Intro, history, hacking Network Security Lecture 1
Welcome to Network Security Should be able to Skills • identify design and • Ability to analyze the implementation security of networked vulnerabilities in network systems protocols and applications • Ability to perform security • exploit such vulnerabilities assessments of a system in practice • Ability to fix vulnerabilities • detect and protect from attacks Eike Ritter Network Security - Lecture 1 1
Module Outline • TCP/IP security • Web security • Browser security • Malicious web • Intrusion detection systems Eike Ritter Network Security - Lecture 1 2
Organization Lectures • – 2/week • Office hours – Tuesdays 4-5pm, and by appointment Homework • – 2 assignments (mix of programming, network analysis, attacks) – Reading assignments, roughly once a week • Examination – 1.5 hours – Covers everything we discuss in class • Grading – 80% examination – 20% homework Check • http://www.cs.bham.ac.uk/~exr/teaching/lectures/networkSecurity/11_1 2 regularly for updates and news Eike Ritter Network Security - Lecture 1 3
What is expected from you • Participate in lectures – Handouts are available (print and online), but they don’t cover everything – Be active: Something is not clear? Ask questions! • Absolutely no plagiarism – Be familiar with School’s plagiarism policy – It’s OK to discuss with others, but everything you submit must be yours • Any problem, doubt, special need; come talk to me Eike Ritter Network Security - Introduction 4
A brief history NETWORK SECURITY Eike Ritter Network Security - Lecture 1 5
‘60 Advanced Research Projects • Agency (ARPA) funds development of ARPANET • First four nodes in 1969 – UCLA (Vint Cerf, Steve Crocker, Jon Postel, Leonard Kleinrock) – SRI (Doug Engelbart) – UCSB (Glen Culler, Burton Fried) – University of Utah • Uses the Network Control Protocol (NCP) through Information Message Processors (IMP) http://www.computerhistory.org/internet_history/full_size_images/1969 _4-node_map.gif Eike Ritter Network Security - Lecture 1 6
‘70 • UNIX, C, Email, Telnet, FTP, TCP, Ethernet, USENET • More hosts join the ARPANET http://www.computerhistory.org/internet_history/full_size_images/1975 _net_map.gif Eike Ritter Network Security - Lecture 1 7
‘80 • Berkeley UNIX includes the TCP/IP suite (sockets) • ARPANET standardizes on TCP/IP (1983) • MILNET detaches from public network (ARPANET) • DNS http://www.computerhistory.org/internet_history/full_size_images/1988 _nsfnet_map.gif Eike Ritter Network Security - Lecture 1 8
… up to now • Even more hosts attach to the Internet • 1991: the Web is born (Tim Berners-Lee at CERN) • The dot-com boom and bust http://opte.org/maps/ Eike Ritter Network Security - Lecture 1 9
Vulnerabilities Source: http://web.nvd.nist.gov/view/vuln/statistics Eike Ritter Network Security - Lecture 1 10
Incidents • Stats from cert.org/stats/ • “Incident reports received - Given the widespread use of automated attack tools, attacks […] have become so commonplace […] provide little information with regard to assessing the scope and impact of attacks. Therefore, we stopped providing this statistic at the end of 2003.” • So, we just gave up… Eike Ritter Network Security - Lecture 1 11
Terminology • Vulnerability – A flaw or weakness in a system's implementation that could be exploited to violate the system's security policy • Exploits – An attack that leverages a vulnerability to violate a system’s security policy Eike Ritter Network Security - Lecture 1 12
HACKING, HACKERS Eike Ritter Network Security - Lecture 1 13
What is a hacker? • The term “hacker” was introduced at MIT in the 60s to describe “computer wizards” – “someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money.” (Brian Harvey, UC Berkeley, http://www.cs.berkeley.edu/~bh/hacker.html) • It has been eventually used to denote “malicious hackers” or “crackers”, that is, people that perform intrusions and misuse computer systems • More jargon: http://www.eps.mcgill.ca/jargon/jargon.html Eike Ritter Network Security - Lecture 1 14
Phreaking • In 1971, John Draper learns that a toy whistle found in Cap’n Crunch cereal box emits sounds at 2600 Hz frequency • The 2600 frequency was used by AT&T to indicate that a trunk line was ready and available to route new call • Free long-distance calls (blue box)… • John Draper arrested in 1972 for toll fraud Eike Ritter Network Security - Lecture 1 15
