ISM6222 Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Bastion Host

- A system identified by the firewall administrator as a critical strong point in the network's security - Serves as a platform for an application-level or circuit-level gateway

Disadvantages of Application-Level Gateway

- Additional processing overhead on each connection

Scanning

- After recon - Looks for ways to break in - Relies on automated tools

Buffer Overflows

- Allows hacker to execute arbitrary commands - Take over system - Based on putting to much info than developers allocated for

Application-Level Gateway Firewall

- Also called proxy server - Acts as a relay of application-level traffic - Must be established to an allowable application in order to establish inside connection

Personal Cybersecurity Tips

- Always use multi-factor authentication - Don't reuse passwords (Use a password Manager) - Encrypt your hard drive - Patch your OS Software - Use a VPN when on a public network - Recognize emails are not encrypted by default - Recognize SMS aren't Encrypted - Look for Connected Apps on Email Accounts - Recognize Caller ID can be spoofed - Use a Hardware Firewall System at home - Use antivirus software

Gain Access

- Analyze buffer overflows - Crack passwords - Sniff data - Use netcat

Packet Filtering Firewall

- Applies a set of rules to each incoming IP packet and then forwards or discards packet - Filtered packets going in both directions - Set up as a list of rules - Two default policies (discard or forward)

Gained Access By

- Buffer overflow - Cracking password - Sniffing info - Use netcat

Checksum Utility

- Can confirm the fingerprints of any downloaded program - To confirm authentic program downloaded - Wireshark

Network Map (Part of the Scanning Phase)

- Develop a network map using cheopsng - Linux based, non-windows - Discovers network hosts, traces the network, and draws the network topography

Disadvantages of Packet Filtering

- Difficulty of setting up rules - Lack of authentication

Port Scanning Defenses

- Disable unneeded services - Use services control panel to disable services - Use firewalls

Sniffing Defenses

- Don't use telnet, rsh, rlogin - Use secure shell - Use VPN's (encrypt all data between systems)

Firewall Design Principles

- Firewall is inserted between the premise network and the internet - Establish a controlled link - Protect premise network from internet based attacks - Provide a single choke point

Sniffing Data

- Gather info transmitted across LAN - Hacker can display stolen data or log into file

Covering Tracks

- Hiding files and directories - NTFS supports file streaming (alternate data streams can be created to store data under an original file, , any number of streams can be attached with a file, doesn't show up in windows explorer)

Advantages of Application-Level Gateway

- Higher security than packet filters - Only needs to scrutinize a few allowable applications - Easy to log and audit all incoming traffic

Defenses for Buffer Overflows

- Implement non-executable system stack - Automated code examining tools

Defense Against Recon

- Keep registration up to date - Use organization contact name rather than individual contact info - Don't us OS type and functions in domain names - Use split DNS (external and internal DNS)

Password Cracking Tools

- L0phtCrack for windows - John the ripper

Goal of Scanning

- List of open ports - Map of target network - List of vulnerabilities on target network - Now the hacker can gain access

Defenses Against Application Trojan Horses

- Look for changes in the system (new registry keys, unexpected files) - Anti-virus tools can detect

Recon

- Low tech (social engineering, physical break-ins, dumpster diving) - Search the web - Retrieve useful information - Network tools (ping, DNS lookup, whois info, IP block registration for an organization, traceroute, crawl a website)

Screened-Subnet Firewall System

- Most secure configuration - Two-packet filtering routers are used - Creation of an isolated sub-network

"NotPetya" Attack in 2017

- On June 27, 2017, a suspected Russian threat actor launched a wide-scale attack against Ukraine - True intention was likely to disrupt business operations and impact the way of life in Ukraine - Threat actor compromised the systems of a major provider of tax software and pushed a malicious update

Phases of Hacking

- Reconnaissance - Scanning - Gaining Access - Maintaining Access - Covering Tracks

Advantages of Packet Filtering

- Simplicity - Transparency to users - High speed

Circuit-Level Gateway Firewall

- Stand alone system or specialized function performed by Application-Level Gateway - Sets up two TCP connections - The gateway typically relays TCP segments from one connection to the other without examining the contents - Security function determines which connections will be allowed - Typically use is a situation in which the system administrator trusts the internal users

Crack Passwords

- Steal from: - Crack it (Guess, encrypt, compare with the stolen file, run through a dictionary of common passwords, use automated tools)

Password Cracking Defenses

- Strong password policy - Password filtering s/w to verify complexity of s/w - Use token-based authentication

Do Not Use Telnet/FTP

- Telnet/FTP has inherent security weaknesses - No encryption - Password easily sniffed - Shut it down

Multifaceted Extortion

- The act of leveraging multiple technologies to coerce victims into paying money (Ex: theft of sensitive data, public shaming, physical intimidation)

NetCat

- Tool for hackers - Reads and writes data across networks -Can allow hackers to transfer files -Scan Ports -Create Backdoors -Create Relays (Bounce a connection between systems)

Dual Homed Bastion Host

- Traffic between the Internet andother hosts on the private network HAS to flow through the bastion host

Reverse WWW Shell

- Tunneling used to hide data - Using one protocol to carry another - ex. E-mail carries html - Carries commands over http - Data looks like web traffic

Nmap Port Scanner

- Type of scan (intense, pingm quick, traceroute) - Can generate packets based from decoys (makes finding the hacker more difficult) - OS detection: based on fingerprints - (any open port is a potential entry point for the hacker and this scanner is used to find these entry points)

Defenses Against Reverse WWW Shell

- Use intrusion detection systems - Use anti-virus tools - Know what should be running on each m/c (investigate strange processes)

Maintaining Access

- Utilize Trojan Horses and Backdoors - Application level trojan horses (fool user into installing s/w, attacker can remotely access and control victim m/c, can be used for legitimate remote administration purposes) - Examples: remote desktop, VNC, chrome remote desktop, netcat

Single Homed Bastion Host

-Consists of: -packet-filtering router -Bastion Host -Only packets to and from the bastion host are allowed to pass through the router

Advantages of Single Homed Bastion Host

-Greater Security (an intruder must penetrate the packet-level and application level) -affords flexibility in providing direct internet access

Advantages of Screened Subnet Firewall System

-Three levels of defense to thwart intruders -The outside router advertises only the existence of the screened subnet to theInternet (internal network is invisible to the Internet) -The inside router advertises only the existence of the screened subnet to the internal network (the systems on the inside network cannot construct direct routes to the Internet)

Evil Corp

A cybercriminal group from Russia distributed malware infecting computers around the world

Phase 5 Hacking

Covering Tracks

Firewall Characteristics

Design goals: - all traffic must pass through the firewall - Only authorized traffic is allowed to pass - Immune to penetration (use of trusted system with a secure operating system)

Phase 3 Hacking

Gain access

Phase 4 Hacking

Maintaining Access

Phase 1 Hacking

Recon

Maksim Yakubets

Russian computer expert and alleged computer hacker. He is alleged to have been a member of the Evil Corp, Jabber Zeus Crew, as well as the alleged leader of the Bugat malware conspiracy

Phase 2 Hacking

Scanning


Set pelajaran terkait

Section 6: Financing Real Estate

View Set

Adult and Pediatric First Aid/CPR/AED

View Set

Intro to Computer Science Unit 1

View Set

International Business Midterm Exam

View Set

Spanish 1002- Indicativo vs. Subjuntivo

View Set

Tetracyclines, Macrolides, Clindamycin, Linezolid

View Set