Download - Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

Transcript
Page 1: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY

101 – STUDENT GUIDE

Page 2: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

Copyright© 2017 AlienVault. All rights reserved 1

Information Security 101

Page 3: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 2

Information Security 101

What motivates attackers?

Review common system vulnerabilities.

Examine how attacks are delivered.

Consider attack types.

Page 4: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 3

What motivates attackers?

Governments

Surveillance

Steal Secrets

Cause Harm

Activists

Further Cause

Steal Data

Cause Harm

Credit Cards

Personal Data

Resources

Criminals

Page 5: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 6: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 4

Common System Vulnerabilities

Internet

WWW

Page 7: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 8: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 5

How Attacks are Delivered

People / SocialBotnets

Internet

Direct

Page 9: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 10: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 6

Types of attack

Malware Attacks

Denial of Service Attacks

**** Brute force Attacks

**** Cryptographic Attacks

Network AttacksWWW Web Application Attacks

Page 11: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 12: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 7

Malware Attacks

Page 13: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 8

What is a Virus?

Copy with File or EXE

Code injected into programs and files.

User intervention is required.

Spread through sharing.

Page 14: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 9

What is a Worm?

Copy over Network

Exploits operating system vulnerabilities.

No user interaction is required.

Reproduce/duplicate and spreads by itself.

Page 15: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 10

What is a Trojan?

Free Word Processor

Masquerades as a not-malicious application.

User intervention is required.

Can cause damage but often stealthy.

Page 16: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 11

Malware Attacks

Botnet Ransomware

Adware / Spyware

/ Keylogger

Rootkit / Backdoor

Page 17: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 18: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 12

Web Application Attacks

Page 19: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 13

Web Application Attacks (SQL Injection)

Exploits of a Mom: https://xkcd.com/327/

Page 20: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 14

Web Application Attacks (SQL Injection)

SQL – Structured Query Language

Page 21: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 15

Web Application Attacks (SQL Injection)

Steal Information

Execute Server Commands

Delete Database / Data

Page 22: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 16

Web Application Attacks (Cross Site Scripting)

Reflected Stored

Cross Site Scripting is also known as XSS.

Reflected XSS: Link is crafted, the user is tricked into clicking it.

Stored XSS: Impacts all visitors to an exploited page.

PersistentNon-Persistent

Page 23: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 24: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 17

Web Application Attacks (Cross Site Scripting)

Cookies

Page 25: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 18

Web Application Attacks (Cross Site Scripting)

Impersonate Users

Collect Information

Browser Exploits

Page 26: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 19

Web Application Attacks (Broken Authentication)

Username / Password / Session ID

Unencrypted Connection

Session values don’t expire

Session IDs in the URL

Page 27: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 20

Web Application Attacks (Broken Authentication)

Username / Password / Session ID

http://www.mytestsite.com/login.jsp?sessionid=XXXXXX

Page 28: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 21

Denial of Service Attacks

Page 29: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 22

Denial of Service Attacks

Denial of Service

Distributed Denial of Service

Page 30: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 23

Denial of Service Attacks

ICMP Flood Attack

Smurf Attack

TCP SYN Flood Attack

CPU

Memory

Network

Page 31: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 32: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 24

Brute Force Attack

Page 33: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 25

Brute Force Attack

SSH

FTP

HTTP

…and so on

Attempts every combination

Time-consuming

Guaranteed to work given enough time

Page 34: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 26

Dictionary Attack

Uses a file with common usernames and passwords

Faster than an exhaustive brute force attack

Not exhaustive and not guaranteed to succeed

SSH

FTP

HTTP

…and so on?

Page 35: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 27

Network Attacks

Page 36: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 28

Network Attacks (A Brief Introduction)

Network Sniffing

Promiscuous Mode

Hubs, Switches, and Routers

Router Layer 3 (Network) Internet Protocol (IP)

Switch Layer 2 (Data Link) Media Access Control (MAC)

Hub Layer 1 (Physical)

Page 37: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 38: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 29

Network Attacks (ARP Spoofing)

Manipulates the Address Resolution Protocol

ARP Poisoning

Used in a “Man in the middle” attack

Page 39: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 30

Network Attacks (ARP Spoofing)

Device IP MAC

Destination 192.168.1.5 ec-08-6b-d1-1e-c4

Victim 192.168.1.10 00-50-56-C0-00-08

Attacker 192.168.1.20 00-50-56-C0-00-01

Page 40: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 31

Network Attacks (IP Spoofing)

Source IP modified in the packet header

Trying to gain access by impersonating authorized system

Non-Blind — Uses the TCP handshake

Blind — TCP handshake with modified network packet

Non-Blind

Blind

Router (L3) Switch (L2)

Page 41: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 42: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 32

Network Attacks (IP Spoofing — Non-Blind)

Device IP MAC

Destination 192.168.1.10 00-50-56-C0-00-10

Source 192.168.1.20 00-50-56-C0-00-08

Attacker 192.168.1.30 00-50-56-C0-00-01

SYN

SYN (ACK)

Page 43: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 33

Network Attacks (IP Spoofing — Blind)

Device IP MAC

Destination 192.168.1.10 00-50-56-C0-00-10

Source 192.168.1.20 00-50-56-C0-00-08

Attacker 180.10.10.20 00-50-56-C0-00-01

Gateway 192.168.1.1 ec-08-6b-d1-1e-c4

SYN

SYN (ACK)

ACK (Source Routing Flag)

Page 44: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 34

Cryptographic Attacks

Page 45: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 35

Cryptographic Attacks

SSH

de

9f2

c7

fd2

1b

3a

fad

37

f

WEP / WPA

??

?

Hash

Password

Page 46: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 36

Cryptographic Attacks (Man in the Middle)

SA

A

S

Page 47: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 37

Cryptographic Attacks (WiFi Cracking)

Wired Equivalent Privacy

WEP is vulnerable to attack due to predictability

Use Wifi Protected Access instead

BSSID Channel Encryption

00:23:69:BB:.. 9 WPA-2

00:1F:33:C9:.. 5 WEP

Deauthentication of Station

Capture frames on reconnect

Page 48: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 49: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 38

Cryptographic Attacks (Password Hash)

Attacker has obtained password files

Used against hashed passwords

Same idea as brute force authentication

passwd

shadow

Usernames

Password Hash

SHA-1: 8c599c4256f1dcf620614c8fc87ff4ab91c348e1

Page 50: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 51: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 39

Cryptographic Attacks (Password Hash)

Dictionary Attack

Rainbow Tables

Salting the Hash

Usernames

Password Hash

SHA-512

Dictionary File

Rainbow Table

Contains common passwords and hash

Page 52: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Page 53: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE

Copyright© 2017 AlienVault. All rights reserved 40

Summary

We identified what motivates attackers.

We introduced some common system vulnerabilities.

We learned about attack delivery methods.

We saw several attack types.

Page 55: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101

INFORMATION SECURITY 101 – STUDENT GUIDE