SlideShare a Scribd company logo
CYBER SECURITY-
TUTORIAL1
From: Sweta Dargad
Assistant Professor
NTC
SYSTEMS VULNERABILITY AND
SCANNING
1. Explain what is vulnerability.
2. List various types of vulnerability and explain briefly.
3. What is a port and explain how many ports are used regularly?
4. List various port numbers known.
5. Explain Packet Sniffing.
6. List down packet sniffers.
7. What is TCPdump and Windump.
WHAT IS VULNERABILITY.
In computer security, a vulnerability is a weakness which allows an
attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements:
a system susceptibility or flaw
 attacker access to the flaw
 and attacker capability to exploit the flaw.
Vulnerability is a ‘hole‘ in any software, operating system or service,
that can be exploited by web criminals for their own benefits.
A SECURITY VULNERABILITY IS A WEAKNESS IN A PRODUCT THAT COULD ALLOW
AN ATTACKER TO COMPROMISE THE INTEGRITY, AVAILABILITY, OR
CONFIDENTIALITY OF THAT PRODUCT.
Integrity of Product: means trustworthiness. If the above weakness is
bad enough that it allows exploiters to misuse it, the product is not
integrated enough. There is a question mark as to how safe is the
product.
Availability of the Product: again refers to the weakness whereby an
exploiter can take over the product and deny access to it for
authorized users.
Confidentiality of the Product: is keeping the data secure. If the bug
in the system allows for unauthorized people to collect others’ data,
it is termed vulnerability.
HAZARDS OF VULNERABILITY
To exploit a vulnerability, an attacker
must have at least one applicable tool
or technique that can connect
to a system weakness
EXAMPLES OF VULNERABILITIES
1. Buffer overflow
2. Lack of input validation
3. Lack of sufficient logging mechanism
4. Fail-open error handling
5. Not closing the database connection properly
6. Integer overflow
7. Format string vulnerability
8. Access Control Problems
BUFFER OVERFLOW
Buffer overflows can cause applications to crash, can compromise
data, and can provide an attack vector for further privilege escalation
to compromise the system on which the application is running.
Any application or system software that takes input from the user,
from a file, or from the network has to store that input, at least
temporarily.
stack—stores data that is specific to a single call to a particular
function, method, block, or other equivalent construct.
heap—General purpose storage for an application. Data stored in the
heap remains available as long as the application is running
Buffer overflow attacks generally occur by compromising either the
stack, the heap, or both.
LACK OF INPUT VALIDATION
As a general rule, you should check all input received by your
program to make sure that the data is reasonable
Any input received by your program from an untrusted source is a
potential target for attack. (In this context, an ordinary user is an
untrusted source.)
text input fields
commands passed through a URL used to launch the program
audio, video, or graphics files
command line input
Hackers look at every source of input to the program and attempt to
pass in malformed data. If the program crashes or misbehaves, the
hacker tries to find a way to exploit the problem. Example:
“jail break” iPhones
ACCESS CONTROL PROBLEMS
Access control is the process of controlling who is allowed to do what.
This ranges from controlling physical access to a computer
keeping your servers in a locked room,
for example—to specifying who has access to a resource (a file, for example)
and what they are allowed to do with that resource (such as read only).
Many exploits involve an attacker somehow gaining more privileges than
they should have.
Privileges, also called permissions, are access rights granted by the
operating system, controlling who is allowed to read and write files,
directories, and attributes of files and directories (such as the permissions
for a file), who can execute a program, and who can perform other restricted
operations such as accessing hardware devices and making changes to the
network configuration
Such an attack caused by this vulnerability is PRIVILEGE ESCALTION which is
also a step in hacking
WHAT IS A PORT
In computer networking, a port serves as an endpoint in an
operating system for many types of communication. It is not a
hardware device, but a logical construct that identifies a service or
process.
A port is always associated with an IP address of a host and the
protocol type of the communication, and thus completes the
destination or origination address of a communications session.
A port is identified for each address and protocol by a 16-bit
number, commonly known as the port number.
CLASSIFICATION OF PORTS
The Internet Assigned Numbers Authority (IANA) is responsible for
the global coordination of the DNS Root, IP addressing, and other
Internet protocol resources. This includes the registration of
commonly used port numbers for well-known Internet services.
The port numbers are divided into three ranges:
1. Well-known ports: The well-known ports (also known as system
ports) are those from 0 through 1023.
2. Registered ports: Ports 1024-49151 - Registered port: vendors
use for applications
3. the dynamic or private ports :Ports >49151 are the port numbers
that are available for use by any application to use in
communicating with any other application, using TCP or UDP.
PACKET SNIFFING
A packet sniffer, sometimes referred to as a network monitor or
network analyzer, can be used legitimately by a network or system
administrator to monitor and troubleshoot network traffic.
Using the information captured by the packet sniffer, an
administrator can identify erroneous packets and use the data to
pinpoint bottlenecks and help maintain efficient network data
transmission.
The packet sniffer is also capable of capturing ALL packets
traversing the network regardless of destination.
By placing a packet sniffer on a network in promiscuous mode, a
malicious intruder can capture and analyze all of the network traffic.
Within a given network, username and password information is
generally transmitted in clear text which means that the information
would be viewable by analyzing the packets being transmitted.
PACKET SNIFFERS
A Packet Sniffer is also known as packet analyzer is a computer
program or piece of computer hardware that can intercept and log
traffic that passes over a digital network or part of a network.
As data streams flow across the network, the sniffer captures each
packet and, if needed, decodes the packet's raw data, showing the
values of various fields in the packets.
1. Wireshark
2. WinPcap
3. Packetyzer
4. Ip Sniffer
5. CommView
TCPDUMP AND WINDUMP
tcpdump is a common packet analyzer that runs under the command
line. It allows the user to display TCP/IP and other packets being
transmitted or received over a network to which the computer is
attached.
tcpdump is free software, Tcpdump works on most Unix-like
operating systems
tcpdump prints the contents of network packets. It can read packets
from a network interface card or from a previously created saved
packet file. Tcpdump can write packets to standard output or a file.
WinDump, the Windows version of tcpdump, can help you analyze
network traffic to look for signs of active malware
Cyber security tutorial1

