0% found this document useful (0 votes)
18 views56 pages

05 - Network Threats - 1

The document discusses various network threats including social engineering, password guessing, and malware threats. Social engineering exploits human psychology rather than technical hacking to gain access to information. Password guessing involves brute force attacks and dictionary attacks to crack passwords. Common malware threats discussed are viruses, worms, trojans, rootkits, and ransomware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views56 pages

05 - Network Threats - 1

The document discusses various network threats including social engineering, password guessing, and malware threats. Social engineering exploits human psychology rather than technical hacking to gain access to information. Password guessing involves brute force attacks and dictionary attacks to crack passwords. Common malware threats discussed are viruses, worms, trojans, rootkits, and ransomware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

Network Threats

Bilal Ahmed
1
Opportunity

The Intrusion Triangle

Motive Means

2
Network Threats
• Social Engineering

• Password Guessing

• Malware threats

• Network Sniffing

• DOS & DDOS

• ARP Poisoning

• Advanced Persistent Threats (APT)


Social Engineering
Social Engineering
• Social engineering is essentially the art of gaining access to
buildings, systems or data by exploiting human psychology,
rather than by breaking in or using technical hacking
techniques
• Social engineers depend on the fact that people are unaware
of their valuable information and are careless about
protecting it
• Common targets are help desk personnel, technical support
executives and system administrators
Social Engineering
• Impact of attack on organization
o Economic losses
o Loss of privacy
o Lawsuits and arbitrations
o Damage to reputation
o Temporary or permanent closure
Human Error
Types of Social Engineering

• Human-Based Social Engineering

• Computer-Based Social Engineering

• Mobile-Based Social Engineering


Human-Based Social Engineering
• Impersonation: pretending to be a legitimate or
authorized person (end user, VIP, help desk officer,
technical support person, repairman) either
personally or using a communication media
phone, email
• Eavesdropping – unauthorized listening of
conversations or reading of messages – can be
done using communication channels
Human-Based Social Engineering
• Shoulder Surfing – Obtain sensitive information by
looking over someone’s shoulder or via vision
enhancing devices such as binoculars

• Dumpster Diving: Looking for treasure in someone


else’s trash bins or storage media
Human-Based Social Engineering
• Tailgating: when a person, whether an employee
or not, passes through a secure door without the
knowledge of the person who has gained
legitimate access through it
• Piggy Backing: Allowing unauthorized person
intentionally through a secure door
Human-Based Social Engineering
• Reverse Social Engineering: A situation in which
an attacker presents himself as an authority and
the target seeks his advice offering the
information that he needs
Computer-based Social Engineering
• Pop-up windows : Asking for user’s information

to login or sign-up

• Chain Letters: emails that offer free gifts such as

money and software on the condition that the

user has to forward the mail to the said number

of persons
Computer-based Social Engineering
• Instant Chat Messenger: Gathering personal
information by chatting with a selected online
user to get personal information

• Spam emails: Irrelevant and unwanted emails -


flooding the Internet with the same message
sent to millions

• Example
Computer-based Social Engineering
• Phishing

• Illegitimate email falsely claiming to be from


a legitimate site - attempts to acquire the
user’s personal or account information
Computer-based Social Engineering
• Spear Phishing

• Targeted phishing attack aimed at specific


individuals within an organization

• Whaling

• Extension of Spear phishing that targets upper


level corporate management in an attempt to
obtain restricted internal information
Computer-based Social Engineering
• Vishing

• Electronic fraud tactic in which individuals are


tricked into revealing critical financial or
personal information

• Vishing works like phishing but does not always


occur over the Internet and is carried out using
voice technology
Computer-based Social Engineering
• Pharming

• Hijacking the intended site’s DNS (domain


name system) server in order to redirect the
victim to fake website that looks like the
intended site
Computer-based Social Engineering
Mobile-based Social Engineering

• Publishing malicious apps with attractive


features and similar names to that of popular
apps
• Repackaging legitimate apps
Mobile-based Social Engineering
• SMiShing
– Sending a SMS text message that urges the
recipient to call a phone number to solve a fraud
problem with their bank account or debit card

– The pre-recorded message asks him to provide


critical information that is unsurprisingly revealed
to the attacker
Social Engineering Counter Measures
Social Engineering Counter Measures
• Password Policies
– Periodic password change
– Avoiding guessable passwords
– Account blocking after failed attempts
– Length and complexity of passwords
– Secrecy of passwords
• Physical Security Policies
– Identification of employees by issuing ID cards
– Accessing area restrictions
– Proper shredding of useless documents
– Security check before employment
Social Engineering Counter Measures
• Effective Training program consisting of all security policies and
methods to increase awareness on social engineering
• Operational Guidelines to ensure security of the sensitive
information and authorized use of resources
• Classification of Information as top secret, proprietary, for internal
use only, for public use etc
• Access Privileges - administrator, user and guest accounts with
proper authorization
• Two factor Authentication
Password Guessing
Guessing Passwords
• Attackers’ strategies

• Non-electronic attacks: Attacks that don't


require technical knowledge to crack
passwords

• shoulder surfing, dumpster diving


Guessing Passwords
• Attackers’ strategies

• Active online attacks: Involves direct


communication with victim’s machine

• Brute forcing, Dictionary attacks


Guessing Passwords
• Attackers’ strategies

• Passive online attacks: Eavesdropping on


network password exchanges - Password
cracking without communicating with the
victim

