Dark Side of Internet
Dark Side of Internet
Dark Side of Internet
Source: http://en.wikipedia.org/wiki/Urban_legend
Urban legend
Despite its name, a typical urban legend does not
necessarily originate in an urban area. Rather, the term
is used to differentiate modern legend from traditional
folklore in preindustrial times. For this reason,
sociologists and folklorists prefer the term contemporary
legend.
Urban legends are sometimes repeated in news stories
and, in recent years, distributed by e-mail. People
frequently allege that such tales happened to a "
friend of a friend" -- so often, in fact, that "friend of a
friend," ("FOAF") has become a commonly used term
when recounting this type of story.
Spam
Source: http://www.unt.edu/benchmarks/archives/2005/february05/spamandcookiescolor.gif
Spam is electronic junk mail that clogs our internet like the fatty canned
meat of the same name clogs our arteries.
Communication lines back up at an alarming rate,
Storage is gobbled up,
Servers and processors thrash, and
Users are irritated at best incapacitated at worst.
Spam costs the ISPs and others a fortune to prevent and/or to remove.
At its worst spam is used by scammers, hackers, and others to market
and prey on literally millions of users at a very low cost.
Spam
What is Spam?
Junk email unwanted, resource robbing, and often contains viruses, worms,
and scams.
http://www.oecd.org/dataoecd/47/5/26618988.pdf
http://www.oecd.org/dataoecd/47/5/26618988.pdf
Crimes of Persuasion
Crimes of persuasion are scams that appeal to
peoples greed, goodwill, or other emotions to
use the victim to provide the access and
assistance to information, the money or other
resources, that are the target of the criminal.
In other words A Con Game
Internet Scams
Internet Scams
Scams over the Internet unlike the fraud and similar crime can be
difficult to detect, prosecute, and prevent and easy to perpetrate.
Email can be used to reach 250 million with a simple program and
a CD-ROM with the email addresses.
Example - The African businessman who offers to split a large sum
of money (like, $20M) if he can only electronically wire it to your
checking account. He also requires a (small) fee ($250.) wired to
his account to bribe fellow country men. Your fee and your bank
account are immediately seen to vanish.
See:
http://www.cnn.com/2000/TECH/computing/10/31/ftc.web.scams/
Email Fraud
Fraud has existed perhaps as long or longer
than money. Any new sociological change
can engender new forms of fraud, or other
crime.
Source: http://en.wikipedia.org/wiki/Email_fraud
Email Fraud
Almost as soon as e-mail became widely used, it
began to be used to defraud people via E-mail fraud.
E-mail fraud can take the form of a "con game" or
scam.
Confidence tricks tend to exploit the inherent greed
and dishonesty of their victims: the prospect of a
'bargain' or 'something for nothing' can be very
tempting.
E-mail fraud, as with other 'bunco schemes' relies on
naive individuals who put their confidence in getrich-quick schemes such as 'too good to be true'
investments or offers to sell popular items at
'impossibly low' prices. Many people have lost their
life savings due to fraud. (Including E-Mail fraud!)
Source: http://en.wikipedia.org/wiki/Email_fraud
Identity Theft
But he that filches from
me my good name
Robs me of that which not
enriches him
And makes me poor
indeed." Shakespeare, Othello,
Act III. Scene III.
Source: http://www.consumer.gov/sentinel/pubs/Top10Fraud2004.pdf
Tiger Woods
A man who used Tiger Woods' identity to
steal $17,000 worth of goods was
sentenced to 200 years-to-life in prison.
Anthony Lemar Taylor was convicted of
falsely obtaining a driver's license using
the name Eldrick T. Woods, Woods'
Social Security number and his birth date.
Though he looks nothing like golf's best
player, the 30-year-old Taylor then used
the false identification and credit cards to
buy a 70-inch TV, stereos and a used
luxury car between August 1998 and
August 1999.
Judge Michael Virga gave Taylor the
maximum sentence under California's
three-strikes law...
Souce: http://www.consumer.gov/sentinel/pubs/Top10Fraud2004.pdf
Identity Theft
Identity Theft the acquiring of personal and financial information
about a person for criminal purposes.
Your Social Security Number, credit card numbers, and passwords
on your machine can be used to gain information about you from
the web sources.
Once the information is gained it is used to charge large amounts
for plane tickets, etc.
The criminal can also assume your identity for fraud and terrorism.
Some rings communicate data gathered to accomplices in other
countries where the fraudulent charges are actually made.
It can take up to 18 months and thousands of dollars to restore
your credit.
See http://www.newsfactor.com/perl/story/15965.html
What is Pharming?
Pharming is the exploitation of a vulnerability in the DNS
server software that allows a hacker to acquire the
Domain Name for a site, and to redirect traffic from that
website to another web site.
