Ethical Hacking 
CHAPTER 3 – NETWORK AND COMPUTER ATTACKS 
ERIC VANDERBURG
Objectives 
 Describe the different types of malicious software 
 Describe methods of protecting against malware attacks 
 Describe the types of network attacks 
 Identify physical security attacks and vulnerabilities
Malicious Software (Malware) 
 Network attacks prevent a business from operating 
 Malicious software (Malware) includes 
 Virus 
 Worms 
 Trojan horses 
 Goals 
 Destroy data 
 Corrupt data 
 Shutdown a network or system
Viruses 
 Virus attaches itself to an executable file 
 Can replicate itself through an executable program 
 Does not stand on its own 
 Needs a host program 
 No foolproof method of preventing them 
 Use antivirus programs for detection 
 Detection based on virus signatures 
 Must update signature database periodically 
 Use automatic update feature if available
Viruses (continued) 
 Encoding base 64 used to reduce size of e-mail attachments 
 Represents 0 to 63 using six bits 
 A is 000000 … Z is 011001 
 Converting base 64 strings to decimal equivalent 
 Create groups of 4 characters, for each group 
 Convert decimal value of each letter to binary 
 Rewrite as three groups of eight bits 
 Convert the binary into decimal
Viruses (continued) 
 Commercial base 64 decoders 
 Shell 
 Executable piece of programming code 
 Should not appear in an e-mail attachment
Macro Viruses 
 Virus encoded as a macro 
 Macro 
 Lists of commands 
 Can be used in destructive ways 
 Example: Melissa 
 Appeared in 1999 
 Even nonprogrammers can create macro viruses 
 Instructions posted on Web sites 
 Security professionals can learn from thinking like attackers
Worms 
 Worm 
 Replicates and propagates without a host 
 Infamous examples 
 Code Red 
 Nimda 
 Can infect every computer in the world in a short time 
 At least in theory 
 Actual examples 
 Cyberattacks against ATM machines 
 Slammer and Nachi worms
Trojan Programs 
 Insidious attack against networks 
 Disguise themselves as useful programs 
 Hide malicious content in program 
 Backdoors 
 Rootkits 
 Allow attackers remote access 
 Firewalls 
 Identify traffic on uncommon ports 
 Can block this type of attack 
 Trojan programs can use known ports 
 HTTP (TCP 80) or DNS (UDP 53)
Spyware 
 Sends information from the infected computer to the attacker 
 Confidential financial data 
 Passwords 
 PINs 
 Any other stored data 
 Can registered each keystroke entered 
 Prevalent technology 
 Educate users about spyware
Adware 
 Similar to spyware 
 Can be installed without the user being aware 
 Sometimes displays a banner 
 Main goal 
 Determine user’s online purchasing habits 
 Tailored advertisement 
 Main problem 
 Slows down computers
Protecting Against Malware 
Attacks 
 Difficult task 
 New viruses, worms, Trojan programs appear daily 
 Malware detected using antivirus solutions 
 Educate your users about these types of attacks
Educating Your Users 
 Structural training 
 Most effective measure 
 Includes all employees and management 
 E-mail monthly security updates 
 Simple but effective training method 
 Recommend that users update virus signature database 
 Activate automatic updates
Educating Your Users 
 SpyBot and Ad-Aware 
 Help protect against spyware and adware 
 Firewalls 
 Hardware (enterprise solution) 
 Software (personal solution) 
 Can be combined 
 Intrusion Detection System (IDS) 
 Monitors your network 24/7
Avoiding Fearing Tactics 
 Avoid scaring users into complying with security measures 
