1_Intro

advertisement
Intro
Intro
1
Counter Hack Chapters
1.
2.
3.
4.
Intro
Introduction --- explains why
emphasis is on tools and techniques
Networking Overview --- we will
cover most of this
Linux and Unix Overview --- briefly
Windows Overview --- briefly
2
Counter Hack Chapters
5.
6.
7.
Intro
Reconnaissance --- low-tech, Web search
(or “Google hacking”), Whois database,
DNS, tools, defenses
Scanning --- War driving, war dialing,
network mapping, port scanning,
vulnerability scanning, IDS and IPS
Gaining Access Using Application and OS
Attacks --- buffer overflow, pwd attacks,
Web-based attacks, browser flaws
3
Counter Hack Chapters
8.
9.
10.
Intro
Gaining Access via Network Attacks --sniffing, IP address spoofing, session
hijacking, Netcat, defenses
DoS Attacks --- locally/remotely stop
services/exhaust resources, DDoS
Maintaining Access --- trojans,
backdoors, bots, rootkits, defenses
4
Counter Hack Chapters
11.
12.
13.
Intro
Covering Tracks and Hiding --- log
and accounting attacks, hard-to-find
files, covert channels, defenses
Putting it All Together: Anatomy of
an Attack --- gives 3 scenarios
The Future, References, and
Conclusions
5
Preface

Preface for new edition and old
o First edition --- somebody’s Web pages got
messed up by a “hacker”
o New edition --- info on more than 1 million
credit cards stolen

Common theme in security today
o Attacks are now more “sinister”, mafia, etc.
o In the past attacks were just fun and games

Aside: Then why did we bothered to worry
about security in the past???
Intro
6
Intro
 Attacks
happen
 Attacks
range from…
o Bad guys constantly probing
o Simple scanning to
o Truly sophisticated attacks
 Lots
of anecdotal info of real attacks
o But “hard” numbers hard to come by
Intro
7
Golden Age of Hacking
15 years ago, Internet was only of
academic interest (literally)
 Today, we are highly dependent on
computers and networks

o Medical info, guiding aircraft, financial
transactions, etc., etc.

This dependence rapidly increasing
o Cell phones, RFID, toasters, etc., etc.
Intro
8
Golden Age of Hacking

Networking/computing infrastructure full
of fundamental security flaws
o Example: TCP/IP designed for friendly academic
environment, no thought of security
o Difficult to retrofit security

The world is “inherently hackable”
o New flaws discovered on a daily basis
o Hackers are reasonably well-organized
o Any 15 year-old can be a hacker
Intro
9
Golden Age of Hacking

New technologies  new hacking
opportunities
o Personal Video Recorder (PVR)
o Heart pacemaker
o Smart cars (download maps, email, online
troubleshooting, etc.) --- “carhacking”

New applications are built on top of
security-flawed architecture
Intro
10
Golden Age of Hacking
History lesson…
 WWII was Golden Age of Cryptanalysis

o All major Axis ciphers were broken
o Several Allied ciphers weak/broken

This situation eventually changed
o Soon after WWII classified ciphers stronger
o More recently commercial ciphers strong
Many many secure modern ciphers
 Similar (optimistic) future for hacking???

Intro
11
Hacking vs Cryptanalysis


Crypto
o
o
o
o
Can be viewed as stand-alone technical problem
Amenable to mathematical techniques
Crypto is scientific/academic discipline
Nevertheless, new crypto attacks do occur
o
o
o
o
A holistic problem
“Human factor” integral part of the problem
Anti-hacking “science” is in its infancy
Architectural issues can be addressed, but…
Hacking
Intro
12
Why this Book?
 Good
work
guys must know how bad guys
o Today, this is generally accepted as OK
 Why
these specific tools/techniques?
o Most common/best/representative tools
o Analyze relatively few in more detail
o For example, lots of rootkits --- this book
looks at a few of them in detail
Intro
13
How this Book Differs
 Encyclopedia,
not a dictionary
o Doesn’t cover everything, lots of detail
 Phased
view of attacks
o All steps in the attack process
 How
tools are used together
o Simple tools combined, creative attacks
 Corny
Intro
analogies
14
The Threat
 Who
are the attackers?
 The proverbial antisocial teenager in
his parent’s basement?
o Yes, could be
o May be highly skilled, regardless of age
 Do
Intro
not underestimate attackers
15
Outsider Threats
The proverbial teenager
 Organized Crime

o Credit card info, identity theft, etc. (money!)
o Relatively “safe” type of crime

