Your SlideShare is downloading. ×
0
Internet Attack
Internet Attack
Internet Attack
Internet Attack
Internet Attack
Internet Attack
Internet Attack
Internet Attack
Internet Attack
Internet Attack
Internet Attack
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Internet Attack

1,028

Published on

Attack Through Internet, File Transfer, Picture Download, Data Transfer With CD, DVD, USB Devices

Attack Through Internet, File Transfer, Picture Download, Data Transfer With CD, DVD, USB Devices

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,028
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Internet Attack David Kyaw Aung
  • 2. Attack & Defense <ul><li>Hack Attack Phase </li></ul><ul><li>Firewall Type </li></ul><ul><li>Current Firewall </li></ul><ul><li>Filter Type </li></ul><ul><li>Point of Attack </li></ul><ul><li>Remote Access </li></ul><ul><li>Ten Top Vulnerabilities to Windows System </li></ul><ul><li>Ten Top Vulnerabilities to Unix System </li></ul>
  • 3. Hack Attack Phase <ul><li>Reconnaissance </li></ul><ul><li>Scanning </li></ul><ul><li>Gaining Access </li></ul><ul><li>Maintaining Access </li></ul><ul><li>Covering Track </li></ul>
  • 4. Firewall Type <ul><li>Embedded </li></ul><ul><li>Enterprise Software Based </li></ul><ul><li>Enterprise Hardware Based </li></ul><ul><li>SOHO Software </li></ul><ul><li>SOHO Hardware </li></ul><ul><li>Specialty </li></ul>
  • 5. Firewall Category <ul><li>Packet Filtering </li></ul><ul><li>Proxy Service </li></ul><ul><li>Stateful Inspection </li></ul>
  • 6. Current Firewall <ul><li>Agnitum Outpost Firewall 1.0.16 </li></ul><ul><li>Subseven Firewall 1.0 </li></ul><ul><li>Sygate Personal Firewall 5.0.1137 </li></ul><ul><li>Tiny Personal Firewall 2.0.15 </li></ul><ul><li>Zone Alarm 3.1.395 </li></ul>
  • 7. Filter Type <ul><li>IP Addresses </li></ul><ul><ul><li>32 bit-number, four octets: 216.27.61.137 </li></ul></ul><ul><li>Domain Names </li></ul><ul><ul><li>www.howstuffworks.com : 216.27.61.137 </li></ul></ul><ul><li>Protocols </li></ul><ul><ul><li>IP, TCP, HTTP, FTP, UTP, ICMP, SMTP, SNTP, Telnet </li></ul></ul><ul><li>Ports </li></ul><ul><ul><li>Web Server Port:80, FTP Server Port:21 </li></ul></ul><ul><li>Specific Words & Phases </li></ul><ul><ul><li>X-Rated </li></ul></ul>
  • 8. Point of Attack <ul><li>Remote login </li></ul><ul><li>Application Backdoors </li></ul><ul><li>SMTP Session Hijacking </li></ul><ul><li>Operating System Bugs </li></ul><ul><li>Denial of Service </li></ul><ul><li>Email Bombs </li></ul><ul><li>Macros </li></ul><ul><li>Viruses </li></ul><ul><li>Spam </li></ul><ul><li>Cookies </li></ul><ul><li>Redirect Bombs </li></ul><ul><li>Source Routing </li></ul>
  • 9. Remote Access <ul><li>Web Site </li></ul><ul><li>Online Business </li></ul><ul><li>FTP Download & Upload Area </li></ul>
  • 10. Top Ten Vulnerabilities to Windows System <ul><li>W1: Internet Information Services (IIS) </li></ul><ul><li>W2: Microsoft Data Access Components (MDAC) – Remote Data Services </li></ul><ul><li>W3: Microsoft SQL Server </li></ul><ul><li>W4: NETBIOS – Unprotected Windows Network Shares </li></ul><ul><li>W5: Anonymous Logon – Null Sessions </li></ul><ul><li>W6: LAN Manager Authentication – accounts with No or Weak Passwords </li></ul><ul><li>W7: Windows Authentication – accounts with No or Weak Passwords </li></ul><ul><li>W8: Internet Explorer </li></ul><ul><li>W9: Remote Registry Access </li></ul><ul><li>W10: Windows Scripting Host </li></ul>
  • 11. Top Ten Vulnerabilities to Unix System <ul><li>U1: Remote Procedure Calls (PRC) </li></ul><ul><li>U2: Apache Web Server </li></ul><ul><li>U3: Secure Shell (SSH) </li></ul><ul><li>U4: Simple Network Management Protocol (SNMP) </li></ul><ul><li>U5: File Transfer Protocol (FTP) </li></ul><ul><li>U6: R-Services – Trust Relationship </li></ul><ul><li>U7: Line Printer Daemon (LPD) </li></ul><ul><li>U8: Sendmail </li></ul><ul><li>U9: BIND/DNS </li></ul><ul><li>U10: Unix Authentication – Accounts with No or Weak Passwords </li></ul>

×