Information security & EthicalHacking

Click here to load reader

download Information security & EthicalHacking

of 26

Transcript of Information security & EthicalHacking

Information Security & Ethical Hacking

Presented byAvinash.DSNIST15315A0430Information Security&Ethical Hacking

OverviewAPPLICATION -ATTACK TYPES ARP SpoofingBotnetCache PoisoningComputer WormKeyloggerMalwareMan in the Middle AttackRootkitSpoofing AttackSpyware

What is ARP Spoofing ? ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attackers MAC address with the IP address of a legitimate computer or server on the network. Once the attackers MAC address is connected to an authentic IP address, the attacker will begin receiving any data that is intended for that IP address. ARP spoofing can enable malicious parties to intercept, modify or even stop data in-transit. ARP spoofing attacks can only occur on local area networks that utilize the Address Resolution Protocol.

Types of ARP SpoofingDenial-of-service attacks: DoS attacks often leverage ARP spoofing to link multiple IP addresses with a single targets MAC address. As a result, traffic that is intended for many different IP addresses will be redirected to the targets MAC address, overloading the target with traffic.Session hijacking: Session hijacking attacks can use ARP spoofing to steal session IDs, granting attackers access to private systems and data.Man-in-the-middle attacks: MITM attacks can rely on ARP spoofing to intercept and modify traffic between victims.

ARP spoofing detection, prevention and protectionPacket filteringAvoid trust relationshipsUse ARP spoofing detection softwareUse cryptographic network protocols

What is a BotNet ?A botnet is a network of compromised computers under the control of a malicious actor. Each individual device in a botnet is referred to as a bot. A bot is formed when a computer gets infected with malware that enables third-party control. Bots are also known as zombie computers due to their ability to operate under remote direction without their owners knowledge. The attackers that control botnets are referred to as bot herders or bot masters.

BotNet exampleZeus is aTrojan horse for Windows that was created to steal bank information using botnets. First discovered in 2007, Zeus spread through email, downloads, and online messaging to users across the globe. Zeus botnets used millions of zombie computers to execute keystroke logging and form grabbing attacks that targeted bank data, account logins, and private user data. The information gathered by Zeus botnets has been used in thousands of cases of online identity theft, credit card theft, and more.

Botnet detection detection and preventionThey can be detected by:IRC traffic (botnets and bot masters use IRC for communications)Connection attempts with known C&C serversMultiple machines on a network making identical DNS requestsHigh outgoing SMTP traffic (as a result of sending spam)Unexpected popups (as a result of clickfraud activity)Slow computing/high CPU usageSpikes in traffic, especially Port 6667 (used for IRC), Port 25 (used in email spamming), and Port 1080 (used by proxy servers)Outbound messages (email, social media, instant messages, etc) that werent sent by the userProblems with Internet access

What is cache poisoning ?Cache poisoning is a type of attack in which corrupt data is inserted into the cache database of the Domain Name System (DNS) name server. The Domain Name System is a system that associates domain names with IP addresses. Devices that connect to the internet or other private networks rely on the DNS for resolving URLs, email addresses and other human-readable domain names into their corresponding IP addresses. In a DNS cache poisoning attack, a malicious party sends forged responses from an imposter DNS in order to reroute a domain name to a new IP address. This new IP address is almost always for a server that is controlled by the attacker. DNS cache poisoning attacks are often used to spreadcomputer worms and othermalware . More sophisticated uses for DNS cache poisoning includeman-in-the-middle attacks and denial-of-service attacks.

Cache poisoning preventionIn order to further prevent cache poisoning attacks, IT teams should configure their DNS name servers to:Limit recursive queries.Store only data related to the requested domain.Restrict query responses to only provide information about the requested domain.

Computer wormOften called Malicious software SYMPTOMS:Users should be familiar with the symptoms of a computer worm so that they can quickly recognize infections and begin the process of computer worm removal. Here are some of the typical symptoms of a computer worm:Slow computer performanceFreezing/crashingPrograms opening and running automaticallyIrregular web browser performanceUnusual computer behavior (messages, images, sounds, etc)Firewall warningsMissing/modified filesAppearance of strange/unintended desktop files or iconsOperating system errors and system error messagesEmails sent to contacts without the users knowledge

What is a Keylogger ?Keyloggersor keystroke loggers are software programs or hardware devices that track the activities (keys pressed) of a keyboard. Keyloggers are a form of spyware where users are unaware their actions are being tracked. Keyloggers can be used for a variety of purposes; hackers may use them to maliciously gain access to your private information, while employers might use them to monitor employee activities. Some keyloggers can also capture your screen at random intervals; these are known as screen recorders. Keylogger software typically stores your keystrokes in a small file, which is either accessed later or automatically emailed to the person monitoring your actions.

