Mister Disagree

"Be the change you wanna see in the world" - Michael Scofield

Lab Test

Lecture 9: Intrusion Detection System


Intruders
- Significant issue hostile/unwanted trespass - from benign to serious
- User trespass - unauthorized logon, privilege abuse
- Software trespass - virus, worm, or trojan horse
- Classes of intruders: - masquerader, misfeasor, clandestine user

-Security Intrusion & Detection

Security Intrusion - a security event, or combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so.

Intrusion Detection - a security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of attempts to access system resources in an unauthorized manner.


Hackers
1. motivated by thrill of access and status
2. benign intruders might be tolerable
3. IDS / IPS / VPNs can help counter

Intrusion Detection Systems
- Classify intrusion detection systems (IDSs) as:
1. Host-based IDS: monitor single host activity
2. Network-based IDS: monitor network traffic

- Logical components:
1. sensors - collect data
2. analyzers - determine if intrusion has
3. occurred
4. user interface - manage / direct / view IDS

IDS Principles
- assume intruder behavior differs from
- legitimate users
- from past history

IDS Requirements
- run continually
- be fault tolerant
- resist subversion
- impose a minimal overhead on system
- configured according to system security policies
- adapt to changes in systems and users
- scale to monitor large numbers of systems
- provide graceful degradation of service
- allow dynamic reconfiguration

Types of IDS
1. Host IDS
2. Network IDS
3. Distributed IDS

Intrusion Detection Techniques
- signature detection
- anomaly detection
- when potential violation detected sensor sends an alert and logs information

Anomaly Detection
- threshold detection
◦ checks excessive event occurrences over time
◦ alone a crude and ineffective intruder detector
◦ must determine both thresholds and time intervals

Signature Detection - observe events on system and applying a set of rules to decide if intruder

Honeypot
• are decoy systems
– filled with fabricated info
– instrumented with monitors / event loggers
– divert and hold attacker to collect activity info
– without exposing production systems
• initially were single systems
• more recently are/emulate entire networks



Lecture 10: Legal and Ethical Issues in Computer Security

Legal & Ethical
- Law
- a rule of conduct or action prescribed or formally recognized as binding or enforced by a controlling authority
- implies imposition by a sovereign authority and the obligation of obedience on the part of all subject to that authority
- Ethics
- a set of moral principles or values
- the principles of conduct governing an individual or a group
- an objectively defined standard of right and wrong

Categories of Law
- Civil law
- Criminal law
- Tort law

Categories of unethical and illegal behavior:
- Ignorance
- Accident
- Intent

Ethics Concept
- Ethical Differences Across Cultures
- Software License Infringement
- Illicit Use
- Misuse of Corporate Resources
- Ethics and Education
- Deterrence to Unethical and Illegal Behavior

Computer Crime
- A computer can be :
- attacked
- used to attack
- used as a means to commit crime

HACKING THE WIRELESS NETWORK


Tools: Backtrack 2 software
Victim: Wireless AP

Backtrack

BackTrack is a Linux distribution distributed as a Live CD which is used for penetration testing. It allows the user to include customizable scripts, additional tools and configurable kernels in personalized distributions.

Step 1: Download backtrack 2

Step 2: Installing Backtrack

Step 3: Starting backtrack

1. Start the virtual machine
2. Partition and mount the hard drive
The virtual SCSI hard drive in VMware is usually /dev/sda. We need to partition this drive and create a filesystem on which Backtrack 2 can be installed.
We will use fdisk to create 2 partitions - one for the filesystem and one for swap space.
fdisk /dev/sda
Enter each line below into fdisk’s prompt:

n
p
1

+7168M
n
p
2


W

* This will create a 7GB partition for the filesystem and a 1GB swap space. If you want more space on the filesystem (or if you made your virtual disk larger than 8GB), you can change +7168M to another number (in megabytes).

3. Create an ext3 filesystem on the first partition:
mkfs.ext3 /dev/sda1
4. Create swap space on the other:
mkswap /dev/sda2
5. Mount the drive:
mkdir /mnt/backtrack
mount /dev/sda1 /mnt/backtrack

6. Run startx to boot up KDE

7. Use the Backtrack installer
Start > System > Backtrack Installer
Leave the source blank
Install backtrack to: /mnt/backtrack
Write MBR to: /dev/sda
Select Real (2700 MB required) for the installation method
Click install. It could take awhile or hang at certain parts (seems to hang for awhile at 81% on my machine).


