| 0 comments ]

Examining Network Attack Methodologies

Add a note hereWho are hackers? What motivates them? How do they do it? How do they manage to breach the measures we have in place to ensure confidentiality, integrity, and availability? Which best practices can we adopt to defeat hackers? These are some of the questions we try to answer next.

Add a note here Adversaries, Motivations, and Classes of Attack

Add a note hereA vulnerability is a weakness in a system or its design that can be exploited by a threat. Vulnerabilities are sometimes found in the protocols themselves, as in the case of some security weaknesses in TCP/IP. Often, the vulnerabilities are in the operating systems and applications.

Add a note hereA threat is an external menace to that system. For example, a hacker actively scouting the Internet for a specific buffer-overflow vulnerability found in web servers would be considered a threat.

Add a note hereA risk is the likelihood that a particular threat using a specific attack will exploit a particular vulnerability of a system that results in an undesirable consequence. Although the roof of the data center might be vulnerable to being penetrated by a falling meteor, for example, the risk is minimal because the likelihood of that threat being realized is essentially almost none.

Add a note here An exploit happens when computer code is developed to take advantage of a vulnerability. For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this vulnerability. Although the vulnerability exists theoretically, there is no exploit yet developed for it. Because there is no exploit, there really is no problem yet.


Note

Add a note hereIf you have a vulnerability, but there is no threat toward that vulnerability, you have no risk!

Add a note hereWhen you analyze system vulnerabilities, it helps to categorize them in classes to better understand the reasons for their emergence. You can categorize the main vulnerabilities of systems as one of the following:

  • Add a note hereDesign errors

  • Add a note hereProtocol weaknesses

  • Add a note hereSoftware vulnerabilities

  • Add a note hereMisconfiguration

  • Add a note hereHostile code

  • Add a note hereHuman factor

Add a note hereThese are just a few of the vulnerability categories. For each of these categories, many additional vulnerabilities could be listed.

Add a note herePeople are social beings, and it is quite common for systems to be compromised through social engineering. Harm can be caused by people just trying to be “helpful.” For example, in an attempt to be helpful, people have been known to give their passwords over the phone to attackers who have a convincing manner and say they are troubleshooting a problem and need to test access using a real user password. The end user must be trained, and reminded, that the ultimate security of a system depends on their behavior.

Add a note hereOf course, people often cause harm within organizations intentionally:

  • Add a note hereMost security incidents are caused by insiders.

  • Add a note hereStrong internal controls on security are required.

  • Add a note hereSpecial organizational practices might need to be implemented.

Add a note hereAn example of a special organizational practice that helps to provide security is the separation of duty, where critical tasks require two or more persons to complete them, thereby reducing the risk of insider threat. People are less likely to attack or misbehave if they are required to cooperate with others.

Add a note hereUnfortunately, users frequently consider security too difficult to understand. Software often does not make security options or decisions easy for end users. Also, users typically prefer “whatever” functionality to no functionality.

Adversaries

Add a note hereTo defend against attacks on information and information systems, organizations must begin to define the threat by identifying potential adversaries. These adversaries can include the following:

  • Add a note here Nation or states

  • Add a note hereTerrorists

  • Add a note hereCriminals

  • Add a note hereHackers

  • Add a note hereCorporate competitors

  • Add a note hereDisgruntled employees

  • Add a note hereGovernment agencies

Add a note hereHackers comprise the most well-known outside threat to information systems. They are not necessarily geniuses, but they are persistent people who have taken a lot of time to learn their craft.

Add a note hereMany titles are assigned to hackers:

  • Add a note here Hackers: Hackers are individuals who break into computer networks and systems to learn more about them. Some hackers generally mean no harm and do not expect financial gain. Unfortunately, hackers may unintentionally pass valuable information on to people who do intend to harm the system.

  • Add a note here Crackers (criminal hackers): Crackers are hackers with a criminal intent to harm information systems. Crackers are generally working for financial gain and are sometimes called black hat hackers.

  • Add a note here Phreakers (phone breakers): Phreakers pride themselves on compromising telephone systems. Phreakers reroute and disconnect telephone lines, sell wiretaps, and steal long-distance services.


    Note

    Add a note hereWhen describing individuals whose intent is to exploit a network maliciously, these individuals are often incorrectly referred to as hackers. In this lesson, the term hacker is used, but might refer to someone more correctly referred to as a cracker, or black hat hacker.