DNS servers are the machines responsible for resolving
internet names into their real Internet Protocol (IP)
addresses - the "signposts" of the internet. (e.g.,
Good_Stuff.com will translate to an address like 152 145
72 30 i.e. four groups of base 8 (octal) numbers in IP
version 4 (IPv4) or eight groups in base 16 (hex) in IP
version 6 (IPv6). The Internet has thousands of DNS
servers each one a target for determined hackers.
Phishing
What is Phishing?
Using email or web sites to look like authentic
corporate communications and web sites to trick
people into giving personal and financial information.
FBI sees this a fast growing form of fraud and can
lead to theft of identity.
See http://www.crimes-of-persuasion.com/Crimes/Delivered/internet.htm
What is Phishing?
phishing (also known as carding and spoofing)
n.
1. The act of attempting to fraudulently acquire
sensitive information, such as passwords and
credit card details, by masquerading as a
trustworthy person or business with a real need
for such information in a seemingly official
electronic notification or message (most often an
email, or an instant message).
Source: http://en.wikipedia.org/wiki/Phishing
Phishing Example
From: eBay Billing Department <[email protected]>
To: [email protected]
Subject: Important Notification
We regret to inform you that your eBay account could be suspended if you don't re-update your account information. To resolve this
problems please click here and re-enter your account information. If your problems could not be resolved your account will be
suspended for a period of 3-4 days, after this period your account will be terminated.
For the User Agreement, Section 9, we may immediately issue a warning, temporarily suspend, indefinitely suspend or terminate your
membership and refuse to provide our services to you if we believe that your actions may cause financial loss or legal liability for you,
our users or us. We may also take these actions if we are unable to verify or authenticate any information you provide to us.
Due to the suspension of this account, please be advised you are prohibited from using eBay in any way. This includes the
registering of a new account. Please note that this suspension does not relieve you of your agreed-upon obligation to pay any fees
you may owe to eBay.
Regards,
Safeharbor Department
eBay, Inc
The eBay team.
This is an automatic message. Please do not reply.
Source: http://en.wikipedia.org/wiki/Phishing
Spear Phishing
Spear phishing is an e-mail spoofing fraud
attempt that targets a specific organization,
seeking unauthorized access to confidential data.
Spear phishing attempts are not typically initiated
by "random hackers" but are more likely to be
conducted by perpetrators out for financial gain,
trade secrets or military information.
Spear phishing messages appear to come from a
trusted source. Phishing messages usually
appear to come from a large and well-known
company or Web site
Source: http://searchsecurity.techtarget.com/definition/spear-phishing
Spoofing
Spoofing
E-mail sent from someone pretending to be
someone else is known as spoofing. Spoofing
may take place in a number of ways. Common to
all of them is that the actual sender's name and
the origin of the message are concealed or
masked from the recipient. Many, if not most,
instances of e-mail fraud use at least minimal
spoofing, as most frauds are clearly criminal acts.
Criminals typically try to avoid easy traceability.
Source: http://en.wikipedia.org/wiki/Email_fraud
DNS Spoofing
Mentioned previously
Substitutes a fake IP address for the real one in the DNS table
What is malware?
malware (malwr) (n.) Short for malicious
software, software designed specifically to
damage or disrupt a system, such as a virus or a
Trojan horse.
Source:: http://www.webopedia.com/TERM/m/malware.html
What is a virus?
Virus
n.
1. A self-replicating
software program that
spreads by inserting
copies of itself into other
executable code or
documents.
Source: www.wikipedia.org
A Trojan horse program may force your computer to do any or all of these things without
your knowledge!
Individuals have actually been prosecuted for actions committed by their computer while
under control of a Trojan horse.
Source: www.wikipedia.org
Source: www.nndb.com
Famous Worms
Name/Date
Comment
Est. Cost
Melissa 3/26/1999
$1.1B
NIMDA 9/2001
$645M
Sobig 1/2003
$36.1B
Source: Computer Worms: Past, Present, and Future, Craig Fosnock (CISSP, MCSE, CNE)
Comment
Est. Cost
Mydoom
$38.5 B
Witty
$11 million
Early Viruses
Brain Virus from Pakistan (1986)
First PC virus
Affected only certain types of floppy drives
Michelangelo (1992)
5 million systems were predicted to be affected.
Only 10,000 systems were ever infected.
A boon for anti-virus software companies.
Source: http://www.research.ibm.com/antivirus/timeline.htm
Trojan Horses
These actions range from harmless messages to
destruction of user files, denial of service, or stealing
personal data.
Lately hackers have taken over thousands of computers
to launch attacks on other sites (using Trojan horse
techniques).
What is a rootkit?
