System Security.ppt
《System Security.ppt》由会员分享,可在线阅读,更多相关《System Security.ppt(76页珍藏版)》请在麦多课文档分享上搜索。
1、System Security,Prabhaker Mateti Wright State University,A Few Assessments ,SysSec/SIAC2003,Mateti/WrightStateU,3,Top 20 Vulnerabilities/ NIPC+FBI+SANS (May 29, 2003),W1 Internet Information Services (IIS) W2 MDAC Remote Data Services W3 Microsoft SQL Server W4 NETBIOS - Unprotected Networking Share
2、s W5 Anonymous Logon - Null Sessions W6 LAN Manager Authentication - Weak LM Hashing W7 No Passwords or Weak Passwords W8 Internet Explorer W9 Remote Registry Access WA Windows Scripting Host,SysSec/SIAC2003,Mateti/WrightStateU,4,Top 20 Vulnerabilities/ NIPC+FBI+SANS (May 29, 2003),U1 RPC Remote Pro
3、cedure Calls U2 Apache Web Server U3 Secure Shell (SSH) U4 SNMP U5 File Transfer Protocol (FTP) U6 R-Services - Trust Relationships U7 Line Printer Daemon (LPD) U8 Sendmail U9 BIND/DNS UA No Passwords or Weak Passwords,SysSec/SIAC2003,Mateti/WrightStateU,5,Threats To The National Infrastructures (De
4、fense Science Board),Incomplete, inquisitive and unintentional blunders. Hackers driven by technical challenges. Disgruntled employees or customers seeking revenge. Criminals interested in personal financial gain or stealing services. Organized crime with the intent of hiding something or financial
5、gain. Organized terrorist groups attempting to influence U.S. policy by isolated attacks. Foreign espionage agents seeking to exploit information for economic, political, or military purposes. Tactical countermeasures intended to disrupt specific weapons or command structures. Multifaceted tactical
6、information warfare applied in a broad orchestrated manner to disrupt a major U.S. military mission. Large organized groups or nation-states intent on overthrowing the United States.,Just the facts Madam,SysSec/SIAC2003,Mateti/WrightStateU,7,Security Incidents / CERT,76,404 Jan June 2003 82,094 all
7、of 2002“CERT uses the word “incident“ as an administrative term that groups together any related set of activities; for example, activities in which the same tool or exploit is used by an intruder. A single “incident“ can involve anything from a single host computer to a very large number of host co
8、mputers, at a single site or at hundreds of thousands of sites.”,SysSec/SIAC2003,Mateti/WrightStateU,8,Number of Hosts in the DNS (isc.org Internet Domain Survey, Jan 2003),Jan 2003 171,638,297Jul 2002 162,128,493Jan 2002 147,344,723Jul 2001 125,888,197Jan 2001 109,574,429Jul 2000 93,047,785Jan 2000
9、 72,398,092,SysSec/SIAC2003,Mateti/WrightStateU,9,Terms ,SysSec/SIAC2003,Mateti/WrightStateU,11,“So you got r00ted.,Your machine has been compromised. root = administrator = super-user An unauthorized user has obtained root privileges. A rootkit may have been installed. Forensic analyses made with t
10、ools existing on that system are unreliable.,SysSec/SIAC2003,Mateti/WrightStateU,12,Denial of Service (DoS),We think of computer systems as providing services to authorized users. When a system is deliberately made to crash, or made to run legitimate users programs so very slowly that it is unusable
11、, we refer to it as a “denial of service attack.“ The attacker accomplishes this by running certain cleverly composed programs, and is pre-aware of the consequences.,SysSec/SIAC2003,Mateti/WrightStateU,13,Black Hats v. White Hats,Black hats are the “bad“ guys in that they use their knowledge to unau
12、thorizedly break into even more systems, and pass their knowledge to other insiders. White hats are the “good“ guys: they are mostly into forensics and prevention of attacks.,SysSec/SIAC2003,Mateti/WrightStateU,14,Vulnerability, ,Vulnerability: A weakness that can be exploited to cause damage. Attac