  • Add a note here Script kiddies: Script kiddies think of themselves as hackers, but have very low skill levels. They do not write their own code; instead, they run scripts written by other, more skilled attackers.

  • Add a note here Hacktivists: Hacktivists are individuals who have a political agenda in doing their work. When government websites are defaced, this is usually the work of a hacktivist.

Add a note hereIn computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems.

Add a note hereThe release of the movie WarGames in 1983 raised the public’s awareness that computer security hackers (especially teenagers) could be a threat to national security. Unfortunately, this concern became real when a gang of teenage crackers known as the 414s broke into computer systems throughout the United States and Canada, including Los Alamos National Laboratory, Memorial Sloan-Kettering Cancer Center, and Security Pacific Bank. The case drew worldwide media attention, and a 17-year-old emerged as the spokesman for the gang. An American magazine, Newsweek, wrote an article in which the word hacker first appeared. Since that time, all forms of media refer to every class of attacker as a hacker.

Add a note hereBecause of news coverage, the U.S. House of Representatives called for an investigation and new laws to cover computer hacking. Because of these laws, white hat, gray hat, and black hat hackers try to distinguish themselves from each other, depending on the legality of their activities.

Add a note hereWhen referring to the events of the 414 gang, Ken Thompson said the following:

Add a note hereI would like to criticize the press in its handling of the “hackers,” the 414 gang, the Dalton gang, and so on. The acts that are performed by these kids are vandalism at best and probably trespass and theft at worst. ... I have watched kids testifying before Congress. It is clear that they are completely unaware of the seriousness of their acts.

Add a note hereIn the academic hacker culture, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness. After 1980, this subculture coalesced with the culture of UNIX. Since the mid-1990s, it has been largely coincident with what is now referred to as the free software and open source movement.

Add a note hereAcademic hackers usually work openly and use their real name, whereas computer security hackers prefer secretive groups and identity-concealing aliases. Also, their activities in practice are largely distinct. Academic hackers focus on creating new infrastructure and improving existing infrastructure (especially the software environment they work with), whereas computer security hackers primarily and strongly emphasize the general act of circumventing security measures.

Add a note hereThe academic hacker community sees secondary circumvention of security mechanisms as legitimate if it is done to get practical barriers out of the way for doing actual work. However, the primary focus in these activities is not one of their interests. A further difference is that, historically, academic hackers were working at academic institutions and used the computing environment there. In contrast, the typical computer security hacker operates out of their home.

Add a note hereWithin the academic hacker culture, the term hacker is also used for a programmer who reaches a goal by employing a series of modifications to extend existing code or resources. In a universal sense, a hacker also refers to someone who makes things work beyond perceived limits in a clever way.

Add a note hereThe hobby hacking subculture relates to the home computing of the late 1970s. The hobbyist focuses mainly on computer and video games, software cracking, and the modification of computer hardware and other electronic devices, also known as modding.

Motivations

Add a note here To defend against attacks on information and information systems, organizations must define the threat in terms of motivation. Motivations can include intelligence gathering, theft of intellectual property, denial of service (DoS), embarrassment of the company or clients, and pride in exploiting a notable target.

Add a note hereThere are many different kinds of attackers. They mainly differ by how much funding they have and which targets they pick. You can roughly divide these attackers in to three groups:

  • Add a note hereCasual crackers (script kiddies)

  • Add a note hereMotivated or paid crackers (lone criminals, industrial spies, organized crime)

  • Add a note hereMilitary, government intelligence, information warfare, or cyberterrorism

Add a note hereCasual crackers pick almost any target and have low funding. Their motivation usually lies in learning, discovering, and generally exploiting things “because they were there.” They are normally not capable of attacking highly secure systems because they lack the resources and knowledge. Still, they can produce substantial damage in money and lost time.

Add a note hereMotivated crackers are usually well paid and possess adequate resources. They are likely to attack carefully selected targets, based on the instructions of their employer. These actions are not always for profit. In recent history, attacks have been made to further a specific agenda. They can produce severe damage and can be extremely difficult to trace.

Add a note hereMilitary or government intelligence has almost unlimited funding. It is believed that, because of their state-of-the-art equipment, they can crack most low-end codes in nearly real time.

