Hacking and its Defense GROUP MEMBERS Chan Li Suman Lohani Prabhu Sundaram Objective Why this topic?? Surprising Facts on Hacking – • U.S. Department of Defense is attacked some 250,000 times each year - Source: The Business Journal • A Microsoft-operated site was cracked and defaced Monday by someone calling himself “flipz.” It was the first time a Microsoft Web site has been breached successfully. - Dated: oct 26 Source: abc.com • Worldwide cost of the Code Red computer worms that were unleashed on the Internet in July and August has reached about $2.6 billion U.S. ($1.1 billion in clean-up costs and $1.5 billion in lost productivity) - Source: www.ns2000.org Estimated total cost for 2001 $15 billion Love Bug - $8.7 billion Melissa- $1.2 billion Explorer-$1 billion SirCam- $1.035 billion Finally, www would have been radically different if there were no Hackers. Cost of virus attacks on information systems around the world 2000 - $17.1 billion 1999 - $12.1 billion Here, we will Discuss the practice of hacking in general and demonstrate a few of the current common methods, exploits and Preventions…. Reasons to hack !! Curiosity Fame Belief in open systems Revenge Notoriety/Fame Profit ($$$ or other gain) Revolutionary Glossary Hacking – 2 definitions 1. Hobby/Profession of working with computers. 2. Hacking refers to acts of unauthorized access or intrusion, in a computer, network, or telecom system by means of computer device, gadget and or softwares. – often referred to as the 2nd one who refer cyber criminals as “Crackers” PhreakingThe art and Science of Cracking the Phone Network (for eg: free long- distance calls). By extension, security – cracking especially communication networks. Back-Door ProgramA feature programmers often build into programs to allow special privileges normally denied to users of the program. Often programmers build back doors so they can fix bugs. If hackers or others learn about a back door, the feature may pose a security risk. Glossary Smurfing - Popular hacking technique by which attackers can persuade your network to perform a denial of service attack on a machine somewhere else on the Internet. Such attacks can also generate large quantities of traffic on your network… Prevention: use a line: no ip directed-broadcast Spoofing A common technique used to attack sites is to create TCP/IP packets which appear to be from local IP addresses. Prevention: The site router is in an ideal place to detect and prevent these attacks, since it can detect when packets with internal source addresses arrive on the external interface of the router… Glossary Trojan Horse Program A program which may be planted on your hard drive by an email message attachment, and may be designed to send information about your system back to the hackers which wrote it. Spy Ware A program which you have downloaded from a legitimate company, but which—unbeknownst to you—has been written to track your every move on the internet for marketing purposes and send the information back to the company. Glossary Denial of Service An attack specifically designed to prevent the normal functioning of a system and thereby to prevent lawful access to the system by authorized users. Hackers can cause denial of service attacks by destroying or modifying data or by overloading the system's servers until service to authorized users is delayed or prevented. Sniffing The use of a sniffer to capture passwords as they cross a network. The network could be a local area network, or the Internet itself. The sniffer can be hardware or software. Glossary Virus - Vital Information Resources Under Siege A computer virus is a specific type of malicious computer code that replicates itself or inserts copies or new versions of itself in other programs. Worm Worms are parasitic computer programs that replicate, but unlike viruses, do not infect other computer program files. Worms can create copies on the same computer, or can send the copies to other computers via a network Damages likely be Caused !! Stealing or destroying data Disabling protection systems Shutting down entire networks Disclosure of Information, such as theft of credit card numbers Denial of service attacks including Smurfing… A common methodology is the following 1. Gather target information. 2. Identify services offered by target to the public (whether intentional or not). 3. Research the discovered services for known vulnerabilities. 4. Attempt to exploit the services. 