More Related Content

What's hot

Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
Sylvain Maret
 
What is firewall
What is firewallWhat is firewall
What is firewall
Harshana Jayarathna
 
Firewall
FirewallFirewall
Types of firewall
Types of firewallTypes of firewall
Types of firewall
Pina Parmar
 
Network defenses
Network defensesNetwork defenses
Network defenses
G Prachi
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
Muhammad Baqar Kazmi
 
Firewall
FirewallFirewall
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
Mhmud Khraibene
 
Firewalls
FirewallsFirewalls
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
Puneet Bawa
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
Soban Ahmad
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
Rohit Phulsunge
 
Firewalls
FirewallsFirewalls
Firewalls
Kalluri Madhuri
 
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
Navdeep Dhingra
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 

What's hot (20)

Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall
FirewallFirewall
Firewall
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Firewall
FirewallFirewall
Firewall
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Firewall
FirewallFirewall
Firewall
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewalls
FirewallsFirewalls
Firewalls
 
I ptable
I ptableI ptable
I ptable
 
Firewall
FirewallFirewall
Firewall
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 

Viewers also liked

Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementKanishka Gopal
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
Mahmmoud Mahdi
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
Saurabh Goel
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
Mahmmoud Mahdi
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
Mahmmoud Mahdi
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1
Anant Lodha
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
Mahmmoud Mahdi
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
Mahmmoud Mahdi
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information SystemsGoutama Bachtiar
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management System
Tushar B Kute
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
crm2life
 
Windump
WindumpWindump
Windump
jk847
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)
crm2life
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
crm2life
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
mikem801
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
Mahmmoud Mahdi
 
Subnetting
SubnettingSubnetting
Subnetting
Kishore Kumar
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning ppt
Shivani Garg
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
Mahmmoud Mahdi
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planningAmit Singh
 

Viewers also liked (20)

Introduction: Enterprise Systems for Management
Introduction: Enterprise Systems for ManagementIntroduction: Enterprise Systems for Management
Introduction: Enterprise Systems for Management
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 
Enterprise Systems
Enterprise SystemsEnterprise Systems
Enterprise Systems
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
 
Siebel System: Anatomy of a Sale, Part 1
Siebel System:  Anatomy of a Sale, Part 1Siebel System:  Anatomy of a Sale, Part 1
Siebel System: Anatomy of a Sale, Part 1
 
Lesson 9: Managing Files
Lesson 9: Managing FilesLesson 9: Managing Files
Lesson 9: Managing Files
 
Lesson 4: Network Infrastucture
Lesson 4: Network InfrastuctureLesson 4: Network Infrastucture
Lesson 4: Network Infrastucture
 