 Sometimes used by unethical security testers 
 Against the OSSTMM’s Rules of Engagement 
 Promote awareness rather than instilling fear 
 Users should be aware of potential threats 
 During training 
 Build on users’ knowledge 
 Make training easier
Intruder Attacks on Networks and 
Computers 
 Attack 
 Any attempt by an unauthorized person to access or use network 
resources 
 Network security 
 Concern with security of network resources 
 Computer security 
 Concerned with the security of a computer not part of a network 
infrastructure 
 Computer crime 
 Fastest growing type of crime worldwide
Denial-of-Service Attacks 
 Denial-of-Service (DoS) attack 
 Prevents legitimate users from accessing network resources 
 Some forms do not involve computers 
 Attacks do not attempt to access information 
 Cripple the network 
 Make it vulnerable to other type of attacks 
 Performing an attack yourself is not wise 
 Only need to prove attack could be carried out
Distributed Denial-of-Service 
Attacks 
 Attack on a host from multiple servers or workstations 
 Network could be flooded with billions of requests 
 Loss of bandwidth 
 Degradation or loss of speed 
 Often participants are not aware they are part of the attack 
 Attacking computers could be controlled using Trojan programs
Buffer Overflow Attacks 
 Vulnerability in poorly written code 
 Code does not check predefined size of input field 
 Goal 
 Fill overflow buffer with executable code 
 OS executes this code 
 Code elevates attacker’s permission 
 Administrator 
 Owner of running application 
 Train your programmer in developing applications with security in 
mind
Ping of Death Attacks 
 Type of DoS attack 
 Not as common as during the late 1990s 
 How it works 
 Attacker creates a large ICMP packet 
 More than 65,535 bytes 
 Large packet is fragmented at source network 
 Destination network reassembles large packet 
 Destination point cannot handle oversize packet and crashes
Session Hijacking 
 Enables attacker to join a TCP session 
 Attacker makes both parties think he or she is the other party
Addressing Physical Security 
 Protecting a network also requires physical security 
 Inside attacks are more likely than attacks from outside the 
company
Keyloggers 
 Used to capture keystrokes on a computer 
 Hardware 
 Software 
 Software 
 Behaves like Trojan programs 
 Hardware 
 Easy to install 
 Goes between the keyboard and the CPU 
 KeyKatcher and KeyGhost
Keyloggers (continued) 
 Protection 
 Software-based 
 Antivirus 
 Hardware-based 
 Random visual tests
Behind Locked Doors 
 Lock up your servers 
 Average person can pick deadbolt locks in less than five minutes 
 After only a week or two of practice 
 Experienced hackers can pick deadbolt locks in under 30 seconds 
 Rotary locks are harder to pick 
 Keep a log of who enters and leaves the room 
 Security cards can be used instead of keys for better security
Summary 
 Be aware of attacks on network infrastructures and standalone 
computers 
 Attacks can be perpetrated by insiders or remote attackers 
 Malicious software 
 Virus 
 Worm 
 Trojan programs 
 Spyware 
 Adware
Summary (continued) 
 Attacks 
 Denial-of-Service (DoS) 
 Distributed Denial-of-Service (DDoS) 
 Buffer overflow 
 Ping of Death 
 Session hijacking
Summary (continued) 
 Physical security 
 As important as network or computer security 
 Keyloggers 
 Software-based 
 Hardware-based 
 Locks 
 Choose hard-to-pick locks 
 Security cards

