SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Attack the [own] Network so you`ll survive




y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
Who Am I
 ●   Founder echo.or.id, e-rdc.org,
     ubuntulinux.or.id
 ●   A Bandwidth hunter
 ●   Security TroubleMaker since 2000
 ●   Not a Celebrity
 ●   y3dips@REMOVEUPPERCASEecho.or.id




y3dips@REMOVEUPPERCASEecho.or.id        UNAS, 27 Desember 2008
Network?
 ●   So, what is Network?
 ●   A collection of host computers together
     with the subnetwork or internetwork
     through which they can exchange data.
 ●   Internet, very popular term in network




y3dips@REMOVEUPPERCASEecho.or.id       UNAS, 27 Desember 2008
Issue
 ●   Spoofing
 ●   Sniffing
 ●   Tunneling
 ●   Denial Of Service/ Botnets




y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
Why attacking?




    “The best defense is a good offense”
          http://www.answers.com/topic/attack-is-the-best-form-of-defence




y3dips@REMOVEUPPERCASEecho.or.id                                       UNAS, 27 Desember 2008
Brief History
 ●   TCP/IP is more than 30 years
 ●   Create withous security considerations,
     eg: FTP, TELNET, SMTP, POP3
 ●   Weakness Lies on IP layer, no auth and
     encryption




y3dips@REMOVEUPPERCASEecho.or.id       UNAS, 27 Desember 2008
Spoofing
 ●   Spoof = Masquerade - rfc4949
 ●   Is a situation in which one person or
     program successfully masquerades as
     another by falsifying data and thereby
     gaining an illegitimate advantage – wikipedia




y3dips@REMOVEUPPERCASEecho.or.id           UNAS, 27 Desember 2008
Spoofing Example
 ●   IP spoofing, e.g: modify source address
     A common misconception is that "IP
     spoofing" can be used to hide your IP
     address while surfing the Internet, chatting
     on-line, sending e-mail, and so forth. This
     is generally not true. Forging the source
     IP address causes the responses to be
     misdirected, meaning you cannot create a
     normal network connection. - iss.net
 ●   Combine with DDOS attack
y3dips@REMOVEUPPERCASEecho.or.id        UNAS, 27 Desember 2008
Spoofing Example
 ●   ARP Spoofing
 ●   Send ‘fake’ or 'spoofed', ARP messages to
     an Ethernet LAN. These frames contain
     false MAC addresses, confusing network
     devices (e.g switches)
 ●   Monkey In the Middle Attack with Cain
 ●   Cain, ettercap, nemesis, dsniff



y3dips@REMOVEUPPERCASEecho.or.id       UNAS, 27 Desember 2008
y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
Sniffing
 ●   "wiretapping"
 ●   Capturing and examining the data packets
     carried on a LAN - rfc4949
 ●   Objectives : Capture credential data
     through network (password, files, video sound, etc)
 ●   Hub (passive) v.s Switch (active)
 ●   Wireshark (ethereal), ettercap, tcpdump
 ●   MITM, Combine with spoofing

y3dips@REMOVEUPPERCASEecho.or.id                      UNAS, 27 Desember 2008
Tunneling
 ●   Tunnel is A communication channel
     created in a computer network by
     encapsulating (i.e., layering) a
     communication protocol's data packets in
     (i.e., above) a second protocol that
     normally would be carried above, or at the
     same layer as, the first one. - rfc4949
 ●   Http, ssh, dns, icmp
 ●   Ssh foo@doo -D port

y3dips@REMOVEUPPERCASEecho.or.id       UNAS, 27 Desember 2008
DOS
 ●   The prevention of authorized access to a
     system resource or the delaying of system
     operations and function – rfc4949
 ●   Famous POD, synflood, new attack (actually
     old, http://it.slashdot.org/article.pl?sid=08/10/01/0127245)

 ●   DDOS attack
 ●   BotNet




y3dips@REMOVEUPPERCASEecho.or.id                                    UNAS, 27 Desember 2008
DOS attacker may
 ●   Attempt to flood a network, thereby
     preventing legitimate network traffic
 ●   Attempt to disrupt connections between
     two machines, thereby preventing access
     to a service
 ●   Attempt to prevent a particular individual
     from accessing a service
 ●   Attempt to disrupt service to a specific
     system or person

y3dips@REMOVEUPPERCASEecho.or.id        UNAS, 27 Desember 2008
y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
y3dips@REMOVEUPPERCASEecho.or.id   UNAS, 27 Desember 2008
Survive




