Internet security

233 views
200 views

Published on

basic info,+advanced attacks

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
233
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Internet security

  1. 1. Internet security<br />By,Prashantgohel<br />09bce014<br />
  2. 2. some basic threats<br />Virus: virus attempts to install it self on victim’s computer. Its main aim that these infected files will be transmitted to another system.<br />Worm: working of worm is similar to the virus. But key diffrence is worm propogate it self without user involvement.<br />
  3. 3. Contiunue..<br />Rootkit: it is a piece off software ,after installing it self on computer it opens up a port to allow hacker to communicate with it & take full control of system.<br />Scanner: it interrogate machineon the internet to get information about system.<br />
  4. 4. Advanced threats<br />Ipspoofing<br />Session hijacking<br />Network sniffer<br />Back orifice<br />Botnet-attacks<br />Anti forensic techniques<br />
  5. 5. Some basic fundamentals <br />
  6. 6. Dns<br />What is dns ?<br /> Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses, Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. <br />
  7. 7. Application <br />A lookup mechanism for translating objects into other objects<br />A globally distributed, loosely coherent, scalable, reliable, dynamic database<br />Comprised of three components<br /><ul><li>A “name space”
  8. 8. Servers making that name space available
  9. 9. Resolvers (clients) which query the servers about the name space</li></li></ul><li>Features of dns<br />Data is maintained locally, but retrievable globally<br />No single computer has all DNS data<br />DNS lookups can be performed by any device<br />Remote DNS data is locally cachable to improve performance<br />The database is always internally consistent<br />Each version of a subset of the database (a zone) has a serial number<br />The serial number is incremented on each database change<br />Changes to the master copy of the database are replicated according to timing set by the zone administrator<br />
  10. 10. Some basic fundamentals<br />How TCP connects<br />data flows across the Internet encapsulated within individual data packages ,to manage the uncertainity packet.<br />Before packets of data can begin flowing from end-to-end over a TCP "connection" the endpoints must exchange their initial packet sequence numbers .<br />
  11. 11. Continue..<br />
  12. 12. Continue… <br />To begin establishing a connection, the Client chooses an Initial Sequence Number (Client ISN = CISN) for the packets, & sends its CISN in a packet .<br />When the Server receives the "SYN" packet it knows that a new TCP connection is being requested. So it sets aside some of its RAM memory to hold the details of this new connection. The Client ISN (CISN) contained in the SYN packet is saved in this memory block along with the Client's "Source IP" address and "Source Port" number. <br />
  13. 13. Continue…<br />For the next step in TCP connection handshaking, our Server chooses its own Initial Sequence Number for the packets it will be sending. It sends this Server ISN (SI<br />The third and final step in our 3-Way TCP connection handshake requires our Client to acknowledge the receipt of the Server's ISN.SN) back to the Client machine .<br />
  14. 14. Ipspoofing<br />a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.<br />Many of the protocols in the TCP/IP suite do not provide mechanisms for authenticating the source or destination of a message. They are thus vulnerable to spoofing attacks when extra precautions are not taken by applications to verify the identity of the sending or receiving host. IP spoofing and ARP spoofing in particular may be used to leverage man-in-the-middle attacks against hosts on a computer network. <br />
  15. 15. Ipspoofing<br />
  16. 16. Ipspoofing..<br />small network of 3 peoples (Tony, Mark & Shane) sharing a single Internet Connection. All three computers are connected to a switch.<br />
  17. 17. Continue..<br /> Now, Shane wants to monitor the traffic of two of his other staff.<br />to change his computer’s MAC address (11:22:3F:7E:F1:25) to the MAC Address of the Modem/Router (01:1B:22:FF:25:01).<br />
  18. 18. Continue…<br />Switch MAC Table is updated with Router’s MAC address for both Shane computer (10.1.1.3) and the Router (10.1.1.254). Now when Tony tries to connect to Internet, Switch receives the data packet and looks into its MAC Table. Then it forwards the data packet to both Router and Shane Computer. <br />
  19. 19. Session hijacking<br />What is session hijacking?<br />Session Hijacking is the process of taking over a existing active session.reason for this is to bypass the authentication process and gain the access to the machine. Since the session is already active so there is no need of re-authenticating and the hacker can easily access the resources and sensitive information<br />
  20. 20. Continue…<br />Types of session hijacking<br />(1)passive hacking<br />(2)active hacking<br />Active hijacking:n Active attack, hacker finds the active session and takes over it. This is done by forcing one of the parties offline which is usually achieved by DDOS attack (Distributed Denial of service attack).<br />Now the hacker takes control over the active session and executes the commands on the system that either give him the seor allow him to login at later time.<br />
  21. 21. Continue…<br />Passive session hijacking:In Passive attack, the hacker Hijacks a session, but just sits back and watches and records all the traffic that is being sent from the computer or received by the computer. This is useful for finding the sensitive information like username passwords of websites, <br />
  22. 22. Continue..<br />
  23. 23. Botnet attack<br />What is bot?<br />Internet bots, also known as web robots, WWW robots or simply bots, are software applications that run automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone.<br />
  24. 24. How Botnets Work<br />Elements of a botnet<br />Botmaster<br />A collection of compromised computers<br />Controlled remotely by crackers.<br />Command and control infrastructure.<br />IRC remains the most popular botnet control method.<br />
  25. 25. How Botnets Work<br />Botmaster exploits the vulnerability on the victim.<br />The victim downloads the actual bot binary. <br />Bot contact the IRC server address in the executable, including resolving the DNS name.<br />The bot joins an IRC channel.<br />The botmaster sends out commands via IRC channel.<br />
  26. 26. Botnet Detection<br />IRC botnet<br />IRC port, may be on non-standard port<br />Monitor IRC payload for known command<br />Behavioral characteristics <br />Response <br />Constant response time, fast join<br />Long standing connection<br />Bots are not talkative<br />Machine learning techniques<br />Using labeled data to build classifier.<br />Track the botnet by honeypot<br />Use honeypot to get infected<br />
  27. 27. Control and Command Infrastructure<br />IRC-based <br />P2P botnet<br />Servent bots<br />Client bots<br />Communicate via peer list.<br />Only servent bots are in peer list<br />Avoid single point of failure.<br />
  28. 28. Denial of Service Attacks<br />Denial of Service Attack:an attack on a computer or network that prevents legitimate use of its resources.[1]<br />DoS Attacks Affect:<br />Software Systems<br />Network Routers/Equipment/Servers<br />Servers and End-User PCs<br />
  29. 29. Classification of DoS Attacks<br />
  30. 30. Distributed Denial of Service Attacks<br />As Defined by the World Wide Web Security FAQ:A Distributed Denial of Service (DDoS) attack uses many computers to launch a coordinated DoS attack against one or more targets. Using client/server technology.<br />Typically a DDoS master program is installed on one computer using a stolen account. <br />
  31. 31. procedure<br />The master program, at a designated time, then communicates to any number of "agent" programs, installed on computers anywhere on the internet. The agents, when they receive the command, initiate the attack. Using client/server technology, the master program can initiate hundreds or even thousands of agent programs within seconds<br />
  32. 32. Ddosarchietecture<br />
  33. 33. Thank you<br />Question?<br />

×