Security+ Guide to Network Security Fundamentals, 2e Chapter 2 Attackers and Their Attacks At a Glance Instructor’s Notes Chapter Overview Chapter Objectives Technical Notes Lecture Notes Quick Quizzes Discussion Questions Additional Activities 2-1 Security+ Guide to Network Security Fundamentals, 2e 2-2 Instructor’s Notes Chapter Overview In this chapter, students will discover who is responsible for attacking information and the systems that store, process, and exchange that information. They will examine some of the motives attackers have for striking and damaging computer systems and explore the types of attacks that attackers unleash. With this information, students can begin to organize a sound defense to attempt to thwart their attacks. Chapter Objectives After reading this chapter, students will be able to: Develop attacker profiles Describe basic attacks Describe identity attacks Identify denial of service attacks Define malicious code (malware) Technical Notes HANDS-ON PROJECTS Project 2-1 HARDWARE DEVICES REQUIRED Computer PC OPERATING SYSTEM REQUIRED Windows XP Project 2-2 Project 2-3 Project 2-4 Computer PC Computer PC Computer PC Windows XP Windows XP Windows XP Project 2-5 Computer PC Linux OTHER RESOURCES Windows XP Professional Backup utility and floppy disks, CD, tape, or other high-capacity storage device None Internet connectivity Advanced Word 2000 Password Recovery (AW2000PR) tool Internet connectivity This chapter should not be completed in one class session. It is recommended that you split the chapter into at least two class sessions, if possible. The amount of subject matter to be covered can be covered in anywhere between a 2to 4-hour period, plus any at-home exercises you wish to assign. Lecture Notes Developing Attacker Profiles Six categories of people violate network and computer systems: hackers, crackers, script kiddies, spies, employees, and cyberterrorists. Table 2-1 on page 30 of the text summarizes the attackers, their skill level, and their motivations for attacks. Hackers A hacker is described as a person who uses his or her advanced computer skills to attack computers, but not with a malicious intent. Instead, hackers use their skills to expose security flaws. Security+ Guide to Network Security Fundamentals, 2e 2-3 Crackers A cracker is a person who violates system security with malicious intent. Like hackers, crackers have advanced knowledge of computers and networks and the skills to exploit them. Crackers destroy data, deny legitimate users of service, or otherwise cause serious problems on computers and networks. Script Kiddies Much like crackers, script kiddies want to break into computers to create damage. However, whereas crackers have an advanced knowledge of computers and networks, script kiddies are unskilled users. Script kiddies do their work by downloading automated hacking software from Web sites and then using it to break into computers. Script kiddies tend to be young computer users who have almost unlimited amounts of leisure time, which they can use to attack systems. Spies A computer spy is a person who has been hired to break into a computer and steal information. Spies do not randomly search for unsecured computers to attack as script kiddies, crackers, and hackers do. Rather, spies are hired to attack a specific computer that contains sensitive information. Employees One of the largest information security threats to a business actually comes from an unlikely source: its employees. Employees break into their company’s computer for various reasons. Quick Reference Discuss some of the reasons employees break into their company’s computer as listed on page 33 of the text. Cyberterrorists Many security experts fear that terrorists will turn their attacks to the network and computer infrastructure to cause panic. Known as cyberterrorists, their motivation may be defined as ideology, or attacking for the sake of their principles or beliefs. One of the targets highest on the list of cyberterrorists is the Internet itself. Quick Reference Discuss the report distributed by the Institute for Security Studies at Dartmouth College, which lists the three goals of a cyberattack as listed on page 33 of the text. Understanding Basic Attacks Today, the global computing infrastructure is the most likely target of attacks. In general, attackers are becoming more sophisticated and are moving away from searching for bugs in specific software applications and toward probing the underlying software and hardware infrastructure itself. Social Engineering The easiest way to attack a computer system requires almost no technical ability and is usually highly successful. Social engineering relies on tricking and deceiving someone to access a system. Security+ Guide to Network Security Fundamentals, 2e Quick Reference 2-4 Discuss the examples of social engineering as listed on pages 35 and 36 of the text. Social engineering is not limited to telephone calls or dated credentials. One popular technique, called dumpster diving, involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away. Another approach is known as phishing, which involves sending people electronic requests for information that appear to come from a valid source. Social engineering is best defeated in two ways. First, you should develop strong procedures in the form of instructions or company policies regarding when passwords are given out, who can enter the premises, and what to do when asked questions by another employee that may reveal protected information. The second way to default social engineering is by educating all employees about the policies and ensuring that these policies are followed. Password Guessing A password is a secret combination of letters and numbers that validates or authenticates a user. Passwords are used with usernames to log on to a system, using a dialog box such as the one shown in Figure 2-1 on page 37 of the text. Quick