Add a note here Classes of Attack and Methodology

Add a note hereThe goal of any hacker is to compromise the intended target or application. Hackers begin with little or no information about the intended target, but by the end of their analysis, they have accessed the network and have begun to compromise their target. Their approach is usually careful and methodical, not rushed and reckless. The seven-step process that follows is a good representation of the methods that hackers use:

Add a note here Step 1

Add a note herePerform footprint analysis (reconnaissance).

Add a note here Step 2

Add a note hereEnumerate applications and operating systems.

Add a note here Step 3

Add a note hereManipulate users to gain access.

Add a note here Step 4

Add a note hereEscalate privileges.

Add a note here Step 5

Add a note hereGather additional passwords and secrets.

Add a note here Step 6

Add a note hereInstall back doors.

Add a note here Step 7

Add a note hereLeverage the compromised system.


Caution

Add a note hereHackers have become successful by thinking “outside the box.” This methodology is meant to illustrate the steps that a structured attack might take. Not all hackers will follow these steps in this order.

Add a note hereTo successfully hack into a system, as a first step hackers generally want to know as much as they can about the system. Hackers can build a complete profile or “footprint” of the company security posture. Using a range of tools and techniques, an attacker can discover the company domain names, network blocks, IP addresses of systems, ports and services that are used, and many other details that pertain to the company security posture as it relates to the Internet, an intranet, remote access, and an extranet. By following some simple advice, network administrators can make footprinting more difficult.

Add a note hereAfter the hacker has completed a profile, or footprint, of your organization, they use tools, such as those in the list that follows, to enumerate additional information about your systems and networks. All these tools are readily available to download, and the security staff should know how these tools work. Additional tools, introduced later in this chapter in the “Security Testing Techniques” section, can also be used to gather information and therefore hack:

  • Add a note here Netcat: Netcat is a featured networking utility that reads and writes data across network connections.

  • Add a note here Microsoft EPDump and Microsoft Remote Procedure Call (RPC) Dump: These tools provide information about Microsoft RPC services on a server.

  • Add a note here GetMAC: This application provides a quick way to find the MAC (Ethernet) layer address and binding order for a computer running Microsoft Windows locally or across a network.

  • Add a note here DumpSec by SomarSoft: This application is a security auditing program for Windows NT, Windows XP, and Windows 2000 or later systems.

  • Add a note here Software development kits (SDK): SDKs provide hackers with the basic tools that they need to learn more about systems.

Add a note hereAnother common technique that hackers use is to manipulate users of an organization to gain access to that organization. There are countless cases of unsuspecting employees providing information to unauthorized people simply because the requesters appear innocent or to be in a position of authority. Hackers find names and telephone numbers on websites or domain registration records by footprinting. Hackers then directly contact these people by phone and convince them to reveal passwords. Hackers gather information without raising any concern or suspicion. This form of attack is called social engineering.

Add a note hereThe next thing the hacker typically does is review all the information about the host that they have collected, searching for usernames, passwords, and Registry keys that contain application or user passwords. This information can help hackers escalate their privileges on the host or network. If reviewing the information from the host does not reveal useful information, hackers may launch a Trojan horse attack in an attempt to escalate their privileges on the host. This type of attack usually means copying malicious code to the user system and giving it the same name as a frequently used piece of software.

Add a note hereAfter the hacker has higher privileges, the next task is to gather additional passwords and other sensitive data. The targets now include such things as the local security accounts manager database or the active directory of a domain controller. Hackers use legitimate tools such as pwdump and lsadump applications to gather passwords from machines running Windows. By cross-referencing username and password combinations, the hacker is able to obtain administrative access to all the computers in the network.

Add a note hereIf hackers are detected trying to enter through the “front door,” or if they want to enter the system without being detected, they try to use “back doors” into the system. A back door is a method of bypassing normal authentication to secure remote access to a computer while attempting to remain undetected. The most common backdoor point is a listening port that provides remote access to the system for users (hackers) who do not have, or do not want to use, access or administrative privileges.

Add a note hereAfter hackers gain administrative access, they enjoy hacking other systems on the network. As each new system is hacked, the attacker performs the steps that were outlined previously to gather additional system and password information. Hackers try to scan and exploit a single system or a whole set of networks and usually automate the whole process.

Add a note hereIn addition, hackers will cover their tracks either by deleting log entries or falsifying them.



0 comments

Post a Comment