Terrorists

Governments
o Perhaps in conjunction with physical attack
o Many governments monitor own citizens
o Certainly they monitor foreign citizens, other
governments, organization, businesses, etc.
Intro
16
Outsider Threats

The competition
o May want to learn trade secrets
o DoS to drive customers to their site, etc.

Hacktivists
o Politically motivated attacks
o Could also be focused on companies

“Hired guns”
o Hired by any of the above
Intro
17
Insider Threats
Estimate: 80% of all attacks are insiders
 Disgruntled employee

o Maybe biggest threat --- know how things work

Clueless employee
o Also a big problem --- disable antivirus, click on
anything, install rogue access point, etc., etc.

Customers

Suppliers
o May want to know “inside” info
o E.g., malicious employee at customer site
Intro
18
Insider Threats

Vendors
o May have lots of access
o Software can do just about anything for you
(or to you) --- virtually impossible to check
o Outsourcing only makes this worse…

Business partners
o Networks may be closely linked
o Security is only as strong as weakest link

Contractors, temps, consultants
o Often not vetted properly, lots of access, etc.
Intro
19
The Threat
Do not overestimate attackers
 Gold-plated security may not be wise

o No point to expensive security alarm on my car
o But I still lock my doors most of the time
Security should be “commensurate with”
threat to/value of your system and info
 Easier said than done!

o Threat is extremely hard to model
o Security costs notoriously difficult to estimate
Intro
20
Skill Levels

“Script kiddies”
o Low/no skill, unsophisticated attackers (e.g.,
email attachment sent to millions)
o Usually pre-packaged/slightly modified attacks

Example: metamorphic viruses/worms
o These viruses are hard to detect
o Many metamorphic “kits” available
o Very easy to recycle old viruses in a new form
Intro
21
Skill Levels

Moderately skilled attackers
o
o
o
o
o

May produce tools for script kiddies
Tools released in public website…
…or may be more secretive
Tools may include nice GUIs
Make sophisticated attacks easy to launch
“End user” does not need to understand
anything about the vulnerability
Intro
22
Skill Levels

Evil elite attackers
o
o
o
o
o

Highly skilled
Secretive, do not share their work
Work long on customized attack
Use specialized tools
Discover new vulnerabilities
Noble elite “attackers”
o High skill, but use it for good
o May become security experts, consultants, etc.
Intro
23
Terminology
Hacker, cracker, etc., have different
meaning to different people
 Book uses “good guys” (Alice and Bob) and
“bad guys” (attacker or Eve)

o Not necessarily human, e.g., “bad guy” could be
malicious software
“White hat” == good guy
 “Black hat” == bad guy

Intro
24
These Tools Can Hurt You!
 Use
tools at your own risk
 Most have some malicious capability
 Some could act as trojans
 Use tools in controlled environment
o Set up a lab (next slide) or
o VMware (can probably get this for free)
Intro
25
Author’s Suggested Lab
Intro
26
More Concerns
 Be
careful surfing some of the sites
 Be careful when you download tools
 Don’t do anything stupid
o You could lose your job, go to jail, etc.
 Legal
Intro
disclaimers…
27
Summary

Attacks are prevalent and damaging
o Increasing in number and scope
This is the Golden Age of Hacking
 Never underestimate adversary

o But don’t overestimate them either
Terminology: attacker, bad guy, good guy,
white hat, black hat, Alice, Bob, Eve, etc.
 Be careful experimenting with the tools

Intro
28
Download