SlideShare uma empresa Scribd logo
1 de 31
How Hackers Attack Networks
Muhammad Adeel Javaid
Common platforms for attacks



Windows 98/Me/XP Home Edition
Linux, OpenBSD, Trinux, and other low-cost
forms of UNIX
Local and remote attacks




Local: Attacks performed with physical
access to the machine
Remote: Attacks launched over the
network
Why worry about local attacks on
workstations?






Hackers can collect more information
about a network and its users.
Hackers can obtain the administrator
password on a workstation, which can lead
to server access.
Spyware can be installed to gather more
sensitive information.
Common local attacks


Getting admin/root at the local machine
 Windows

Workstation: Rename or delete
c:winntsystem32configSAM
 Linux: at LILO prompt, type linux s



Cracking local passwords
 L0phtcrack




(LC)

Removing hard drive to install in another box
Exploiting files or commands available upon login
 C:Documents

and SettingsAll UsersStart MenuProgramsStartup
 Registry commands, such as adding users
Cracking over the network:
A four-step program
1.
2.
3.
4.

Footprinting
Scanning and enumerating
Researching
Exploiting
Footprinting
Finding out what an organization owns:
 Find the network block.
 Ping the network broadcast address.
Scanning and enumerating




What services are running?
What accounts exist?
How are things set up?
Scanning and enumerating:
Methods and tools


Port scanning




Sniffing




Nmap
ngrep

SNMP


Solarwinds



Null session



NBTenum
Nbtdump
Scanning and enumerating:
Methods and tools (cont.)


Null session





NBTenum
Nbtdump

NetBIOS browsing



Netview
Legion



Vulnerability
scanners




Nessus
Winfingerprint
LANGuard
Researching
Researching security sites and hacker sites can reveal
exploits that will work on the systems discovered during
scanning and enumerating.






http://www.securityfocus.com/
http://www.networkice.com/advice/Exploits/Ports
http://www.hackingexposed.com
http://www.ntsecurity.net/
http://www.insecure.org/
Exploits






Brute force/dictionary attacks
Software bugs
Bad input
Buffer overflows
Sniffing
Countering hackers


Port scanning






Block all ports except those you need
Block ICMP if practical
NT: IPsec; Linux: iptables

Sniffing




Use switched media
Use encrypted protocols
Use fixed ARP entries
Countering hackers (cont.)
 Null


sessions

Set the following registry value to 2
[HKEY_LOCAL_MACHINESYSTEMCurren
tControlSetControlLsaRestrictAnonymous]

 Use



IDS

Snort
BlackICE
Identifying attacks







On Windows, check the event log under
Security.
On Linux, check in /var/log/.
Review IIS logs at
winntsystem32LogFiles.
Check Apache logs at /var/log/httpd.
Administrative shares:





Make life easier for system admins.
Can be exploited if a hacker knows the
right passwords.
Standard admin shares:




Admin$
IPC$
C$ (and any other drive in the box)
Control the target


Establish connection with target host.





Use Computer Management in MMC or
Regedit to change system settings.
Start Telnet session.




net use se-x-xipc$ /u:se-x-xadministrator

at  se-x-x 12:08pm net start telnet

Turning off file sharing thwarts these
connections.
Counters to brute
force/dictionary attacks


Use good passwords.







Use account lockouts.
Limit services.




No dictionary words
Combination of alpha and numeric characters
At least eight-character length

If you don’t need, it turn it off.

Limit scope.
Buffer overflow
Cracker sends more data then the buffer can handle, at the
end of which is the code he or she wants executed.
Code
Allotted space
on stack

Code

Data sent

Stack smashed;
Egg may
be run.
Hacker = Man in the middle
Sniffing on local networks





On Ethernet without a switch, all traffic is
sent to all computers.
Computers with their NIC set to
promiscuous mode can see everything that
is sent on the wire.
Common protocols like FTP, HTTP, SMTP,
and POP3 are not encrypted, so you can
read the passwords as plain text.
Sniffing: Switched networks




