared in 1999 
 Even nonprogrammers can create macro viruses 
 Instructions posted on Web sites 
 Security professionals can learn from thinking like attackers
Worms 
 Worm 
 Replicates and propagates without a host 
 Infamous examples 
 Code Red 
 Nimda 
 Can infect every computer in the world in a short time 
 At least in theory 
 Actual examples 
 Cyberattacks against ATM machines 
 Slammer and Nachi worms
Trojan Programs 
 Insidious attack against networks 
 Disguise themselves as useful programs 
 Hide malicious content in program 
 Backdoors 
 Rootkits 
 Allow attackers remote access 
 Firewalls 
 Identify traffic on uncommon ports 
 Can block this type of attack 
 Trojan programs can use known ports 
 HTTP (TCP 80) or DNS (UDP 53)
Spyware 
 Sends information from the infected computer to the attacker 
 Confidential financial data 
 Passwords 
 PINs 
 Any other stored data 
 Can registered each keystroke entered 
 Prevalent technology 
 Educate users about spyware
Adware 
 Similar to spyware 
 Can be installed without the user being aware 
 Sometimes displays a banner 
 Main goal 
 Determine user’s online purchasing habits 
 Tailored advertisement 
 Main problem 
 Slows down computers
Protecting Against Malware 
Attacks 
 Difficult task 
 New viruses, worms, Trojan programs appear daily 
 Malware detected using antivirus solutions 
 Educate your users about these types of attacks
Educating Your Users 
 Structural training 
 Most effective measure 
 Includes all employees and management 
 E-mail monthly security updates 
 Simple but effective training method 
 Recommend that users update virus signature database 
 Activate automatic updates
Educating Your Users 
 SpyBot and Ad-Aware 
 Help protect against spyware and adware 
 Firewalls 
 Hardware (enterprise solution) 
 Software (personal solution) 
 Can be combined 
 Intrusion Detection System (IDS) 
 Monitors your network 24/7
Avoiding Fearing Tactics 
 Avoid scaring users into complying with security measures 
 Sometimes used by unethical security testers 
 Against the OSSTMM’s Rules of Engagement 
 Promote awareness rather than instilling fear 
 Users should be aware of potential threats 
 During training 
 Build on users’ knowledge 
 Make training easier
Intruder Attacks on Networks and 
Computers 
 Attack 
 Any attempt by an unauthorized person to access or use network 
resources 
 Network security 
 Concern with security of network resources 
 Computer security 
 Concerned with the security of a computer not part of a network 
infrastructure 
 Computer crime 
 Fastest growing type of crime worldwide
Denial-of-Service Attacks 
 Denial-of-Service (DoS) attack 
 Prevents legitimate users from accessing network resources 
 Some forms do not involve computers 
 Attacks do not attempt to access information 
 Cripple the network 
 Make it vulnerable to other type of attacks 
 Performing an attack yourself is not wise 
 Only need to prove attack could be carried out
Distributed Denial-of-Service 
Attacks 
 Attack on a host from multiple servers or workstations 
 Network could be flooded with billions of requests 
 Loss of bandwidth 
 Degradation or loss of speed 
 Often participants are not aware they are part of the attack 
 Attacking computers could be controlled using Trojan programs
Buffer Overflow Attacks 
 Vulnerability in poorly written code 
 Code does not check predefined size of input field 
 Goal 
 Fill overflow buffer with executable code 
 OS executes this code 
 Code elevates attacker’s permission 
 Administrator 
 Owner of running application 
 Train your programmer in developing applications with security in 
mind
Ping of Death Attacks 
 Type of DoS attack 
 Not as common as during the late 1990s 
 How it works 
 Attacker creates a large ICMP packet 
 More than 65,535 bytes 
 Large packet is fragmented at source network 
 Destination network reassembles large packet 
 Destination point cannot handle oversize packet and crashes
Session Hijacking 
 Enables attacker to join a TCP session 
 Attacker makes both parties think he or she is the other party
Addressing Physical Security 
 Protecting a network also requires physical security 
 Inside attacks are more likely than attacks from outside the 
company
Keyloggers 
 Used to capture keystrokes on a computer 
 Hardware 
 Software 
 Software 
 Behaves like Trojan programs 
 Hardware 
 Easy to install 
 Goes between the keyboard and the CPU 
 KeyKatcher and KeyGhost
Keyloggers (continued) 
 Protection 
 Software-based 
 Antivirus 
 Hardware-based 
 Random visual tests
Behind Locked Doors 
 Lock up your servers 
 Average person can pick deadbolt locks in less than five minutes 
 After only a week or two of practice 
 Experienced hackers can pick deadbolt locks in under 30 seconds 
 Rotary locks are harder to pick 
 Keep a log of who enters and leaves the room 
 Security cards can be used instead of keys for better security
Summary 
 Be aware of attacks on network infrastructures and standalone 
computers 
 Attacks can be perpetrated by insiders or remote attackers 
 Malicious software 
 Virus 
 Worm 
 Trojan programs 
 Spyware 
 Adware
Summary (continued) 
 Attacks 
 Denial-of-Service (DoS) 
 Distributed Denial-of-Service (DDoS) 
 Buffer overflow 
 Ping of Death 
 Session hijacking
Summary (continued) 
 Physical security 
 As important as network or computer security 
 Keyloggers 
 Software-based 
 Hardware-based 
 Locks 
 Choose hard-to-pick locks 
 Security cards

