Hackers英语ppt展示.ppt

上传人:本田雅阁 文档编号:3406263 上传时间:2019-08-22 格式:PPT 页数:21 大小:328.01KB
返回 下载 相关 举报
Hackers英语ppt展示.ppt_第1页
第1页 / 共21页
Hackers英语ppt展示.ppt_第2页
第2页 / 共21页
Hackers英语ppt展示.ppt_第3页
第3页 / 共21页
Hackers英语ppt展示.ppt_第4页
第4页 / 共21页
Hackers英语ppt展示.ppt_第5页
第5页 / 共21页
点击查看更多>>
资源描述

《Hackers英语ppt展示.ppt》由会员分享,可在线阅读,更多相关《Hackers英语ppt展示.ppt(21页珍藏版)》请在三一文库上搜索。

1、Hackers, Crackers, and Network Intruders,科普五班 第一组 李文轩 何平 罗敏 刘盼 王尧 杨延超,Content,Hackers and their vocabulary Threats and risks Types of hackers Gaining access Intrusion detection and prevention,Hacker Terms,Hacking - showing computer expertise Cracking - breaching security on software or systems Phrea

2、king - cracking telecom networks Spoofing - faking the originating IP address in a datagram Denial of Service (DoS) - flooding a host with sufficient network traffic so that it cant respond anymore Port Scanning - searching for vulnerabilities,Hacking through the ages,1969 - Unix hacked together 197

3、1 - Cap n Crunch phone exploit discovered 1988 - Morris Internet worm crashes 6,000 servers 1994 - $10 million transferred from CitiBank accounts 1995 - Kevin Mitnick sentenced to 5 years in jail 2000 - Major websites succumb to DDoS 2000 - 15,700 credit and debit card numbers stolen from Western Un

4、ion (hacked while web database was undergoing maintenance) 2001 Code Red exploited bug in MS IIS to penetrate & spread probes random IPs for systems running IIS had trigger time for denial-of-service attack 2nd wave infected 360000 servers in 14 hours Code Red 2 - had backdoor installed to allow rem

5、ote control Nimda -used multiple infection mechanisms email, shares, web client, IIS 2002 Slammer Worm brings web to its knees by attacking MS SQL Server,The threats,Denial of Service (Yahoo, eBay, CNN, MS) Defacing, Graffiti, Slander, Reputation Loss of data (destruction, theft) Divulging private i

6、nformation (AirMiles, corporate espionage, personal financial) Loss of financial assets (CitiBank),CIA.gov defacement example,Web site defacement example,Types of hackers,Professional hackers Black Hats the Bad Guys White Hats Professional Security Experts Script kiddies Mostly kids/students User to

7、ols created by black hats, To get free stuff Impress their peers Not get caught Underemployed Adult Hackers Former Script Kiddies Cant get employment in the field Want recognition in hacker community Big in eastern european countries Ideological Hackers hack as a mechanism to promote some political

8、or ideological purpose Usually coincide with political events,Types of Hackers,Criminal Hackers Real criminals, are in it for whatever they can get no matter who it hurts Corporate Spies Are relatively rare Disgruntled Employees Most dangerous to an enterprise as they are “insiders” Since many compa

9、nies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise,Top intrusion justifications,Im doing you a favor pointing out your vulnerabilities Im making a political statement Because I can Because Im paid to do it,Gaining access,Front door Password gu

10、essing Password/key stealing Back doors Often left by original developers as debug and/or diagnostic tools Forgot to remove before release Trojan Horses Usually hidden inside of software that we download and install from the net (remember nothing is free) Many install backdoors Software vulnerabilit

11、y exploitation Often advertised on the OEMs web site along with security patches Fertile ground for script kiddies looking for something to do,Back doors & Trojans,e.g. Whack-a-mole / NetBus Cable modems / DSL very vulnerable Protect with Virus Scanners, Port Scanners, Personal Firewalls,Software vu

12、lnerability exploitation,Buffer overruns HTML / CGI scripts Poor design of web applications Javascript hacks PHP/ASP/ColdFusion URL hacks Other holes / bugs in software and services Tools and scripts used to scan ports for vulnerabilities,Password guessing,Default or null passwords Password same as

13、user name (use finger) Password files, trusted servers Brute force make sure login attempts audited!,Password/key theft,Dumpster diving Its amazing what people throw in the trash Personal information Passwords Good doughnuts Many enterprises now shred all white paper trash Inside jobs Disgruntled em

14、ployees Terminated employees (about 50% of intrusions resulting in significant loss),Once inside, the hacker can.,Modify logs To cover their tracks To mess with you Steal files Sometimes destroy after stealing A pro would steal and cover their tracks so to be undetected Modify files To let you know

15、they were there To cause mischief Install back doors So they can get in again Attack other systems,Intrusion detection systems (IDS),A lot of research going on at universities Doug Somerville- EE Dept, Viktor Skorman EE Dept Big money available due to 9/11 and Dept of Homeland Security Vulnerability

16、 scanners pro-actively identifies risks User use pattern matching When pattern deviates from norm should be investigated Network-based IDS examine packets for suspicious activity can integrate with firewall require one dedicated IDS server per segment,Intrusion detection systems (IDS),Host-based IDS

17、 monitors logs, events, files, and packets sent to the host installed on each host on network Honeypot decoy server collects evidence and alerts admin,Intrusion prevention,Patches and upgrades (hardening) Disabling unnecessary software Firewalls and Intrusion Detection Systems Honeypots Recognizing and reacting to port scanning,Risk management,Probability,Impact,Ignore (e.g. delude yourself),Prevent (e.g. firewalls, IDS, patches),Backup Plan (e.g. redundancies),Contain & Control (e.g. port scan),Thank You!,

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1