Right Now, at This Very Moment, Your

advertisement
Right Now, At this
Very Moment,
Your Computer is
Infected
November 8 | Froms Bits to RSA Dongles:
An Introduction to IT Security
start with bits and bytes
• bit: (binary digit) bit
• The basic unit of information in
computing, the amount of information
stored by a digital device in one of two
possible distinct states, not 1 and 2, off/on
• digital value of 1 = positive voltage, up to
5 volts
• digital value of 0 = 0 volts
• 8 bits = 1 byte, usually, but depends on
hardware
• byte: the number of bits needed to
encode a single character of text in a
computer
from binary # to letters
01110000 = p
01101001 = i
01111010 = z
01111010 = z
01100001 = a
data and packets
data: binary files, 01010010010010010 … etc.
packet: a unit of data
from binary to text or image
packet: control information and payload
control information: data the network needs to
deliver the payload, ex. address, error control
• payload: the content of your “digital letter”
• From files to programs and applications
•
•
•
•
•
OSI model
OSI model
computer virus
• A program that can replicate
itself and spread
• With reproductive ability
• Must attach itself to an existing
program
• Will typically corrupt or modify
files on targeted computer
• Malware, a more general term
to include: viruses, computer
worms (causing network harm),
Trojan horses (appear benign),
rootkits, spyware, adware, etc.
A Windows-based,
backdoor Trojan horse
virus transmission
•
•
•
•
•
•
•
•
•
•
Viruses have targeted various types of transmission media or hosts. This list is not
exhaustive:
Binary executable files (such as COM files and EXE files in MS-DOS, Portable
Executable files in Microsoft Windows, the Mach-O format in OSX, and ELF files
inLinux)
Volume Boot Records of floppy disks and hard disk partitions
The master boot record (MBR) of a hard disk
General-purpose script files (such as batch files in MS-DOS and Microsoft
Windows, VBScript files, and shell script files on Unix-like platforms).
Application-specific script files (such as Telix-scripts)
System specific autorun script files (such as Autorun.inf file needed by Windows to
automatically run software stored on USB Memory Storage Devices).
Documents that can contain macros (such as Microsoft
Word documents, Microsoft Excel spreadsheets, AmiPro documents, and Microsoft
Access database files)
Cross-site scripting vulnerabilities in web applications (see XSS Worm)
Arbitrary computer files. An exploitable buffer overflow, format string, race
condition or other exploitable bug in a program which reads the file could be used
to trigger the execution of code hidden within it. Most bugs of this type can be
made more difficult to exploit in computer architectures with protection features
such as an execute disable bit and/or address space layout randomization.
from binary to decimal
16
2
0
65535
ports
• A port is an application–specific or process-specific
software construct serving as a communications
endpoint in a computer’s host operating system,
part of the Internet Protocol suite system
• Example: HTTP:80 | SMTP:25 | DHCP:68 (client)
• Ports are numbered from 0 to 65535
• Equivalent to 65536 ways into your computer
• Introducing netstat what your computer is doing
with ports
• netstat –a active connections
• netstat –help switches and [interval]
common ports
•
•
•
•
•
•
•
•
•
•
•
21: File Transfer Protocol (FTP)
22: Secure Shell (SSH)
23: Telnet remote login service
25: Simple Mail Transfer Protocol (SMTP)
53: Domain Name System (DNS) service
80: Hypertext Transfer Protocol (HTTP) World Wide Web
110: Post Office Protocol (POP)
119: Network News Transfer Protocol (NNTP)
143: Internet Message Access Protocol (IMAP)
161: Simple Network Management Protocol (SNMP)
443: HTTP Secure (HTTPS)
the “brangelina” of ports
•
•
•
•
internet: network of networks, millions of networks
web: system of interlinked hypertext documents
port: 80
Try it: http://www.techcomfort.com:81
• Try it: http://www.techcomfort.com:80
• Port scan your computer using an on-line tool.
• http://viewdns.info/portscan
• Port scan your computer using an on-line tool.
• http://viewdns.info
ports
• Dean Brady has just instructed us via secure e-mail?
to construct a device to combat the “port” menace
and make GSPP computers safe for policy analysis.
