KULIAH II THREAT AND ATTACK (1)

Slides:



Advertisements
Presentasi serupa
INTRO (TO BPOS). What is BPOS? Apakah BPOS itu? •BPOS = (Microsoft) Business Productivity Online Suite (Service) •adalah sebuah layanan online Microsoft,
Advertisements

Developing Knowledge Management dalam perusahaan Week 10 – Pert 19 & 20 (Off Class Session)
Presented at “Indonesia MS Access Community Gathering 2012” By Haer Talib, Access MVPHaer Talib Auditorium PT Microsoft Indonesia, 19 April 2012.
INTRO TO BPOS ( Coffey’s Project Portal). What is BPOS? Apakah BPOS itu? •BPOS = (Microsoft) Business Productivity Online Suite (Service) •adalah sebuah.
This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All.
ENHANCED YOUR NETWORK with D-Link Integrated Solution Live Demo October - November 2008 D-Link Indonesia.
PEMOGRAMAN BERBASIS JARINGAN
SOCIAL MEDIA Widianto Nugroho, S.Sn. |
Hadi Syahrial (Health IT Security Forum)
Aplikasi dan Pemrograman Jaringan
Page 1 of 62 ADSL Wireless Modem Router Produk. Page 2 of 62 D-LINK ADSL Produk DSL-2640TDSL-2600U.
Program Keahlian I – SI By Antonius Rachmat C, S.Kom
FootPrinting & Scanning Target
IT SEBAGAI ALAT UNTUK MENCIPTAKAN KEUNGGULAN KOMPETISI
DRAINASE JALAN KERETA API
Process to Process Delivery
Kasmawi, S.Kom (Networking ) The Lecturer of information technology program Politechnic of Bengkalis
Antivirus Tools Backup Tools Multimedia Tools Network Tools Password Tools.
Slide 3-1 Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Revised by IB & SAM, Fasilkom UI, 2005 Exercises Apa saja komponen utama.
Teknologi Open Source (pertemuan 3) Open Source vs Free Software oleh Razief Perucha F.A D3-Manajemen Informatika Jurusan Matematika – FMIPA Universitas.
Taken From William Stallings Chapter 2 TCP/IP Models.
Introduction to The Design & Analysis of Algorithms
IF-ITB/SAS/25Aug2003 IF7074 – Bagian Pertama Page 1 IF 7047 Kewirausahaan Teknologi Informasi Bagian Pertama: 1.1. Entrepreneurship, entrepreneur, dan.
Database Create-Retrieve-Update-Delete (CRUD)
IT , Jaringan,Internet,E-commerce
PROSES PADA WINDOWS Pratikum SO. Introduksi Proses 1.Program yang sedang dalam keadaan dieksekusi. 2.Unit kerja terkecil yang secara individu memiliki.
1. Objek dalam kalimat aktif menjadi subjek dalam kalimat pasif
M. Suwarso Kegiatan Lembaga Standarisasi Internasional Dalam Hal Telepon Internet Telepon Internet.
Could not load an object because it is not avaliable on this machine. Tidak dapat memuat sebuah benda karena tidak tersedia pada mesin ini.
KULIAH X FIREWALL KOM Keamanan Jaringan 2012/2013 KOM Keamanan Jaringan 2012/2013.
Sistem Teknologi Informasi Perbankan Materi setelah UTS
Implementing an REA Model in a Relational Database
KULIAH I INTRODUCTION TO NETWORK SECURITY Imam Bukhari, S.Kom KOM Keamanan Jaringan 2012/2013 KOM Keamanan Jaringan 2012/2013.
MEMORY Bhakti Yudho Suprapto,MT. berfungsi untuk memuat program dan juga sebagai tempat untuk menampung hasil proses bersifat volatile yang berarti bahwa.
Ancamanan Keamanan Informasi Pada Industri Finansial Universitas Bina Darma Palembang – 20 Juni 2014 Digit Oktavianto digit.
2nd MEETING Assignment 4A “Exploring Grids” Assignment 4 B “Redesign Grids” Create several alternatives grid sysytem using the provided elements: (min.