Enterprise Information Systems
Enterprise Information SystemsEnterprise Information Systems
Enterprise Information Systems
 
MIS 18 Enterprise Management System
MIS 18 Enterprise Management SystemMIS 18 Enterprise Management System
MIS 18 Enterprise Management System
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Windump
WindumpWindump
Windump
 
Gen7176 siebel crm strategy and roadmap (1)
Gen7176   siebel crm strategy and roadmap (1)Gen7176   siebel crm strategy and roadmap (1)
Gen7176 siebel crm strategy and roadmap (1)
 
Crm siebel
Crm siebelCrm siebel
Crm siebel
 
Subnetting Basics Tutorial
Subnetting Basics TutorialSubnetting Basics Tutorial
Subnetting Basics Tutorial
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Subnetting
SubnettingSubnetting
Subnetting
 
Enterprise resource planning ppt
Enterprise resource planning pptEnterprise resource planning ppt
Enterprise resource planning ppt
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 
Enterprise resource planning
Enterprise resource planningEnterprise resource planning
Enterprise resource planning
 

Similar to Cyber security tutorial1

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
gaurav96raj
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
saad504633
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptx
AjayKumar73315
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
Mohit Dholakiya
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
Netwax Lab
 
Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
Export Promotion Bureau
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
Bhavya Chawla
 
Procuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the NetworkProcuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the Network
IOSR Journals
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
Shyam Kumar Singh
 
Firewall
FirewallFirewall
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
Razorpoint Security
 
Network security
Network securityNetwork security
Aw36294299
Aw36294299Aw36294299
Aw36294299
IJERA Editor
 

Similar to Cyber security tutorial1 (20)

Net Defender
Net DefenderNet Defender
Net Defender
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptx
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Advance Technology
Advance TechnologyAdvance Technology
Advance Technology
 
Network security
Network securityNetwork security
Network security
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Procuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the NetworkProcuring the Anomaly Packets and Accountability Detection in the Network
Procuring the Anomaly Packets and Accountability Detection in the Network
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Security measures for networking
Security measures for networkingSecurity measures for networking
Security measures for networking
 
Firewall
FirewallFirewall
Firewall
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Open port vulnerability
Open port vulnerabilityOpen port vulnerability
Open port vulnerability
 
Network security
Network securityNetwork security
Network security
 
Aw36294299
Aw36294299Aw36294299
Aw36294299
 

More from sweta dargad

Sock Puppet.pptx
Sock Puppet.pptxSock Puppet.pptx
Sock Puppet.pptx
sweta dargad
 
Stacks
StacksStacks
Stacks
sweta dargad
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
sweta dargad
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
sweta dargad
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
sweta dargad
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
sweta dargad
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
sweta dargad
 
All about snmp
All about snmpAll about snmp
All about snmp
sweta dargad
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’ssweta dargad
 
Cacti
CactiCacti

More from sweta dargad (10)

Sock Puppet.pptx
Sock Puppet.pptxSock Puppet.pptx
Sock Puppet.pptx
 
Stacks
StacksStacks
Stacks
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’s
 