More Related Content

PPTX
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
PPTX
Network Miner Network forensics
PPT
Ch04 Network Vulnerabilities and Attacks
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPTX
IDS, IPS, IDPS
PPTX
Threat hunting foundations: People, process and technology.pptx
PPTX
Footprinting and reconnaissance
PPTX
Assingement on dos ddos
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Network Miner Network forensics
Ch04 Network Vulnerabilities and Attacks
Computer Security and Intrusion Detection(IDS/IPS)
IDS, IPS, IDPS
Threat hunting foundations: People, process and technology.pptx
Footprinting and reconnaissance
Assingement on dos ddos

What's hot (20)

PPT
Ch03 Network and Computer Attacks
PPTX
Cyber Threat Hunting Workshop
PPTX
Threat hunting for Beginners
PPTX
Buffer overflow
PDF
Threat Hunting
PDF
What is Ransomware?
PPT
Malware
PPTX
Hash Function
PDF
Offensive OSINT
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PPT
Network Security Threats and Solutions
PPTX
Cyber Threat Modeling
PPT
Intrusion Detection Systems
PPTX
DNS spoofing/poisoning Attack
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
DDoS ATTACKS
PPT
Web Application Security
PDF
Stuxnet
PDF
Cyber Security Governance
PPT
Introduction to information security
Ch03 Network and Computer Attacks
Cyber Threat Hunting Workshop
Threat hunting for Beginners
Buffer overflow
Threat Hunting
What is Ransomware?
Malware
Hash Function
Offensive OSINT
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
Network Security Threats and Solutions
Cyber Threat Modeling
Intrusion Detection Systems
DNS spoofing/poisoning Attack
Effective Threat Hunting with Tactical Threat Intelligence
DDoS ATTACKS
Web Application Security
Stuxnet
Cyber Security Governance
Introduction to information security

Viewers also liked (20)

PDF
CNIT 123: Ch 4: Footprinting and Social Engineering
PPTX
Introduction To Ethical Hacking
PPTX
Denial of Service in Software Defined Netoworks
PPTX
Ethical Hacking
PPTX
Information security & ethical hacking
PPT
Ethical Hacking
PPSX
Information Security and Ethical Hacking
PDF
CNIT 123: Ch 3: Network and Computer Attacks
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PDF
CNIT 123: Ch 1 Ethical Hacking Overview
PDF
CNIT 126 7: Analyzing Malicious Windows Programs
PDF
Information Security Benchmarking 2015
PDF
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
PDF
Is Your Mobile App Secure?
PDF
Ch 9: Embedded Operating Systems: The Hidden Threat
PDF
CNIT 126 8: Debugging
PDF
Ch 6: Enumeration
PDF
Ch 7: Programming for Security Professionals
PDF
CNIT 126 5: IDA Pro
PDF
CNIT 127 Ch 3: Shellcode
CNIT 123: Ch 4: Footprinting and Social Engineering
Introduction To Ethical Hacking
Denial of Service in Software Defined Netoworks
Ethical Hacking
Information security & ethical hacking
Ethical Hacking
Information Security and Ethical Hacking
CNIT 123: Ch 3: Network and Computer Attacks
Hacktrikz - Introduction to Information Security & Ethical Hacking
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 126 7: Analyzing Malicious Windows Programs
Information Security Benchmarking 2015
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
Is Your Mobile App Secure?
Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 126 8: Debugging
Ch 6: Enumeration
Ch 7: Programming for Security Professionals
CNIT 126 5: IDA Pro
CNIT 127 Ch 3: Shellcode

Similar to Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg (20)

PDF
Ch 3: Network and Computer Attacks
PPT
Network Attacks
PDF
CNIT 123: Ch 3: Network and Computer Attacks
PPTX
Network security presentation
PDF
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
PPT
23 computer security
PPTX
23 network security threats pkg
PPTX
Computer security ethics_and_privacy
PPT
System-Security-acit-Institute
PPTX
PPTX
Protection from hacking attacks
PPT
Ethical Hacking - Introduction to Computer Security
PPT
Introduction To Computer Security
PPT
Ethical Hacking - Introduction to Computer Security
PPT
CyberSecurity presentation for basic knowledge about this topic
PDF
Ch14 security
PPT
a documentation of final year SRS for AI drons.ppt
PPTX
Computer security
PPTX
Security and ethics
PPT
Computer Securityyyyyyyy - Chapter 2.ppt
Ch 3: Network and Computer Attacks
Network Attacks
CNIT 123: Ch 3: Network and Computer Attacks
Network security presentation
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
23 computer security
23 network security threats pkg
Computer security ethics_and_privacy
System-Security-acit-Institute
Protection from hacking attacks
Ethical Hacking - Introduction to Computer Security
Introduction To Computer Security
Ethical Hacking - Introduction to Computer Security
CyberSecurity presentation for basic knowledge about this topic
Ch14 security
a documentation of final year SRS for AI drons.ppt
Computer security
Security and ethics
Computer Securityyyyyyyy - Chapter 2.ppt

More from Eric Vanderburg (20)