A type of Trojan that keeps itself, other files,
registry keys and network connections hidden
from detection.
It enables an attacker to have "root" access to the
computer, which means it runs at the lowest level
of the machine.
A rootkit typically intercepts common API calls so
antivirus scans never see the rootkit programs.
Whats a Wabbit?
wabbit
n.
1. A program that replicates itself on a computer but does not
touch other documents or executables. It is not spread
through the Internet. It makes so many copies of a program
that the computer cannot even start the program that would
allow the user to terminate the wabbit program.
Whats a backdoor?
Code that allows access
of the computer through
O/S or application.
In some cases this is
intentional and in others
its a bug. In any case it is
a dangerous problem and
requires that the user get
the latest patches to the
O/S and applications.
Source: http://cluestick.me.uk/burrow/gallery/cartoons/
Malware Detection
Norton Anti-Virus
McAfee Anti-Virus
Panda Software
What is Adware?
Adware or advertising-supported software is any software
package which automatically plays, displays, or downloads
advertising material to a computer after the software is installed on
it or while the application is being used.
Adware programs other than spyware do not invisibly collect and
upload this activity record or personal information when the user of
the computer has not expected or approved of the transfer, but
some vendors of adware maintain that their application which
does this is not also spyware, due to disclosure of program
activities: for example, a product vendor may indicate that since
somewhere in the product's Terms of Use, there is a clause that
third-party software will be included that may collect and may
report on computer use, that this Terms of Use disclosure means
the product is just adware.
http://en.wikipedia.org/wiki/Adware
Spyware
Spyware software that gathers information
about a person or computer without permission or
knowledge.
Once loaded unto a computer sends data back to
the site that launched them.
Can be very dangerous and used in identity theft
and other forms of fraud.
Can make your computer appear to be slow and
unresponsive.
What is spyware?
spyware n.
1. a broad category of malicious software intended to intercept or
take partial control of a computer's operation without the user's
informed consent. Unlike viruses, it does not usually self-replicate.
Spyware is designed to exploit infected computers for the
commercial gain of third parties. Typical tactics furthering this goal
include delivery of unsolicited pop-up advertisements; theft of
personal information (including financial information such as credit
card numbers); monitoring of web-browsing activity for marketing
purposes; or routing of HTTP requests to advertising sites.
As of 2005, spyware affects only computers running Microsoft
Windows. There have been no reported observations of
spyware for Mac OS X, Linux, or other platforms
Source: www.wikipedia.org
Malware steals your personal information and address book (identity theft and
keystroke-logging).
Source: http://www.cnet.com/Resources/Info/Glossary/Terms/cookie.html
Source: http://sarahmorgan73.tripod.com/pers.html
Flash Cookies
Wireless Dangers
War Driving
Virtual Intrusion
Other means
Security Measures
Wardriving
Wardriving is the act of searching for Wi-Fi
wireless networks by a person in a moving
vehicle using a Wi-Fi-equipped computer, such as
a laptop or a PDA. It is similar to using a radio
scanner, or to the ham radio practice of DXing.
Connecting to the network and using its services
without explicit authorization is referred to as
piggybacking.
Source: http://en.wikipedia.org/wiki/War_driving
Further References
http://courses.washington.edu/info100/classwork/
slides/files/fit100-21-darkside.ppt
Beaver, K Hacking Wireless Networks for
Dummies, (2005) Wiley
Cyber Bullying
Cyber bullying is a controversial
area of Internet abuse.
Cyber-Bullying
Cyberbullying is willful and involves recurring or
repeated harm inflicted through the medium of
electronic text, such as e-mail or instant
messaging are just two ways but cyber bullying
can occur in any way if it is on the internet.
According to R.B. Standler[1]bullying intends to
cause emotional distress and has no legitimate
purpose to the choice of communications.
Source: http://en.wikipedia.org/wiki/Cyber-bullying
Cyber-Bullying (More)
Cyberbullying can be as simple as continuing to
send e-mail to someone who has said they want
no further contact with the sender.
Cyberbullying may also include threats, sexual
remarks, pejorative labels (i.e., hate speech).
Cyber-bullies may publish personal contact
information for their victims at websites. They
may attempt to assume the identity of a victim for
the purpose of publishing material in their name
that defames or ridicules them.
Megan Meier
St. Louis, Missouri, teenager Megan Meier committed
suicide after a girl down the street disguised herself
as a teenage boy on MySpace and taunted the 13year-old about her weight and sexuality. Megan was
three days away from her 14th birthday in October of
2006
The Missouri officials and Federal officials could not
find a crime Finally a charge of computer fraud was
filed in California for misrepresentation of the childs
age to use Myspace against the mother.
