Intro_2021
Intro_2021
Hacker Exploits
INCS-745
Summer 2021
by
Yasir Malik Ph.D.
Guide to Firewalls and VPNs, 3rd Edition 1
Course details
❑ Prerequisites:
– INCS 615 Network Security and Perimeter Protection
– CSCI 620 Operating System Security
❑ Main topics
- Network Security
- Software Security
- Web Security
- Operating System Security
2
Course objective
❑ Methods used in computer and network hacking are studied with
the intention of learning how better to protect systems from such
intrusions.
3
Recommended resources
❑ Notes and lecture slides are available in Blackboard.
❑ Textbooks
1. Computer Security and Penetration Testing, 2nd Edition by Alfred Basta,
Nadine Basta, Mary Brown.
❑ Lab Exercise:
1. Seed Project: Network security Labs available at
http://www.cis.syr.edu/~wedu/seed/lab_env.html
4
❑ There will be 5 lab assignments. Lab demos will be performed
individually. Lab sessions will be conducted by TA and is
strongly recommended to attend. One or two lab demos will
be provided for bonus.
❑ Extra Learning Tutorials from Kali Linux and Seed project Labs
are recomended.
5
Assessment Elements
6
Grading Policy
Percentage Graduate grade
90 – 100 A
85 – 89 A-
80 – 84 B+
70 – 79 B
65 – 69 B-
60 – 64 C+
55 – 59 C
0 – 54 F
7
• Security
• protection of a person, building, organization, or country against
threats such as crime or attacks by foreign countries:
• the fact that something is not likely to fail or be lost:
• Cambridge English Dictionary
• Computer Security
• The protection afforded to an automated information system in order
to attain the applicable objectives of preserving the integrity,
availability and confidentiality of information system resources
(includes hardware, software, firmware, information/data, and
telecommunications) NIST 1995
What Is Cybersecurity
Ref: https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
9
Classes of Intruders- Cyber Criminals
Groups of hackers
sponsored by
governments to
conduct espionage or
sabotage activities
Target acquisition
Privilege
and information Initial access
escalation
gathering
Information
Maintaining
gathering or Covering tracks
access
system exploit
Definitions
• Security Intrusion:
Unauthorized act of bypassing the security
mechanisms of a system
• Intrusion Detection:
A hardware or software function that gathers and
analyzes information from various areas within a
computer or a network to identify possible
security intrusions
Challenges of computer security
• Network security
• Critical activity for almost every organization
• Perimeter defense
• Cornerstone of most network security programs
• Effective firewall
• Properly configured to be safe and efficient
22
Security Perimeter and Defense in
Depth
• Security perimeter
• Defines the boundary between the outer limit of an
organization’s security and the beginning of the
outside network
• Perimeter does not protect against internal attacks
• Organization may choose to set up security domains
• Defense in depth
• Layered implementation of security
• Redundancy
• Implementing technology in layers
23
Security Perimeter and Defense in
Depth (cont’d.)
24
Security Perimeter and Defense in
Depth (cont’d.)
25
What Is Information Security?
26
What Is Information Security?
(cont’d.)
• C.I.A. triangle
• Industry standard for computer security
• Based on the three characteristics of information that
make it valuable to organizations:
• Confidentiality
• Integrity
• Availability
27
Key Security Concepts
• Preserving
• Guarding against • Ensuring timely
authorized
improper and reliable access
restrictions on
information to and use of
information access
modification or information
and disclosure,
destruction,
including means
including ensuring
for protecting
information
personal privacy
nonrepudiation
and proprietary
and authenticity
information
Critical Characteristics of
Information
• Availability
Information is accessible by authorized users without
interference or obstruction, and they receive it in the required
format.
• Accuracy
Information is free from mistakes or errors and it has the
value that the end user expects.
• Authenticity
• Information is genuine or original rather than a
reproduction or fabrication.
• Confidentiality
Information is protected from disclosure or exposure to
unauthorized individuals or systems.
29
Critical Characteristics of
Information (cont’d.)