Functionality: KeyloggerRemote- access software keyloggers can allow access to locally recorded data from a remote location. This communication can happen by using one of the following methods:Uploading the data to a website, database or FTP server.Periodically emailing data to a predefined email address.Wirelessly transmitting data through an attached hardware system.Software enabling remote login to your local machine.Additional features that some software keyloggers come with can capture additional information without requiring any keyboard key presses as input. They include:Clipboard logging Anything that can be copied to the clipboard is captured.Screen logging Randomly timed screenshots of your computer screen are logged.Control text capture The Windows API allows for programs to request the text value of some controls, meaning that your password may be captured even if behind a password mask (the asterisks you see when you type your password into a form).Activity tracking Recording of which folders, programs and windows are opened and also possibly screenshots of each.Recording of search engine queries, instant message conversations, FTP downloads along with any other internet activities.

Detection and removal:There are a variety of ways to detect a keylogger, though none are a catchall, so if you have reason to suspect your computer has a keylogger, we recommend trying a variety of these tactics:Begin by running your antivirus, which can often detect a keylogger on your system.Run a program like Spybot Search and Destroy or MalwareBytes to check for certain types.Check your task list by pressing ctrl+alt+del in Windows. Examine the tasks running, and if you are unfamiliar with any of them, look them up on a search engine.Scan your hard disk for the most recent files stored. Look at the contents of any files that update often, as they might be logs.Use your system configuration utility to view which programs are loaded at computer start-up. You can access this list by typing msconfig into the run box.

What is MITM ? Man-in-the-middle is a type of eavesdropping attack that occurs when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems.A MITM attack exploits the real-time processing of transactions, conversations or transfer of other data.Man-in-the-middle attacks allow attackers to intercept, send and receive data never meant to be for them without either outside party knowing until it is too late.

What is a Rootkit ?A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words "root" and "kit." Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the Admin account on Unix and Linux systems, and kit refers to the software components that implement the tool. Today rootkits are generally associated with malware such as Trojans, worms, viruses that conceal their existence and actions from users and other system processes.

Functionality and DetectionWhat Can a Rootkit Do?A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infected computer can also access log files and spy on the legitimate computer owners usage.Rootkit DetectionIt is difficult to detect rootkits. There are no commercial products available that can find and remove all known and unknown rootkits. There are various ways to look for a rootkit on an infected machine. Detection methods include behavioral-based methods (e.g., looking for strange behavior on a computer system), signature scanning and memory dump analysis. Often, the only option to remove a rootkit is to completely rebuild the compromised system.

Well-known Rootkit examplesLane Davis and Steven Dake - wrote the earliest known rootkit in the early 1990s.NTRootkit one of the first malicious rootkits targeted at Windows OS.HackerDefender this early Trojan altered/augmented the OS at a very low level of functions calls.Machiavelli - the first rootkit targeting Mac OS X appeared in 2009. This rootkit creates hidden system calls and kernel threads.Greek wiretapping in 2004/05, intruders installed a rootkit that targeted Ericsson's AXE PBX.Zeus, first identified in July 2007, is a Trojan horse that steals banking information by man-in-the-browser keystroke logging and form grabbing.Stuxnet - the first known rootkit for industrial control systemsFlame - a computer malware discovered in 2012 that attacks computers running Windows OS. It can record audio, screenshots, keyboard activity and network traffic.

SpywareSpyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind ofmalware that secretly gathers information about a person or organization and relays this data to other parties. In some cases, these may be advertisers or marketing data firms, which is why spyware is sometimes referred to as adware. It is installed without user consent by methods such as a drive-by download, a trojan included with a legitimate program or a deceptive pop-up window

Signs of spywareSigns of a spyware infection can include unwanted behaviors and degradation of system performance. It can eat up CPU capacity, disk usage and network traffic. Stability issues such as applications freezing, failure to boot, difficulty connecting to the internet and system crashes are also common.