5. Utilize exploited services to gain additional privileges from the target. Reiterate steps 1-5 until goals are achieved. Steps Hackers generally follow !! Step 1: Gather target information.. Domain names, IP address ranges InterNIC contact information Physical addresses Organizational structures Alliances and financial information Names of officers, managers, technical staff Newsgroup posts Step 2: Indentify services !! Web Servers FTP Servers DNS Servers e-mail gateways Help desks/phone support other (gopher, LDAP, irc, etc.) Step 3: Research vulnerabilities Vendor announcements. Default configurations. Poor configurations. (ie. Passwords, cleartext protocols) Gather available exploits or develop new exploit Derived exploits Some original work. Step 4: Exploit Vulnerabilities. Attempt to exploit vulnerabilities to gain access to the target. Continue until Successful. Step 5: Utilize increased access Exploit additional vulnerabilities to gain additional access and information to use in penetrating further into an organization. The hacker "becomes" a legitimate user (even an administrator). Demo on IIS Web Exploit !! Only requires normal web user access to an IIS webserver (i.e. port 80 or 443). Using non-standard ports for your web server only makes this marginally more difficult. You do publish how to access your webserver to someone, right? (also, you would be surprised what search engines contain about you.) Using SSL (https protocol) will not prevent the exploit from succeeding. Demo : Software Levels Target: Windows NT Server 4.0sp6a, IIS 4.0 Attacker: Linux 2.2.17-21mdk kernel, Window NT Worstation 4.0 sp6a Demo : Target info Target IP address is 192.168.168.125 Query whois database at ARIN.net to locate owner and domain information. Also try reverse DNS mappings for host/domain names. Demo : Services information Use nmap to scan target for services of interest. $ nmap -sS -p 21-25,80,135-139,443 192.168.168.125 Starting nmap V. 2.53 by fyodor@insecure.org ( www.insecure.org/nmap/ ) Interesting ports on (192.168.168.125): (The 7 ports scanned but not shown below are in state: closed) Port State Service 21/tcp open ftp 80/tcp open http 135/tcp open loc-srv 139/tcp open netbios-ssn 443/tcp open https Nmap run completed -- 1 IP address (1 host up) scanned in 1 second Demo: Research services Use netcat or telnet commands to determine web server information. $ nc 198.168.168.125 80 HEAD / HTTP/1.0 <CR> HTTP/1.1 200 OK Server: Microsoft-IIS/4.0 Content-Location: http://192.168.168.125/Default.htm Date: Mon, 06 Aug 2001 23:40:10 GMT Content-Type: text/html Accept-Ranges: bytes Last-Modified: Mon, 30 Jul 2001 15:28:47 GMT ETag: "c0bf6c53c19c11:b50" Content-Length: 4325 Demo : Exploit services to gain access Unicode “dot dot” exploit to traverse filesystem Default configuration of Inetpub\scripts directory is used to upload and execute commands of our choice. Get target to fetch useful commands. Get target to initiate a command session. Use target to obtain additional information. Prevention on IIS Stay current on patch levels for Microsoft's OS and web server. Implement good firewalling. Use an IDS system (or two!). Host security is important (Microsoft's "Securing IIS” and “Securing Windows NT” documents). Pattern matching intercept proxies. Demonstration Ping, ifconfig, tracert(Icmp) Hacking tools IP – tools.exe Wotweb.exe Superscan.exe Prevention The Price of a New Web Server $ 800 The Price of the Application Firewall $ 2500 Having to tell your boss that you’ve Just been Hacked!! PRICELESS!! Some Defense Arsenals for Computer Security !! 1. 2. 3. 4. 5. 6. Password Protection AntiVirus Software Encryption Audit Trails Smart Cards and Biometrics Firewalls Here we will focus about Firewalls… Firewall Firewall H/W firewall Router/internet gateways S/W firewall Application Packet Proxy filtering Firewall firewall (Squid: -Microsoft proxy server) (ipchains:-Linux) Proxy Server Example There are two types of Firewall. 1. Dual Homed 2. Demilitarized Setup. Dual Homed (Secure Network) Internet Router Firewall + router +DHCP Server Comp Comp Comp Hub Comp Comp Comp Comp Internet Firewall Web Server mail Demilitarized Setup (More Secure Network) DNS Firewall Database Server mail DNS Firewall Example 1 Firewall Example 2 Firewall Products Some Firewall Providers: McAFEE ASAP Trend Micro Zone Alarm.. Single user- Cost $ 40 (for 1 year) 50 users - Cost $1500 Some Versions of it are Free to download….. Useful security related links !! SANS Institute (www.sans.org) Security Focus Archives (www.securityfocus.com) Snort IDS home (www.snort.org) Security archives (archives.neohapsis.com) CERT Coordination Center (www.cert.org) http://www.courses.dsu.edu/ infs750 www.insecure.org Mailing Lists Risks Digest (www.risks.org) BUGTRAQ (www.securityfocus.com/bugtraq/archive) NTBugtraq (www.ntbugtraq.com) Win2KSecurity Advice (www.ntsecurity.net) Securing Web servers Apache project (www.apache.org) http://httpd.apache.org/docs/misc/tutorials.html support.microsoft.com "Resources for Securing Internet Information Services”, Article ID Q282060. Conclusion How to prevent becoming a target? !! The only reliable solution to reduce the risk of a successful intrusion attempt is staying current with your security infrastructure. This is an ongoing dynamic process. !! Areas to be explored includes More about Hackers SSL, L2TP, Proxy servers (security devices and software) More on Server Vulnerabilities