• Integrity
• Information remains whole, complete, and
uncorrupted
• Utility
• Information has value for some purpose or end
• Possession
• Information object or item is owned or controlled by
somebody
30
Balancing Information Security
and Access
• Information security
• Process, not an end state
• Balance protection of information and information
assets with the availability of that information to
authorized users
• Security must allow reasonable access
• Yet protect against threats
31
Business Needs First
32
Data
• Data owners
• Responsible for the security and use of a particular
set of information
• Data custodians
• Responsible for the storage, maintenance, and
protection of the information
• Data users
• Allowed by the data owner to access and use the
information to perform their daily jobs
33
Key Information Security
Terminology
• Security professional must be familiar with common
terms
• To effectively support any information security effort
including the design, implementation, and
administration of an effective perimeter defense
34
Threats and Attacks
• Threat
• Category of object, person, or other entity that poses a potential risk of
loss to an asset
• Asset
• Anything that has value for the organization
• Can be physical or logical
• Attack
• Intentional or unintentional action that could represent the
unauthorized modification, damage, or loss of an information asset
35
Threats and Attacks (cont’d.)
• Subject of an attack
• Used as an active tool to conduct the attack
• Object of an attack
• Entity being attacked
• Direct attack
• Hacker uses a personal computer to break into a
system
• Indirect attack
• System is compromised and used to attack other
systems
36
Passive and Active Attacks
• Threat agent
• Specific instance of a general threat
• Well-known vulnerabilities
• Vulnerabilities that have been examined,
documented, and published
• Exploit
• Threat agents attempt to exploit a system or
information asset
• Specific recipe that an attacker creates to formulate
an attack
40
Vulnerabilities and Exploits
(cont’d.)
• Controls, safeguards, or countermeasures
• Synonymous terms
• Security mechanisms, policies, or procedures that
can successfully counter attacks, reduce risk, resolve
vulnerabilities, and generally improve the security
within an organization
41
Risk
42
Risk (cont’d.)
• Residual risk
• Amount of risk that remains after an organization
takes precautions, implements controls and
safeguards, and performs other security activities
• To control risk:
• Self-protection
• Risk transfer
• Self-insurance or acceptance
• Avoidance
43
Other Ways to View Threats
• Perspectives:
• Intellectual property
• Software piracy
• Shoulder surfing- watching other person password or
data.
• Hackers
• Script kiddies-hackers with limited skills
• Packet monkeys
• Cracker
• Phreaker-person who hacks public phone net for free
calls.
• Hacktivist or cyberactivist
• Cyberterrorist
44
Other Ways to View Threats
(cont’d.)
• Malicious code, malicious software, or malware
• Computer virus: macro virus, boot virus
• Worms
• Trojan horses
• Backdoor, trapdoor, maintenance hook
• Rootkit
45
Attacks on Information Assets
46
Malicious Code
• Malicious code
• Includes viruses, worms, Trojan horses, and active
Web scripts
• Executed with the intent to destroy or steal
information
• Polymorphic, multivector worm
• Constantly changes the way it looks
• Uses multiple attack vectors to exploit a variety of
vulnerabilities in commonly used software
47
Compromising Passwords
48
Denial-of-Service (DoS) and
Distributed Denial-of-Service (DDoS)
49
Spoofing
• Intruder sends messages to IP addresses that indicate to
the recipient that the messages are coming from a trusted
host
50
Man-in-the-Middle
51
E-mail Attacks
• E-mail
• Vehicle for attacks rather than the attack itself
• Spam
• Used as a means to make malicious code attacks
more effective
• Mail bomb
• Attacker routes large quantities of e-mail to the
target system
52
Sniffers
• Sniffer
• Program or device that can monitor data traveling
over a network
• Used both for legitimate network management
functions and for stealing information from a
network
• Impossible to detect
• Can be inserted almost anywhere
• Packet sniffers
• Work on TCP/IP networks
53
Social Engineering
54
Buffer Overflow
• Application error
• Occurs when more data is sent to a buffer than it can
handle
• Attacker can make the target system execute
instructions
• Attacker can take advantage of some other
unintended consequence of the failure
55
Summary
56
Homework
1. Introduction to Linux and Kali Linux
• Self-Paced Basic Linux course at Edx. @
https://courses.edx.org/courses/course-
v1:LinuxFoundationX+LFS101x+3T2018/course/
• Kali Linux @ https://www.udemy.com/kali-linux-101/
• Set up your machines for Course Labs
• http://www.cis.syr.edu/~wedu/seed/lab_env.html
57