Escolar Documentos
Profissional Documentos
Cultura Documentos
Trish Miller
Objectives
Types of Attacks
Attacks on the OSI & TCP/IP Model
Attack Methods
Prevention
Switch Vulnerabilities and Hacking
Cisco Routers
Interesting links
Trish Miller
Types of Attacks
Physical Access
Attacks
Wiretapping
Server Hacking
Vandalism
Trish Miller
Dialog Attacks
Eavesdropping
Impersonation
Message Alteration
Scanning (Probing)
Break-in
Denial of Service
Malware
Viruses
Worms
Trish Miller
Social Engineering
Opening Attachments
Password Theft
Information Theft
Trish Miller
Presentation:
Cracking of encrypted
transmissions by short
encryption key
Trish Miller
Session
Password theft
Unauthorized Access
with Root permission
Trish Miller
Network Sniffers
Wire Taps
Trojan Horses
Malicious code
LAND attack
Trish Miller
Trish Miller
Attack Methods
Trish Miller
Attack Methods
Host Scanning
Network Scanning
Port Scanning
Fingerprinting
Trish Miller
Trish Miller
Trish Miller
Trish Miller
NetBIOS
Ports 135 139 used for NetBIOS ports used for file
and print services.
GRC.com a free website that scan your pc for open
ports.
Trish Miller
Trish Miller
Trish Miller
Trish Miller
Trish Miller
Prevention
Trish Miller
Preventions
Stealth Scanning
Access Control
Firewalls
Proxy Servers
Trish Miller
IPsec
Security Policies
DMZ
Host Security
Stealth Scanning
Noisiness of Attacks
Exposure of the Attackers IP Address
Reduce the rate of Attack below the IDS
Threshold
Scan Selective Ports
Trish Miller
Access Control
The goal of access control is to prevent
attackers from gaining access, and stops them if
they do.
The best way to accomplish this is by:
Determine who needs access to the resources
located on the server.
Decide the access permissions for each resource.
Implement specific access control policies for each
resource.
Record mission critical resources.
Harden the server against attacks.
Disable invalid accounts and establish policies
Trish Miller
Firewalls
Firewalls are designed to
protect you from outside
attempts to access your
computer, either for the
purpose of
eavesdropping on your
activities, stealing data,
sabotage, or using your
machine as a means to
launch an attack on a
third party.
Trish Miller
Firewalls (Cont.)
Hardware
Provides a strong
degree of protection
from the outside world.
Can be effective with
little or no setup
Can protect multiple
systems
Trish Miller
Software
Better suite to protect
against Trojans and
worms.
Allows you to
configure the ports you
wish to monitor. It
gives you more fine
control.
Protects a single
system.
Firewalls
Can Prevent
Discovery
Network
Traceroute
Penetration
Trish Miller
Synflood
Garbage
UDP Ping
TCP Ping
Ping of Death
Proxy
A proxy server is a buffer between your
network and the outside world.
Use an anonymous Proxy to prevent
attacks.
Trish Miller
IPSec
Provides various security services for traffic at
the IP layer
These security services include
Authentication
Integrity
Confidentiality
Trish Miller
How IPsec
helps
Details
Unauthorized
system access
Authentication,
tamperproofing
Targeted
attacks of highvalue servers
Authentication,
tamperproofing
Eavesdropping
Authentication,
confidentiality
Government
guideline
compliance
Authentication,
confidentiality
Example: All
communications between
financial servers must be
encrypted.
Trish Miller
DMZ Image
Trish Miller
Host Security
Trish Miller
Hardening Servers
Cisco IOS
Upgrades and Patches
Unnecessary Services
Network Monitoring tools
Trish Miller
CDP Protocol
Used to locate IP address, version, and
model.
Mass amounts of packets being sent can
fake a crash
Used to troubleshoot network, but should
be disabled.
Trish Miller
ARP Poisoning
Give users data by poisoning ARP cache
of end node.
MAC address used to determine
destination. Device driver does not check.
User can forge ARP datagram for man in
the middle attack.
Trish Miller
SNMP
SNMP manages the network.
Authentication is weak. Public and
Private community keys are clear text.
Uses UDP protocol which is prone to
spoofing.
Enable SNMPv3 without backwards
compatibility.
Trish Miller
Trish Miller
Trish Miller
Trish Miller
SpanningTree
TreeAttacks
Attacks (Cont.)
(Cont.)
Spanning
STEP 3: The attacker becomes the
Root bridge!
Spanning Tree recalculates.
The backbone from the original network is
now the backbone from the attacking host
to the other switches on the network.
Trish Miller
Trish Miller
Trish Miller
CDM
Cisco Secure Desktop
3 major vulnerabilities
Maintains information after an Internet
browsing session. This occurs after an SSL
VPN session ends.
Evades the system via the system policies
preventing logoff, this will allow a VPN
connection to be activated.
Allow local users to elevate their privileges.
Trish Miller
Prevention
Cisco has software to address the
vulnerabilities.
There are workarounds available to mitigate
the effects of some of these vulnerabilities.
Trish Miller
Cisco Routers
Trish Miller
Cisco Routers
Two potential issues with Cisco
Routers
Problems with certain IOS software
SNMP
Trish Miller
Trish Miller
Virtual connection 1
Virtual Connection 2
Trish Miller
Error
Connection
Information leak
Trish Miller
Trish Miller
CISCO
Router
Attacking
Computer
Trish Miller
CISCO
Router
Trish Miller
Attacking
Computer
Trish Miller
Links
http://sectools.org/tools2.html
http://insecure.org/sploits/l0phtcrack.lanma
n.problems.html
http://www.grc.com/intro.htm
http://www.riskythinking.com
http://www.hidemyass.com/
Trish Miller
References
http://www.bmighty.com/network/showArticle.jhtml;jsessi
onid=2YYDWJHHX3FL2QSNDLPSKHSCJUNN2JVN?ar
ticleID=202401432&pgno=2
http://www.juniper.net/security/auto/vulnerabilities/vuln19
998.html
http://www.blackhat.com/presentations/bh-usa-02/bh-us02-convery-switches.pdf
http://www.askapache.com/security/hacking-vlanTrishswitched-networks.html
Miller
Trish
TrishMiller
Miller
Trish Miller