Chapter 7


Joining BBS



Roaming & channel
- roaming = walk/change away from initial AP network to another AP network

802.11a
- 54Mbps in 5Ghz range
- not compatible

802.11g
- 54Mbps in 2.4GHz range
- compatible

802.11b
- 11Mbps in 2.4GHz range
- compatible

Open system authentication
- Service Set Identifier (SSID)
- Station must specify SSID to connect to the AP

Interception
- signal week by 3 factor:
1. Wall
2. floor
3. interference

802.11
- 3 basic security service:
1. Authentication
2. Integrity - data will be encrypt by using WEP & WPA technique.
3. Confidential

* Some say WPA is much more secure than WEP but its actually depends on what type of shared key that actually base on ots library. the it use a simple library so it would be easy to crack and hack the network

Passive attack
- Attacker collect all trafic
- Attacker collect two message
1. encrypted with same key and IV
2. Statistical attack to reveal plain text
3. Plaintext X0R chipertext = keystream

Tool to crack the wireless AP
- Backtrack


Chapter 8

- Internet connectivity is essintial
- act as perimeter defence
- effective of firewall produce secure network

Capabilities
- Single chocke point that keep unauthorize user to get out from the protected network
- Provide location for monitoring security event

Type of firewall
1. Packet filtering firewall
2. statefull inspection firewall
3. Application level gateway (application proxy)
4. circuit level gateway

Firewall hosting
- Bastion host = single firewall that cover a network territory
- Host-base = single firewall protect a single workstation/server

VPN
- Create a secure LAN connection through an internet.
- outsider will tgought that we in a LAN network but actually we use the internet.

Distributed firewall
- A firewall installed per subnet in a network



Midterm Test

CHAPTER 5 (cont.)

* Who cause sequrity problem - Hacker, spy, student, businessman, ex - employee, terrorist

Network security problem area:
1. Authentication - hacker want to be an autheriza user, so they am this first.
2. Secracy - In the midle between sender and receiver.
3. Non- repudiation - deal with digital signature.
4. Integrity - Ensure that only authorize user allow to change the data.

Disadvantages of computing network
1. Sharing.
2. Complexity.
3. Unknown paramenter - alot of point on the network that possible to exploite to capture packet.
4. Ananomity - For a big network,we dont even know who at the other point. eg: some one may hack the DNS server before take over the website.
5. Sequrity exposure - Privacy, data integrity, authenticity, convert channel, impersonaty and evesdropping.

Theaten Network
1. Denial Of Service - DOS, DDOS
2. Packet replay - Capture packet that being sent to the AP that using WEP, but it use a lot of time so we use packet replay to dacoy the AP while sniffing the packet without change that packet's content.
3. Packet notification - capture and change the packet's content.

Network security control
1. Encryption
2. Strong authentication
3. IPSec, VPN, SSH
4. Karberos
5. Firewall (act as a roadbloack)
6. IDS (act as speedtrap)
7. IPS (act as grill)
8. Honeypot

Encryption
1. link to link
- cover layer 1 & 2 attack
- use switch layer 3 to prevent it
2. end to end
- Use application to encrypt send packet


IPSec
- Authentication & encapsulation
- Work on layer 3
- Only can be decrypt on the receiver side

SSL
- Combining of symmetric (on client host)and asymmetric (on server)algorithm

Karberos
- 1 server use to provide control authentication called as Karberos server
- Host need to have a ticket before able to send a packet to any server, 1 authentication server use to control the ticket.
-The ticket characteristic is unique, encrypted and have a life time period, since the life time is over the limit, client should request the new one before able to communicate to other server.

Firewall
- Differentiate the user whether it inside or outside the network.
- Basically hacker use the alternative way or tunneling to pass the firewall.
- Once the hacker already inside the network, firewall cant do anything.

IDS
- Capture packet and compare with the rule of IDS that installed and stored in database. If detect the malicious packet, an alert will be sent to admin so an admin can go to firewall device to block that particular packet.
- Based on attitude of admin and rule, admin must update the rule constantly so it would be still relevant.

IPS
- Scan the network, and if detect a malicious packet, IPS will send alert to access list on firewall, the firewall will directly block that particular packet.

Hacking involve:
1. Reconnaissance – gain general info on target host
2. Scanning
3. Gaining access
4. Maintaining access
5. Covering track


Chepter 6

Email
- 2 part:
- Header
- Body
- Send as text file format.
- Use MIME that allow us to an email that contain image file, attachment file or whatever.
- Non-encrypted because it just a plain text

S/MIME
- Encrypted content
- We can choose whether just want to send the email as plaintext or being encrypted.