13、k: A method of exploiting a vulnerability. Threat: A motivated, capable adversary that mounts attacks.,SysSec/SIAC2003,Mateti/WrightStateU,15,Hacker v. Attacker v. Intruder,Hacker = One who programs enthusiastically, even obsessively. An expert at a particular program, as in a Unix hacker. A hacker
14、enjoys exploring the details of programmable systems and how to stretch their capabilities. A hacker has ethics.,SysSec/SIAC2003,Mateti/WrightStateU,16,Viruses,Viruses are “programs“ that modify other programs on a computer, inserting copies of themselves. Viruses are not officially programs: They c
15、annot run on their own. Need to have some host program. When the host program is run, the virus runs.,SysSec/SIAC2003,Mateti/WrightStateU,17,Structure of Viruses,V() infectExecutable(); if (triggered() doDamage();jump to main of infected program; void infectExecutable() file = chose an uninfected ex
16、ecutable file; prepend V to file; void doDamage() . int triggered() return (some test? 1 : 0); ,SysSec/SIAC2003,Mateti/WrightStateU,18,Worms,Worms are programs that propagate from computer to computer on a network. Worms can run independently. Worms may have (different) portions of themselves runnin
17、g on many different machines. Worms do not change other programs, although they may carry other code that does.,SysSec/SIAC2003,Mateti/WrightStateU,19,Trojans,A Trojan mimics the functionality of its namesake legitimate program. But has a hidden “agenda.” Ex: wu-ftpd Trojan - Login with specific use
18、r/password gives a root shell.,SysSec/SIAC2003,Mateti/WrightStateU,20,Backdoors,Also called trap doors. Allow unauthorized access to a system. The absence of backdoors cannot be established.,SysSec/SIAC2003,Mateti/WrightStateU,21,Malware,Viruses + Worms + Trojans + Any “program” that has a “maliciou
19、s” intent ,SysSec/SIAC2003,Mateti/WrightStateU,22,System Security,“System Security” = Computer Security + Network Security + Internet SecurityTrojan Horses, Viruses and Worms Privacy and Authentication TCP/IP exploits Firewalls Secure Configuration of Personal Machines Buffer Overflow and Other Bug
20、Exploitation Writing Bug-free and Secure Software Secure e-Commerce Transactions ,Current practices, and their problems,SysSec/SIAC2003,Mateti/WrightStateU,24,Improper Configuration,Out of the box installations are rarely properly configured. Standard user accounts with standard passwords. Running u
21、nneeded services. Leaving sensitive files read/write-open.,SysSec/SIAC2003,Mateti/WrightStateU,25,Fortification,Start with a properly configured system. Delete weak or unneeded components. Add protective layers. Keep detailed logs.,SysSec/SIAC2003,Mateti/WrightStateU,26,Hardened OS,Often “equated” w
22、ith fortification. Rebuilding an OS from the same source code but by using a more rigorous compiler. Redesigning portions of an OS. Statically v. dynamically configured.,SysSec/SIAC2003,Mateti/WrightStateU,27,Rootkits,“A rootkit is a collection of tools and utilities that attackers use to hide their
23、 presence and gather data to help them infiltrate further across the network. Rootkits insert backdoors, install Trojans, and patch existing programs. A rootkit may disable auditing when a certain user is logged on. A rootkit could allow anyone to log in if a certain backdoor password is used. A roo
24、tkit could patch the kernel itself, allowing anyone to run privileged code if they use a special filename Installed after the attacker gains access. Cannot be detected by firewalls or anti-virus scanners. 203 results for search “rootkit on www.packetstormsecurity.org,SysSec/SIAC2003,Mateti/WrightSta
25、teU,28,Rootkits,“Rootkit” was originally a Unix term, derived from the word “root”. Unix rootkits typically replace system binaries with trojaned binaries. The trojaned binaries hide the attacker activities,SysSec/SIAC2003,Mateti/WrightStateU,29,Windows Rootkit,A Windows rootkit typically replaces A
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- SYSTEMSECURITYPPT