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Botnets
BotnetsBotnets
Botnets
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Network security
Network securityNetwork security
Network security
 
Password cracking and brute force
Password cracking and brute forcePassword cracking and brute force
Password cracking and brute force
 

Andere mochten auch

Denial of Service in Software Defined Netoworks
Denial of Service in Software Defined NetoworksDenial of Service in Software Defined Netoworks
Denial of Service in Software Defined Netoworks
Mohammad Faraji
 

Andere mochten auch (20)

CNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social EngineeringCNIT 123: Ch 4: Footprinting and Social Engineering
CNIT 123: Ch 4: Footprinting and Social Engineering
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Denial of Service in Software Defined Netoworks
Denial of Service in Software Defined NetoworksDenial of Service in Software Defined Netoworks
Denial of Service in Software Defined Netoworks
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
 
Is Your Mobile App Secure?
Is Your Mobile App Secure?Is Your Mobile App Secure?
Is Your Mobile App Secure?
 
Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
 
CNIT 126 8: Debugging
CNIT 126 8: DebuggingCNIT 126 8: Debugging
CNIT 126 8: Debugging
 
Ch 6: Enumeration
Ch 6: EnumerationCh 6: Enumeration
Ch 6: Enumeration
 
Ch 7: Programming for Security Professionals
Ch 7: Programming for Security ProfessionalsCh 7: Programming for Security Professionals
Ch 7: Programming for Security Professionals
 
CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro CNIT 126 5: IDA Pro
CNIT 126 5: IDA Pro
 

Ähnlich wie Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg

Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
Karan Bhandari
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
 

Ähnlich wie Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg (20)

Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Data security
Data securityData security
Data security
 
CNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer AttacksCNIT 123: Ch 3: Network and Computer Attacks
CNIT 123: Ch 3: Network and Computer Attacks
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security
Computer securityComputer security
Computer security
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Computer security
Computer securityComputer security
Computer security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber security
Cyber security Cyber security
Cyber security
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 