BENTUK ING VERB + ING. Bentuk ING juga biasa disebut dengan ING form Meskipun pembentukannya sangat se- derhana tetapi penggunaannya mem- punyai aturan.
Slide 1 QUIS Langkah pertama caranya Buat di slide pertama judul Slide kedua soal Slide ketiga waktu habis Slide keempat jawaban yang benar Slide kelima.
Selamat Datang Peserta Workshop
LOGO Manajemen Data Berdasarkan Komputer dengan Sistem Database.
Definisi VLAN Pemisahan jaringan secara logis yang dilakukan pada switch Pada tradisional switch, dalam satu switch menunjukkan satu segmentasi LAN.
MODELS OF PR SYIFA SA. Grunig's Four models of Public Relations Model Name Type of Communica tion Model Characteristics Press agentry/ publicity model.
Metodologi Penelitian dalam Bidang Informatika
3.1 © 2007 by Prentice Hall OVERVIEW Information Systems, Organizations, and Strategy.
Diagnose device problems that connected to the Wide Area Network Identify problems Through the Symptoms that arise HOME.
SMPN 2 DEMAK GRADE 7 SEMESTER 2
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Fungsi dan Protokol Layer Aplikasi Network Fundamentals – Chapter 3.
MAINTENANCE AND REPAIR OF RADIO RECEIVER Competency : Repairing of Radio Receiver.
Via Octaria Malau Transfer (Internal Transfers) Transfer (Transfers Internal) Select the account from which funds are to be transferred FROM and then select.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Pengalamatan Jaringan – IPv4 Dosen Pengampu: Resi Utami Putri, S.Kom.,
TCP, THREE-WAY HANDSHAKE, WINDOW
Mengapa Strategi Gagal Diterapkan?
Web Teknologi I (MKB511C) Minggu 12 Page 1 MINGGU 12 Web Teknologi I (MKB511C) Pokok Bahasan: – Text processing perl-compatible regular expression/PCRE.
Slide 1 Chapter 1: Introduction to Systems Analysis and Design Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc.
Keamanan Web.
Pemrograman Internet Mobile 7 PHP: Hypertext Preprocessors.
Proses Serangan terhadap Jaringan Komputer
Electronic Engineering Polytechnic Institut of Surabaya – ITS Kampus ITS Sukolilo Surabaya Portsentry.
1 Eksplotasi Keamanan. 2 Tujuan Setelah perkuliahan ini mahasiswa dapat menjelaskan :  cara intruder mengekploitasi lubang-lubang keamanan  hack anatomi.
CARA KERJA WEB Rofilde Hasudungan.
TCP & UDP.
PEMROGRAMAN WEB 1 PERTEMUAN 1
How to Set Up AT&T on MS Outlook ATT is a multinational company headquartered in Texas. ATT services are used by many people widely across.
V ERIZON SETTINGS FOR I P HONE, A NDROID, O UTLOOK, AND W INDOWS P HONE.
HughesNet was founded in 1971 and it is headquartered in Germantown, Maryland. It is a provider of satellite-based communications services. Hughesnet.
Here you'll find the complete solution about how to set up Roadrunner settings for iPhone, Android, Windows Phone and Outlook. Unable to set up Roadrunner.
 Zoho Mail offers easy options to migrate data from G Suite or Gmail accounts. All s, contacts, and calendar or other important data can be imported.
Fix problems opening Norton  Fix problems opening Norton This problem can happen after you update Norton. To fix the matter, restart the computer. Fix.
In this article, you can learn about how to synchronize AOL Mail with third-party applications like Gmail, Outlook, and Window Live Mail, Thunderbird.
What is Kerberos? Network Security.
Transcript presentasi:

KULIAH II THREAT AND ATTACK (1) Aswin Suharsono KOM 15008 Keamanan Jaringan 2012/2013

Overview Threat Vulnerability Attack Fase-fase serangan terhadap keamanan Phase 1: Reconaissance Phase 2: Scanning Phase 3: Gaining Access Using Application & OS Attack

Threat1) Threat (ancaman) dalam keamanan jaringan adalah semua hal yang dapat mengganggu operasi, fungsi, confidentiality, integrity, availability dari jaringan atau sistem. Terdapat ancaman alamiah seperti banjir, gempa dan gunung meletus. Terdapat ancaman sebagai akibat dari kecelakaan dan kebodohan salah satu pihak yang terkait dengan sistem. Terdapat ancaman akibat pihak lain diluar sistem yang berniat jahat terhadap sistem. Setiap ancaman dapat berbahaya terhadap sistem. 1) John E. Canavan, Fundamentals of Network Security, Artech House

Threat

Threat Dalam kuliah ini kita fokus kepada ancaman akibat kecerobohan orang dalam, dan ancaman yang berasal dari pihak luar yang bermaksud jahat. Tidak banyak yang dapat dilakukan untuk mencegah ancaman akibat bencana alam. Upaya yang dapat dilakukan antara lain, menyediakan backup data dan server di tempat lain. Banyak berdo’a mungkin solusi terbaik. :D

Vulnerability Vulnerabilities adalah kelemahan dalam desain, konfigurasi, implementasi atau manajemen jaringan atau sistem yang membuat sistem rentan terhadap ancaman. Setiap sistem dan jaringan pasti memiliki kelemahan. 1) 1) John E. Canavan, Fundamentals of Network Security, Artech House

Attack Serangan (Attack) adalah upaya untuk mengeksploitasi kelemahan sistem. Mengakibatkan gangguan yang berkaitan dengan Confidentiality, Integrity dan Availability. Serangan terhadap confidentiality misalnya upaya untuk mengetahui data rahasia seseorang dengan menyadap (sniffing) percakapan pada jaringan. Serangan terhadap Integrity misalnya upaya untuk memalsukan pesan dari atasan ke bawahan. Serangan terhadap Availability misalnya upaya untuk membuat sistem mati. 1) John E. Canavan, Fundamentals of Network Security, Artech House

Attack Dua tipe serangan, Aktif dan Pasif. Serangan Aktif merupakan serangan yang menyebabkan akibat aktif dan memiliki efek yang terlihat nyata. Contoh: membuat sistem mati (down) Serangan Pasif merupakan serangan yang diam-diam, tidak terdapat aktivitas atau akibat yang kasat mata. Contoh serangan pasif adalah penyadapan (sniffing). Serangan Pasif lebih sulit untuk dideteksi. Serangan Aktif lebih mudah dideteksi. Tetapi saat terdeteksi biasanya akibatnya sudah fatal. 1) John E. Canavan, Fundamentals of Network Security, Artech House

Fase-fase serangan serangan2) 2) Certified Ethical Hacker (CEH) module v6.0

1. Reconnaissance Finding as much information about the target as possible before launching the first attack packet Reconnaissance techniques Low tech methods General web searches Whois databases DNS 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Low-Technology Reconnaissance Social Engineering Physical Break-In Dumpster Diving 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Reconnaissance via Searching the Web Searching an organization’s own web site Using search engines Listen in at the virtual watering hole: USENET 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Searching an Organization’s Own Web Site Employees’ contact information and phone numbers Clues about the corporate culture and language Business partners Recent mergers and acquisitions Server and application platforms in use 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Searching the Web

Searching the web

Searching the web

Whois Databases Contain information regarding assignment of Internet addresses, domain names, and individual contacts Internet Corporation for Assigned Names and Numbers (ICANN) InterNIC’s whois database available at www.internic.net/whois.html Whois database for organizations outside the United States available at ALLwhois web site Whois database for U.S. military organizations available at whois.nic.mil Whois database for U.S. government agencies available at whois.nic.gov Network Solutions whois database 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Whois search

2. Scanning After the reconnaissance phase, the attacker is armed with some vital information about the target infrastructure: a handful of telephone numbers, domain names, IP addresses, and technical contact information—a very good starting point. Most attackers then use this knowledge to scan target systems looking for openings. This scanning phase is akin to a burglar turning doorknobs and trying to open windows to find a way into a victim's house. 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Vulnerability Scanning Tools 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Network Mapping Finding live hosts ICMP pings TCP/UDP packets 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Traceroute Traceroute utility on most Unix platforms sends out UDP packets with incremental TTL values to trigger ICMP Time Exceeded messages Tracert utility on Microsoft platform sends out ICMP packets with incremental TTL values to trigger ICMP Time Exceeded replies 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Traceroute 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Traceroute