Web security
- To secure our web/http
- Use SSL/TLS,SSH,SET

SSH
- Transfer data securely (encrypted)

Security in Network

Step 1: Start your virtual machine containing winserv03_server and winserv03_client.

Step 2: Set the IP address of your winserv03_server and winserv03_client and set them as host
only so they can communicate each other

Step 3: Install Information Services (IIS) with FTP at winserv03_server to enable FTP services

Step 4: installed then open Wireshark on winserv03_server

Step 5: Start FTP services

Step 6: Install IP Security Monitor

Step 7: Configure IPSec on server
1. Click [Start] | [Run] and then type mmc.
2. Management Console will appear and then, on the menu bar click [File] | [Add/Remove snap-in].
3. On the Add/Remove Snap-in box, click [Add] button and select the [IP Security Monitor] and click [OK].
4. Repeat step 3 by selecting IP Security Policy Management on Local Machine and then click [Finish].
5. On the Add/Remove Snap-in, click [OK].
6. In the right pane, right-click on [Secure Server (Require Security)] | [Properties].
7. In the Secure Server (Require Security) Properties dialog box, highlight All IP Traffic and click [Edit].
8. On the Edit Rule Properties dialog box, select the Authentication Method tab. Click add and screen New Authentication Method Properties will appear. Select Use this string (preshared key) and then type MSPRESS in the scroll box, then click OK. Make sure your client preshared key must be same as server preshared key
9. Highlight the Preshared Key and click the [Move up] button to make the preshared key as a first priority for the authentication. Click [Apply] | [OK].
10. Click [OK] on the [Secure Server (Require Security)] Properties dialog box and close it.
11. Right-click on [Secure Server (Require Security)], and click [Assign] from the pop-up menu.



Step 8: Configure on client
1. Click [Start] | [Run] and then type mmc.
2. Management Console will appear and on the menu bar click [File] | [Add/Remove snap-in].
3. On the Add/Remove Snap-in box, click [Add] button and select the [IP Security Monitor] and click [OK].
4. Repeat step 3 by selecting IP Security Policy Management on Local Machine and then click [Finish].
5. On the Add/Remove Snap-in, click [OK].
6. In the right pane, right-click on [Secure Server (Require Security)] | [Properties].
7. In the Client (Response Only) Properties dialog box, highlight and click [Edit].
8. On the Edit Rule Properties dialog box, select the [Authentication Method] tab. Click [add] and screen New Authentication Method Properties will appear. Select Use this string (preshared key) and then type MSPRESS in the scroll box, then click [OK].
9. Highlight the Preshared Key and click the Move up button to make the preshared key as a first priority for the authentication. Click [Apply] | [OK].
10. Click [OK] on the Client (Response Only) Properties dialog box and close it.
11. Right-click on Client (Response Only), and click [Assign].


Chepter 4 (Cont.)

Access Control - The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner
Access Control Requirements
- reliable input
- fine and coarse specifications
- least privilege
- separation of duty
- open and closed policies
- policy combinations, conflict resolution
- administrative policies
Access Control Elements
- subject = entity that can access objects
- object = access controlled resource
- access right = way in which subject accesses an object

ACCESS CONTROL MATRIX - Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that characterizes the rights of each subject with respect to every object in the system
Access control List
- access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.
File System Security

¨in Linux everything as a file
¤e.g. memory, device-drivers, named pipes, and
¨other system resources
¤hence why filesystem security is so important
¨I/O to devices is via a “special” file
¤e.g. /dev/cdrom
¨have other special files like named pipes
¤a conduit between processes / programs
Users and Groups
- user-account (user)
¤represents someone capable of using files
¤associated both with humans and processes
- group-account (group)
¤is a list of user-accounts
¤users have a main group
¤may also belong to other groups
- users & groups are not files
File Permissions
- files have two owners: a user & a group
- each with its own set of permissions
- with a third set of permissions for otherpermissions are to read/write/execute in order
- set using chmod command
Chepter 5: Security in Networks

- Computer Networks = A computing network is a computing environment with more than one independent processors


- Network resources:
1. Computers
2. Operating system
3. Programs
4. Processes
5. People


- network can provide logical interface function:
1. Sending messages
2. Receiving messages
3. Executing program
4. Obtaining status information
5. Obtaining status information on other network users and their status


- Basic terminology:


1. Node - Single computing system in a network.
2. Host - A single computing system's processor.
3. Link - A connection between two hosts.
4. Topology - The pattern of links in a network.


- Network Topology:
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Mesh Topology

- Open Systems Interconnection (OSI)

- Networks as System:
- Single System - Single set of security policies associated with each computing system.
- Each system concerned with:
-Operating system enforces its owns security policies.