PPTX
GDPR, Data Privacy and Cybersecurity - MIT Symposium
PPTX
Modern Security the way Equifax Should Have
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PPTX
Mobile Forensics and Cybersecurity
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPTX
Ransomware: 2016's Greatest Malware Threat
PPT
Emerging Technologies: Japan’s Position
PPT
Principles of technology management
PPT
Japanese railway technology
PPT
Evaluating japanese technological competitiveness
PPT
Japanese current and future technology management challenges
PPT
Technology management in Japan: Robotics
PPT
Incident response table top exercises
PPTX
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
PPTX
Cloud Storage and Security: Solving Compliance Challenges
PPTX
Hacktivism: Motivations, Tactics and Threats
PPTX
Correct the most common web development security mistakes - Eric Vanderburg
PPTX
Deconstructing website attacks - Eric Vanderburg
PPTX
Countering malware threats - Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Ransomware: 2016's Greatest Malware Threat
Emerging Technologies: Japan’s Position
Principles of technology management
Japanese railway technology
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg

Recently uploaded (20)

PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
DOCX
search engine optimization ppt fir known well about this
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPTX
future_of_ai_comprehensive_20250822032121.pptx
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Statistics on Ai - sourced from AIPRM.pdf
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Consumable AI The What, Why & How for Small Teams.pdf
search engine optimization ppt fir known well about this
Microsoft User Copilot Training Slide Deck
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
future_of_ai_comprehensive_20250822032121.pptx
Basics of Cloud Computing - Cloud Ecosystem
Statistics on Ai - sourced from AIPRM.pdf
Custom Battery Pack Design Considerations for Performance and Safety
Co-training pseudo-labeling for text classification with support vector machi...
Rapid Prototyping: A lecture on prototyping techniques for interface design
Early detection and classification of bone marrow changes in lumbar vertebrae...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
4 layer Arch & Reference Arch of IoT.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Enhancing plagiarism detection using data pre-processing and machine learning...

Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg

  • 1. Ethical Hacking CHAPTER 3 – NETWORK AND COMPUTER ATTACKS ERIC VANDERBURG
  • 2. Objectives  Describe the different types of malicious software  Describe methods of protecting against malware attacks  Describe the types of network attacks  Identify physical security attacks and vulnerabilities
  • 3. Malicious Software (Malware)  Network attacks prevent a business from operating  Malicious software (Malware) includes  Virus  Worms  Trojan horses  Goals  Destroy data  Corrupt data  Shutdown a network or system
  • 4. Viruses  Virus attaches itself to an executable file  Can replicate itself through an executable program  Does not stand on its own  Needs a host program  No foolproof method of preventing them  Use antivirus programs for detection  Detection based on virus signatures  Must update signature database periodically  Use automatic update feature if available
  • 5. Viruses (continued)  Encoding base 64 used to reduce size of e-mail attachments  Represents 0 to 63 using six bits  A is 000000 … Z is 011001  Converting base 64 strings to decimal equivalent  Create groups of 4 characters, for each group  Convert decimal value of each letter to binary  Rewrite as three groups of eight bits  Convert the binary into decimal
  • 6. Viruses (continued)  Commercial base 64 decoders  Shell  Executable piece of programming code  Should not appear in an e-mail attachment
  • 7. Macro Viruses  Virus encoded as a macro  Macro  Lists of commands  Can be used in destructive ways  Example: Melissa  Appeared in 1999  Even nonprogrammers can create macro viruses  Instructions posted on Web sites  Security professionals can learn from thinking like attackers
  • 8. Worms  Worm  Replicates and propagates without a host  Infamous examples  Code Red  Nimda  Can infect every computer in the world in a short time  At least in theory  Actual examples  Cyberattacks against ATM machines  Slammer and Nachi worms
  • 9. Trojan Programs  Insidious attack against networks  Disguise themselves as useful programs  Hide malicious content in program  Backdoors  Rootkits  Allow attackers remote access  Firewalls  Identify traffic on uncommon ports  Can block this type of attack  Trojan programs can use known ports  HTTP (TCP 80) or DNS (UDP 53)
  • 10. Spyware  Sends information from the infected computer to the attacker  Confidential financial data  Passwords  PINs  Any other stored data  Can registered each keystroke entered  Prevalent technology  Educate users about spyware
  • 11. Adware  Similar to spyware  Can be installed without the user being aware  Sometimes displays a banner  Main goal  Determine user’s online purchasing habits  Tailored advertisement  Main problem  Slows down computers
  • 12. Protecting Against Malware Attacks  Difficult task  New viruses, worms, Trojan programs appear daily  Malware detected using antivirus solutions  Educate your users about these types of attacks
  • 13. Educating Your Users  Structural training  Most effective measure  Includes all employees and management  E-mail monthly security updates  Simple but effective training method  Recommend that users update virus signature database  Activate automatic updates
  • 14. Educating Your Users  SpyBot and Ad-Aware  Help protect against spyware and adware  Firewalls  Hardware (enterprise solution)  Software (personal solution)  Can be combined  Intrusion Detection System (IDS)  Monitors your network 24/7
  • 15. Avoiding Fearing Tactics  Avoid scaring users into complying with security measures  Sometimes used by unethical security testers  Against the OSSTMM’s Rules of Engagement  Promote awareness rather than instilling fear  Users should be aware of potential threats  During training  Build on users’ knowledge  Make training easier
  • 16. Intruder Attacks on Networks and Computers  Attack  Any attempt by an unauthorized person to access or use network resources  Network security  Concern with security of network resources  Computer security  Concerned with the security of a computer not part of a network infrastructure  Computer crime  Fastest growing type of crime worldwide
  • 17. Denial-of-Service Attacks  Denial-of-Service (DoS) attack  Prevents legitimate users from accessing network resources  Some forms do not involve computers  Attacks do not attempt to access information  Cripple the network  Make it vulnerable to other type of attacks  Performing an attack yourself is not wise  Only need to prove attack could be carried out
  • 18. Distributed Denial-of-Service Attacks  Attack on a host from multiple servers or workstations  Network could be flooded with billions of requests  Loss of bandwidth  Degradation or loss of speed  Often participants are not aware they are part of the attack  Attacking computers could be controlled using Trojan programs
  • 19. Buffer Overflow Attacks  Vulnerability in poorly written code  Code does not check predefined size of input field  Goal  Fill overflow buffer with executable code  OS executes this code  Code elevates attacker’s permission  Administrator  Owner of running application  Train your programmer in developing applications with security in mind
  • 20. Ping of Death Attacks  Type of DoS attack  Not as common as during the late 1990s  How it works  Attacker creates a large ICMP packet  More than 65,535 bytes  Large packet is fragmented at source network  Destination network reassembles large packet  Destination point cannot handle oversize packet and crashes
  • 21. Session Hijacking  Enables attacker to join a TCP session  Attacker makes both parties think he or she is the other party
  • 22. Addressing Physical Security  Protecting a network also requires physical security  Inside attacks are more likely than attacks from outside the company
  • 23. Keyloggers  Used to capture keystrokes on a computer  Hardware  Software  Software  Behaves like Trojan programs  Hardware  Easy to install  Goes between the keyboard and the CPU  KeyKatcher and KeyGhost
  • 24. Keyloggers (continued)  Protection  Software-based  Antivirus  Hardware-based  Random visual tests
  • 25. Behind Locked Doors  Lock up your servers  Average person can pick deadbolt locks in less than five minutes  After only a week or two of practice  Experienced hackers can pick deadbolt locks in under 30 seconds  Rotary locks are harder to pick  Keep a log of who enters and leaves the room  Security cards can be used instead of keys for better security
  • 26. Summary  Be aware of attacks on network infrastructures and standalone computers  Attacks can be perpetrated by insiders or remote attackers  Malicious software  Virus  Worm  Trojan programs  Spyware  Adware
  • 27. Summary (continued)  Attacks  Denial-of-Service (DoS)  Distributed Denial-of-Service (DDoS)  Buffer overflow  Ping of Death  Session hijacking
  • 28. Summary (continued)  Physical security  As important as network or computer security  Keyloggers  Software-based  Hardware-based  Locks  Choose hard-to-pick locks  Security cards