No Slide Title
Download
Report
Transcript No Slide Title
Hacking 101
How hackers do it
Ron Woerner
Security Administrator
CSG Systems, Inc.
What do you think when you hear:
7/20/2015
Hacker or cracker
Melissa, LoveBug (ILOVEYOU)
Denial of Service (DoS) attacks
Packet sniffing
Password cracking
Information warfare or Cybercrime
Social engineering
©2000, CSG Systems, Inc.
All rights reserved
3
Home Security Analogy
Systems Security is like securing your house
Policies are the written understanding
Access control and passwords are the keys
Window and door locks keep out intruders
A security camera watches open doors
The intent is to make the environment less
inviting to those looking for easy pickings
7/20/2015
©2000, CSG Systems, Inc.
All rights reserved
4
The “Crown Jewels”
Question:
What are your “Crown Jewels”?
What attracts hackers to your company?
Why would a hacker take interest in your company?
What is your companies biggest vulnerabilities?
7/20/2015
©2000, CSG Systems, Inc.
All rights reserved
5
Security Risks
You need to be concerned about:
Disclosure of confidential information - The disclosure of
personal and private information about individuals can lead to civil
or criminal liability for your company.
Data loss - Data can be electronically destroyed or altered either
accidentally or maliciously.
Damage to reputation - Customers, potential customers,
investors, and potential investors are all influenced by a security
incident.
Downtime - A security incident can shut an organization down.
7/20/2015
CSG Systems, Inc.Confidential & Proprietary
©2000, CSG Systems, Inc.
All rights reserved
6
Anatomy of a Hack
Perimeter / Vulnerability Assessment
Footprinting
Scanning
Enumeration
Exploitation
7/20/2015
Gaining Access
Escalating privileges
Pilfering
Covering Tracks
Creating backdoors
©2000, CSG Systems, Inc.
All rights reserved
7
Assessment
Footprinting - Information gathering
Open source search on the site
Network Solutions (www.networksolutions.com/cgibin/whois/whois)
ARIN whois (www.arin.net/whois)
This gives network and contact information
DNS lookup (nslookup, Sam Spade)
The Domain Name Server gives further network and
system information
7/20/2015
©2000, CSG Systems, Inc.
All rights reserved
8
Assessment
Scanning - System type
IP Address determination - ping sweep
Determines which systems I can access
Port Scan (TCP/UDP)
Shows what is “open” on those systems
Enumeration - Getting details
System/application vulnerabilities
What’s running on a particular system
System users
Who is on that system
7/20/2015
©2000, CSG Systems, Inc.
All rights reserved
9
Exploitation
Gaining access
Password eavesdropping
Buffer overflows
Application vulnerabilities
Escalating privilege (gaining root/admin)
Password cracking
Network sniffing
Application vulnerabilities
7/20/2015
©2000, CSG Systems, Inc.
All rights reserved
10
Exploitation
Pilfering - getting the “crown jewels”
Finding whatever is valuable such as
Credit information
Personal information
Additional system information
Covering Tracks
Loading a “root kit”
7/20/2015
Clear log files
Hide tools
Secure the system
Creating back doors - so they can get in again
©2000, CSG Systems, Inc.
All rights reserved
11
Denial of Service (DoS)
Rendering a service offered by a workstation or
server unavailable to others - Disabling the target.
Reasons:
To get a system reboot
Hacker covering his/her tracks
Malicious intent
How it’s done:
Ping of death - ICMP techniques
Syn (network) vulnerabilities
7/20/2015
©2000, CSG Systems, Inc.
All rights reserved
12
Social Engineering
An attack based on deceiving users or administrators
at the target site to gain information or access.
The “old con job”
Typically done by telephoning users or operators. The
“hackers” pretend to be an authorized user and attempt
to gain information about the systems and/or gain illicit
access to systems.
Requires little technical skill.
Relies on people’s “natural” trusting nature.
7/20/2015
©2000, CSG Systems, Inc.
All rights reserved
13
What you can do
ALL systems/applications are insecure! It’s up to
the administrators and users for security.
7/20/2015
Think Security
Secure passwords
Physical security
Report incidents/anomalies
Work with system/application administrators
©2000, CSG Systems, Inc.
All rights reserved
14