Switches send data only to target hosts.
Switched networks are more secure.
Switches speed up the network.
ARP Spoofing
Hackers can use programs like
arpspoof to change the identify of a
host on the network and thus receive
traffic not intended for them.
ARP spoofing steps
1. Set your machine to forward packets:
Linux: echo 1 > /proc/sys/net/ipv4/ip_forward echo 1 >
/proc/sys/net/ipv4/ip_forward
BSD: sysctl -w net.inet.ip.forwarding=1

2. Start arpspoofing (using two terminal windows)
arpspoof -t 149.160.x.x 149.160.y.y
arpspoof -t 149.160.y.y 149.160.x.x

3. Start sniffing
ngrep host 149.160.x.x | less
OR
Dsniff | less
Counters to ARP spoofing



Static ARP tables
ARPWatch


Platforms: AIX, BSDI, DG-UX, FreeBSD,
HP-UX, IRIX, Linux, NetBSD, OpenBSD,
SCO, Solaris, SunOS, True64 UNIX, Ultrix,
UNIX
IP spoofing:





Fakes your IP address.
Misdirects attention.
Gets packets past filters.
Confuses the network.
DoS
Denial of service attacks make it slow or
impossible for legitimate users to access
resources.
 Consume resources





Drive space
Processor time

Consume Bandwidth



Smurf attack
DDoS
SYN flooding




Numerous SYN packets are transmitted,
thus tying up connections.
Spoofing IP prevents tracing back to
source.
Smurf attack





Ping requests are sent to the broadcast address of
a Subnet with a spoofed packet pretending to be
the target.
All the machines on the network respond by
sending replies to the target.
Someone on a 56K line can flood a server on a
T1 by using a network with a T3 as an amplifier.


Example command:
nemesis-icmp -I 8 -S 149.160.26.29 -D
149.160.31.255
Distributed denial of service
Use agents (zombies) on computers connected to
the Internet to flood targets.
Client
Master
Agent

Agent

Master
Agent
Target

Master
Agent

Agent
Common DDoS zombie tools:
Trinoo
 TFN
 Stacheldraht
 Troj_Trinoo
 Shaft
Sniff the network to detect them or use
ZombieZapper from Razor Team to put them
back in their graves.


Mais conteúdo relacionado

Mais procurados

Shutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esxShutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esx
moy725
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
leminhvuong
 
Hacking and Computer Forensics
Hacking and Computer ForensicsHacking and Computer Forensics
Hacking and Computer Forensics
Kristian Arjianto
 

Mais procurados (20)

Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Shutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esxShutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esx
 
Linux Vulnerabilities
Linux VulnerabilitiesLinux Vulnerabilities
Linux Vulnerabilities
 
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking   Chapter 7 - Enumeration - Eric VanderburgEthical hacking   Chapter 7 - Enumeration - Eric Vanderburg
Ethical hacking Chapter 7 - Enumeration - Eric Vanderburg
 
Know Your Worm (Conficker)
Know Your Worm (Conficker)Know Your Worm (Conficker)
Know Your Worm (Conficker)
 
Essential security for linux servers
Essential security for linux serversEssential security for linux servers
Essential security for linux servers
 
Conficker
ConfickerConficker
Conficker
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
How Microsoft will MiTM your network
How Microsoft will MiTM your networkHow Microsoft will MiTM your network
How Microsoft will MiTM your network
 
Hacking and Computer Forensics
Hacking and Computer ForensicsHacking and Computer Forensics
Hacking and Computer Forensics
 
Unix Security
Unix SecurityUnix Security
Unix Security
 
Access over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEAccess over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoE
 
snortinstallguide
snortinstallguidesnortinstallguide
snortinstallguide
 
Shellshock bug
Shellshock bugShellshock bug
Shellshock bug
 
Conficker
ConfickerConficker
Conficker
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
 
Shell Shock (Bash Bug)
Shell Shock (Bash Bug)Shell Shock (Bash Bug)
Shell Shock (Bash Bug)
 
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
 
Shellshock - A Software Bug
Shellshock - A Software BugShellshock - A Software Bug
Shellshock - A Software Bug
 

Destaque (11)

An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Denial of service attack
Denial of service attackDenial of service attack
Denial of service attack
 