Reference Discuss some of the characteristics of weak passwords as listed on page 37 of the text. Attackers attempt to exploit weak passwords by password guessing. Password-guessing attacks fall into three categories. The first type of attack is brute force, in which an attacker attempts to create every possible password combination by systematically changing one character at a time in a hypothetical password and then using each newly generated password to access the system. The second type of password guessing is a dictionary attack. Unlike a brute force attack, in which all possible combinations are used, a dictionary attack takes each word from a dictionary and encodes it (called hashing) in the same way the computer encodes a user’s password. Figure 2-2 on page 38 of the text shows a dictionary attack. The third type of attack is software exploitation. This attack takes advantage of any weakness in software to bypass security that requires a password. One of the most common exploitations is a buffer overflow, which occurs when a computer program attempts to stuff more data into a temporary storage area (a buffer) than it can hold. In Figure 2-3 on page 39 of the text, the buffer for a program is six characters and is adjacent to another computer storage area that contains instructions for the computer. Quick Reference Discuss some of the policies that can minimize password-guessing attacks as illustrated on page 40 of the text. Weak Keys Cryptography, from two Greek words—crypto, meaning hidden, and graph, meaning writing—is the science of transforming information so that it is secure while it is being transmitted or stored. Cryptography does not attempt to hide the existence of the data; instead, it “scrambles” the data so that it cannot be viewed by unauthorized users. Security+ Guide to Network Security Fundamentals, 2e 2-5 Changing the original text to a secret message using cryptography is known as encryption. The success of cryptography depends on the process used to encrypt and decrypt messages. This process is based on a procedure called an algorithm. The algorithm is given a value known as a key that it uses to encrypt the message. However, any mathematical key that creates a detectable pattern or structure provides an attacker with valuable information to break the encryption. Keys that create this type of repeating pattern are known as weak keys. Mathematical Attacks Cryptanalysis is the process of attempting to break an encrypted message. One type of cryptanalysis is a mathematical attack, which often develops a statistical analysis of the characters in an encrypted text and then analyzes the statistics to discover the keys and decrypt the data. Birthday Attacks When you meet someone for the first time, you have a 1 in 365 chance—0.27%—that he has the same birthday as you. If you meet 60 people, the probability leaps to over 99% that you will share the same birthday with one of these people. This phenomenon is called the birthday paradox. A birthday attack is an attack on a cryptographical system that exploits the mathematics underlying the birthday paradox. Quick Quiz 1. ____________ tend to minimize or misconstrue the consequences of their activities. ANSWER: Ethical hackers 2. ____________ are hired to attack a specific computer that contains sensitive information. ANSWER: Spies 3. _____________ involves sending people electronic requests for information that appear to come from a valid source. ANSWER: Phishing 4. A(n) _____________ attack takes advantage of any weakness in software to bypass security that requires a password. ANSWER: software exploitation 5. _____________ attacks can best be resisted by NOT sending the same encrypted message more than once. ANSWER: Mathematical Examining Identity Attacks Another category of attacks are those in which the attacker attempts to assume the identity of a valid user. Man-in-the-Middle Attacks Man-in-the-middle attacks on computer information are common attacker tools. This type of attack makes it seem that two computers are communicating with each other, when actually they are sending and receiving data with a computer between them, or the “man in the middle.” In Figure 2-5 on page 43 of the text, Computer A and Computer B are communicating without recognizing that an attacker, as the man in the middle, is intercepting their transmissions. Man-in-the-middle attacks can be active or passive. In a passive attack, the attacker captures the sensitive data that is being transmitted and then sends it on to the original recipient without his presence being detected. In an active attack, the contents of the message are intercepted and altered before they are sent on. Security+ Guide to Network Security Fundamentals, 2e 2-6 Replay A replay attack is similar to an active man-in-the-middle attack. However, whereas an active man-in-the-middle attack changes the contents of a message before sending it on, a replay attack only captures the message and then sends it again later. A replay attack takes advantage of the communications between a network device and a file server. Figure 2-6 on page 44 of the text illustrates a replay attack. TCP/IP Hijacking With wired networks, TCP/IP hijacking uses a technique known as spoofing, which is the act of pretending to be the legitimate owner when in reality you are not. One particular type of spoofing is Address Resolution Protocol (ARP) spoofing. To understand ARP spoofing, remember that each computer using TCP/IP must have a unique IP address. In addition, certain types of local area networks (LANs), such as Ethernet, must also have another address, called the media access control (MAC) address, to move information around the network. Computers on a network keep a table that links an IP address with the corresponding address, as shown in Figure 2-7 on page 45 of the text. In an ARP spoofing attack, a hacker changes the table so that packets are redirected