Những vụ tấn công mạng "đình đám" thời gian qua• Tin tặc Trung Quốc tấn công website Philippines • Theo hãng tin ABS-CBN News, vào ngày 11/5, đã có tất cả 7 website của Philippines-trong
Trang 1CỤC ỨNG DỤNG CÔNG NGHỆ THÔNG TIN
TRUNG TÂM CHÍNH PHỦ ĐIỆN TỬ
Các phương thức tấn công
Cao Hoàng Nam
Trang 2Các phương thức tấn công
• Các phương pháp trinh sát, dò quét, thu thập thông tin
• Các loại hình tấn công phổ biến
• Đánh giá an toàn thông tin
• Đánh giá lỗ hổng an toàn thông tin
• Kiểm tra khả năng thâm nhập
• Quản lý bản vá
Trang 3Những vụ tấn công mạng "đình đám" thời gian qua
• Tin tặc Trung Quốc tấn công website Philippines
• Theo hãng tin ABS-CBN News, vào ngày 11/5, đã có tất cả 7 website của Philippines-trong đó có 2 website của Chính phủ nước này-đã bị tin tặc đánh sập và thay đổi giao diện Tin tặc đã thay đổi giao diện các website bằng dòng chữ “HACKED BY CHINESE”
Trang 4Những vụ tấn công mạng "đình đám" thời gian qua
• Ngày 9/5, chỉ hai ngày sau khi Tổng thống Nga Vladimir Putin tuyên thệ nhậm chức, nhóm tin tặc nổi tiếng Anonymous tuyên bố trên Twitter đã đánh sập cổng thông tin Chính phủ nước Nga (tại địa chỉ www.kremlin.ru), đồng thời khẳng định sẽ tiến hành thêm nhiều đợt tấn công tương tự khác vào các website của Chính phủ nước này.
• rước đó một ngày, vào ngày 8/5, nhóm tin tặc giấu mặt đã sử dụng phương pháp DDos (tấn công từ chối dịch vụ) để tấn công vào website của Virgin Media - một trong những nhà cung cấp dịch vụ Internet lớn nhất tại Anh.
• Hai hacker người Na Uy đã bị cơ quan đặc trách về tội ác tại Anh (SOCA) - vốn có vai trò tương đương FBI (Cục điều tra Liên bang Mỹ) tóm gọn sau khi tấn công vào website của cơ quan này Webiste của SOCA đã bị tê liệt trong vòng vài tiếng đồng hồ, khiến nhiều công việc của cơ quan này bị gián đoạn và đặt các tài liệu mật của SOCA vào nguy cơ bị "rò rỉ" cao.
Trang 5Những vụ tấn cộng mạng đình đám internet Việt trong năm qua
• Diễn đàn chuyên về hack và bảo mật HVA đã trở thành nạn nhân của 2 vụ tấn công từ chối dịch vụ (DDOS) trong tháng 6/2011 Rạng sáng ngày 5/6/2011, nhiều thành viên diễn đàn này thông báo tình trạng truy cập khó khăn hoặc hoàn toàn không truy cập được Cùng ngày, ban quản trị HVA có thông báo chính thức về sự cố trên, theo đó HVA đã có một lượng truy cập tăng đột biến (lên đến 2.5Gbps), gây nghẽn toàn bộ đường truyền tới máy chủ.
• Tháng 6/2011 cũng là thời điểm hàng loạt website có tên miền gov.vn (website của cơ quan bộ ngành) bị hack Theo thống kê từ
Bộ Thông tin Truyền thông, có 329 trang web tên miền gov.vntrở thành nạn nhân của các vụ tấn công tính đến tháng 12/2011 Bên cạnh đó, hàng loạt website có tên miền org.vn cũng trở thành đối tượng của các vụ tấn công tương tự.
• Website Vietnamnet đã trải qua nhiều sự cố trong năm qua Vào đầu năm (4/1/2011), một đợt tấn công từ chối dịch vụ nhắm vào Vietnamnet khiến trang web bị tắc nghẽn nhiều giờ đồng hồ, gây khó khăn cho hàng triệu độc giả.
Trang 6Những vụ tấn cộng mạng đình đám internet Việt trong năm qua
Trang 7Các phương pháp trinh sát, dò quét, thu thập thông tin
Trang 8What is Footprinting
Trang 9Why Footprinting
Trang 10• Know Security Posture: Performing footprinting on the target organization in a systematic and methodical manner gives the complete profile of the organization’s security posture.
