Computer Security
Computer Security
Defense – An Overview
Jeff Huberty
Business Information Technology Solutions (BITS)
www.bits-solutions.com
Has Your System Been Compromised?
OUTLINE
Security Threats
• The most expensive computer crime was denial of service (DoS). Theft of
intellectual property, the prior leading category, was the second most
expensive last year.
Survey suggests that organizations that raise their level of security awareness
have reason to hope for measurable returns on their investments.
“Men are from Mars, Women are from Venus. Computers are from Hell!”
Four Objectives of Computer Security
"A bus station is where a bus stops. A train station is where a train stops.
On my desk I have a workstation..."
Security Goals
Confidentiality
keeps information from being
read by unauthorized people
Integrity Availability
"The nice thing about standards is that there are so many to choose from."
Security Goals
Availability: addresses issues from fault tolerance to protect
against denial of service and access control to ensure that data is
available to those authorized to access it.
Integrity: keeping data away from those who should not have it and
making sure that those who should have it can get it are fairly basic
ways to maintain the integrity of the data
¾ Web Hacking
¾ Vulnerability Scanners (Whisker, Nikto, Stealth, Twwwscan/Arirang)
¾ All-Purpose (Curl, OpenSSL, Stunnel)
¾ Application Inspection (Achilles, WebSleuth, Wget)
¾ Password Cracking/Brute-Force
¾ PassFilt.dll and Windows Password Policies
¾ PAM and UNIX Password Policies
¾ OpenBSD login.conf
"The definition of a hacker ? Someone who, after installing a new program, goes
immediately into the [Tools][Options] menu."
What If MS Created NMap?
Web server Exploit Attempt
The following is a real capture of an exploit attempt on 30–NOV-04:
Httpd access log:
66.205.59.245 Å-Attackers IP- - [30/Nov/2004:20:18:16 -0500] "SEARCH
/\x90\
x90\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\
x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\x
b1\
b1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x0
2\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1
\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\
xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x
02\
02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb
1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02\
x02\xb1\
xb1\x02 Å-
Buffer Overflow attempt
Basically, this is a repeated string of text that is sent to a web server in an attempt to overflow the
buffer. If this attack was successful (un-patched web server) it would drop them into a UNIX/TS
shell prompt and then they are in the system. Most UNIX web server administrators won’t allow
web servers to run as root, however there are plenty out there that do. This attack filled about 8
megs of log space in a matter of 30 minutes. A simple solution is to stay patched and make sure
you have the proper IDS/Firewalling/Filtering in place prior to rolling out a global Web server.
.
"A computer program does what you tell it to do, not what you want it to do."
Greer’s Third Law.
Internet Tools, cont’d
¾ Password Cracking/Brute Force Tools
¾ Backdoors and Remote Access (VNC, Netbus, Back Orifice, SubSeven, Loki,
stcpshell, Knark, AGOBOT, Phatbot, SDBOT)
"It's 5.50 a.m.... Do you know where your stack pointer is ?"
What Can We Do?
Take steps to increase security awareness
• Education, training, periodic bulletins, etc., cultivate user acceptance of security technologies
that need to be deployed.
• Security should be seen as a work in progress and never a finished project. Hackers adapt;
so should the organization.
Policies and Settings
Firewall Setting
Policy
No outside Web access.
Drop all outgoing packets to any IP, Port 80
"Unix is user-friendly. It's just very selective about who its friends are."
Access Control
¾ Today almost all systems are protected only by a simple
password that is typed in, or sent over a network in the
clear.Techniques for guessing passwords:
¾ Try default passwords.
¾ Try all short words, 1 to 3 characters long.
¾ Try all the words in an electronic dictionary(60,000).
¾ Collect information about the user’s hobbies, family
names, birthday, etc.
¾ Try user’s phone number, social security number, street
address, etc.
¾ Try all license plate numbers (123XYZ).
¾ Prevention: Enforce good password selection
(j@1H7%!2u4rZ) with more than 10 characters
¾ Tap a phone line - but this requires a very special modem, UI,
VAMP.
"If debugging is the process of removing software bugs, then programming must be the
process of putting them in."
Stages of a Network Intrusion
1. Scan the network to:
5. Use IRC (Internet Relay Chat) to invite friends to the feast, control
multiple machines, or just to host warez/P2P files.
"To err is human, but for a real disaster you need a computer."
Phase 2: Scanning
ATTACK DEFENSE
• War Dialing • Modem Policies
• Network Mapping • Hardening (close
unused ports)
• Vulnerability • Patch, Run Tools
Against Own Net
• Intrusion • Intrusion Detection
System
• Sophisticated
Stack/Buffer Overflow • IDS, mailing lists
Password • Tips discussed later
Web Apps • DigiSign, Encrypt, dyna
session IDs, timestamps
"If brute force doesn't solve your problems, then you aren't using enough."
Phase 3: Access via Network
ATTACK DEFENSE
• Sniffing • Secure protocols,
DMZ
• IP Address Spoof • Test via NMap, SSH
for UNIX
• Session Hijacking • Combine everything
above
"Foolproof systems don't take into account the ingenuity of fools." — Gene Brown.
Phase 5: Duck and Cover
ATTACK DEFENSE
"Dude, I hate to be the bearer of bad news, but I'm afraid you've been hacked — the
FTP server at 127.0.0.1 has all your personal files. See for yourself; just log in with your
Spyware, Viruses, Trojans (Oh, My!)
¾ Do not execute programs (or "macro's") from unknown sources (e.g., PS files, HyperCard files,
MS Office documents, Java, ...), if you can help it.
¾ Avoid the most common operating systems and email programs, if possible.
¾ Run legitimate anti-spyware programs (Ad-aware SE Personal and Spybot Search and Destroy
1.3 are both free and highly recommended by professionals)
¾ Deletion of temp files (sans .log files) contained in temporary internet folders and temp folders
¾ Set security level for macros to high (requesting your permission)
¾ Resetting IE security to Medium to Medium-
Medium-High; shorten history settings and temporary internet files
¾ Check local installed programs in Add/Remove programs for validity
validity
¾ Check Services for bogus service applications
¾ Check Event Viewer (security, application, system)
Great Websites
Packet Storm Security (packetstorm.security.com)
SANS (sans.org)
Security Focus Bugtraq Archives (securityfocus.com)
@stake Security News (atstake.com/security_news)
Security Portal (securityportal.com)
2600 (2600.com)
White Hats (whitehats.com)
Attrition (attrition.org)
Information Security Magazine (infosecuritymagazine.com)
CERT (cert.org)
Credits
Secured Enterprise: Protecting Your Information Assets; F. Byrnes/P. Proctor, Prentice-Hall PTR
(5/2002)
Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the BlackHat
Community; Honeynet Project; Addison-Wesley (2002)
Login: yes
Password: i dont have one
password is incorrect
Login: yes
Password: incorrect
Any Questions?