    “Security is a process, not a product”




y3dips@REMOVEUPPERCASEecho.or.id    UNAS, 27 Desember 2008
Survive (cont`d)
 ●   Firewall, IDS, IPS just a tool
 ●   Educate the user
 ●   Implement the Best policy
 ●   Regularly Audit




y3dips@REMOVEUPPERCASEecho.or.id      UNAS, 27 Desember 2008
Thanks All.
                         Q&A ?




y3dips@REMOVEUPPERCASEecho.or.id     UNAS, 27 Desember 2008

Weitere ähnliche Inhalte

Andere mochten auch

phpbb worm explanation
phpbb worm explanationphpbb worm explanation
phpbb worm explanationAmmar WK
 
webhacking
webhackingwebhacking
webhackingAmmar WK
 
behind the book
behind the bookbehind the book
behind the bookAmmar WK
 
Playin with Password
Playin with PasswordPlayin with Password
Playin with PasswordAmmar WK
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet SecurityAmmar WK
 
Art of Thinking [Re-write]
Art of Thinking [Re-write]Art of Thinking [Re-write]
Art of Thinking [Re-write]Ammar WK
 
Denial Of services
Denial Of servicesDenial Of services
Denial Of servicesAmmar WK
 
Attacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAttacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAmmar WK
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security ProfessionalAmmar WK
 
Arpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofingArpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofingAmmar WK
 
Burp suite
Burp suiteBurp suite
Burp suiteAmmar WK
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?Ammar WK
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingAmmar WK
 
Art of Backdooring: Technique and Practice
Art of Backdooring: Technique and PracticeArt of Backdooring: Technique and Practice
Art of Backdooring: Technique and PracticeAmmar WK
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationAmmar WK
 
bluetooth [in]security [2]
bluetooth [in]security [2]bluetooth [in]security [2]
bluetooth [in]security [2]Ammar WK
 
password series
password seriespassword series
password seriesAmmar WK
 
from 33 to 0 - A journey to be root
from 33 to 0 - A journey to be rootfrom 33 to 0 - A journey to be root
from 33 to 0 - A journey to be rootAmmar WK
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linuxAmmar WK
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Ammar WK
 

Andere mochten auch (20)

phpbb worm explanation
phpbb worm explanationphpbb worm explanation
phpbb worm explanation
 
webhacking
webhackingwebhacking
webhacking
 
behind the book
behind the bookbehind the book
behind the book
 
Playin with Password
Playin with PasswordPlayin with Password
Playin with Password
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Art of Thinking [Re-write]
Art of Thinking [Re-write]Art of Thinking [Re-write]
Art of Thinking [Re-write]
 
Denial Of services
Denial Of servicesDenial Of services
Denial Of services
 
Attacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and ProfitAttacking Blackberry For Phun and Profit
Attacking Blackberry For Phun and Profit
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security Professional
 
Arpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofingArpwall - protect from ARP spoofing
Arpwall - protect from ARP spoofing
 
Burp suite
Burp suiteBurp suite
Burp suite
 
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
 
Art of Backdooring: Technique and Practice
Art of Backdooring: Technique and PracticeArt of Backdooring: Technique and Practice
Art of Backdooring: Technique and Practice
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
 
bluetooth [in]security [2]
bluetooth [in]security [2]bluetooth [in]security [2]
bluetooth [in]security [2]
 
password series
password seriespassword series
password series
 
from 33 to 0 - A journey to be root
from 33 to 0 - A journey to be rootfrom 33 to 0 - A journey to be root
from 33 to 0 - A journey to be root
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
 
Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008Mastering Network HackingFU - idsecconf2008
Mastering Network HackingFU - idsecconf2008
 

Ähnlich wie Attack the (Own) Network so You'll Survive

How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves SecurityWilliam Norton
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...HackIT Ukraine
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsA Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsIRJET Journal
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdingershawn_merdinger
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksGeekNightHyderabad
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxAde John Gestole
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksAtif Shahzad
 

Ähnlich wie Attack the (Own) Network so You'll Survive (20)

D do s
D do sD do s
D do s
 
How Internet Peering Improves Security
How Internet Peering Improves SecurityHow Internet Peering Improves Security
How Internet Peering Improves Security
 