The following video discusses the legal issues. Note
the jury found Laurie Drew not guilty on but one
charge which was also dropped by the judge.
Phoebe Prince
Phoebe Prince was an Irish immigrant to Massachusetts
when she took her own life in January of 2010. Phoebe
was a victim of cyberbullying at South Hadley High
School in western Massachusetts.
Rutgers Case
The gay 18-year-old ended his life Sept. 22 by
jumping off a bridge, after authorities said two
other students streamed his private sexual
encounter online.
One of the students, the room mate, planted the
web camera.
One major issue is what the two students should
be charged with.
The invasion of privacy and the death shocked
the campus.
Rutgers University
Legal & Ethical Issues
Sexting
Sexting -- Teens text messages
including explicit pictures of
themselves is raising issues
Is it pornography and if so what
should be the punishment for the
sender and the receiver.
Is it a new form of Cyber Bullying
when the boy or girl friend sends posts
those private photos on the web.
Source: http://www.youtube.com/watch?v
=mYrXG1Yze68&feature=fvst
Source; http://en.wikipedia.org/wiki/Anthony_Weiner_sexting_scandal
Trolling
Trolling means mean-spirited
searching of the internet for victims
to send harassing, often anonymous
messages.
Source:
http://www.cyberbullyingnews.com/2010/03/cyberbullying-current-news-trolling
Unwanted exposure to sexual material: When online, opening email, or opening e-mail links, and not seeking or expecting sexual
material, being exposed to pictures of naked people or people
having sex.
Survey Findings
One in 5 youth received a sexual approach or solicitation over the
Internet in the past year.
One in 33 youth received an aggressive sexual solicitation in the past
year. This means a predator asked a young person to meet
somewhere, called a young person on the phone, and/or sent the
young person correspondence, money, or gifts through the U.S. Postal
Service.
One in 4 youth had an unwanted exposure in the past year to pictures
of naked people or people having sex.
One in 17 youth was threatened or harassed in the past year.
Most young people who reported these incidents were not very
disturbed about them, but a few found them distressing.
Craigslist
Craigslist is a centralized network of online
communities, featuring free online classified
advertisements with sections devoted to jobs,
housing, personals, for sale, services, community,
gigs, rsums, and discussion forums.
Craig Newmark began the service in 1995 as an email
distribution list of friends, featuring local events in
the San Francisco Bay Area, before becoming a webbased service in 1996.
Craigslist has a business model of free or low cost
ads that attacks one major leg of the newspaper of
revenue.
http://en.wikipedia.org/wiki/Craigs_list
Taylor Behl
On August 17, 2005, Taylor Behl
left home for college at Virginia
Commonwealth University.
On September 5, 2005, a 38
year-old amateur photographer,
Benjamin Fawley, killed Taylor
Behl and dumped her unburied
body in a shallow ravine near his
ex-girlfriends farm.
Behl met Fawley as a
prospective student. She kept in
contact with him through
LiveJournal and Myspace.
Source: http://www.youtube.com/watch?v=zU8m-4_CmtU
email, social networking users are targeted with messages alerting them
to a fake inheritance or access to a rich strangers fortune;
Chat Roulette
1.
2.
3.
Synflood Attack
The attacker simulates many users starting requests for data but not completing
the request. The victim is stuck waiting for the attacker to complete the
requests.
Source: www.wikipedia.org
This massive amount of personal data leads to data mining and other
marketing techniques to target individual groups with specific ads and
products.
These gangs use the Internet to carry out their attacks and often
do it from sites that make prosecution difficult if not impossible.
Material Source:
http://online.wsj.com/article_email/article_print/SB117824446226991797.html
The Hackers
The so called, Bonny and Clyde, hackers break
in with a quick attack and often leave clues and
other artifacts behind that signal the their
presence.
TJX was the hallmark of Russian and eastern
European gangs that scout for the weakest link in
the security and with careful planning attack it.
Albert Gonzales
Albert Gonzalez, a Miami hacker who once
worked as a government mole tracking down
identity thieves, is accused of playing a critical
role in all the largest credit-card heists on record.
He was previously charged in other computer
break-ins, most significantly at TJX Cos., the
chain that owns discount retailers T.J. Maxx and
Marshalls, in which as many as 100 million
accounts were lifted.
Source: http://www.google.com/hostednews/ap/article/ALeqM5ij90C
Cyber-Warfare
Cyber-Warfare uses computers and the
Internet to wage war. This mode of
warfare is being used in hot and cold wars
as well as by both sides of in the war on
terrorism.
Types of attacks
There are several methods of attack in cyber-warfare, this list is ranked in
order of mildest to most severe.
Web vandalism: Attacks that deface webpages, or
denial-of-service attacks. This is normally swiftly combated and of little
harm.