Early problems • Bob Metcalfe, “The Stockings Were Hung by the Chimney with Care”, RFC 602, December 1973 • “The ARPA Computer Network is susceptible to security violations for at least the three following reasons” – Sites used to physical limitations of access are not protected against unauthorized access (e.g., passwords which are easy to guess) – “The TIP allows access to the ARPANET to a much wider audience than is thought or intended.” – “There is a lingering affection for the challenge of breaking someone's system” Eike Ritter Network Security - Lecture 1 16
The cuckoo’s egg • Cliff Stoll was a system administrator at LBL in 1986 • While investigating an accounting discrepancy, he discovers an account created without billing address • Further investigation reveals the presence of an intruder • Cliff Stoll decides to monitor the actions of the intruder instead of simply cutting him/her off (honeypot of sorts) Eike Ritter Network Security - Lecture 1 17
The cuckoo’s egg – cont’d The vulnerability • – Emacs provided a utility ( movemail ) to allow users to change spool file ownership and move it – At LBL it was installed setuid root • The exploit – The attacker used movemail to copy his own script over the atrun utility, which is run periodically with system privileges • Consequences – Intruder gained root access – Used the system to probe military systems in the MILNET – Looked for potentially sensitive documents searching for keywords like “SDI” (Strategic Defense Initiative), “nuclear”, “norad” • Investigation – FBI involved – Conenctions traced back to Germany – In 1989 arrest of Markus Hess, who operated for the KGB Eike Ritter Network Security - Lecture 1 18
The Morris Worm • On November 2, 1988, Robert T. Morris releases the Internet worm • A mistake in the propagation procedure leads to the overload of infected machines • Internet had to be “turned off” • RTM was sentenced to three years’ probation, a $10,000 fine, and 400 hours of community service • The Computer Emergency Response Team (CERT) was created Eike Ritter Network Security - Lecture 1 19
The Morris Worm – cont’d • Worm: self-replicating program that spreads across a network of machines • Vulnerabilities & exploits – “Debug” function of sendmail , which enabled to send an email with a program as a recipient • Worm sent a message with body that created a C program which transferred the rest of the modules from the originating host, linked them, and executed them – fingerd stack-based buffer overflow – Weak passwords – Trusted hosts (~/.rhost) Eike Ritter Network Security - Lecture 1 20
Kevin Mitnick • 1981: breaks into Pac Bell phone center. 1year probation. 1982: cracks Pacific • Telephone. 6 months of juvenile prison. 1987: breaks into SCO. 3 years • probation. • 1988: expelled from Pierce for computer misuse 1992: cracks into California • DMV • 1994: breaks into San Diego Supercomputer Center 1995: well-publicized arrest • (Shimomura and New York Time’s John Markoff) Eike Ritter Network Security - Lecture 1 21
Kevin Mitnick – cont’d • Christmas 1994 attack against San Diego Supercomputer Center (SDSC) • Sophisticated TCP spoofing attack, which exploits the trust relationship between two hosts, x-terminal and server – x-terminal: diskless host – server: host providing boot images to x-terminal – x-terminal allows unauthenticated logins and commands from server • Exploit – DoS against server – Attacker spoofs server and injects command # rsh x-terminal "echo + + >>/.rhosts" Eike Ritter Network Security - Lecture 1 22
Other famous incidents • Summer 2001: Code Red – Exploits buffer overflow in IIS – Defaces the vulnerable site to display: HELLO! Welcome to http://www.worm.com! Hacked By Chinese! • August 2003: Blaster worm – Exploits buffer overflow in DCOM RPC service of Windows and binds a command shell to port 4444 of the infected target – Transfers payload on compromised machine via TFTP – SYN floods windowsupdate.com (but not windowsupdate.microsoft.com) – Jeffrey Lee Parson, 18 year old, arrested Eike Ritter Network Security - Lecture 1 23
Recommend
More recommend