Traceroute 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Cheops A nifty network mapper tool Available at http://www.marko.net/cheops Runs on Linux Generates network topology by using ping sweeps and traceroute Supports remote operating system identification using TCP Stack Fingerprinting

Figure 6.5 The Cheops display

Defenses against Network Mapping Block incoming ICMP messages at Internet gateway to make ping ineffective Filter ICMP Time Exceeded messages leaving your network to make traceroute ineffective 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Port Scanning Used to find open ports Free port scanning tools Nmap available at www.insecure.org/Nmap Strobe at http://packetstorm.securify.com/UNIX/scanners Ultrascan for NT available at http://packetstorm.securify.com/Unix/scanners 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Nmap Full-featured port scanning tool Unix version available at http://www.insecure.org/Nmap Windows NT version available at http://www.eeye.com/html/Databases/Software/Nmapnt.html 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Scan Types supported by Nmap TCP Connect (-sT) Attempts to completes 3-way handshake with each scanned port Sends SYN and waits for ACK before sending ACK Tears down connection using FIN packets If target port is closed, sender will received either no response, a RESET packet , or an ICMP Port Unreachable packet. Not stealthy

Defenses against Port Scanning Unix systems remove all unneeded services in /etc/inetd.conf Remove unneeded services in /etc/rc*.d Windows systems uninstall unneeded services or shut them off in the services control panel Scan your own systems before the attackers do Use stateful packet filter or proxy-based firewall blocks ACK scans Blocks FTP data source port scans 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

3. Gaining Access 3.1 Gaining Access using OS and Application Attacks At this stage of the siege, the attacker has finished scanning the target network, developing an inventory of target systems and potential vulnerabilities on those machines. Next, the attacker wants to gain access on the target systems. The particular approach to gaining access depends heavily on the skill level of the attacker, with simple script kiddies trolling for exploits and more sophisticated attackers using highly pragmatic approaches. 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Script Kiddie Exploit Trolling

Password Guessing Attacks Users often choose passwords that are easy to remember, but are also easily guessed default passwords used by vendors left unchanged Database of vendor default passwords http://security.nerdnet.com 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

An online database of default passwords

Password Guessing through Login Scripting THC-Login Hacker tool http://thc.inferno.tusculum.edu Authforce http://kapheine.hypa.net/authforce/index.php brute_ssl and brute_web http://packetstrom.security.com/Exploit_Code_archive/brute_ssl.c http://packetstrom.security.com/Exploit_Code_archive/brute_web.c Windows NT password guessing http://packetstorm.securify.com/NT/audit/nt.remotely.crack.nt.passwords.zip Xavier http://www.btinernet.com/~lithiumsoft/ Guessing email passwords using POP3 protocol: Hypnopaedia http://packetstorm.securify.com/Crackers/hypno.zip Other password guessing tools http://packetstorm.securify.com/Crackers

Password Cracking More sophisticated and faster than password guessing through login script Requires access to a file containing user names and encrypted passwords Dictionary attacks Brute force attacks Hybrid dictionary and brute force attacks 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Password Cracking Tools L0phtCrack, a Windows NT/2000 password cracker http://www.l0pht.com/l0phtcrack John the Ripper, a Unix password cracker http://www.openwall.com/john Crack, a Unix password cracker http://www.users.diron.co.uk/~crypto/ Pandora, a password cracker for Novell http://www.nmrc.org/pandora PalmCrack, a Windows NT and Unix password cracker that runs on the Palm OS PDA platform http://www.noncon.org/noncon/download.html

Web Application Attacks Can be conducted even if the Web server uses Secure Sockets Layer (SSL) SSL used to authenticate the Web server to the browser SSL used to prevent an attacker from intercepting traffic SSL can be used to authenticate the client with client-side certificates Web attacks can occur over SSL-encrypted connection Account harvesting Undermining session tracking SQL Piggybacking 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Account Harvesting Technique used to determine legitimate userIDs and even passwords of a vulnerable application Targets the authentication process when application requests a userID and password Works against applications that have a different error message for users who type in an incorrect userID 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

Account Harvesting Defenses Make sure that error message is the same when a user types in an incorrect userID or password 3) Ed Skoudis, Counter Hack Reloaded, Prentice Hall

To Be Continued ....