to his computer, as shown in Figure 2-8 on page 45 of the text. Identifying Denial of Service Attacks In contrast to a normal network situation, a denial of service (DoS) attack attempts to make a server or other network device unavailable by flooding it with requests, such as to display a Web page or access a stored file. After a short time, the server runs out of resources and can no longer function. This is known as a SYN attack because it exploits the SYN/ACK “handshake.” Figure 2-10 on page 47 of the text shows a server waiting for a response during a DoS attack. Another DoS attack tricks computers into responding to a false request. An attacker can send a request to all computers on the network that makes it appear as if a server is asking for a response. Each of the computers then responds to the server, overwhelming it, and causing the server to crash or be unavailable to legitimate users. This is called a Smurf attack. Understanding Malicious Code (Malware) Malicious code, or malware, consists of computer programs designed to break into computers or to create havoc on computers. The most common types of malware are viruses, worms, logic bombs, Trojan horses, and back doors. According to the security organization Sandvine, Internet service providers (ISPs) in North America spend more than $245 million annually to combat malware. Viruses A computer virus is a program that secretly attaches itself to another document or program and executes when that document or program is opened. A virus might cause problems ranging from displaying an annoying message to erasing files from a hard drive or causing a computer to crash repeatedly. After it infects one computer, the virus seeks another computer to attack. Security+ Guide to Network Security Fundamentals, 2e 2-7 Today, viruses spread primarily through e-mail attachments. Modern viruses can send themselves to all the contacts listed in an e-mail address book. The recipients, seeing they have received a message from a friend or business associate, might unsuspectingly open the attachment, infect their computers, and send the virus to others. According to Sophos, an antivirus software vendor, more than 89,000 known viruses attack computers and, on average, one new virus is written and released every hour. The defense against viruses is antivirus software. The drawback of antivirus software is that it must be updated to recognize new viruses. Known as definition files or signature files, these updates can be downloaded automatically from the Internet to a user’s computer. Worms Another type of malicious code is known as a worm. Although similar in nature, worms are different from viruses in two regards. First, a virus attaches itself to a computer document, such as an e-mail message, and is spread by traveling along with the document. A second difference is that a virus needs the user to perform some type of action, such as starting a program or reading an e-mail message, to start the infection. Worms are usually distributed via e-mail attachments as separate executable programs. In many instances, reading the e-mail message starts the worm. However, if the worm does not start automatically, attackers can trick the user to start the program and launch the worm. Quick Reference Discuss the tricks listed on page 50 of the text on how worms can get started. Logic Bombs Logic bombs are another type of malicious code. A logic bomb is a computer program that lies dormant until it is triggered by a specific event, such as a certain date being reached on the system calendar or a person’s rank in an organization dropping below a specified level. Quick Reference Discuss the suggestions to protect an organization from logic bombs as illustrated on pages 50 and 51 of the text. Trojan Horses A Trojan horse is a program that hides its true intent and then reveals itself when activated. A Trojan horse might disguise itself as a free calendar program or other interesting software. Once installed on the user’s computer, however, it can launch into action. One of the simplest Trojan horse strategies involves giving a malicious program the name of a file associated with a benign program. Another Trojan horse technique is to combine two or more executable programs into a single filename. You can defend against Trojan horses with the following products: Antivirus tools, which are one of the best defenses against combination programs Special software that alerts you to the existence of a Trojan horse program Anti-Trojan horse software that disinfects a computer containing a Trojan horse Security+ Guide to Network Security Fundamentals, 2e Back Doors A back door is a secret entrance into a computer of which the user is unaware. Many viruses and worms install a back door that allows a remote user to access a computer without the legitimate user’s knowledge or permission. Quick Quiz 1. With __________, the attacker uses ARP spoofing to send information from the user’s computer to the attacker’s computer instead of to a valid computer. ANSWER: TCP/IP hijacking 2. A special “Are you there?” message is called a(n) __________ using the Internet Control Message Protocol (ICMP) that the receiving computer immediately replies to if it is available. ANSWER: ping 3. The user of the __________ has no indication that his or her computer has malicious software installed. ANSWER: zombie 4. __________ are often designed into computer systems to help during the testing phase of the program. ANSWER: Back doors Discussion Questions 1. Why are certain people so intrigued by gaining access to any computer system? 2. How has information theft changed how we develop new technology? Additional Activities 1. Have students conduct research looking for software and hardware that can be used to hack into a computer system and summarize what they find. 2. Have students configure firewall software and hardware and document the procedures used. 2-8