Day3

23
Securing and Optimization of Linux Servers and Hacking Techniques

description

Network Security and Hacking Techniques

Transcript of Day3

Page 1: Day3

Securing and Optimization of Linux Servers

and Hacking Techniques

Page 2: Day3

Securing and optimization of Linux Server and Hacking Techniques

Introduction

“The Linux Based Services that Mean Business Securing Internet”

Page 3: Day3

Securing and optimization of Linux Server and Hacking Techniques

Network-Level Attacks

Session Hijacking:

Page 4: Day3

Securing and optimization of Linux Server and Hacking Techniques

Network-Level Attacks(Cont…)

Packet Sniffing:

Packet sniffer is a piece of software that grabs all of the traffic flowing

Dsniff –n –i 1

Page 5: Day3

Securing and optimization of Linux Server and Hacking Techniques

Gathering and Parsing Packets

DNS Cache Poisoning

DNS ID Spoofing

DNS Hides Poisoning

Page 6: Day3

Securing and optimization of Linux Server and Hacking Techniques

Gathering and Parsing Packets (Cont..)

The ARP Cache poisoning:

Page 7: Day3

Securing and optimization of Linux Server and Hacking Techniques

Gathering and Parsing Packets (Cont..)

IP Address Spoofing Variations

Page 8: Day3

Securing and optimization of Linux Server and Hacking Techniques

Denial of Service Attacks

TCP Connections

Page 9: Day3

Securing and optimization of Linux Server and Hacking Techniques

Denial of Service Attacks (Cont…)

Abusing TCP:  The Traditional SYN Flood

Page 10: Day3

Securing and optimization of Linux Server and Hacking Techniques

Denial of Service Attacks (Cont…)

The Development of Bandwidth Attacks

Page 11: Day3

Securing and optimization of Linux Server and Hacking Techniques

Denial of Service Attacks (Cont…)

DOS

Page 12: Day3

Securing and optimization of Linux Server and Hacking Techniques

Denial of Service Attacks (Cont…)

DDOS

Page 13: Day3

Securing and optimization of Linux Server and Hacking Techniques

Denial of Service Attacks (Cont…)

Distributed Reflection DOS

Page 14: Day3

Securing and optimization of Linux Server and Hacking Techniques

Denial of Service Attacks (Cont…)

Packet path diffusion

Page 15: Day3

Securing and optimization of Linux Server and Hacking Techniques

Denial of Service Attacks (Cont…)

Diffusing the path

Page 16: Day3

Securing and optimization of Linux Server and Hacking Techniques

Web Application Attacks

Web Spoofing

SQL Injection: Manipulating Back-end Databases

Cross-Site Scripting

Page 17: Day3

Securing and optimization of Linux Server and Hacking Techniques

Operating System and Application-Level Attacks

Password Cracking With  L0phtCrack

Buffer Overflows in Depth

Examples of remote root exploit through buffer overflow

Root Kits

Page 18: Day3

Securing and optimization of Linux Server and Hacking Techniques

Operating System and Application-Level Attacks

Buffer Overflows in Depth

Stuffing more data into a buffer than it can handle

Overwrites the return address of a function

Switches the execution flow to the hacker code

Page 19: Day3

Securing and optimization of Linux Server and Hacking Techniques

Operating System and Application-Level Attacks

Process Memory Region

Page 20: Day3

Securing and optimization of Linux Server and Hacking Techniques

Operating System and Application-Level Attacks

Examples of remote root exploit through buffer overflow

QPOP 3.0beta AUTH remote root stack overflow

BIND 8.2 - 8.2.2 remote root exploit

Page 21: Day3

Securing and optimization of Linux Server and Hacking Techniques

Operating System and Application-Level Attacks

Root Kits

Rootkit name are combination from two words, “root and “kit”

collection of tools that enable attacker to keep the root power

Type of Rootkit

Application rootkit - established at the application layer.

Kernel rootkit - establish more deep into kernel layer.

Page 22: Day3

Securing and optimization of Linux Server and Hacking Techniques

Application Rootkit

Programs replace to hide attacker presence.

Examples ls,ps,top,du,find,ifconfig,lsof

Network Daemons with backdoor

Sniffer Program

Kernel Rootkit

Hiding processes.

Hiding files

Hiding the sniffer.

Hiding the File System

Operating System and Application-Level Attacks

Page 23: Day3

.999