Propaganda: Political messages can be spread through or to anyone
with access to the internet.
Gathering data. Classified information that is not handled securely can
be intercepted and even modified, making espionage possible from the
other side of the world.
Denial-of-Service Attacks: Large numbers of computers in one country
launch a DoS attack against systems in another country.
Equipment disruption: Military activities that use computers and
satellites for co-ordination are at risk from this type of attack. Orders and
communications can be intercepted or replaced, putting soldiers at risk.
Attacking critical infrastructure: Power, water, fuel, communications,
commercial and transportation are all vulnerable to a cyber attack
Eligible Receiver
Eligible Receiver, code name of a 1997 internal exercise
initiated by the Department of Defense.
A "red team" of hackers from the National Security
Agency (NSA) was organized to infiltrate the Pentagon
systems.
The red team was only allowed to use publicly available
computer equipment and hacking software.
Although many details about Eligible Receiver are still
classified, it is known that the red team was able to
infiltrate and take control of the Pacific command center
computers, as well as power grids and 911 systems in
nine major U.S. cities.
Source: http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/hamre.html
Moonlight Maze
Moonlight Maze refers to a highly classified incident in which U.S.
officials accidentally discovered a pattern of probing of computer
systems at the Pentagon, NASA, Energy Department, private
universities, and research labs.
It began in March 1998 and had been going on for nearly two
years.
The invaders were systematically marauding through tens of
thousands of files -- including maps of military installations, troop
configurations and military hardware designs.
The Defense Department traced the trail back to a mainframe
computer in the former Soviet Union but the sponsor of the attacks
is unknown and Russia denies any involvement.
Source: http://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/warnings/#maze
Titan Rain
In 2005 a cyber attack, code named, Titan Rain
was exposed. It was targeted at military and
secret government sites world wide.
Using computer forensics techniques and hacking
into the offending systems, Shawn Carpenter was
able to use the compromised systems against
themselves and find the actual origin of the
attacks. Doing things that official government
agents could not, he determined that the root of
the attacks was inside China.
Source: http://www.time.com/time/printout/0,8816,1098961,00.html
Critical National
Infrastructures
Infrastructures that are deemed to
be so vital that their incapacity or
destruction would have a
debilitating regional or national
impact or would severely disrupt
the behavior and activities of large
numbers of people who depend
upon the infrastructure
1,912,000 Farms
87,000 food-processing plants
5,800 registered hospitals
87,000 emergency services
entities
2 billion miles of telecomm
cable
2,800 electric power plants
104 commercial nuclear power
plants
300,000 oil and natural gas
sites
460 skyscrapers
Structured adversaries
Terrorists, hactivists (hacker-activist)
Organized crime
Three levels of Terrorist
Independent
Foreign nations
Supported
Insiders
Foreign agent
Witting
Unwitting
Half-witting (You cant fix stupid)
Source: http://www.iti.uiuc.edu/events/2005_09_15_Jeff_Dagle.pdf
Fuel Transport,
Shipping
Power for
Signaling,
Switches
Transportation
Water
or
Water f ,
n
Cooli g s
n
Emissio n
io
Reduct
ip p
Power for
Compressors,
Storage,
Natural
Control
Electric Sys
tems
Gas
Power
r
o
f
Fuel ors
at
Gener
S
Com CADA,
mun
icatio
ns
Po
Wat
er fo Sw wer
Coo
r
itc for
ling
he
s
SCA
DA,
Com
mun
ic
in g
Fuel
Transport,
Shipping
Sh
SCADA, Communications
Fuels, Lubricants
Heat
,
DA tions
A
C
S nica
mu
Com
Telecom
ation
s
or
Fuel for Generat
SCADA,
Communications
Oil
p
Ship
,
Cooling
Water for Production,
si
Emis
ing
n
uctio
d
e
R
ons
Complex Interdependencies
m
m
o lth tion
c
le ea rta
&
e
H
g
T
o
gy &
in
ic sp ter
l
r
d
k
e
b
o
o
n
n
a
En Inf Pu Tra W
Fo Ba
Prevent Attacks
Reduce Vulnerability
Minimize Damage & Recover
Homeland Security
Strategic Objectives
e
c
an
n
Fi
Targets
and
Vulnerabilities
SCADA attacks
SCADA was designed for automated plant
process control. Its original design did not
envision its use over the Internet and/or security.
SCADA was adopted by electrical grids, pipelines,
and transportation networks.
