By : Khalid Alfalqi Department of Computer Science, Umm Al-Qura

By : Khalid Alfalqi
Department of Computer Science, Umm Al-Qura University
Slides based on Security in Computing. Fourth Edition by Pfleeger and
Pfleeger.
Based on Dr. Musab Alzaghul’s slides
Outline
1. Network Concepts
2. Precursors to attack
3. Common Attacks
1. DOS attacks
2. A/W attacks
4. Vulnerabilities of Web Add-ins
5.
6.
7.
8.
Network Security Controls
Firewalls
Intrusion detection systems
Secure e-mail
Information Security
2
Precursors to attack
 We study the precursors (‫ )نذر‬to an attack so that
if we can recognize characteristic behavior, we may
be able to block the attack before it is launched.
1. Port scan.
2. Intelligence.
3. Social Engineering
Information Security
3
Precursors to attack
1-Port scan.
 is often used by administrator to verify security
policies of their networks and by attacker to
identify running services on a host with the view to
compromise it.
 An attacker can systematically query your network
to determine which services and ports are open.
 This process is called port scanning, and it’s part of
fingerprinting a network; it can reveal a great deal
about your systems.
 Port scan tools
• Nmap, http://www.insecure.org/nmap
• Netcat by Hobbit
• Nessus, CyberCop, SecureScanner, Internet Scanner
Information Security
4
Precursors to attack
 Port scanning tells an attacker three
things:
• Which standard ports or services are running
• What OS is installed on the target system,
 Studying the types of packets flowing from a system
can determining the type of operating system installed
 Each version of OS/app has its fingerprint that
reveals its identity (manufacturer, name, version)
• What applications and versions of applications
are present.
Information Security
5
Precursors to attack
2-Intelligence:
 In security it often refers to gathering
discrete bits of information from various
sources and then putting them together
like the pieces of a puzzle. Such as
1- Dumpster diving: (Garbage picking)
 involves looking through items that have
been discarded in rubbish bins or recycling
boxes.
• network diagrams, printouts of security device
configurations, system designs and source code,
telephone and employee lists, and more.
• Green Company
Information Security
6
Precursors to attack
2-Eavesdropping (‫)اختالس السمع‬.
 is the process of listening in or overhearing parts
of a conversation. Eavesdropping also includes
attackers listening in your network traffic.
3-Snooping (‫( التطفل‬
 occurs when someone looks through your files in
the hopes of finding something interesting. These
files may be either electronic or on paper.
4-Interception
 A passive interception would involve someone who
routinely monitors network traffic.
 An active interception might include putting a
computer system between the sender and receiver
to capture information as it’s sent.
Information Security
7
Precursors to attack
3-Social Engineering. (psychological manipulation)
 Social engineering involves using social skills
and personal interaction to get someone to
reveal security-relevant information .
 The only preventive measure in dealing with
social engineering attacks is to educate
your users and staff to never give out
passwords and user IDs over the phone, via
e-mail, or to anyone who isn’t positively
verified as being who they say the are.
Information Security
8
Precursors to attack
 Phishing is a form of social engineering in
which you simply ask someone for a piece of
information that you are missing by making
it looks as if it is a legitimate request.
Information Security
9
Precursors to attack
 Shoulder surfing
• is using direct observation
techniques, such as looking over someone's
shoulder, to get information.
• Shoulder surfing can also be done long distance
with the aid of vision-enhancing devices.
• To prevent shoulder surfing, experts
recommend that you shield paperwork or your
keypad from view by using your body or cupping
your hand.
Information Security
10
Common Attacks (DoS) attack
1. Transmission Failure
2. Connection Flooding
 ICMP
 Syn flood
 TearDrop
3. Traffic Redirection
4. Distributed DoS
Information Security
11
Common Attacks (DoS) attack
1) Transmission Failure
 Communication fails for many reasons
 Examples:
 Line cut
 Noise on a line
 Node/device failure along the transmission
path
 Device saturation: excessive traffic
 Some of the above service denials are
short-lived and/or go away automatically
Information Security
12
Common Attacks (DoS) attack
2) Connection Flooding
If an attacker sends you as much data
(useless packets) as your communications
system can handle, you are prevented from
receiving any other data. Even if an
occasional packet reaches you from
someone else, communication to you will be
seriously degraded.
 Examples:
• 2.1 ICMP
• 2.2 Syn flood
• 2.3 TearDrop