E firewalls
E firewallsE firewalls
E firewalls
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Network security
Network securityNetwork security
Network security
 
DDoS.ppt
DDoS.pptDDoS.ppt
DDoS.ppt
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde..."Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
 
Network Security
Network SecurityNetwork Security
Network Security
 
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention MechanismsA Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
A Survey Report on DDOS Attacking Tools, Detection and Prevention Mechanisms
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptx
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Network Security
Network SecurityNetwork Security
Network Security
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 
Firewalls
FirewallsFirewalls
Firewalls
 
Networking
NetworkingNetworking
Networking
 

Mehr von Ammar WK

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssnAmmar WK
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?Ammar WK
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsAmmar WK
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!Ammar WK
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0dayAmmar WK
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareAmmar WK
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteAmmar WK
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)Ammar WK
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet AnalysisAmmar WK
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)Ammar WK
 
Network security
Network securityNetwork security
Network securityAmmar WK
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsAmmar WK
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A HackerAmmar WK
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkAmmar WK
 

Mehr von Ammar WK (17)

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssn
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0day
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or White
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet Analysis
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)
 
Network security
Network securityNetwork security
Network security
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A Hacker
 
idsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 networkidsecconf2010-hacking priv8 network
idsecconf2010-hacking priv8 network
 

Kürzlich hochgeladen

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Attack the (Own) Network so You'll Survive

  • 1. Attack the [own] Network so you`ll survive y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 2. Who Am I ● Founder echo.or.id, e-rdc.org, ubuntulinux.or.id ● A Bandwidth hunter ● Security TroubleMaker since 2000 ● Not a Celebrity ● y3dips@REMOVEUPPERCASEecho.or.id y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 3. Network? ● So, what is Network? ● A collection of host computers together with the subnetwork or internetwork through which they can exchange data. ● Internet, very popular term in network y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 4. Issue ● Spoofing ● Sniffing ● Tunneling ● Denial Of Service/ Botnets y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 5. Why attacking? “The best defense is a good offense” http://www.answers.com/topic/attack-is-the-best-form-of-defence y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 6. Brief History ● TCP/IP is more than 30 years ● Create withous security considerations, eg: FTP, TELNET, SMTP, POP3 ● Weakness Lies on IP layer, no auth and encryption y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 7. Spoofing ● Spoof = Masquerade - rfc4949 ● Is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage – wikipedia y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 8. Spoofing Example ● IP spoofing, e.g: modify source address A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection. - iss.net ● Combine with DDOS attack y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 9. Spoofing Example ● ARP Spoofing ● Send ‘fake’ or 'spoofed', ARP messages to an Ethernet LAN. These frames contain false MAC addresses, confusing network devices (e.g switches) ● Monkey In the Middle Attack with Cain ● Cain, ettercap, nemesis, dsniff y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 10. y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 11. y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 12. Sniffing ● "wiretapping" ● Capturing and examining the data packets carried on a LAN - rfc4949 ● Objectives : Capture credential data through network (password, files, video sound, etc) ● Hub (passive) v.s Switch (active) ● Wireshark (ethereal), ettercap, tcpdump ● MITM, Combine with spoofing y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 13. Tunneling ● Tunnel is A communication channel created in a computer network by encapsulating (i.e., layering) a communication protocol's data packets in (i.e., above) a second protocol that normally would be carried above, or at the same layer as, the first one. - rfc4949 ● Http, ssh, dns, icmp ● Ssh foo@doo -D port y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 14. DOS ● The prevention of authorized access to a system resource or the delaying of system operations and function – rfc4949 ● Famous POD, synflood, new attack (actually old, http://it.slashdot.org/article.pl?sid=08/10/01/0127245) ● DDOS attack ● BotNet y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 15. DOS attacker may ● Attempt to flood a network, thereby preventing legitimate network traffic ● Attempt to disrupt connections between two machines, thereby preventing access to a service ● Attempt to prevent a particular individual from accessing a service ● Attempt to disrupt service to a specific system or person y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 16. y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 17. y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 18. Survive “Security is a process, not a product” y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 19. Survive (cont`d) ● Firewall, IDS, IPS just a tool ● Educate the user ● Implement the Best policy ● Regularly Audit y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008
  • 20. Thanks All. Q&A ? y3dips@REMOVEUPPERCASEecho.or.id UNAS, 27 Desember 2008