Source: http://www.pcworld.com/article/id,137845-c,networksecurity/article.html
Source: http://www.zdnet.com/blog/btl/blowing-up-generators-remotely/6451
Stuxnet References
http://en.wikipedia.org/wiki/Stuxnet
http://www.google.com/hostednews/ap/article/ALe
qM5jam2yTGb8W1t53gQ6SRbSquSmiAD9IFORD00
http://volokh.com/2010/09/22/vc-scoops-thesecurity-pros-by-two-months/
NYT links Iran worm to bible
Stuxnet 'cyber superweapon' moves to China
Maroochy Shire
Australia
Source: http://images.businessweek.com/ss/10/10/1014_cyber_attacks/8.htm
Cyber Warriors
Hackers
The term hacker goes back to early days
of computers and originated with a group
of computer students at MIT
Hackers
Hackers were originally those people with intense
interest and computer skills.
Hackers are now people who use their computer
skills to break into secure computer sites, disrupt
Internet communications, steal information, etc.
In the early days of the transition hackers were
sort of seen as teenage (mostly male) geeks who
broke into sites and looked around.
The world became less tolerant as the costs rose
rapidly and the behavior is now seen as the work
of terrorists and criminals.
Source: http://en.wikipedia.org/wiki/Black_hat
Script Kiddie
In hacker culture, a script kiddie (occasionally
script bunny, skidie, script kitty, script-running
juvenile (SRJ), or similar) is a derogatory term
used for an inexperienced malicious cracker who
uses programs developed by others to attack
computer systems, and deface websites. It is
generally assumed that script kiddies are kids
who lack the ability to write sophisticated hacking
programs on their own,[1] and that their objective
is to try to impress their friends or gain credit in
underground cracker communities.[1]
Infamous Hackers
A Rogues Gallery of Hackers along with the damage to
private industry, society, and government.
Footnote
Rifkin returned to the US and
believing that the diamonds could
be sold at a profit attempted to sell
them to local jewelry outlets for
$13.2M. Working on a tip he was
turned in.
The bank after the trial believed that
it could now sell the diamonds at a
profit via auction. After a year of
trying the bank sold them at greatly
less than the original price.
Lesson DIAMONDS are greatly over
inflated in value and are a classic
example of social engineering. Their
value as an investment is highly
doubtful.
See
Ian Murphy
Changed the internal
clocks at AT&T.
Impact: Phone bills were
universally incorrect.
Late night discounts were
given to daytime users
and late night users were
subject to high bills.
First hacker to go to jail.
Inspired the movie,
Sneakers
Robert Morris
Source: www.nndb.com
Vladimir Levin
Hacked Citibank
Stole $10 12 million
Arrested in 1995.
Fought extradition for
two years
3 yrs in prison
Had to return
$240,015 to Citibank
David L. Smith
Creator of Melissa
virus
The Melissa virus was
named after a stripper
and was send as an
email attachment.
Caught by hard work
and luck
Ehud Tenebaum
18-year-old Israeli who
created "the most
organized and
systematic attack the
Pentagon has seen to
date."
Kevin Mitnick
Hacked
PACBell
The Pentagon
North American Air Defense
Command
MCI
Digital Equipment Co.
Nokia
Motorola
Novell
Fujitsu
NEC
Sun
Kevin Mitnick
After being convicted and
serving 4 yrs., he became a
security professional.
While the media portrayed him
as a computer genius, he
exploited human weakness
through social engineering for
his exploits
See Art of Deception by K.D.
Mitnick & Wm. L. Simon, Wily
(2002). A compendium of cons
for getting information
including private,
governmental, and corporate
data and ways to prevent
them.
Source: http://www.mccullagh.org/image/10d-9/kevin-mitnick.html
Shown at Los Vegas Def Con selling his services as a security professional
Stole: $87,000
Hao Jinglong
Prison Term: Life
Hao Jingwen
Death Penalty
Source: http://www.computerworld.com.au/index.php/id;1224861705;relcomp;1
Reomel Lamores
Author of the Love Bug
Damage caused to
international
businesses estimated
at over $100 million
Prison term: None
Fine: $0
Hacking is not a crime
in the Phillipines
Adrian Lamo
Homeless hacker who
only performs intrusion
analysis for free for large
companies.
Hacked into
MCI WorldCom
New York Times Co.
Microsoft
AOL Time Warner
CSC
NBC
http://www.cnn.com/TECH/computing/9803/18/juvenile.hacker/
Super Hacker
Emulex Corporation
http://www.pro-linux.de/berichte/jpgs/cliff_interview.jpg
Hacker Trackers
Kevin Mitnick was tracked
down in part by Tsutomu
Shimomura.
See Take Down, T.
Shimomura & J. Markoff,
Hyperion Press, (1996).
References
Verton, D The Hacker Diaries, Confessions of
Teen Age Hackers, (2002), McGraw Hill
Soruce: http://en.wikipedia.org/wiki/Identity_theft
Social Engineering
While the media portrays the hacker as a
super smart geek, in fact many of the best
hackers use social engineering to
accomplish their criminal acts.
