haihongyuan.com
海量文库 文档专家
全站搜索:
您现在的位置:首页 > 幼儿教育 > 少儿英语少儿英语

Attacks and vulnerabilities 2

发布时间:2013-11-10 08:01:33  

Attacks and

Vulnerabilities

Topics of Discussion

?Reconnaissance

Gain information about a system

?Vulnerabilities

Attributes of a system that can be maliciously exploited

?Attacks

Procedures to exploit vulnerabilities

Reference 1

Topics of DiscussionReconnaissance

–War Dialing

–War Driving

–Port Scanning

–Probing

–Packet Sniffing

War Dialing (Reconnaissance)?Method

Dial a range of phone

numbers searching for

modem

?Motivation

Locate potential targets??DetectionDetection impossible outside of the telephony infrastructureDefenseDisconnect unessential modems from outgoing

phone lines

Reference 2

War Driving (Reconnaissance)?Method

Surveillance of wireless

signals in a region

?Motivation

Find wireless traffic??DetectionCan only be detected by physical surveillanceDefense

Limit geographic access to

wireless signal

Reference 3

Port Scanning (Reconnaissance)?Method

Send out a SYN packet,

check for response

?Motivation

Find potential targets??DetectionTraffic analysisDefenseClose/silence ports

Reference 4

Probing (Reconnaissance)?Method

Send packets to ports

?Motivation

Find specific port information?DetectionTraffic analysis?Defense

Close/silence ports

Packet Sniffing (Reconnaissance)?Method

Capture and analyze packets

traveling across a network

interface

?Motivation

Gain access to information

traveling on the network?DetectionNone?DefenseUse encryption to minimize

cleartext on the network

Reference 5

Topics of DiscussionVulnerabilities

–Backdoors

–Code Exploits

–Eavesdropping

–Indirect Attacks

–Social Engineering

Backdoors (Vulnerabilities)

?Bypass normal means of authentication?Hidden from casual inspection

?Installed separately or integrated into software

Reference 6

Code Exploits (Vulnerabilities)

?Use of poor coding practices left uncaught by testing?Defense: In depth unit and integration testing

Eavesdropping (Vulnerability)

?Data transmitted without encryption can be captured and read by parties other than the sender and receiver

?Defense: Use of strong cryptography to minimize cleartext on the network

Password Cracks: l0phtcrack?Method

Gain access to operating

system’s hash table and

perform cracking remotely

?Motivation

Gain access to system,

cracking elsewhere –no

lockouts?DetectionDetecting reading of hash table?DefenseLimit access to system

Reference 8

Web Attacks: Source Viewing?Method

Read source code for

valuable information

?Motivation

Find passwords or

commented out URL??DetectionNoneDefenseNone

Web Attacks: Database Insertion?Method

Form multiple queries to a

database through forms

?Motivation

Insert information into a table

that might be unsafe?DetectionCheck database logs?DefenseFilter database queries, make

them quotesafe

Reference 9

Web Attacks: Meta Data?Method

Use meta characters to make

malicious input

?Motivation

Possibly reveal script or other

useful information?DetectionWebsite logs?DefenseFilter input of meta characters

Reference 10

Physical Attack: Spoof MAC & IP?Method

Identify MAC address of

target and replicate

?Motivation

Deny target from receiving

traffic?DetectionMonitoring ARP requests and checking logs?DefenseNone as of now

网站首页网站地图 站长统计
All rights reserved Powered by 海文库
copyright ©right 2010-2011。
文档资料库内容来自网络,如有侵犯请联系客服。zhit326@126.com