What can we do?
firewalls
• A device or set of devices
designed to permit or deny
network transmissions
• Based on a set of rules
• Allowing legitimate
communications
• Blocking unauthorized
access
• Network address translation,
(NAT) to hide real IP address
• Datacenter rules
private networks
• Private addresses are commonly used in corporate
networks, which for security reasons, are not connected
directly to the Internet
• Private addresses are seen as enhancing network
security for the internal network, since it is difficult for an
Internet host to connect directly to an internal system.
anti-virus software
• A program used to prevent, detect, and remove
malware, including but not limited to computer
viruses, computer worms, trojan horses, spyware
and adware
• Many viruses have a signature; detection of a virus
involves searching for known patterns
• But what about viruses for which no signature
currently exists?
• Current anti-virus software is not good enough to
stop the bad guys 
malware
• Viruses have gone
into stealth-mode
• Malwarebytes’ AntiMalware
• Download, install
and run
• What do you find?
• Not enough…
ex. RSA attacked
• The attacker in this case sent two different phishing emails
over a two-day period. The two emails were sent to two small
groups of employees; you wouldn’t consider these users
particularly high profile or high value targets. The email subject
line read “2011 Recruitment Plan.”
• The email was crafted well enough to trick one of the
employees to retrieve it from their Junk mail folder, and open
the attached excel file. It was a spreadsheet titled “2011
Recruitment plan.xls.
• The spreadsheet contained a zero-day exploit that installs a
backdoor through an Adobe Flash vulnerability (CVE-20110609).
• The next step in a typical Advanced Persistent Threat (APT) is
to install some sort of a remote administration tool that allows
the attacker to control the machine. In our case the weapon
of choice was a Poison Ivy variant set in a reverse-connect
mode that makes it more difficult to detect, as the PC reaches
out to the command and control rather than the other way
around.
RSA, not the only ones
• The information suggests
that more than 760
other organizations had
networks that were
compromised with some
of the same resources
used to hit RSA. Almost
20 percent of the
current Fortune 100
companies are on this
list.
•
•
•
•
RSA, not the only ones
302-DIRECT-MEDIA-ASN
8e6 Technologies, Inc.
302-DIRECT-MEDIA-ASN
AAPT Limited
8e6 AAPT
Technologies,
Inc.
Abbot Labs
AAPTABBOTT
AAPT Limited
ABOVENET-CUSTOMER
– Abovenet Communications, Inc
ABBOTT
Abbot Labs
ACCNETWORKS – Advanced
Computer
Connections
ABOVENET-CUSTOMER
– Abovenet
Communications,
Inc
ACEDATACENTERS-AS-1
Ace Data Connections
Centers, Inc.
ACCNETWORKS
– Advanced–Computer
ACSEAST – ACS Inc. – Ace Data Centers, Inc.
ACEDATACENTERS-AS-1
ACS-INTERNET
– Affiliated Computer Services
ACSEAST
– ACS Inc.
ACS-INTERNET
– Armstrong
CableServices
Services
ACS-INTERNET
– Affiliated
Computer
ADELPHIA-AS
– Road Runner
ACS-INTERNET
– Armstrong
CableHoldCo
ServicesLLC
Administracion
Nacional
de Telecomunicaciones
ADELPHIA-AS
– Road
Runner HoldCo
LLC
AERO-NET –Nacional
The Aerospace
Corporation
Administracion
de Telecomunicaciones
AHP – WYETH-AYERST/AMERICAN
HOME PRODUCTS
AERO-NET
– The Aerospace Corporation
– Digital Magicians,HOME
Inc. PRODUCTS
AHP AIRLOGIC
– WYETH-AYERST/AMERICAN
AIRTELBROADBAND-AS-AP
Bharti Airtel Ltd., Telemedia Services
AIRLOGIC
– Digital Magicians, Inc.
AIS-WEST – American Internet
Services,
AIRTELBROADBAND-AS-AP
Bharti Airtel
Ltd., LLC.