Network Security
Network SecurityNetwork Security
Network Security
 
Kerberos
KerberosKerberos
Kerberos
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Semelhante a How hackers attack networks

modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
leminhvuong
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
webhostingguy
 

Semelhante a How hackers attack networks (20)

Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
Intrusion Techniques
Intrusion TechniquesIntrusion Techniques
Intrusion Techniques
 
Server hardening
Server hardeningServer hardening
Server hardening
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
Technology to Stop Hackers
Technology to Stop Hackers Technology to Stop Hackers
Technology to Stop Hackers
 
Presentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad AlmajaliPresentation Prepared By: Mohamad Almajali
Presentation Prepared By: Mohamad Almajali
 
CEH v9 cheat sheet notes Certified Ethical Hacker
CEH v9 cheat sheet notes  Certified Ethical HackerCEH v9 cheat sheet notes  Certified Ethical Hacker
CEH v9 cheat sheet notes Certified Ethical Hacker
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMP
 
Living off the land and fileless attack techniques
Living off the land and fileless attack techniquesLiving off the land and fileless attack techniques
Living off the land and fileless attack techniques
 
Presentación1
Presentación1Presentación1
Presentación1
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Network security
Network securityNetwork security
Network security
 

Mais de Adeel Javaid

How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in Academia
Adeel Javaid
 
Secrets of success
Secrets of successSecrets of success
Secrets of success
Adeel Javaid
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcare
Adeel Javaid
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
Adeel Javaid
 
Project management
Project managementProject management
Project management
Adeel Javaid
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recovery
Adeel Javaid
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mind
Adeel Javaid
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
Adeel Javaid
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturing
Adeel Javaid
 

Mais de Adeel Javaid (20)

Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manual
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computing
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
What is ph d
What is ph dWhat is ph d
What is ph d
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in Academia
 
Secrets of success
Secrets of successSecrets of success
Secrets of success
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcare
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
 
Project management
Project managementProject management
Project management
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recovery
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mind
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategy
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production system
 
Channel marketing
Channel marketingChannel marketing
Channel marketing
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturing
 
Cloud security
Cloud securityCloud security
Cloud security
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