• Reduce Attack Area: by using a combination of tools and techniques, attackers can take an unknown entity (for example XYZ organization) and reduce it to a specific range of domain names, network blocks, and individual IP addresses of systems directly connected to the Internet, as well as many other details pertaining
to its security posture
Trang 11Why Footprinting
• Build information database: a detailed footprint provides maximum information about the target
organization Attackers can build their own information database about security weakness of the target organization This database can then be analyzed to find the easiest way to break into the organization’s security perimeter
• Draw network map: combining footprinting techniques with tools such as Tracert allows the attacker to create network diagrams of the target organization’s network presence This network map represents their understanding of the target’s Internet footprint These network diagrams can guide the attack
Trang 12Objectives of Footprinting
Trang 13Footprinting Methodology
Trang 14Overview of Network Scanning
Trang 15Types of Scanning
• Port scanning: open ports and services
• Network scanning: IP addresses
• Vulnerability scanning: Presence of known weaknesses
Trang 16Objectives of Network Scanning
Trang 17• Discovering live hosts, IP address, and open ports of live hosts running on network
• Discovering open ports: open ports are the best means to break into a system or network, you can find easy ways to break into the target organization’s network by discovering open ports on its network
Trang 18Objectives of Network Scanning
• Discovering operating systems and system architecture of the targeted system: this is also referred to as fingerprinting Here the attacker will try to launch the attack based on the operating system’s vulnerabilities
• Identifying the vulnerabilities and threats: vulnerabilities and threats are the security risks present in any system You can compromise the system or network by exploiting these vulnerabilities and threats
• Detecting the associated network service of each port
Trang 19Scanning Methodology
Trang 20What is Enumeration
• Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system
• In the enumeration phase, the attacker creates active connections to the system and performs directed
queries to gain more information about the target
• The attacker uses the gathered information to identify the vulnerabilities or weak points in system security and then tries to exploit them
Trang 21What is Enumeration
Trang 22Techniques for Enumeration
Trang 23Technique for Enumeration
• Extract user names using email Ids: every email ID contains two parts; one is user name and the other is domain name For example: abc@gmail.com, abc is user name and gmail.com is the domain name
• Extract information using the default passwords: many online resources provide lists of default passwords assigned by the manufacturer for their products Often users forgot to change the default passwords provided
by the manufacturer or developer of the product If users don’t change their passwords for a long time, then attackers can easily enumerate their data
Trang 24Techniques for enumeration
• Brute force Active Directory: Microsoft Active Directory is susceptible to a user name enumeration weakness at the time of user-supplied input verification This is the consequence of design error in the application If the “logon hours” feature is enabled, the attemps to the service authentication result in varying error messages Attackers take this advantage and exploit the weakness to enumerate valid user names If succeed, then the attackers can conduct a brute force attack to reveal respective passwords
• Extract user names using SNMP: attackers can easily guess the “strings” using this SNMP API through which they can extract required user names
Trang 25Techniques for enumeration
• Extract user groups from Windows: these extract user accounts from specified groups and store the results and also verify if the session accounts are in the group or not
• Extract information using DNS Zone Transfer: DNS zone transfer reveals a lot of valuable information about the particular zone you request When a DNS zone transfer request is sent to the DNS server, the server transfers its DNS records containing information such as DNS zone transfer An attacker can get valuable topological information about a target’s internal network using DNS zone transfer
Trang 26Services and Ports to Enumeration
Trang 27Packet Sniffing
Trang 28Sniffing Threats
Trang 29How a Sniffer works
Trang 30Types of Sniffing Attacks
Trang 31• MAC Flooding: sniffing attack that floods the network switch with data packets that interrupt the usual sender to recipient data flow that is common with MAC address The data , instead of passing from sender to recipient, blasts out across all the ports Thus, attackers can monitor the data across the network.
• DNS Poisoning: is a process in which the user is misdirected to a fake website by providing fake data to the DNS server The website looks similar to the genuine site but it is controlled by the attacker
• ARP Poisoning: is an attack in which the attacker tries to associate his/her own MAC address with the victim’s IP address so that the traffic meant for that IP address is sent to the attacker
Trang 32Types of Sniffing Attacks
• DHCP attacks: -DHCP starvation: attacking a DHCP server by sending a large amount of requests to it
-Rogue DHCP server attack: attacker sets up a rogue DHCP server to impersonate a legitimate DHCP server on the LAN; the rogue server can start issuing leases to the network’s DHCP clients Information provided to the clients by this rogue server can disrupt their network access, causing DoS
Password Sniffing: method used to steal passwords by monitoring the traffic that moves across the network and pulling out data including the data containing passwords After obtaining passwords, attackers can gain control over the network, access user accounts, sensitive meterial
Trang 33Types of Sniffing Attacks
• Spoofing Attacks: attacker successfully pretends to be someone else by falsifying data and thereby gains access to restricted resources or steals personal information Attacker can use victim’s IP address illegally to access their accounts, to send fraudulent emails, to set up fake website for acquiring sensitive information or set up fake wireless access points and simulate legitimate users to connect through the illegitimate connection
Trang 34What is Social Engineering
Trang 35Behaviors vulnerable to Attack
Trang 36Factors that make companies vulnerable to attack
Trang 37Why is Social Engineering effective?
Trang 38Phases in Social Engineering attack
Trang 39Các loại hình tấn công phổ biến
Trang 40What is a Denial of Service attack?
Trang 41What are Distributed Denial of Service attacks?