Telemedia Services
AKADO-STOLITSA-AS
_AKADO-Stolitsa_
AIS-WEST
– American Internet
Services, LLC.JSC
ALCANET Corporate
ALCANET Access
AKADO-STOLITSA-AS
_AKADO-Stolitsa_
JSC
ALCANET-DE-AS
Deutschland GmbH
ALCANET
Corporate Alcanet
ALCANETInternational
Access
ALCATEL-NAAlcanet
– Alcanet
International
NA
ALCANET-DE-AS
International
Deutschland
GmbH
ALCHEMYNET
– Alchemy
Communications,
Inc.
ALCATEL-NA
– Alcanet
International
NA
Alestra, S. –de
R.L. de C.V.
ALCHEMYNET
Alchemy
Communications, Inc.
ALLIANCE-GATEWAY-AS-AP
Alliance Broadband Services Pvt. Ltd.,Alliance Gateway
Alestra,
S. de R.L. de C.V.
AS,Broadband Services Alliance
Provider,Kolkata,India
ALLIANCE-GATEWAY-AS-AP
Broadband Services Pvt. Ltd.,Alliance Gateway
ALMAZAYAServices
Almazaya
gateway L.L.C
AS,Broadband
Provider,Kolkata,India
AMAZON-AES
– Amazon.com,
Inc.
ALMAZAYA
Almazaya
gateway L.L.C
AMERITECH-AS
– AT&T Services,
AMAZON-AES
– Amazon.com,
Inc. Inc.
AMNET-AU-AP
Amnet
IT Services
AMERITECH-AS
– AT&T
Services,
Inc. Pty Ltd
ANITEX-AS Amnet
Anitex Autonomus
System
AMNET-AU-AP
IT Services Pty
Ltd
AOL-ATDN
– AOL
Transit Data
Network
ANITEX-AS
Anitex
Autonomus
System
API-DIGITAL
API Digital
Group, LLC
AOL-ATDN
– AOL– Transit
DataCommunications
Network
APOLLO-AS
API-DIGITAL
– APILATTELEKOM-APOLLO
Digital Communications Group, LLC
APOLLO-GROUP-INC
– University of Phoenix
APOLLO-AS
LATTELEKOM-APOLLO
APT-AP AS
APOLLO-GROUP-INC
– University of Phoenix
ARLINGTONVA
– Arlington County Government
APT-AP
AS
ARLINGTONVA
– Arlington
County Government
ARMENTEL Armenia
Telephone
Company
AS INFONET
ARMENTEL
Armenia Telephone Company
AS3215 France Telecom – Orange
AS INFONET
AS3602-RTI
Rogers Cable
Communications Inc.
AS3215
France –Telecom
– Orange
AS4196––Rogers
Wells Fargo
Company
AS3602-RTI
Cable&Communications
Inc.
AS702
Verizon
Business
EMEA – Commercial IP service provider in Europe
AS4196
– Wells
Fargo
& Company
ASATTCA
Global
Network
Services IP
– AP
AS702
VerizonAT&T
Business
EMEA
– Commercial
service provider in Europe
ASC-NET
– Alabama
Supercomputer
ASATTCA
AT&T
Global Network
Services – Network
AP
ASDANIS
DANIS SRL
ASC-NET
– Alabama
Supercomputer Network
ASGARR
GARR
ASDANIS
DANIS
SRL Italian academic and research network
ASIAINFO-AS-AP
INFONET
Co.,Ltd./
TRUE
INTERNET Co.,Ltd.
ASGARR
GARR ItalianASIA
academic
and
research
network
ASIANDEVBANK
Asian Development
Bank
ASIAINFO-AS-AP
ASIA– INFONET
Co.,Ltd./ TRUE
INTERNET Co.,Ltd.
ASN852 – Telus
Advanced
Communications
ASIANDEVBANK
– Asian
Development
Bank
AS-NLAYER
– nLayer Communications,
ASN852
– Telus Advanced
CommunicationsInc.
ASTOUND-CABLE
– Wave Broadband,
AS-NLAYER
– nLayer Communications,
Inc.LLC
AT&T Global Network
Services – EMEA
ASTOUND-CABLE
– Wave Broadband,
LLC
US Network Services – EMEA
AT&TAT&T
Global
ATMAN Autonomous System
AT&TATMAN
US
ATOMNET
SA
ATMAN
ATMANATOM
Autonomous
System
ATOS-AS
ATOS
ATOMNET
ATOM
SAOrigin Infogerance Autonomous System
ATT-INTERNET4
– AT&T
Services, Autonomous
Inc.