How hackers attack networks

  • 1. How Hackers Attack Networks Muhammad Adeel Javaid
  • 2. Common platforms for attacks   Windows 98/Me/XP Home Edition Linux, OpenBSD, Trinux, and other low-cost forms of UNIX
  • 3. Local and remote attacks   Local: Attacks performed with physical access to the machine Remote: Attacks launched over the network
  • 4. Why worry about local attacks on workstations?    Hackers can collect more information about a network and its users. Hackers can obtain the administrator password on a workstation, which can lead to server access. Spyware can be installed to gather more sensitive information.
  • 5. Common local attacks  Getting admin/root at the local machine  Windows Workstation: Rename or delete c:winntsystem32configSAM  Linux: at LILO prompt, type linux s  Cracking local passwords  L0phtcrack   (LC) Removing hard drive to install in another box Exploiting files or commands available upon login  C:Documents and SettingsAll UsersStart MenuProgramsStartup  Registry commands, such as adding users
  • 6. Cracking over the network: A four-step program 1. 2. 3. 4. Footprinting Scanning and enumerating Researching Exploiting
  • 7. Footprinting Finding out what an organization owns:  Find the network block.  Ping the network broadcast address.
  • 8. Scanning and enumerating    What services are running? What accounts exist? How are things set up?
  • 9. Scanning and enumerating: Methods and tools  Port scanning   Sniffing   Nmap ngrep SNMP  Solarwinds  Null session   NBTenum Nbtdump
  • 10. Scanning and enumerating: Methods and tools (cont.)  Null session    NBTenum Nbtdump NetBIOS browsing   Netview Legion  Vulnerability scanners    Nessus Winfingerprint LANGuard
  • 11. Researching Researching security sites and hacker sites can reveal exploits that will work on the systems discovered during scanning and enumerating.      http://www.securityfocus.com/ http://www.networkice.com/advice/Exploits/Ports http://www.hackingexposed.com http://www.ntsecurity.net/ http://www.insecure.org/
  • 13. Countering hackers  Port scanning     Block all ports except those you need Block ICMP if practical NT: IPsec; Linux: iptables Sniffing    Use switched media Use encrypted protocols Use fixed ARP entries
  • 14. Countering hackers (cont.)  Null  sessions Set the following registry value to 2 [HKEY_LOCAL_MACHINESYSTEMCurren tControlSetControlLsaRestrictAnonymous]  Use   IDS Snort BlackICE
  • 15. Identifying attacks     On Windows, check the event log under Security. On Linux, check in /var/log/. Review IIS logs at winntsystem32LogFiles. Check Apache logs at /var/log/httpd.
  • 16. Administrative shares:    Make life easier for system admins. Can be exploited if a hacker knows the right passwords. Standard admin shares:    Admin$ IPC$ C$ (and any other drive in the box)
  • 17. Control the target  Establish connection with target host.    Use Computer Management in MMC or Regedit to change system settings. Start Telnet session.   net use se-x-xipc$ /u:se-x-xadministrator at se-x-x 12:08pm net start telnet Turning off file sharing thwarts these connections.
  • 18. Counters to brute force/dictionary attacks  Use good passwords.      Use account lockouts. Limit services.   No dictionary words Combination of alpha and numeric characters At least eight-character length If you don’t need, it turn it off. Limit scope.
  • 19. Buffer overflow Cracker sends more data then the buffer can handle, at the end of which is the code he or she wants executed. Code Allotted space on stack Code Data sent Stack smashed; Egg may be run.
  • 20. Hacker = Man in the middle
  • 21. Sniffing on local networks    On Ethernet without a switch, all traffic is sent to all computers. Computers with their NIC set to promiscuous mode can see everything that is sent on the wire. Common protocols like FTP, HTTP, SMTP, and POP3 are not encrypted, so you can read the passwords as plain text.
  • 22. Sniffing: Switched networks    Switches send data only to target hosts. Switched networks are more secure. Switches speed up the network.
  • 23. ARP Spoofing Hackers can use programs like arpspoof to change the identify of a host on the network and thus receive traffic not intended for them.
  • 24. ARP spoofing steps 1. Set your machine to forward packets: Linux: echo 1 > /proc/sys/net/ipv4/ip_forward echo 1 > /proc/sys/net/ipv4/ip_forward BSD: sysctl -w net.inet.ip.forwarding=1 2. Start arpspoofing (using two terminal windows) arpspoof -t 149.160.x.x 149.160.y.y arpspoof -t 149.160.y.y 149.160.x.x 3. Start sniffing ngrep host 149.160.x.x | less OR Dsniff | less
  • 25. Counters to ARP spoofing   Static ARP tables ARPWatch  Platforms: AIX, BSDI, DG-UX, FreeBSD, HP-UX, IRIX, Linux, NetBSD, OpenBSD, SCO, Solaris, SunOS, True64 UNIX, Ultrix, UNIX
  • 26. IP spoofing:     Fakes your IP address. Misdirects attention. Gets packets past filters. Confuses the network.
  • 27. DoS Denial of service attacks make it slow or impossible for legitimate users to access resources.  Consume resources    Drive space Processor time Consume Bandwidth   Smurf attack DDoS
  • 28. SYN flooding   Numerous SYN packets are transmitted, thus tying up connections. Spoofing IP prevents tracing back to source.
  • 29. Smurf attack    Ping requests are sent to the broadcast address of a Subnet with a spoofed packet pretending to be the target. All the machines on the network respond by sending replies to the target. Someone on a 56K line can flood a server on a T1 by using a network with a T3 as an amplifier.  Example command: nemesis-icmp -I 8 -S 149.160.26.29 -D 149.160.31.255
  • 30. Distributed denial of service Use agents (zombies) on computers connected to the Internet to flood targets. Client Master Agent Agent Master Agent Target Master Agent Agent
  • 31. Common DDoS zombie tools: Trinoo  TFN  Stacheldraht  Troj_Trinoo  Shaft Sniff the network to detect them or use ZombieZapper from Razor Team to put them back in their graves. 