• Sniffing
Guessing Passwords
• Attackers’ strategies

• Offline attack: Attacker copies target’s


password file and then tries to crack passwords
in his own system at different location

• Ophcrack, John the Ripper


Guidelines
• Use strong passwords

• Change default passwords

• Set password length

• Password format

• Mix upper/ lower case alphabets, numerals


and symbols

• Avoid obvious passwords


Guidelines
• Password checkers

• Check password against dictionary of weak


passwords
Guidelines
• Password checkers

• Check password against dictionary of weak


passwords
pakistan
Guidelines
• Password checkers

• Check password against dictionary of weak


passwords
1qaz2wsx3edc
Guidelines
• Password checkers

• Check password against dictionary of weak


passwords
5N%5#B{Vg$9s(.av
Guidelines
• Password generation

• Produces random passwords

• Users – not allowed to pick passwords


Guidelines
• Password generation

• Produces random passwords

• Users – not allowed to pick passwords


Guidelines
• Password Aging

• Expiry date of password is set

• Forces user to change passwords

• Additional mechanisms must be enforced to


prevent from reverting to previous passwords
Countering password guessing
Anderson’s formula:

• 'P' probability of guessing a password in


specified period of time

• 'G' number of guesses tested in 1 time unit

• 'T' number of time units in which guessing occurs

• 'N' number of possible passwords

• Then P ≥ TG/N
Example-1
• Choose a password which is 6 chars long and the

password can contain only a-z, A-Z, 0-9. If the attacker

could guess 10,000 pwd /sec and the probability that

an attacker could guess is 0.5 then what is the time

frame in which the password would be compromised ?


Example
• P = 0.5
• G = 10,000
• N = A^S where A is the no of allowed chars in the
password and S is the length of the password
• Here A (26 + 26 + 10) = 62 and S=6, so N = 62 ^ 6
Now we want to find T and from Anderson's formula
• T <= NP/G
T <= 62 ^ 6 * 0.5 / 10,000
<= 2,840,012 sec
<= 33 days
Malware Threats
Malware Threats
• Virus
• A program that attaches itself to other programs or
documents, and alters or damages the computer files and
applications
• Worm
• A malicious program that replicates itself and spreads to
other computers
• Backdoor
• An unauthorized mean of accessing the system and bypassing
the security mechanisms
Malware Threats
• Trojan

• Program with an overt purpose (known to user) and a covert

purpose (unknown to user)

• Seems to be legitimate but acts maliciously, when executed

• Example

• Netbus
Example: NetBus
• Designed for Windows NT system
• Mode of operation
• Client – server
• Victim installs this
– Usually disguised as a game program
• Acts as a server, accepting and executing
commands for remote administrator (client)
– This includes intercepting keystrokes and mouse
motions and sending them to attacker
– Also allows attacker to upload, download files
Example: NetBus
Malware Threats
• Rootkit
– A set of programs or utilities that allows someone to
maintain root‐level access to the system

• Ransomware

• A form of malware that essentially holds a computer system


captive while demanding a ransom

• Blocks access to the data of a victim, threating to either


publish it or delete it until a ransom is paid

• Problem - ?
Malware Threats
• Adware
– Short form of advertising-supported software
– Automatically delivers advertisements
– Majority aims at solely being the advertisers
– Some are capable of tracking user activity and stealing
information
• Spyware
– Functions by spying on user activity without their knowledge
– Can include activity monitoring, collecting keystrokes, data
harvesting (account information, logins, financial data)
Malware Threats
• Logic Bomb
• A program that performs an action that violates the security
policy when some external event occurs

• Example: program that deletes company’s payroll records


when one particular record is deleted

– The “particular record” is usually that of the person writing the


logic bomb

– Idea is if (when) he or she is fired, and the payroll record


deleted, the company loses all those records
Malware Symptoms
• Increased CPU usage
• Slow computer or web browser speeds
• Problems connecting to networks
• Freezing or crashing
• Modified or deleted files
• Appearance of strange files, programs, or desktop icons
• Programs running, turning off, or reconfiguring themselves
• Strange computer behavior
• Emails/messages being sent automatically and without user’s
knowledge
Malware Countermeasures
• Install quality anti-malware software

• Make sure malware definitions of the scanner are regularly

updated

• Never open an attachment from an untrusted source

• Taking caution when surfing the internet and downloading files

• Backup data

• Sandboxing
Sandboxing
• Security technique that isolates programs, preventing
malicious programs from damaging the rest of your
computer
• Isolates applications from critical system resources and
other programs
• Provides an extra layer of security that prevents malware
or harmful applications from negatively affecting your
system
• Without sandboxing, an application may have unrestricted
access to all system resources and user data on a
computer
• A sandboxed app on the other hand, can only access
resources in its own "sandbox
Sandboxing
Network Sniffing
Network Sniffing
• Sniffing is a process of monitoring and capturing all data packets
passing through a given network using sniffing tools
• Generally, sniffers do not intercept or alter captured data
• Easy in hub based network
How a Sniffer works
• Shared Ethernet
– An attacker gets connected to the target network in order to sniff
the packets

– In this environment, all the other machines receive packets meant


for one machine

– Sniffer turns the NIC of a system to the promiscuous mode so that


it listens to all the data transmitted on its segment
How a Sniffer works

You might also like