Information Security
13
Common Attacks (DoS) attack
2.1) ICMP
(1) Command Prompt
(2) ping www.wmich.edu
 Internet Control Msg Protocol
 Designed for Internet system diagnostic
 ICMP protocols include
• ping, sends ICMP “echo request” msg to destination D. If
D replies with “echo reply” msg, it indicates that D is
reachable/functioning
• echo, which requests a destination to return the
data sent to it, intended to show that the
connection link is reliable (ping is actually a
version of echo)
Information Security
14
Common Attacks (DoS) attack
three-way handshak
 A session is established with three-way handshak
 Session = virtual connection between protocol peers
• The client (initiator) sends a sequence number to open a
connection,
• the server responds with that number and a sequence
number of its own,
• and the client responds with the server's sequence
number.
• Sequence numbers are incremented regularly
Information Security
15
Common Attacks (DoS) attack
2.2) Syn flood

A common DoS attack involves opening as
many TCP sessions as possible
Information Security
16
Common Attacks (DoS) attack
2.3) Teardrop
 the attacker sends a series of datagrams
that cannot fit together properly.
 One datagram might say it is position 0 for
length 60 bytes, another position 30 for 90
bytes, and another position 41 for 173
bytes.
 These three pieces overlap, so they cannot
be reassembled properly.
 In an extreme case, the operating system
locks up with these partial data units it
cannot reassemble, thus leading to denial of
service.
Information Security
17
Common Attacks (DoS) attack
3) Redirecting traffic
 Routers advertise their conections to their neighbors
 Routers find best path for passing packets from S to D
Information Security
18
Common Attacks (DoS) attack
4) Distributed DoS
1. Attacker plants Trojans on many target machines
2. Target machines controlled by Trojans become
zombies
3. Attacker chooses victim V, orders zombies to
attack V
4. Each zombie launches a separate DoS attack
5. Different zombies can use different DoS attacks

E.g., some use syn floods, other smurf attacks
6. V becomes overwhelmed and unavailable DDoS
succeeds
Information Security
19
Common Attacks (DoS) attack
Zombie: is a computer attached to the Internet that has been compromised by a
hacker, a computer virus, or a trojan horse.
Information Security
20
Common Attacks –Access & Mod attack
1.
2.
3.
4.
5.
Password-guessing
Sniffing.
Wiretapping
Spoofing
Impersonation
Information Security
21
Common Attacks –A/W attack
1) Password-guessing attacks
 Brute-force attack: is an attempt to guess
passwords until a successful guess occurs.
 Dictionary attack: uses a dictionary of common
words to attempt to find the user’s password.
• .
Information Security
22
Common Attacks –A/W attack
2) Sniffing
 is the process of monitoring the data that is
transmitted across a network.
.
Information Security
23
Common Attacks - A/W attack
3) Wiretapping ‫التنصت علي المحادثات التلفونية‬
Information Security
24
Common Attacks - A/W attack
4) Spoofing
 spoofing refers tricking or deceiving computer
systems or other computer users. This is typically
done by hiding one's identity or faking the identity
of another user on the Internet.
Examples of spoofing are
• 4.1)Masquerade
• 4.2)Session Hijacking
• 4.3)Man-in-the-Middle Attacking.
Information Security
25
Common Attacks - A/W attack
5) Impersonation
 Attacker foils authentication and assumes
identity of a valid entity
5.1)by guessing and social engineering
5.2)by eavesdropping/wiretaping
5.3)by exploiting well-known authentication
Information Security
26
Vulnerabilities of Web Add-ins
 Increasingly, web browsers and other
web-enabled technologies allow
servers to send instructions to the
client to provide multi-media and
other capabilities.
• This is creating a problem for security
professionals
 This section discusses the more
common web-based applications such
as JavaScript and applets and the
vulnerabilities you should be aware of.
Information Security
27
Vulnerabilities of Web Add-ins
JavaScript
 Java code that is pushed to the client
for execution
Information Security
28
Vulnerabilities of Web Add-ins
Java Applets
 A Java applet is a small, self-contained Java script that is
downloaded from a server to a client and then run from the
browser.
Information Security
29
Vulnerabilities of Web Add-ins
ActiveX
 ActiveX is a technology that was implemented by
Microsoft to customize controls, icons, and other
features, which increases the usability of webenabled systems.
Information Security
30
Vulnerabilities of Web Add-ins
Cookies
 Cookies = data object sent from server S to client
C that can cause data transfers from C to S
 encoded using S’s key (C can’t read them)
 contains information about the user.
• a cookie can contain a client’s history, buying
habits to improve customer service.
• Cookies can also be used to timestamp a user to
limit access.
 cookies are considered a risk because they have
the potential to contain your personal information,
which could get into the wrong hands.
 The best protection is to not allow cookies to be
accepted.
Information Security
31
Vulnerabilities of Web Add-ins
 So a cookie is something that
• takes up space on your disk,
• holding information about you that you
cannot see,
• forwarded to servers
• you do not know whenever the server
wants it, without informing you.
Information Security
32
End of Chapter 7 part 2
Security in Networks