- Advantages of Computing Networks:
1. Resource sharing
2. Increased reliability
3. Distributing the workload
4 Expandability

:: Web Application Security ::


Web scarab

* WebScarab is a web security application testing tool. It serves as a proxy intercepting browser web request and web server replies




Step 1: Install Webgoat browser














Step 2: Install java (*java app. is require to run your webscarab)

Step 3: Install webscarab

Step 4: Run it

AUTHENTICATION & ACCES CONTROL



Authentication = Verification of identity of someone who generated some data.
= Relates to identity verification.
= Protection against active attack (falsification of data and transactions).

Password
- Protection of passwords
¤Don’t keep your password to anybody.
¤Don’t write or login your password at everywhere.

- Choosing a good password
¤Criteria: Hard to guess and easy to remember
¤Characteristics: Not shorter than six characters & Not patterns from the keyboard.

- Calculations on password
¤Password population, N =rs
¤Probability of guessing a password = 1/N
¤Probability of success, P=nt/N

- Password Selecting Strategies:
¤User education
¤Computer-generated passwords
¤Reactive password checking
¤Proactive password checking
Biometric
- Biometrics is the measurement and statistical analysis of biological data
- In IT, biometrics refers to technologies for measuring and analysing human body characteristics for authentication purposes
- Biometric Identifiers:

1) Universality
2) Uniqueness
3) Stability
4) Collectability
5) Performance
6) Acceptability
7)Forge resistance

- Static vs. dynamic biometric methods
¤Static (also called physiological) biometric methods – authentication based on a feature that is always present
¤Dynamic (also called behavioural) biometric methods – authentication based on a certain behaviour pattern


- Major components:
¤Data collection
¤Signal processing
¤Matching
¤Decision
¤Storage
¤Transmission


Fingerprint authentication

- Basic steps for fingerprint authentication:
¤ Image acquisition
¤ Noise reduction
¤ Image enhancement
¤ Feature extraction
¤ Matching

Also cancelled...

Class was cancelled...

MODEN CRYPTOGRAPHY


Data Encyption Standard (DES)





ANSWER:


incoming...

Message authentication
- protect againts active attack
- verify receive message is authentic
- use conventional encryption / seperate authentication mechanism

Hash Function

- Hash value depends on algorithm
- algorithm (MD-5, SHA-1,SHA-256,384,512)
- produce fixed length output
- easy to compute
- one way property - once u give a number, no more same number at another time
- weak & strong collision resistence.


MD5 (Message-Digest algorithm 5)
- produce 128 bit output
- different size of input, same size of output
- not recommend


SHA-1 (Secure Hash Algorithm)
- SHA-1 = MD-5 + DSS (Digital signature standard)
- handle by NIST & NSA
- produce 160 bit MAC
- message block has 512 bit represent 32 word


SHA-256
- use 6 function
- each function operates on 32 bit
- message block has 512 bit represent 32 word



Digital Signature
- algorithm = (RSA & El Gamal)

Certification authority (NA)
- body that responsible to ensure/ justify that the public key that u've got from your admin its really came from him.

Validation Authority (VA)
- end users ask the VA if a given certificate is still valid and receive a yes or no answer.
Method of attack againts encryption information:
- Ciphertext - only attack
- Known plaintext
- Choosen plaintext
- Choosen ciphertext

Method of attack againts encryption system:
- Brute-Force attack
- Replay attack
- Man-in-the-middle
- Fault in Cryptosystem

Also cancelled...

Cancelled...



Stream cipher...
c = p OR k

* where c = chipertext, p = plaintext, k = key
- weakness: We can identify the key by XOR the ciphertext with plaintext
- same bit size for both key and message.
- example: 64 bit key for 64 bit data that be


Block cipher...
example:
- data bit's size =356
- cryptography algorithm block = 256
so..
- 1st block contain 256 bit of data
- 2nd block contain 100 bit of data plus 56 additional bit to complete the block


DES (Data Encryption Standard)...
- 64 bit of data
- through 16 times of process
- while the key is changes each time through the process
- 56 bit of key + 8 bit of priority
- nowadays, it improved to become "triple DES" which 64 times of process during the encryption process

AES (Advance Encryption Standard)...
- also known as rijndael cryptography
- AES cipher has a 128-bit block size
- key
sizes of 128, 192 and 256 bits

Postponed...
UTeM been attacked by H1N1 pendemic...

Postponed...
UTeM been attacked by H1N1 pendemic...