ATOS-AS
ATOS Origin
Infogerance
System
AUGERE-AS-AP
Augere
Wireless
ATT-INTERNET4
– AT&T
Services,
Inc. Broadband Bangladesh Limited
AVAYA AVAYA
AUGERE-AS-AP
Augere Wireless Broadband Bangladesh Limited
AVENUE-AS
AVAYA
AVAYA Physical person-businessman Kuprienko Victor Victorovich
AXAUTSYS
ARAX person-businessman
I.S.P.
AVENUE-AS
Physical
Kuprienko Victor Victorovich
AXAUTSYS ARAX I.S.P.
BACOM – Bell Canada
BAHNHOF Bahnhof AB
BALTKOM-AS SIA _Baltkom TV SIA_
BANGLALINK-AS an Orascom Telecom Company, providing GSM service in Bangladesh
BANGLALION-WIMAX-BD Silver Tower (16 & 18th Floor)
BANKINFORM-AS Ukraine
BASEFARM-ASN Basefarm AS. Oslo – Norway
BBIL-AP BHARTI Airtel Ltd.
BBN Bredbaand Nord I/S
BC-CLOUD-SERVICES
BEAMTELE-AS-AP Beam Telecom Pvt Ltd
BEE-AS JSC _VimpelCom_
BELINFONET Belinfonet Autonomus System, Minsk, Belarus
BELLSOUTH-NET-BLK – BellSouth.net Inc.
BELPAK-AS BELPAK
BELWUE Landeshochschulnetz Baden-Wuerttemberg (BelWue)
BENCHMARK-ELECTRONICS – Benchmark Electronics Inc.
BEND-BROADBAND – Bend Cable Communications, LLC
BEZEQ-INTERNATIONAL-AS Bezeqint Internet Backbone
BIGNET-AS-ID Elka Prakarsa Utama, PT
BLUEWIN-AS Swisscom (Schweiz) AG
BM-AS-ID PT. Broadband Multimedia, Tbk
BN-AS Business network j.v.
BNSF-AS – Burlington Northern Sante Fe Railway Corp
BNT-NETWORK-ACCESS – Biz Net Technologies
BORNET Boras Energi Nat AB
BREEZE-NETWORK TOV TRK _Briz_
BSC-CORP – Boston Scientific Corporation
BSKYB-BROADBAND-AS BSkyB Broadband
BSNL-NIB National Internet Backbone
BT BT European Backbone
BT-ITALIA BT Italia S.p.A.
BTN-ASN – Beyond The Network America, Inc.
BTTB-AS-AP Telecom Operator & Internet Service Provider as well
BT-UK-AS BTnet UK Regional network
CABLECOM Cablecom GmbH
CABLE-NET-1 – Cablevision Systems Corp.
CABLEONE – CABLE ONE, INC.
CABLEVISION S.A.
CACHEFLOW-AS – Bluecoat Systems, Inc.
CANET-ASN-4 – Bell Aliant Regional Communications, Inc.
CANTV Servicios, Venezuela
CAPEQUILOG – CapEquiLog
CARAVAN CJSC Caravan-Telecom
CARRIER-NET – Carrier Net
CATCHCOM Ventelo
CCCH-3 – Comcast Cable Communications Holdings, Inc
CDAGOVN – Government Telecommunications and Informatics Services
CDS-AS Cifrovye Dispetcherskie Sistemy
command and control
conclusions
• Google and RSA aren’t safe, and you aren’t either
• But there are lots of targets, so minimize your
footprint, make yourself a more difficult target
• Run anti-virus with real-time protections, whatever
the vendor
• Run anti-malware
• Use a firewall, or multiple firewalls, hardware and
software
• Use network address translation (NAT)
• Make backups, so you can rebuild, if necessary
next time:
SQL Quiz, IT Security
(continued) and Final
Projects Planning
• Case Study: Distributed Denial: the Tech of Cyber
Attack in the Russo-Georgian Conflict of August
2008
Download