Trang 42How Distributed Denial of Service attacks work
Trang 43Symtoms of Denial of Service attack
Trang 44DoS attack Techniques
Trang 45What is Session Hijacking?
Trang 46Dangers posed by Hijacking
Trang 47Why Session Hijacking successful
Trang 48Key Session Hijacking Techniques
Trang 49Key Session Hijacking Techniques
• Brute forcing: involves making thousands of requests using all the available session IDs until the attacker gets
succeeded This technique is comprehensive but a time-consuming process
• Stealing: attacker uses various techniques to steal session IDs The techniques maybe installing trojans on client PCs, sniffing network traffic…
• Calculating: using non-randomly generated IDs, attacker tries to calculate the session IDs The number of attempts that need to be carried out for retrieving the session ID of the user or client depends on the key space of session IDs Therefore, the probability of success of this type of attack can be calculated based on the size and key space of session IDs
Trang 50Why Webservers are compromised
Trang 51Impact of Webserver attacks
Trang 52Webserver attack methodology
Trang 53• Information gathering: every attacker tries to collect as much information as possible about the target web server Once the information is gathered, attacker analyzes the gathered information in order to find the security lapses in the current mechanism over the web server
• Web server footprinting: gather more information about security aspects of a web server with the help of tools or footprinting techniques The main purpose is to know about its remote access capabilities, its ports and services, and the aspects of its security
• Mirroring website: method of copying a website and its content onto another server for offline browsing
Trang 54Webserver attack methodology
• Vulnerability scanning: method of finding various vulnerabilities and misconfigurations of a web server It is done with the help of various automated tools known as vulnerable scanners
• Session hijacking: is possible once the current session of the client is identified Complete control of the user session
is taken over by the attacker by means of session hijacking
• Hacking web server passwords: attackers use various password cracking methods like brute force attacks, hybrid attacks, dictionary attacks, etc and crack web server passwords
Trang 55What is SQL Injection
Trang 56SQL Injection attacks
Trang 57Types of SQL Injection
Trang 58Types of SQL Injection
• Blind SQL injection: wherever there is web application vulnerability, blind SQL injection can be used either to access the sensitive data or to destroy the data Attacker can steal the data by asking a series of true or false questions
through SQL statements
Trang 60Buffer Overflow
Trang 61Why are programs and applications vulnerable to Buffer overflow
Trang 62An example of Buffer overflow
Trang 63An example of Buffer overflow
Trang 64Đánh giá an toàn thông tin
Trang 66Security Audits
• IT security audit focus on people and processes used to design, implement and manage security on a network
• This is a baseline involved for processes and policies within an organization
• IT management usually initiates IT security audits
• In a computer, the security audit technical assessment of a system or application is done manually or automatic
Trang 67Security Audits
Trang 68• Perform a manual assessment by using the following techniques:
– Interviewing the staff
– Reviewing application and operationg systems access controls
– Analyzing physical access to the systems
• Perform an automatic assessment by uing the following techniques:
– Generating audit reports
– Monitoring and reporting the changes in the files
Trang 69Vulnerability Assessment
• Vulnerability assessment is a basic type of security
• Helps you in finding known security weaknesses by scanning a network
• Using scanning tools search network segments for IP-enabled devices and enumeration systems, operating systems and applications
• Using vulnerability scanners also identify common security mistakes such as accounts have weak passwords, files and folders with weak permissions, default services and application need to be uninstalled, mistakes in security
configuration
Trang 70Vulnerability Assessment
Trang 71Limitations of Vulnerability Assessment
Trang 72Penetration Testing
Trang 74Why Penetration Testing
Trang 75Comparing Security Audits, Vulnerability Assessment and Penetration Testing
Trang 76What should be tested
Trang 77What makes a good penetration testing
Trang 78External Penetration Testing
Trang 79Internal Penetration Testing
Trang 80Automated Testing
Trang 81Manual Testing
Trang 82Penetration Testing Techniques
Trang 83Phases of Penetration Testing
Trang 84• Pre-attack Phase: focus on gathering as much information as possible about the target organization or network to be attacked.
• Attack Phase: information gathered in the pre-attack phase forms the basis of the attack strategy
• Post-attack Phase: tester needs to restore the network to its original state This involves cleanup of testing processes and removal of vulnerabilities created (not those that existed originally)
Trang 86Patch Management
• According to statistics published by CERT/CC, the number of annual vulnerabilities catalogued has continued to rise, from 345 in 1996, to 8,064 in 2006 Put another way, identifiable software vulnerabilities have increased more than 20 times over the last decade
• Attackers are able to take advantage of newly discovered vulnerabilities in less time than ever
• It has been shown that the amount of time between the discovery of a software vulnerability and corresponding
attacks has been steadily decreasing
• There is also an increasing trend towards attack tools that exploit newly discovered vulnerabilities appearing well before any corresponding patch is released by the software vendor to fix a problem This situation is generally known
as a “zero-day attack”