Social Engineering
In the field of computer security, social engineering is the
practice of obtaining confidential information by manipulation of
legitimate users.
A social engineer will commonly use the telephone or Internet to
trick people into revealing sensitive information or getting them
to do something that is against typical policies.
By this method, social engineers exploit the natural tendency of
a person to trust his or her word, rather than exploiting computer
security holes.
It is generally agreed upon that users are the weak link in
security and this principle is what makes social engineering
possible.
Source: http://en.wikipedia.org/wiki/Social_engineering_%28computer_security%29
Google Hacking
University of Sunderland
CSEM02
Harry R Erwin, PhD
Peter Dunne, PhD
Section taken from web posted by Erwin
Basics
Web Search
Newsgroups
Images
Preferences
Language Tools
Google Queries
Non-case sensitive
* in a query stands for a word
. in a query is a single character wildcard
Automatic stemming
Ten-word limit
AND (+) is assumed, OR (|) and NOT (-) must be
entered
for a phrase
More Queries
You can control the language of the pages and
the language of the reports
You can restrict the search to specific countries
Controlling Searches
Intitle, allintitle
Inurl, allinurl
Filetype
Allintext
Site
Link
Inanchor
Daterange
Cache
Info
Related
Phonebook
Rphonebook
Bphonebook
Author
Group
Msgid
Insubject
Stocks
Define
Typical Filetypes
Pdf
Ps
Xls
Ppt
Doc
Rtf
Txt
Why Google
You access Google, not the original website.
Most crackers access any site, even Google via a
proxy server.
Why? If you access the cached web page and it
contains images, you will get the images from the
original site.
Directory Listings
HR files
Helpdesk files
Job listings
Company information
Employee names
Personal websites and blogs
E-mail and e-mail addresses
Network Mapping
Site:domain name
Site crawling, particularly by indicating negative
searches for known domains
Lynx is convenient if you want lots of hits:
lynx -dump http://www.google.com/search?\
q=site:name+-knownsite&num=100 >\
test.html
Link Mapping
Explore the target site to see what it links to. The
owners of the linked sites may be trusted and yet
have weak security.
The link operator supports this kind of search.
Also check the newsgroups for questions from
people at the organization.
Site:
Intitle:index.of
Error|warning
Login|logon
Username|userid|
employee.ID| your
username is
Password|passcode|
your password is
Admin|administrator
-ext:html -ext:htm
-ext:shtml -ext:asp
-ext:php
Inurl:temp|inurl:tmp|
inurl:backup|inurl:bak
Intranet|help.desk
Protecting Yourselves
More Protection
Passwords
Delete anything you dont need from the standard
webserver configuration
Keep your system patched.
Hack yourself
If sensitive data gets into Google, use the URL
removal tools to delete it.
intitle:sony
network camera snc-p1
intitle:sony
network camera snc-m1
site:.viewnetcam.com www.viewnetcam.com
intitle:Toshiba
Network Camera user lo
gin
intitle:netcam live image
intitle:i
-Catcher Console Web M
onitor
Password Cracking
Password cracking is the process of recovering
secret passwords from data that has been stored
in or transmitted by a computer system. A
common approach is to repeatedly try guesses
for the password.
Password cracking works in a number of ways:
Guessing common words, birth dates, etc.
Dictionary attacks- trying all the words in a dictionary
Brute force based on the hashing system used by the
operating system
Source:http://en.wikipedia.org/wiki/Password_cracking
Packet Sniffers
A sniffer is a program that monitors and analyzes
network traffic, detecting bottlenecks and problems.
Ethernet protocol works by sending packet information to
all the hosts on the same circuit. A machine that is
accepting all packets, no matter what the packet header
says, is said to be in promiscuous mode.
Because, in a normal networking environment, account
and password information is passed along Ethernet in
clear-text, it is not hard for an intruder once they obtain
root to put a machine into promiscuous mode and by
sniffing, compromise all the machines on the net.
Source:http://cs.baylor.edu/~donahoo/tools/sniffer/packetsniffers.htm
Packet Sniffers
The popularity of packet sniffing stems from the fact that it
sees everything. Typical items sniffed include:
SMTP, POP, IMAP traffic
Allows intruder to read the actual e-mail.
POP, IMAP, HTTP Basic, Telnet authentication
Reads passwords off the wire in clear-text.
SMB, NFS, FTP traffic
Reads files of the wire.
SQL databse
Reads financial transactions and credit card numbers.
