Hackers英语ppt展示

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Gaining access
• Front door
– Password guessing – Password/key stealing
• Back doors
– Often left by original developers as debug and/or diagnostic tools – Forgot to remove before release
• Denial of Service (Yahoo, eBay, CNN, MS) • Defacing, Graffiti, Slander, Reputation • Loss of data (destruction, theft) • Divulging private information (AirMiles,
• Trojan Horses
– Usually hidden inside of software that we download and install from the net (remember nothing is free)
– Many install backdoors
• Software vulnerability exploitation
– examine packets for suspicious activity – can integrate with firewall – require one dedicated IDS server per segment
Intrusion detection systems (IDS)
– Often advertised on the OEMs web site along with security patches – Fertile ground for script kiddies looking for something to do
Back doors & Trojans
Password/key theft
• Dumpster diving
– Its amazing what people throw in the trash
• Personal information • Passwords • Good doughnuts
– Many enterprises now shred all white paper trash
• e.g. Whack-a-mole / NetBus • Cable modems / DSL very vulnerable • Protect with Virus Scanners, Port Scanners,
Personal Firewalls
Software vulnerability exploitation
Hackers, Crackers, and Network Intruders
科普五班 第一组
李文轩 何平 罗敏 刘盼 王尧 杨延超
Content
• Hackers and their vocabulary • Threats and risks • Types of hackers • Gaining access • Intrusion detection and prevention
while web database was undergoing maintenance) • 2019 Code Red
– exploited bug in MS IIS to penetrate & spread – probes random IPs for systems running IIS – had trigger time for denial-of-service attack – 2nd wave infected 360000 servers in 14 hours • Code Red 2 - had backdoor installed to allow remote control
– Real criminals, are in it for whatever they can get no matter who it hurts
• Corporate Spies
– Are relatively rare
• Disgruntled Employees
– Most dangerous to an enterprise as they are “insiders” – Since many companies subcontract their network services a
• Host-based IDS
– monitors logs, events, files, and packets sent to the host
• Nimda -used multiple infection mechanisms email, shares, web client, IIS
• 2019 – Slammer Worm brings web to its knees by attacking MS SQL Server
The threats
• Modify files
– To let you know they were there – To cause mischief
• Install back doors
– So they can get in again
• Attack other systems
Intrusion detection systems (IDS)
– To cover their tracks – To mess with you
• Steal files
– Sometimes destroy after stealing – A pro would steal and cover their tracks so to be undetected
• Inside jobs
– Disgruntled employees – Terminated employees (about 50% of intrusions
resulting in significant loss)
Once inside, the hacker can...
• Modify logs
– To get free stuff – Impress their peers – Not get caught
• Underemployed Adult Hackers
– Former Script Kiddies
• Can’t get employment in the field • Want recognition in hacker community • Big in eastern european countries
disgruntled vendor could be very dangerous to the host enterprise
Top intrusion justifications
• I’m doing you a favor pointing out your vulnerabilities • I’m making a political statement • Because I can • Because I’m paid to do it
• Ideological Hackers
– hack as a mechanism to promote some political or ideological purpose – Usually coincide with political events
Types ofቤተ መጻሕፍቲ ባይዱHackers
• Criminal Hackers
• Professional hackers
– Black Hats – the Bad Guys – White Hats – Professional Security Experts
• Script kiddies
– Mostly kids/students
• User tools created by black hats,
• Buffer overruns • HTML / CGI scripts • Poor design of web applications
– Javascript hacks – PHP/ASP/ColdFusion URL hacks
• Other holes / bugs in software and services • Tools and scripts used to scan ports for vulnerabilities
• Vulnerability scanners
– pro-actively identifies risks – User use pattern matching
• When pattern deviates from norm should be investigated
• Network-based IDS
Password guessing
• Default or null passwords • Password same as user name (use finger) • Password files, trusted servers • Brute force
– make sure login attempts audited!
network traffic so that it can’t respond anymore • Port Scanning - searching for vulnerabilities
Hacking through the ages
• 1969 - Unix ‘hacked’ together • 1971 - Cap ‘n Crunch phone exploit discovered • 1988 - Morris Internet worm crashes 6,000 servers • 1994 - $10 million transferred from CitiBank accounts • 2019 - Kevin Mitnick sentenced to 5 years in jail • 2000 - Major websites succumb to DDoS • 2000 - 15,700 credit and debit card numbers stolen from Western Union (hacked
• A lot of research going on at universities
– Doug Somerville- EE Dept, Viktor Skorman – EE Dept
• Big money available due to 9/11 and Dept of Homeland Security
Hacker Terms
• Hacking - showing computer expertise • Cracking - breaching security on software or systems • Phreaking - cracking telecom networks • Spoofing - faking the originating IP address in a datagram • Denial of Service (DoS) - flooding a host with sufficient
corporate espionage, personal financial) • Loss of financial assets (CitiBank)
CIA.gov defacement example
Web site defacement example
Types of hackers
相关文档
最新文档