Mehr von Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

Mehr von Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg

  • 1. Ethical Hacking CHAPTER 3 – NETWORK AND COMPUTER ATTACKS ERIC VANDERBURG
  • 2. Objectives  Describe the different types of malicious software  Describe methods of protecting against malware attacks  Describe the types of network attacks  Identify physical security attacks and vulnerabilities
  • 3. Malicious Software (Malware)  Network attacks prevent a business from operating  Malicious software (Malware) includes  Virus  Worms  Trojan horses  Goals  Destroy data  Corrupt data  Shutdown a network or system
  • 4. Viruses  Virus attaches itself to an executable file  Can replicate itself through an executable program  Does not stand on its own  Needs a host program  No foolproof method of preventing them  Use antivirus programs for detection  Detection based on virus signatures  Must update signature database periodically  Use automatic update feature if available
  • 5. Viruses (continued)  Encoding base 64 used to reduce size of e-mail attachments  Represents 0 to 63 using six bits  A is 000000 … Z is 011001  Converting base 64 strings to decimal equivalent  Create groups of 4 characters, for each group  Convert decimal value of each letter to binary  Rewrite as three groups of eight bits  Convert the binary into decimal
  • 6. Viruses (continued)  Commercial base 64 decoders  Shell  Executable piece of programming code  Should not appear in an e-mail attachment
  • 7. Macro Viruses  Virus encoded as a macro  Macro  Lists of commands  Can be used in destructive ways  Example: Melissa  Appeared in 1999  Even nonprogrammers can create macro viruses  Instructions posted on Web sites  Security professionals can learn from thinking like attackers
  • 8. Worms  Worm  Replicates and propagates without a host  Infamous examples  Code Red  Nimda  Can infect every computer in the world in a short time  At least in theory  Actual examples  Cyberattacks against ATM machines  Slammer and Nachi worms
  • 9. Trojan Programs  Insidious attack against networks  Disguise themselves as useful programs  Hide malicious content in program  Backdoors  Rootkits  Allow attackers remote access  Firewalls  Identify traffic on uncommon ports  Can block this type of attack  Trojan programs can use known ports  HTTP (TCP 80) or DNS (UDP 53)
  • 10. Spyware  Sends information from the infected computer to the attacker  Confidential financial data  Passwords  PINs  Any other stored data  Can registered each keystroke entered  Prevalent technology  Educate users about spyware
  • 11. Adware  Similar to spyware  Can be installed without the user being aware  Sometimes displays a banner  Main goal  Determine user’s online purchasing habits  Tailored advertisement  Main problem  Slows down computers
  • 12. Protecting Against Malware Attacks  Difficult task  New viruses, worms, Trojan programs appear daily  Malware detected using antivirus solutions  Educate your users about these types of attacks
  • 13. Educating Your Users  Structural training  Most effective measure  Includes all employees and management  E-mail monthly security updates  Simple but effective training method  Recommend that users update virus signature database  Activate automatic updates
  • 14. Educating Your Users  SpyBot and Ad-Aware  Help protect against spyware and adware  Firewalls  Hardware (enterprise solution)  Software (personal solution)  Can be combined  Intrusion Detection System (IDS)  Monitors your network 24/7
  • 15. Avoiding Fearing Tactics  Avoid scaring users into complying with security measures  Sometimes used by unethical security testers  Against the OSSTMM’s Rules of Engagement  Promote awareness rather than instilling fear  Users should be aware of potential threats  During training  Build on users’ knowledge  Make training easier
  • 16. Intruder Attacks on Networks and Computers  Attack  Any attempt by an unauthorized person to access or use network resources  Network security  Concern with security of network resources  Computer security  Concerned with the security of a computer not part of a network infrastructure  Computer crime  Fastest growing type of crime worldwide
  • 17. Denial-of-Service Attacks  Denial-of-Service (DoS) attack  Prevents legitimate users from accessing network resources  Some forms do not involve computers  Attacks do not attempt to access information  Cripple the network  Make it vulnerable to other type of attacks  Performing an attack yourself is not wise  Only need to prove attack could be carried out
  • 18. Distributed Denial-of-Service Attacks  Attack on a host from multiple servers or workstations  Network could be flooded with billions of requests  Loss of bandwidth  Degradation or loss of speed  Often participants are not aware they are part of the attack  Attacking computers could be controlled using Trojan programs
  • 19. Buffer Overflow Attacks  Vulnerability in poorly written code  Code does not check predefined size of input field  Goal  Fill overflow buffer with executable code  OS executes this code  Code elevates attacker’s permission  Administrator  Owner of running application  Train your programmer in developing applications with security in mind
  • 20. Ping of Death Attacks  Type of DoS attack  Not as common as during the late 1990s  How it works  Attacker creates a large ICMP packet  More than 65,535 bytes  Large packet is fragmented at source network  Destination network reassembles large packet  Destination point cannot handle oversize packet and crashes
  • 21. Session Hijacking  Enables attacker to join a TCP session  Attacker makes both parties think he or she is the other party
  • 22. Addressing Physical Security  Protecting a network also requires physical security  Inside attacks are more likely than attacks from outside the company
  • 23. Keyloggers  Used to capture keystrokes on a computer  Hardware  Software  Software  Behaves like Trojan programs  Hardware  Easy to install  Goes between the keyboard and the CPU  KeyKatcher and KeyGhost
  • 24. Keyloggers (continued)  Protection  Software-based  Antivirus  Hardware-based  Random visual tests
  • 25. Behind Locked Doors  Lock up your servers  Average person can pick deadbolt locks in less than five minutes  After only a week or two of practice  Experienced hackers can pick deadbolt locks in under 30 seconds  Rotary locks are harder to pick  Keep a log of who enters and leaves the room  Security cards can be used instead of keys for better security
  • 26. Summary  Be aware of attacks on network infrastructures and standalone computers  Attacks can be perpetrated by insiders or remote attackers  Malicious software  Virus  Worm  Trojan programs  Spyware  Adware
  • 27. Summary (continued)  Attacks  Denial-of-Service (DoS)  Distributed Denial-of-Service (DDoS)  Buffer overflow  Ping of Death  Session hijacking
  • 28. Summary (continued)  Physical security  As important as network or computer security  Keyloggers  Software-based  Hardware-based  Locks  Choose hard-to-pick locks  Security cards