Cacti
CactiCacti
Cacti
 

Cyber security tutorial1

  • 1. CYBER SECURITY- TUTORIAL1 From: Sweta Dargad Assistant Professor NTC
  • 2. SYSTEMS VULNERABILITY AND SCANNING 1. Explain what is vulnerability. 2. List various types of vulnerability and explain briefly. 3. What is a port and explain how many ports are used regularly? 4. List various port numbers known. 5. Explain Packet Sniffing. 6. List down packet sniffers. 7. What is TCPdump and Windump.
  • 3. WHAT IS VULNERABILITY. In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw  attacker access to the flaw  and attacker capability to exploit the flaw. Vulnerability is a ‘hole‘ in any software, operating system or service, that can be exploited by web criminals for their own benefits.
  • 4. A SECURITY VULNERABILITY IS A WEAKNESS IN A PRODUCT THAT COULD ALLOW AN ATTACKER TO COMPROMISE THE INTEGRITY, AVAILABILITY, OR CONFIDENTIALITY OF THAT PRODUCT. Integrity of Product: means trustworthiness. If the above weakness is bad enough that it allows exploiters to misuse it, the product is not integrated enough. There is a question mark as to how safe is the product. Availability of the Product: again refers to the weakness whereby an exploiter can take over the product and deny access to it for authorized users. Confidentiality of the Product: is keeping the data secure. If the bug in the system allows for unauthorized people to collect others’ data, it is termed vulnerability.
  • 5. HAZARDS OF VULNERABILITY To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness
  • 6. EXAMPLES OF VULNERABILITIES 1. Buffer overflow 2. Lack of input validation 3. Lack of sufficient logging mechanism 4. Fail-open error handling 5. Not closing the database connection properly 6. Integer overflow 7. Format string vulnerability 8. Access Control Problems
  • 7. BUFFER OVERFLOW Buffer overflows can cause applications to crash, can compromise data, and can provide an attack vector for further privilege escalation to compromise the system on which the application is running. Any application or system software that takes input from the user, from a file, or from the network has to store that input, at least temporarily. stack—stores data that is specific to a single call to a particular function, method, block, or other equivalent construct. heap—General purpose storage for an application. Data stored in the heap remains available as long as the application is running Buffer overflow attacks generally occur by compromising either the stack, the heap, or both.
  • 8. LACK OF INPUT VALIDATION As a general rule, you should check all input received by your program to make sure that the data is reasonable Any input received by your program from an untrusted source is a potential target for attack. (In this context, an ordinary user is an untrusted source.) text input fields commands passed through a URL used to launch the program audio, video, or graphics files command line input Hackers look at every source of input to the program and attempt to pass in malformed data. If the program crashes or misbehaves, the hacker tries to find a way to exploit the problem. Example: “jail break” iPhones
  • 9. ACCESS CONTROL PROBLEMS Access control is the process of controlling who is allowed to do what. This ranges from controlling physical access to a computer keeping your servers in a locked room, for example—to specifying who has access to a resource (a file, for example) and what they are allowed to do with that resource (such as read only). Many exploits involve an attacker somehow gaining more privileges than they should have. Privileges, also called permissions, are access rights granted by the operating system, controlling who is allowed to read and write files, directories, and attributes of files and directories (such as the permissions for a file), who can execute a program, and who can perform other restricted operations such as accessing hardware devices and making changes to the network configuration Such an attack caused by this vulnerability is PRIVILEGE ESCALTION which is also a step in hacking
  • 10.
  • 11. WHAT IS A PORT In computer networking, a port serves as an endpoint in an operating system for many types of communication. It is not a hardware device, but a logical construct that identifies a service or process. A port is always associated with an IP address of a host and the protocol type of the communication, and thus completes the destination or origination address of a communications session. A port is identified for each address and protocol by a 16-bit number, commonly known as the port number.
  • 12. CLASSIFICATION OF PORTS The Internet Assigned Numbers Authority (IANA) is responsible for the global coordination of the DNS Root, IP addressing, and other Internet protocol resources. This includes the registration of commonly used port numbers for well-known Internet services. The port numbers are divided into three ranges: 1. Well-known ports: The well-known ports (also known as system ports) are those from 0 through 1023. 2. Registered ports: Ports 1024-49151 - Registered port: vendors use for applications 3. the dynamic or private ports :Ports >49151 are the port numbers that are available for use by any application to use in communicating with any other application, using TCP or UDP.
  • 13.
  • 14. PACKET SNIFFING A packet sniffer, sometimes referred to as a network monitor or network analyzer, can be used legitimately by a network or system administrator to monitor and troubleshoot network traffic. Using the information captured by the packet sniffer, an administrator can identify erroneous packets and use the data to pinpoint bottlenecks and help maintain efficient network data transmission. The packet sniffer is also capable of capturing ALL packets traversing the network regardless of destination.
  • 15.
  • 16. By placing a packet sniffer on a network in promiscuous mode, a malicious intruder can capture and analyze all of the network traffic. Within a given network, username and password information is generally transmitted in clear text which means that the information would be viewable by analyzing the packets being transmitted.
  • 17. PACKET SNIFFERS A Packet Sniffer is also known as packet analyzer is a computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet's raw data, showing the values of various fields in the packets. 1. Wireshark 2. WinPcap 3. Packetyzer 4. Ip Sniffer 5. CommView
  • 18.
  • 19. TCPDUMP AND WINDUMP tcpdump is a common packet analyzer that runs under the command line. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. tcpdump is free software, Tcpdump works on most Unix-like operating systems tcpdump prints the contents of network packets. It can read packets from a network interface card or from a previously created saved packet file. Tcpdump can write packets to standard output or a file. WinDump, the Windows version of tcpdump, can help you analyze network traffic to look for signs of active malware