Source:http://cs.baylor.edu/~donahoo/tools/sniffer/packetsniffers.htm
Packet Sniffers
Source: http://sectools.org/sniffers.html
Nslookup
Whois
Ping
Traceroute
Nslookup
nslookup is a network administration commandline tool available for many computer operating
systems for querying the Domain Name System
(DNS) to obtain domain name or IP address
mapping or for any other specific DNS record
Source: http://en.wikipedia.org/wiki/Nslookup
Whois
WHOIS (pronounced as the phrase who is) is a
query and response protocol that is widely used
for querying databases that store the registered
users or assignees of an Internet resource, such
as a domain name, an IP address block, or an
autonomous system, but is also used for a wider
range of other information. The protocol stores
and delivers database content in a humanreadable format.[1] The Whois protocol is
documented in RFC 3912.
Source: http://en.wikipedia.org/wiki/Whois
Ping
Source: http://en.wikipedia.org/wiki/Ping
Traceroute
Source: http://en.wikipedia.org/wiki/Traceroute
Keystroke Logging
Keystroke logging is the program installed on a
computer to record every keystroke that the user
makes. Typically it is hidden in a Trojan horse.
The keystroke logger can reveal user ids and
passwords, scripts, etc.
The data can be downloaded and also used to
upload other damaging programs or to create a
slave computer that obeys a master in DDOS
attacks.
@ instead of a
$ instead of s
3 instead of E
& instead of et
1 or ! instead of i
1 instead of l (depending on if you use ! instead of i)
Ex. Instead of using the password mainstreet use m@1n$tr3&
What is a firewall?
(frwl) (n.) A system designed to prevent
unauthorized access to or from a private network.
Firewalls can be implemented in both hardware
and software, or a combination of both. Firewalls
are frequently used to prevent unauthorized
Internet users from accessing private networks
connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass
through the firewall, which examines each
message and blocks those that do not meet the
specified security criteria.
Source: http://www.webopedia.com/TERM/f/firewall.html
Packet filter: Looks at each packet entering or leaving the network and accepts
or rejects it based on user-defined rules. Packet filtering is fairly effective and
transparent to users, but it is difficult to configure. In addition, it is susceptible to
IP spoofing.
Application gateway: Applies security mechanisms to specific applications,
such as FTP and Telnet servers. This is very effective, but can impose a
performance degradation.
Circuit-level gateway: Applies security mechanisms when a TCP or UDP
connection is established. Once the connection has been made, packets can
flow between the hosts without further checking.
Proxy server: Intercepts all messages entering and leaving the network. The
proxy server effectively hides the true network addresses.
Source: http://www.webopedia.com/TERM/f/firewall.html
Source: http://www.answers.com/
http://www.answers.com/
Reference:
Scrambrey,J et al Hacking Exposed Web
Applications, 2nd edit,(2006) McGraw Hill.
Dhanjani, N Linux and Unix Security Portable
Reference, (2003) McGraw Hill
Shema, M Web Security Portable Reference,
(2003) McGraw Hill
http://tutorials.freeskills.com/read/id/646
Read and understand the refund and shipping policies of a website you
visit, before you make your purchase. Look closely at disclosures about the
website's refund and shipping policies. Again, search through the website for
these disclosures.
Keep your personal information private. Don't disclose your personal
information - your address, telephone number, bank account number or e-mail
address - unless you know who's collecting the information, why they're
collecting it and how they'll use it.
Give payment information only to businesses you know and trust, and
only when and where it is appropriate - like an order form. Never give your
password to anyone online, even your Internet service provider.
Keep records of your online transactions and check your e-mail for
contacts by merchants with whom you're doing business. Merchants may
send you important information about your purchases.
Review your monthly credit card and bank statements for any errors or
unauthorized purchases promptly and thoroughly. Notify your credit or debit
card issuer immediately if your credit or debit card is lost or stolen, or if you
suspect someone is using your accounts without your permission.
Actions to take
Call and report all lost or compromised credit and debit
cards immediately. Your liability for loss is often
dependent on quick reporting. Remember driver
licenses, passports, and other id as well.
Carry a list of your credit/debit cards, their numbers, and phone
numbers in a separate place than the cards.
Experian
1 888-397-3742
1 800-583-4080
EQUIFAX 1 800-685-1111
1 800-349-9960
TRANS
UNION
1 800-916-8800
References
Standler, R.B., Computer Crime,
http://www.rbs2.com/ccrime.htm (2002)
Movies
Hackers (1995) starring a very young Angelina
Jolie
Takedown (2000) A cult classic about the phone
phreaker, Kevin Mitchnik
The Score (2001) Ed Norton and Robert De Niro
in a crime set in Canada
Live Free or Die Hard (2007) A Bruce Willis flix,
The attacking the nations infrastructure thru its
interlocking grids.
Source:
http://netforbeginners.about.com/od/hacking101/a/hackermovies.
htm