《Hackers英语ppt展示.ppt》由会员分享,可在线阅读,更多相关《Hackers英语ppt展示.ppt(21页珍藏版)》请在三一文库上搜索。
1、Hackers, Crackers, and Network Intruders,科普五班 第一组 李文轩 何平 罗敏 刘盼 王尧 杨延超,Content,Hackers and their vocabulary Threats and risks Types of hackers Gaining access Intrusion detection and prevention,Hacker Terms,Hacking - showing computer expertise Cracking - breaching security on software or systems Phrea
2、king - cracking telecom networks Spoofing - faking the originating IP address in a datagram Denial of Service (DoS) - flooding a host with sufficient network traffic so that it cant respond anymore Port Scanning - searching for vulnerabilities,Hacking through the ages,1969 - Unix hacked together 197
3、1 - Cap n Crunch phone exploit discovered 1988 - Morris Internet worm crashes 6,000 servers 1994 - $10 million transferred from CitiBank accounts 1995 - Kevin Mitnick sentenced to 5 years in jail 2000 - Major websites succumb to DDoS 2000 - 15,700 credit and debit card numbers stolen from Western Un
4、ion (hacked while web database was undergoing maintenance) 2001 Code Red exploited bug in MS IIS to penetrate & spread probes random IPs for systems running IIS had trigger time for denial-of-service attack 2nd wave infected 360000 servers in 14 hours Code Red 2 - had backdoor installed to allow rem
5、ote control Nimda -used multiple infection mechanisms email, shares, web client, IIS 2002 Slammer Worm brings web to its knees by attacking MS SQL Server,The threats,Denial of Service (Yahoo, eBay, CNN, MS) Defacing, Graffiti, Slander, Reputation Loss of data (destruction, theft) Divulging private i
6、nformation (AirMiles, corporate espionage, personal financial) Loss of financial assets (CitiBank),CIA.gov defacement example,Web site defacement example,Types of hackers,Professional hackers Black Hats the Bad Guys White Hats Professional Security Experts Script kiddies Mostly kids/students User to
7、ols created by black hats, To get free stuff Impress their peers Not get caught Underemployed Adult Hackers Former Script Kiddies Cant get employment in the field Want recognition in hacker community Big in eastern european countries Ideological Hackers hack as a mechanism to promote some political
8、or ideological purpose Usually coincide with political events,Types of Hackers,Criminal Hackers Real criminals, are in it for whatever they can get no matter who it hurts Corporate Spies Are relatively rare Disgruntled Employees Most dangerous to an enterprise as they are “insiders” Since many compa
9、nies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise,Top intrusion justifications,Im doing you a favor pointing out your vulnerabilities Im making a political statement Because I can Because Im paid to do it,Gaining access,Front door Password gu
10、essing Password/key stealing Back doors Often left by original developers as debug and/or diagnostic tools Forgot to remove before release Trojan Horses Usually hidden inside of software that we download and install from the net (remember nothing is free) Many install backdoors Software vulnerabilit
11、y exploitation Often advertised on the OEMs web site along with security patches Fertile ground for script kiddies looking for something to do,Back doors & Trojans,e.g. Whack-a-mole / NetBus Cable modems / DSL very vulnerable Protect with Virus Scanners, Port Scanners, Personal Firewalls,Software vu
12、lnerability exploitation,Buffer overruns HTML / CGI scripts Poor design of web applications Javascript hacks PHP/ASP/ColdFusion URL hacks Other holes / bugs in software and services Tools and scripts used to scan ports for vulnerabilities,Password guessing,Default or null passwords Password same as
13、user name (use finger) Password files, trusted servers Brute force make sure login attempts audited!,Password/key theft,Dumpster diving Its amazing what people throw in the trash Personal information Passwords Good doughnuts Many enterprises now shred all white paper trash Inside jobs Disgruntled em
14、ployees Terminated employees (about 50% of intrusions resulting in significant loss),Once inside, the hacker can.,Modify logs To cover their tracks To mess with you Steal files Sometimes destroy after stealing A pro would steal and cover their tracks so to be undetected Modify files To let you know
15、they were there To cause mischief Install back doors So they can get in again Attack other systems,Intrusion detection systems (IDS),A lot of research going on at universities Doug Somerville- EE Dept, Viktor Skorman EE Dept Big money available due to 9/11 and Dept of Homeland Security Vulnerability
16、 scanners pro-actively identifies risks User use pattern matching When pattern deviates from norm should be investigated Network-based IDS examine packets for suspicious activity can integrate with firewall require one dedicated IDS server per segment,Intrusion detection systems (IDS),Host-based IDS
17、 monitors logs, events, files, and packets sent to the host installed on each host on network Honeypot decoy server collects evidence and alerts admin,Intrusion prevention,Patches and upgrades (hardening) Disabling unnecessary software Firewalls and Intrusion Detection Systems Honeypots Recognizing and reacting to port scanning,Risk management,Probability,Impact,Ignore (e.g. delude yourself),Prevent (e.g. firewalls, IDS, patches),Backup Plan (e.g. redundancies),Contain & Control (e.g. port scan),Thank You!,