Lecture 19

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Lecture 19

Hacking
2 WHAT IS NETWORK
SECURITY?
 Security is much larger than just packets,
firewalls, and hackers. Security includes:
 Policies and procedures
 Liabilities and laws
 Human behavior patterns
 Corporate security programs and implementation
 Technical aspects- firewalls, intrusion detection
systems, proxies, encryption, antivirus software,
hacks, cracks, and attacks
 Understanding hacking tools and how attacks
are carried out is only one piece of the puzzle.
ATTACKS

 THERE ARE MANY TYPES OF ATTACKS


 SPOOFING ATTACK
 TELNET BASED ATTACK
 DOS (Daniel of service) ATTACK
 PING OF DEATH
 DISTRIBUTED DOS ATTACK
 MAILBOMBS
NEED FOR SECURITY

 SOME EXELLENT SOFTWARE CAN PROVIDE YOU


BEST SECURITY
 LIKE
 TROJAN
 FIREWALL
TROJAN

 WINDOWS TROJANS ARE SMALL ASPECT OF


WINDOWS SECURUTY
 TROJAN IS UNOTHORIZED PROGRAM CONTAINED
WITHIN A LEGIMATE PROGRAM
 THIS PROGRAM PERFORMS FUNCTION UNKNOWN
BY USER
FIREWALL

 FIREWALL IS ANY DEVICE USED TO PREVENT


OUTSIDERS FROM GAINING ACCESS TO YOUR
NETWORK
 TYPES OF FIREWALLS
 PACKET FILTER
 APPLICATION PROXY
 PACKET INSPECTION
7 Common Steps for
Attackers
 Reconnaissance
 Intelligent work of obtaining information either actively
or passively
 Examples:
 Passively: Sniffing Traffic, eavesdropping
 Actively: Obtaining data from American Registry for
Internet Numbers (ARIN), who is databases, web sites,
social engineering
8 Common Steps for
Attackers
 Scanning
 Identifying systems that are running and services that
are active on them
 Examples: Ping sweeps and port scans
9 Common Steps for
Attackers
 Gaining Access
 Exploiting identified vulnerabilities to gain
unauthorized access
 Examples: Exploiting a buffer overflow or brute forcing
a password and logging onto a system
10 Common Steps for
Attackers
 Maintaining Access
 Uploading malicious software to ensure re-entry is
possible
 Example: Installing a backdoor on a system
11 Common Steps for
Attackers
 Covering Tracks
 Carrying out activities to hide one’s malicious activities
 Example: Deleting or modifying data in a system and
its application logs

You might also like